Created
January 19, 2020 21:17
-
-
Save kingdonb/cc325766bb7a24fbd93515f273a07a5d to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
10:01 -!- yebyen [[email protected]] has joined #honkctl-jan | |
10:01 -!- Topic for #honkctl-jan: https://gist.githubusercontent.com/jeefy/ee705f2838f237d46d2c8fd756abb395/raw/a866e3b207cd6d07bf2b145399a2ce85a30dd139/honkctl-jan | |
10:01 -!- Topic set by jeefy [uid114104@gateway/web/irccloud.com/x-zgoztgdtahgzdpfo] [Fri Jan 17 20:05:37 2020] | |
10:01 [Users #honkctl-jan] | |
10:01 [@jeefy ] [ bdimcheff] [ fronkchie ] [ yebyen] | |
10:01 [@mrbobbytables] [ fraq ] [ randohacker] | |
10:01 -!- Irssi: #honkctl-jan: Total of 7 nicks [2 ops, 0 halfops, 0 voices, 5 normal] | |
10:01 -!- Channel #honkctl-jan created Thu Jan 16 23:17:40 2020 | |
10:01 -!- Irssi: Join to #honkctl-jan was synced in 0 secs | |
10:01 -!- xmudrii [[email protected]] has joined #honkctl-jan | |
10:01 -!- honkctl [[email protected]] has joined #honkctl-jan | |
10:05 < xmudrii> !honkctl get no -o wide | |
10:06 <@mrbobbytables> 👋 | |
10:06 <@mrbobbytables> it'll take about 3 min to spin up a cluster | |
10:06 < yebyen> !honkctl get crd | |
10:07 < bdimcheff> !honkctl I'm still in bed but you might as well spin up a cluster | |
10:07 <@jeefy> I've been up for 3 hours Brandon get real | |
10:07 <@mrbobbytables> 5 here =p | |
10:07 < honkctl> Error from server (Forbidden): nodes is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "nodes" in API group "" at the cluster scope | |
10:08 <@jeefy> There's @mudrii's | |
10:08 <@jeefy> There's @xmudrii's | |
10:08 < xmudrii> I want to go to the bed already... and it's just 4 pm | |
10:08 <@jeefy> LOL | |
10:08 <@mrbobbytables> lol | |
10:08 < xmudrii> !honkctl auth can-i --list | |
10:08 < honkctl> Resources Non-Resource URLs Resource Names Verbs | |
10:08 < honkctl> selfsubjectaccessreviews.authorization.k8s.io [] [] [create] | |
10:08 < honkctl> selfsubjectrulesreviews.authorization.k8s.io [] [] | |
10:08 < honkctl> ... | |
10:08 < honkctl> NAME CREATED AT | |
10:08 < honkctl> todos.honk.ci 2020-01-18T15:06:46Z | |
10:09 <@jeefy> That should be @yebyen | |
10:09 < yebyen> !honkctl get todos -o name | |
10:09 < honkctl> todo.honk.ci/todo-1 | |
10:09 < honkctl> todo.honk.ci/todo-2 | |
10:09 < honkctl> todo.honk.ci/todo-3 | |
10:09 < honkctl> todo.honk.ci/todo-4 | |
10:09 < honkctl> todo.honk.ci/todo-5 | |
10:09 < yebyen> !honkctl get todos -o jsonpath='{@}' | |
10:09 < honkctl> 'map[apiVersion:v1 items:[map[apiVersion:honk.ci/v1 kind:Todo metadata:map[annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"honk.ci/v1","kind":"Todo","metadata":{"annotations":{},"name":"todo-1"},"spec":{"hint":"Sometimes one must become that t | |
10:09 < honkctl> ... | |
10:09 -!- gooseguy [[email protected]] has joined #honkctl-jan | |
10:09 < yebyen> !honkctl get todos -o jsonpath='{.data}' | |
10:09 < honkctl> '' | |
10:10 < honkctl> Error: unknown command "I'm" for "kubectl" | |
10:10 < honkctl> Run 'kubectl --help' for usage. | |
10:10 < gooseguy> !honkctl | |
10:10 < yebyen> !honkctl get crd todo -o json | |
10:10 < honkctl> Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "todo" not found | |
10:10 < bdimcheff> mrbobbytables did you sleep 3h? | |
10:10 < yebyen> !honkctl get crd todo.honk.ci -o json | |
10:10 < honkctl> Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "todo.honk.ci" not found | |
10:10 < yebyen> !honkctl get crd todos.honk.ci -o json | |
10:10 < honkctl> { | |
10:10 < honkctl> "apiVersion": "apiextensions.k8s.io/v1", | |
10:10 < honkctl> "kind": "CustomResourceDefinition", | |
10:10 < honkctl> "metadata": { | |
10:10 < honkctl> "annotations": { | |
10:10 < honkctl> "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"apiextensions.k8s.io/v1\",\"kind\":\"CustomResourceDefinition\ | |
10:10 < honkctl> ... | |
10:10 < gooseguy> !honkctl version | |
10:10 < honkctl> Cluster is still starting. Please wait for the response from first command. | |
10:10 < yebyen> !honkctl get crd todos.honk.ci -o jsonpath='{.spec}' | |
10:10 < honkctl> 'map[conversion:map[strategy:None] group:honk.ci names:map[kind:Todo listKind:TodoList plural:todos shortNames:[td] singular:todo] scope:Cluster versions:[map[additionalPrinterColumns:[map[description:An important task jsonPath:.spec.todo name:Todo type:string]] name:v1 sche | |
10:10 < honkctl> ... | |
10:10 <@mrbobbytables> @bdimcheff about 4 hours | |
10:11 < xmudrii> !honkctl get todos -o jsonpath='{.items[0].spec.hint}' | |
10:11 < honkctl> 'Sometimes one must become that they honk to reach ones goals.' | |
10:11 < xmudrii> !honkctl get todos -o jsonpath='{.items[0].spec}' | |
10:11 < honkctl> 'map[hint:Sometimes one must become that they honk to reach ones goals. todo:Steal the groundskeepers keys.]' | |
10:11 < xmudrii> !honkctl get todos -o jsonpath='{.items[0].status}' | |
10:11 < honkctl> '' | |
10:11 < xmudrii> !honkctl get todos -o jsonpath='{.items[1].spec}' | |
10:11 < honkctl> 'map[hint:Let's go to the Winchester, have a nice cold pint, and wait for this all to blow over. todo:Get to the Pub.]' | |
10:11 < xmudrii> !honkctl get todos -o jsonpath='{.items[2].spec}' | |
10:11 < honkctl> 'map[hint:the grizzly knows the way todo:Get into the model-village.]' | |
10:11 < xmudrii> !honkctl get todos -o jsonpath='{.items[3].spec}' | |
10:11 < honkctl> 'map[hint: todo:Steal the beautiful minature golden bell.]' | |
10:11 < xmudrii> !honkctl get todos -o jsonpath='{.items[4].spec}' | |
10:11 < honkctl> 'map[hint:Cloning oneself should be illegal todo:...and take it all the way back home.]' | |
10:11 < xmudrii> !honkctl get todos -o jsonpath='{.items[5].spec}' | |
10:11 < honkctl> error: error executing jsonpath "'{.items[5].spec}'": Error executing template: array index out of bounds: index 5, length 5. Printing more information for debugging the template: | |
10:11 < honkctl> template was: | |
10:11 < honkctl> '{.items[5].spec}' | |
10:11 < honkctl> object given to jsonpath engine was: | |
10:11 < honkctl> map[string]interfac | |
10:11 < honkctl> ... | |
10:11 -!- indy21 [[email protected]] has joined #honkctl-jan | |
10:12 < gooseguy> !honkctl get todos | |
10:12 < honkctl> Unable to connect to the server: EOF | |
10:12 < xmudrii> !honkctl get crd | |
10:12 < honkctl> NAME CREATED AT | |
10:12 < honkctl> todos.honk.ci 2020-01-18T15:05:50Z | |
10:12 < indy21> !honkctl cluster-info | |
10:12 < yebyen> !honkctl get sa groundskeeper -o jsonpath='{.secrets[0].name}' | |
10:12 < honkctl> 'groundskeeper-token-6cdxs' | |
10:13 < xmudrii> !honkctl get crd todos.honk.ci | |
10:13 < honkctl> NAME CREATED AT | |
10:13 < honkctl> todos.honk.ci 2020-01-18T15:05:50Z | |
10:13 < gooseguy> !honkctl get todos | |
10:13 < honkctl> NAME TODO | |
10:13 < honkctl> todo-1 Steal the groundskeepers keys. | |
10:13 < honkctl> todo-2 Get to the Pub. | |
10:13 < honkctl> todo-3 Get into the model-village. | |
10:13 < honkctl> todo-4 Steal the beautiful minature golden bell. | |
10:13 < honkctl> todo-5 ...and take it all the way back home. | |
10:13 < gooseguy> !honkctl config set-context --current --namespace=garden | |
10:13 < honkctl> Context "goose-garden-kind-gooseguy" modified. | |
10:13 < gooseguy> !honkctl config set-context --current --namespace=pub | |
10:13 < honkctl> Context "goose-garden-kind-gooseguy" modified. | |
10:13 < indy21> !honkctl api-resources | |
10:13 < honkctl> Cluster is still starting. Please wait for the response from first command. | |
10:13 < xmudrii> !honkctl get crd -o jsonpath='{.items[0].spec.scope}' | |
10:13 < honkctl> 'Cluster' | |
10:14 < gooseguy> !honkctl get pods --as=groundskeeper | |
10:14 < honkctl> Error from server (Forbidden): pods is forbidden: User "groundskeeper" cannot list resource "pods" in API group "" in the namespace "pub" | |
