-
Notifications
You must be signed in to change notification settings - Fork 308
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
az aks dashboard is empty "There is nothing to display here" #1573
Comments
I have the same issue |
Good, I'm not alone! :) |
I deployed a new AKS cluster with k8s v1.15.10 using the Azure Portal. After the deployment was finished, I was able to see relevant data (pods, namespaces, etc) on the k8s Dashboard. I upgraded the cluster to k8s v1.16.7 via the Azure Portal. Viewing the Dashboard after the upgrade, I only see "There is nothing to display here". I deleted clusterrolebinding kubernetes-dashboard, then recreated it as cluster-admin. I am still seeing "There is nothing to display here". I then upgraded to k8s v1.17.3. I see the same "There is nothing to display here" in the Dashboard. |
I assume it’s due to missing permissions. |
In My case, I solved this way.
reference : https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#-em-clusterrolebinding-em- |
@KwonHyuck it works! Thank you! |
@KwonHyuck work for me too, except it was not as straightforward. kubectl delete clusterrolebinding kubernetes-dashboard kubectl create clusterrolebinding kubernetes-dashboard --clusterrole=cluster-admin --serviceaccount=kube-system:kubernetes-dashboard --user=clusterUser I'm like, WTF? :( kubectl delete clusterrolebinding kubernetes-dashboard kubectl delete clusterrolebinding kubernetes-dashboard kubectl create clusterrolebinding kubernetes-dashboard --clusterrole=cluster-admin --serviceaccount=kube-system:kubernetes-dashboard --user=clusterUser kubectl delete clusterrolebinding kubernetes-dashboard kubectl delete clusterrolebinding kubernetes-dashboard -n kube-system kubectl create clusterrolebinding kubernetes-dashboard --clusterrole=cluster-admin --serviceaccount=kube-system:kubernetes-dashboard --user=clusterUser And it started working now! |
The same problem for fresh installed AKS v 1.18.2 |
I can see 1.17.5 (preview), but not any 1.18.* |
same issue, no luck! |
@ecc256 solution above worked for me. |
As of v1.10.1 of the Kubernetes dashboard or kubernetes v1.16+ the service account "kubernetes-dashboard" can no longer be used to retrieve resources due to a security fix in that release. Thus the 'clusterUser' works. |
Thats work for me. thanks! |
This solves for me |
I just fixed this issue for a fresh 1.17.7 installation using @ecc256 solution. Not specifying |
finally got this fixed by above lines.. |
You don't need to delete the old clusterrolebinding and you can just assign a unique name.
|
it's also worked for me, thanks brother :-) |
Action required from @Azure/aks-pm |
Action required from @qpetraroia. |
Hi everyone, The reason why you are having issues using the Kubernetes dashboard is because the dashboard no longer uses the service account identity. This was a part of a security fix which you can read here kubernetes/dashboard#3400. If you are just copying the clusterUser role or using the kubeconfig, a workaround you can implement is to grant permissions to clusterUser. An example of this is below.
However, the AKS team recommends that you use an AAD enabled cluster and have each user use its own token and respective permissions instead of giving the clusterUser clusterAdmin privileges. You can also use the Azure Portal as we are in the process of deprecating the dashboard. You can see more here https://docs.microsoft.com/en-us/azure/aks/kubernetes-portal. Thank you! |
Thanks for reaching out. I'm closing this issue as it was marked with "Answer Provided" and it hasn't had activity for 2 days. |
It works for me. Thanks for saving my time. |
Frustating it is, It was working before and suddenly it stopped and getting the above error Stuck |
Please refer to @qpetraroia's comment for explanation and workaround Please consider using the Azure Portal resource view instead of exposing and granting additional permissions to your clusterUser or continuing to use the k8s dashboard |
What is right way to fix az k8s dashboard?
Kubernetes version 1.16.7
kubectl works properly
Tried this and recreated
ClusterRoleBinding
kubectl delete clusterrolebinding kubernetes-dashboard
followed by
kubectl create clusterrolebinding kubernetes-dashboard --clusterrole=cluster-admin --serviceaccount=kube-system:kubernetes-dashboard
orkubectl create clusterrolebinding kubernetes-dashboard -n kube-system --clusterrole=cluster-admin --serviceaccount=kube-system:kubernetes-dashboard
Got dashboard login prompt.
With Token auth got:
Unauthorized (401): Invalid credentials provided
with Kubeconfig it shows dashboard with all items "There is nothing to display here"
and tons of notification similar to this post
cronjobs.batch is forbidden: User "clusterUser" cannot list resource "cronjobs" in API group "batch" in the namespace "default"
secrets is forbidden: User "clusterUser" cannot list resource "secrets" in API group "" in the namespace "default"
events is forbidden: User "clusterUser" cannot list resource "events" in API group "" in the namespace "default"
pods is forbidden: User "clusterUser" cannot list resource "pods" in API group "" in the namespace "default"
replicationcontrollers is forbidden: User "clusterUser" cannot list resource "replicationcontrollers" in API group "" in the namespace "default"
events is forbidden: User "clusterUser" cannot list resource "events" in API group "" in the namespace "default"
pods is forbidden: User "clusterUser" cannot list resource "pods" in API group "" in the namespace "default"
statefulsets.apps is forbidden: User "clusterUser" cannot list resource "statefulsets" in API group "apps" in the namespace "default"
configmaps is forbidden: User "clusterUser" cannot list resource "configmaps" in API group "" in the namespace "default"
persistentvolumeclaims is forbidden: User "clusterUser" cannot list resource "persistentvolumeclaims" in API group "" in the namespace "default"
events is forbidden: User "clusterUser" cannot list resource "events" in API group "" in the namespace "default"
pods is forbidden: User "clusterUser" cannot list resource "pods" in API group "" in the namespace "default"
replicasets.apps is forbidden: User "clusterUser" cannot list resource "replicasets" in API group "apps" in the namespace "default"
ingresses.extensions is forbidden: User "clusterUser" cannot list resource "ingresses" in API group "extensions" in the namespace "default"
services is forbidden: User "clusterUser" cannot list resource "services" in API group "" in the namespace "default"
events is forbidden: User "clusterUser" cannot list resource "events" in API group "" in the namespace "default"
pods is forbidden: User "clusterUser" cannot list resource "pods" in API group "" in the namespace "default"
Tried to google - everybody says recreating
ClusterRoleBinding
should do it for az aks...Don't know what to try next...
Clicking on top right icon in all empty dashboard shows:
'logged in with token'
I can perform all admin actions kubectl...
The text was updated successfully, but these errors were encountered: