chilly-toddler-80124
02/14/2023, 7:54 PMwide-garage-9465
02/14/2023, 7:55 PMchilly-toddler-80124
02/14/2023, 8:04 PMwide-garage-9465
02/14/2023, 8:07 PMchilly-toddler-80124
02/14/2023, 8:12 PMwide-garage-9465
02/14/2023, 8:19 PMchilly-toddler-80124
02/15/2023, 9:30 AMapiVersion: v1
kind: ServiceAccount
metadata:
# name: admin-user
name: admin@k3d-mycluster
namespace: kubernetes-dashboard
and apply it: ~# kubectl apply -f dashboard-adminuser.yamlapiVersion: <http://rbac.authorization.k8s.io/v1|rbac.authorization.k8s.io/v1>
kind: ClusterRoleBinding
metadata:
# name: admin-user
name: admin@k3d-mycluster
roleRef:
apiGroup: <http://rbac.authorization.k8s.io|rbac.authorization.k8s.io>
kind: ClusterRole
name: cluster-admin
subjects:
- kind: ServiceAccount
# name: admin-user
name: admin@k3d-mycluster
namespace: kubernetes-dashboard
Is it again? kubectl apply -f clusterrolebinding.yamlwide-garage-9465
02/15/2023, 9:43 AMURL like this: http://localhost:8001/api/v1/namespaces/kubernetes-dashboard/services/https:kubernetes-dashboard:/proxy/How did you get to this? 🤔
chilly-toddler-80124
02/15/2023, 9:49 AMkubectl apply -f <https://raw.githubusercontent.com/kubernetes/dashboard/v2.7.0/aio/deploy/recommended.yaml>
it is okay too.wide-garage-9465
02/15/2023, 9:52 AMchilly-toddler-80124
02/15/2023, 10:09 AM# name: admin-user
name: admin@k3d-mycluster