10:14 < gooseguy> !honkctl get pods --as=system:serviceaccount:garden:groundskeeper | |
10:14 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:14 < honkctl> barkeep-7fd8878887-bsv72 1/1 Running 1 3m15s | |
10:14 < honkctl> burly-man-56588df9dd-dcrqg 1/1 Running 2 3m15s | |
10:14 < honkctl> delivery-person-65d5c4fcf7-vm6t9 1/1 Running 1 | |
10:14 < honkctl> ... | |
10:14 < xmudrii> When someone changes the context, that's just for themselves, right? | |
10:14 < yebyen> !honkctl get secret groundskeeper-token-6cdxs -o jsonpath='{.data.token}' | |
10:14 < honkctl> Error from server (Forbidden): secrets "groundskeeper-token-6cdxs" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "secrets" in API group "" in the namespace "garden" | |
10:14 <@jeefy> Yes it is. | |
10:14 <@mrbobbytables> load avg at 60 😬 we'll see how it holds | |
10:14 < gooseguy> indeed. everyone has their own cluster | |
10:14 < indy21> !honkctl get todos | |
10:14 < honkctl> Unable to connect to the server: EOF | |
10:15 < indy21> !honkctl version | |
10:15 < honkctl> Unable to connect to the server: EOF | |
10:15 < indy21> Oops | |
10:15 < gooseguy> !honkctl get todo todo-3 -o jsonpath={.spec.hint} | |
10:15 < honkctl> the grizzly knows the way | |
10:15 < gooseguy> !honkctl get todo todo-3 -o jsonpath={.spec.todo} | |
10:15 < honkctl> Get into the model-village. | |
10:15 < honkctl> Error from server (Forbidden): services is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "services" in API group "" in the namespace "kube-system" | |
10:16 < gooseguy> !honkctl get all --as=system:serviceaccount:garden:groundskeeper | |
10:16 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:16 < honkctl> pod/barkeep-7fd8878887-bsv72 0/1 CrashLoopBackOff 4 5m4s | |
10:16 < honkctl> pod/burly-man-56588df9dd-dcrqg 0/1 CrashLoopBackOff 5 5m4s | |
10:16 < honkctl> pod/delivery-person-65d5c4fcf7 | |
10:16 < honkctl> ... | |
10:16 < xmudrii> !honkctl config get-contexts | |
10:16 < honkctl> CURRENT NAME CLUSTER AUTHINFO NAMESPACE | |
10:16 < honkctl> * goose-garden-kind-xmudrii kind-xmudrii goose-garden-kind-xmudrii garden | |
10:16 < xmudrii> !honkctl get sa | |
10:16 < honkctl> NAME SECRETS AGE | |
10:16 < honkctl> default 1 10m | |
10:16 < honkctl> goose 1 10m | |
10:16 < honkctl> groundskeeper 1 10m | |
10:16 < indy21> !honkctl config get-contexts | |
10:16 < honkctl> CURRENT NAME CLUSTER AUTHINFO NAMESPACE | |
10:16 < honkctl> * goose-garden-kind-indy21 kind-indy21 goose-garden-kind-indy21 garden | |
10:16 < yebyen> !honkctl get po | |
10:16 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:16 < honkctl> groundskeeper-99c96696f-8xj8s 0/1 CrashLoopBackOff 6 9m53s | |
10:17 < gooseguy> !honkctl get all -o=custom-columns=name | |
10:17 < honkctl> error: unexpected custom-columns spec: name, expected <header>:<json-path-expr> | |
10:17 < xmudrii> !honkctl get po --as=system:serviceaccount:garden:groundskeeper | |
10:17 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:17 < honkctl> groundskeeper-99c96696f-6pjx7 0/1 CrashLoopBackOff 7 11m | |
10:17 < yebyen> !honkctl get po!honkctl get ev | |
10:17 < honkctl> error: the server doesn't have a resource type "po!honkctl" | |
10:17 < yebyen> !honkctl get ev | |
10:17 < honkctl> LAST SEEN TYPE REASON OBJECT MESSAGE | |
10:17 < honkctl> 10m Warning FailedScheduling pod/groundskeeper-99c96696f-8xj8s 0/1 nodes are available: 1 node(s) had taints that the pod didn't tolerate. | |
10:17 < honkctl> <unknown> Warning FailedSched | |
10:17 < honkctl> ... | |
10:17 < gooseguy> !honkctl get all -o=custom-columns=name:name | |
10:17 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "pods" in API group "" in the namespace "pub" | |
10:17 < honkctl> Error from server (Forbidden): replicationcontrollers is forbidden: User "system:serviceaccount:garden:goose" cannot | |
10:17 < honkctl> ... | |
10:17 < indy21> !honkctl get namespaces | |
10:17 < honkctl> NAME STATUS AGE | |
10:17 < honkctl> default Active 3m50s | |
10:17 < honkctl> garden Active 3m45s | |
10:17 < honkctl> home Active 3m45s | |
10:17 < honkctl> kube-node-lease Active 3m58s | |
10:17 < honkctl> kube-public Active 3m58s | |
10:17 < honkctl> kube-system Active 3m58s | |
10:17 < honkctl> model-village Active 3m45s | |
10:17 < honkctl> pub | |
10:17 < honkctl> ... | |
10:17 < xmudrii> !honkctl logs groundskeeper-99c96696f-6pjx7 --as=system:serviceaccount:garden:groundskeeper | |
10:17 < honkctl> 2020/01/18 15:15:56 [alert] 1#1: fork() failed while spawning "worker process" (12: Out of memory) | |
10:17 < yebyen> !honkctl get no | |
10:17 < honkctl> 2020/01/18 15:15:56 [alert] 1#1: sendmsg() failed (9: Bad file descriptor) | |
10:17 < honkctl> 2020/01/18 15:15:56 [alert] 1#1: sendmsg() failed (9: Bad file descriptor) | |
10:17 -!- RicardoSSP [uid416133@gateway/web/irccloud.com/x-mzeyrbvjyjbgcbhn] has joined #honkctl-jan | |
10:17 < yebyen> oops | |
10:17 < gooseguy> !honkctl get all -o=custom-columns=name:name --as=serviceaccount:garden:groundskeeper | |
10:17 < xmudrii> Is this as expected actually? :D | |
10:18 < indy21> !honkctl get roles -n pub | |
10:18 < honkctl> Error from server (Forbidden): roles.rbac.authorization.k8s.io is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "roles" in API group "rbac.authorization.k8s.io" in the namespace "pub" | |
10:18 < bdimcheff> !honkctl version | |
10:18 < honkctl> Client Version: version.Info{Major:"1", Minor:"17", GitVersion:"v1.17.0", GitCommit:"70132b0f130acc0bed193d9ba59dd186f0e634cf", GitTreeState:"clean", BuildDate:"2019-12-07T21:20:10Z", GoVersion:"go1.13.4", Compiler:"gc", Platform:"linux/amd64"} | |
10:18 < honkctl> Server Version: version.Info{M | |
10:18 < honkctl> ... | |
10:18 < xmudrii> !honkctl get all groundskeeper-99c96696f-6pjx7 --as=system:serviceaccount:garden:groundskeeper | |
10:18 < honkctl> error: you must specify only one resource | |
10:18 -!- RicardoSSP [uid416133@gateway/web/irccloud.com/x-mzeyrbvjyjbgcbhn] has quit [Changing host] | |
10:18 -!- RicardoSSP [uid416133@unaffiliated/ricardossp] has joined #honkctl-jan | |
10:18 -!- RicardoSSP [uid416133@unaffiliated/ricardossp] has quit [Changing host] | |
10:18 -!- RicardoSSP [uid416133@gateway/web/irccloud.com/x-mzeyrbvjyjbgcbhn] has joined #honkctl-jan | |
10:18 < bdimcheff> cool | |
10:18 < xmudrii> !honkctl get all --as=system:serviceaccount:garden:groundskeeper | |
10:18 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:18 < honkctl> pod/groundskeeper-99c96696f-6pjx7 0/1 CrashLoopBackOff 7 12m | |
10:18 < honkctl> NAME READY UP-TO-DATE AVAILABLE AGE | |
10:18 < honkctl> deployment.apps/groundskeeper 0/1 1 | |
10:18 < honkctl> ... | |
10:18 < yebyen> !honkctl get all --as=groundskeeper | |
10:18 < honkctl> Error from server (Forbidden): pods is forbidden: User "groundskeeper" cannot list resource "pods" in API group "" in the namespace "garden" | |
10:18 < honkctl> Error from server (Forbidden): replicationcontrollers is forbidden: User "groundskeeper" cannot list resource "replicationcontrollers" | |
10:18 < honkctl> ... | |
10:18 < indy21> !honkctl get secrets -n pub | |
10:18 < honkctl> Error from server (Forbidden): secrets is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "secrets" in API group "" in the namespace "pub" | |
10:18 < gooseguy> !honkctl get all -o custom-columns=NAME:.metadata.name --as=serviceaccount:garden:groundskeeper | |
10:18 < honkctl> Error from server (Forbidden): users "serviceaccount:garden:groundskeeper" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "users" in API group "" at the cluster scope | |
10:18 < honkctl> Error from server (Forbidden): users "serviceaccount:garden:groundskeep | |
10:18 < honkctl> ... | |
