incalculable-sundown-82514
02/06/2019, 7:19 PMincalculable-sundown-82514
02/06/2019, 7:19 PM-d
enables debug logging)little-river-49422
02/06/2019, 7:20 PMincalculable-sundown-82514
02/06/2019, 7:20 PMlittle-river-49422
02/06/2019, 8:08 PMincalculable-sundown-82514
02/06/2019, 8:10 PMincalculable-sundown-82514
02/06/2019, 8:10 PMincalculable-sundown-82514
02/06/2019, 8:11 PMlittle-river-49422
02/06/2019, 8:11 PMlittle-river-49422
02/06/2019, 8:11 PMlittle-river-49422
02/06/2019, 8:13 PMincalculable-sundown-82514
02/06/2019, 8:14 PMlittle-river-49422
02/06/2019, 8:17 PMlittle-river-49422
02/06/2019, 8:19 PMincalculable-sundown-82514
02/06/2019, 8:19 PMlittle-river-49422
02/06/2019, 8:21 PMincalculable-sundown-82514
02/06/2019, 8:21 PMlittle-river-49422
02/06/2019, 8:22 PMwhite-balloon-205
little-river-49422
02/06/2019, 8:24 PMwhite-balloon-205
little-river-49422
02/06/2019, 8:28 PMlittle-river-49422
02/06/2019, 8:29 PMwhite-balloon-205
little-river-49422
02/06/2019, 8:46 PMlittle-river-49422
02/07/2019, 5:12 PMlittle-river-49422
02/07/2019, 5:12 PMlittle-river-49422
02/07/2019, 7:33 PMlittle-river-49422
02/07/2019, 9:20 PMRoleBinding(
"orleans-rbac-rb",
metadata={
"name": "orleans-rbac",
"namespace": "default"
},
role_ref={
"apiGroup": "<http://rbac.authorization.k8s.io|rbac.authorization.k8s.io>",
"kind": "ClusterRole",
"name": "orleans-rbac"
},
subjects=[
{
"kind": "ServiceAccount",
"name": "orleans-rbac",
"namespace": "default"
}
]
)
this binds to a clusterrole, but thats intentional. it should be the reason to fail anyway. no way pulumi can know I have or not have that role, nor should it carelittle-river-49422
02/07/2019, 9:20 PM