10:18 < yebyen> !honkctl get all --as=system:serviceaccount:garden:groundskeeper | |
10:18 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:18 < honkctl> pod/groundskeeper-99c96696f-8xj8s 0/1 CrashLoopBackOff 7 11m | |
10:18 < honkctl> NAME READY UP-TO-DATE AVAILABLE AGE | |
10:18 < honkctl> deployment.apps/groundskeeper 0/1 1 | |
10:18 < honkctl> ... | |
10:19 < bdimcheff> !honkctl config get-contexts | |
10:19 < honkctl> CURRENT NAME CLUSTER AUTHINFO NAMESPACE | |
10:19 < honkctl> * goose-garden-kind-bdimcheff kind-bdimcheff goose-garden-kind-bdimcheff garden | |
10:19 -!- brrrr [[email protected]] has joined #honkctl-jan | |
10:19 < gooseguy> !honkctl get all -o custom-columns=NAME:.metadata.name --as=system:serviceaccount:garden:groundskeeper | |
10:19 < honkctl> NAME | |
10:19 < honkctl> barkeep-7fd8878887-bsv72 | |
10:19 < honkctl> burly-man-56588df9dd-dcrqg | |
10:19 < honkctl> delivery-person-65d5c4fcf7-vm6t9 | |
10:19 < honkctl> fetch-kubectl-6hb8z | |
10:19 < honkctl> old-man-bf794945f-hl4rp | |
10:19 < honkctl> woman-0 | |
10:19 < honkctl> woman-1 | |
10:19 < honkctl> barkeep | |
10:19 < honkctl> burly-man | |
10:19 < honkctl> delivery-person | |
10:19 < honkctl> old-man | |
10:19 < honkctl> barkeep-7fd8878887 | |
10:19 < honkctl> burly-man-56588df9dd | |
10:19 < indy21> !honkctl get pv | |
10:19 < yebyen> !honkctl get nodes | |
10:19 < honkctl> Error from server (Forbidden): nodes is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "nodes" in API group "" at the cluster scope | |
10:19 < brrrr> the dedication to theming here is very good | |
10:19 < gooseguy> !honkctl describe po burly-man-56588df9dd | |
10:19 < honkctl> Error from server (Forbidden): pods "burly-man-56588df9dd" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
10:19 < yebyen> !honkctl get nodes --as=system:serviceaccount:garden:groundskeeper | |
10:19 < honkctl> Error from server (Forbidden): nodes is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "nodes" in API group "" at the cluster scope | |
10:19 < gooseguy> !honkctl describe po burly-man-56588df9dd --as=system:serviceaccount:garden:groundskeeper | |
10:19 < honkctl> Name: burly-man-56588df9dd-dcrqg | |
10:19 < honkctl> Namespace: pub | |
10:19 < honkctl> Priority: 0 | |
10:19 < honkctl> Node: gooseguy-control-plane/172.17.0.5 | |
10:19 < honkctl> Start Time: Sat, 18 Jan 2020 15:13:21 +0000 | |
10:19 < honkctl> Labels: bucket=true | |
10:19 < honkctl> pod-template-hash=56588df9dd | |
10:19 < bdimcheff> yeah that's cool | |
10:19 < honkctl> Annotations: <none> | |
10:19 < honkctl> Status: Ru | |
10:19 < honkctl> ... | |
10:20 < indy21> !kubectl get pv --as=system:serviceaccount:garden:groundskeeper | |
10:20 < xmudrii> !honkctl auth can-i --list --as=system:serviceaccount:garden:groundskeeper | |
10:20 < honkctl> Resources Non-Resource URLs Resource Names Verbs | |
10:20 < honkctl> selfsubjectaccessreviews.authorization.k8s.io [] [] [create] | |
10:20 < honkctl> selfsubjectrulesreviews.authorization.k8s.io [] [] [c | |
10:20 < honkctl> ... | |
10:20 < xmudrii> !honkctl get ns --as=system:serviceaccount:garden:groundskeeper | |
10:20 < honkctl> Error from server (Forbidden): namespaces is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "namespaces" in API group "" at the cluster scope | |
10:20 < xmudrii> !honkctl get sa --as=system:serviceaccount:garden:groundskeeper | |
10:20 < honkctl> NAME SECRETS AGE | |
10:20 < honkctl> default 1 14m | |
10:20 < honkctl> goose 1 14m | |
10:20 < honkctl> groundskeeper 1 14m | |
10:20 <@jeefy> @bob how's the load lol | |
10:20 < xmudrii> !honkctl get po -A --as=system:serviceaccount:garden:groundskeeper | |
10:20 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "pods" in API group "" at the cluster scope | |
10:21 < xmudrii> !honkctl get po --as=system:serviceaccount:garden:groundskeeper | |
10:21 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:21 < honkctl> groundskeeper-99c96696f-6pjx7 0/1 CrashLoopBackOff 7 15m | |
10:21 < indy21> !honkctl -n pub get pods -o wide | |
10:21 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "pods" in API group "" in the namespace "pub" | |
10:21 <@mrbobbytables> getting better now that a bunch of clusters aren't being provisioned | |
10:21 < xmudrii> !honkctl get sts --as=system:serviceaccount:garden:groundskeeper | |
10:21 < honkctl> No resources found in garden namespace. | |
10:21 <@mrbobbytables> pods went into crashloopbackoff during it though :( | |
10:21 < indy21> !honkctl auth can-i get pods --all-namespaces --as=system:serviceaccount:garden:groundskeeper | |
10:21 < honkctl> no | |
10:21 < yebyen> !honkctl get all --as=system:serviceaccount:garden:groundskeeper | |
10:21 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:21 < honkctl> pod/groundskeeper-99c96696f-8xj8s 0/1 CrashLoopBackOff 7 14m | |
10:21 < honkctl> NAME READY UP-TO-DATE AVAILABLE AGE | |
10:21 < honkctl> deployment.apps/groundskeeper 0/1 1 | |
10:21 < honkctl> ... | |
10:21 < gooseguy> !honkctl run beer-plz --image=busybox --command=['cat','/var/run/kubernetes.io/serviceaccount/token','&&','sleep','5000'] --as=system:serviceaccount:garden:groundskeeper | |
10:21 < honkctl> Error: invalid argument "['cat','/var/run/kubernetes.io/serviceaccount/token','&&','sleep','5000']" for "--command" flag: strconv.ParseBool: parsing "['cat','/var/run/kubernetes.io/serviceaccount/token','&&','sleep','5000']": invalid syntax | |
10:21 < honkctl> See 'kubectl run --help' for usage. | |
10:22 < indy21> !honkctl auth can-i get pods --all-namespaces | |
10:22 < honkctl> no | |
10:22 < yebyen> !honkctl logs pod/groundskeeper-99c96696f-8xj8s --as=system:serviceaccount:garden:groundskeeper | |
10:22 < honkctl> 2020/01/18 15:17:23 [alert] 1#1: worker process 6 exited on signal 9 | |
10:22 < honkctl> 2020/01/18 15:17:23 [alert] 1#1: worker process 7 exited on signal 9 | |
10:22 < honkctl> 2020/01/18 15:17:25 [alert] 1#1: worker process 8 exited on signal 9 | |
10:22 < honkctl> 2020/01/18 15:17:34 [alert] 1#1: worker process 9 exited on signal 9 | |
10:22 < honkctl> ... | |
10:22 < xmudrii> !honkctl get po --as=system:serviceaccount:garden:groundskeeper | |
10:22 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:22 < honkctl> groundskeeper-99c96696f-6pjx7 0/1 CrashLoopBackOff 9 16m | |
10:22 < xmudrii> !honkctl get po groundskeeper-99c96696f-6pjx7 --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.spec.containers[0]}' | |
10:22 < honkctl> 'map[image:nginx:stable-alpine imagePullPolicy:IfNotPresent name:groundskeeper ports:[map[containerPort:80 protocol:TCP]] resources:map[limits:map[cpu:100m memory:10Mi] requests:map[cpu:100m memory:10Mi]] terminationMessagePath:/dev/termination-log terminationMessagePolicy:F | |
10:22 < honkctl> ... | |
10:23 < xmudrii> !honkctl get po groundskeeper-99c96696f-6pjx7 --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.spec.containers[1]}' | |
10:23 < honkctl> error: error executing jsonpath "'{.spec.containers[1]}'": Error executing template: array index out of bounds: index 1, length 1. Printing more information for debugging the template: | |
10:23 < honkctl> template was: | |
10:23 < honkctl> '{.spec.containers[1]}' | |
10:23 < honkctl> object given to jsonpath engine was: | |
10:23 < honkctl> map[strin | |
10:23 < honkctl> ... | |
10:23 < indy21> !honkctl ge namespaces | |
10:23 < honkctl> Error: unknown command "ge" for "kubectl" | |
10:23 < honkctl> Did you mean this? | |
10:23 < honkctl> set | |
10:23 < honkctl> get | |
10:23 < honkctl> cp | |
10:23 < honkctl> Run 'kubectl --help' for usage. | |
10:23 < indy21> !honkctl get namespaces | |
10:23 < honkctl> NAME STATUS AGE | |
10:23 < honkctl> default Active 9m48s | |
10:23 < honkctl> garden Active 9m43s | |
10:23 < honkctl> home Active 9m43s | |
10:23 < honkctl> kube-node-lease Active 9m56s | |
10:23 < honkctl> kube-public Active 9m56s | |
10:23 < honkctl> kube-system Active 9m56s | |
10:23 < honkctl> model-village Active 9m43s | |
10:23 < xmudrii> !honkctl get po groundskeeper-99c96696f-6pjx7 --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.metadata}' | |
10:23 < honkctl> pub | |
10:23 < honkctl> ... | |
10:23 < gooseguy> !honkctl run beer-plz --image=busybox --as=system:serviceaccount:garden:groundskeeper --command=cat /var/run/kubernetes.io/serviceaccount/token && sleep 5000 | |
10:23 < gooseguy> !honkctl get pods --as=system:serviceaccount:garden:groundskeeper | |
10:23 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:23 < honkctl> barkeep-7fd8878887-bsv72 0/1 CrashLoopBackOff 7 12m | |
10:23 < honkctl> burly-man-56588df9dd-dcrqg 0/1 CrashLoopBackOff 7 12m | |
10:23 < honkctl> delivery-person-65d5c4fcf7-vm6t9 0/1 C | |
10:23 < honkctl> ... | |
10:23 < indy21> !honkctl auth can-i get pods -n garden | |
10:23 < honkctl> yes | |
10:24 < gooseguy> !honkctl get pod beer-plz --as=system:serviceaccount:garden:groundskeeper | |
10:24 < honkctl> Error from server (NotFound): pods "beer-plz" not found | |
10:24 < indy21> !honkctl auth can-i get pods -n home | |
10:24 < honkctl> yes | |
10:24 < gooseguy> !honkctl get deploy beer-plz --as=system:serviceaccount:garden:groundskeeper | |
10:24 < honkctl> Error from server (NotFound): deployments.apps "beer-plz" not found | |
10:24 < xmudrii> !honkctl get po groundskeeper-99c96696f-6pjx7 --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.metadata}' | |
10:24 < honkctl> 'map[creationTimestamp:2020-01-18T15:06:02Z generateName:groundskeeper-99c96696f- labels:map[pod-template-hash:99c96696f rake:true] name:groundskeeper-99c96696f-6pjx7 namespace:garden ownerReferences:[map[apiVersion:apps/v1 blockOwnerDeletion:true controller:true kind:Replic | |
10:24 < honkctl> ... | |
10:24 < brrrr> !honkctl get ns | |
10:24 < indy21> !honkctl auth can-i get pods -n model-village | |
10:24 < honkctl> no | |
10:24 < gooseguy> !honkctl get all -o custom-columns=NAME:.metadata.name --as=serviceaccount:garden:groundskeeper | |
10:24 < honkctl> Error from server (Forbidden): users "serviceaccount:garden:groundskeeper" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "users" in API group "" at the cluster scope | |
10:24 < honkctl> Error from server (Forbidden): users "serviceaccount:garden:groundskeep | |
10:24 < honkctl> ... | |
10:24 < indy21> !honkctl get pods -n home | |
10:24 < honkctl> No resources found in home namespace. | |
10:24 < gooseguy> !honkctl get all -o custom-columns=NAME:.metadata.name --as=system:serviceaccount:garden:groundskeeper | |
10:24 < honkctl> NAME | |
10:24 < honkctl> barkeep-7fd8878887-bsv72 | |
10:24 < honkctl> burly-man-56588df9dd-dcrqg | |
10:24 < honkctl> delivery-person-65d5c4fcf7-vm6t9 | |
10:24 < honkctl> fetch-kubectl-6hb8z | |
10:24 < indy21> !honkctl get pods -n garden | |
10:24 < honkctl> old-man-bf794945f-hl4rp | |
10:24 < honkctl> woman-0 | |
10:24 < honkctl> woman-1 | |
10:24 < honkctl> barkeep | |
10:25 < honkctl> burly-man | |
10:25 < honkctl> delivery-person | |
10:25 < honkctl> old-man | |
10:25 < honkctl> barkeep-7fd8878887 | |
10:25 < honkctl> burly-man-56588df9dd | |
10:25 < indy21> !honkctl get deployments -n garden | |
10:25 < xmudrii> !honkctl get pods -n garden | |
10:25 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:25 < honkctl> groundskeeper-99c96696f-6pjx7 0/1 CrashLoopBackOff 9 19m | |
10:25 < gooseguy> !honkctl describe pod delivery-person-65d5c4fcf7-vm6t9 | |
10:25 < honkctl> Error from server (Forbidden): pods "delivery-person-65d5c4fcf7-vm6t9" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
10:25 < yebyen> !honkctl get pods -n pub | |
10:25 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "pods" in API group "" in the namespace "pub" | |
10:25 < gooseguy> !honkctl describe pod delivery-person-65d5c4fcf7-vm6t9 --as=system:serviceaccount:garden:groundskeeper | |
10:25 < honkctl> Name: delivery-person-65d5c4fcf7-vm6t9 | |
10:25 < honkctl> Namespace: pub | |
10:25 < honkctl> Priority: 0 | |
10:25 < honkctl> Node: gooseguy-control-plane/172.17.0.5 | |
10:25 < honkctl> Start Time: Sat, 18 Jan 2020 15:13:21 +0000 | |
10:25 < honkctl> Labels: box=true | |
10:25 < honkctl> pod-template-hash=65d5c4fcf7 | |
10:25 < honkctl> Annotations: <none> | |
10:25 < honkctl> Status: | |
10:25 < honkctl> ... | |
10:25 < indy21> !honkctl get sa -n garden | |
10:25 < gooseguy> !honkctl get secrets --as=system:serviceaccount:garden:groundskeeper | |
10:25 < honkctl> NAME SECRETS AGE | |
10:25 < honkctl> default 1 11m | |
10:25 < honkctl> goose 1 12m | |
10:25 < honkctl> groundskeeper 1 12m | |
10:25 < honkctl> NAME TYPE DATA AGE | |
10:25 < honkctl> barkeep-token-zlgvb kubernetes.io/service-account-token 3 14m | |
10:25 < honkctl> burly-man-token-gcbdj kubernetes.io/service-account-token 3 14m | |
10:25 < honkctl> default-token-znncb kubernet | |
10:25 < honkctl> ... | |
10:26 < gooseguy> !honkctl get secrets --as=system:serviceaccount:garden:groundskeeper -o custom-columns=NAME:.metadata.nam | |
10:26 < honkctl> NAME | |
10:26 < honkctl> <none> | |
10:26 < honkctl> <none> | |
10:26 < honkctl> <none> | |
10:26 < honkctl> <none> | |
10:26 < honkctl> <none> | |
10:26 < honkctl> <none> | |
10:26 < gooseguy> !honkctl get secrets --as=system:serviceaccount:garden:groundskeeper -o custom-columns=NAME:.metadata.name | |
10:26 < honkctl> NAME | |
10:26 < honkctl> barkeep-token-zlgvb | |
10:26 < honkctl> burly-man-token-gcbdj | |
10:26 < honkctl> default-token-znncb | |
10:26 < honkctl> delivery-person-token-p4dqg | |
10:26 < honkctl> old-man-token-w7m6c | |
10:26 < honkctl> woman-token-b52vd | |
10:26 < xmudrii> !honkctl get po -n pub | |
10:26 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "pods" in API group "" in the namespace "pub" | |
10:26 < indy21> !honkctl get rolebinding -n garden | |
10:26 < honkctl> Error from server (Forbidden): rolebindings.rbac.authorization.k8s.io is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "rolebindings" in API group "rbac.authorization.k8s.io" in the namespace "garden" | |
10:26 < indy21> !honkctl get rolebinding -n garden --as=system:serviceaccount:garden:groundskeeper | |
10:26 < honkctl> Error from server (Forbidden): rolebindings.rbac.authorization.k8s.io is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "rolebindings" in API group "rbac.authorization.k8s.io" in the namespace "garden" | |
10:26 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:26 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:26 < honkctl> barkeep-7fd8878887-td89c 0/1 CrashLoopBackOff 9 20m | |
10:26 < honkctl> burly-man-56588df9dd-ztmbg 0/1 CrashLoopBackOff 9 20m | |
10:26 < honkctl> delivery-person-65d5c4fcf7-h5rph 0/1 C | |
10:26 < honkctl> ... | |
10:26 < gooseguy> !honkctl get sa --as=system:serviceaccount:garden:groundskeeper | |
10:26 < honkctl> NAME SECRETS AGE | |
10:26 < honkctl> barkeep 1 15m | |
10:26 < honkctl> burly-man 1 15m | |
10:26 < honkctl> default 1 15m | |
10:26 < honkctl> delivery-person 1 15m | |
10:26 < honkctl> old-man 1 15m | |
10:26 < honkctl> woman 1 15m | |
10:26 < indy21> !honkctl get pods -n garden | |
10:26 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:26 < honkctl> groundskeeper-99c96696f-mmwtk 0/1 CrashLoopBackOff 7 13m | |
10:27 < gooseguy> !honkctl get role --as=system:serviceaccount:garden:groundskeeper | |
10:27 < honkctl> Error from server (Forbidden): roles.rbac.authorization.k8s.io is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "roles" in API group "rbac.authorization.k8s.io" in the namespace "pub" | |
10:27 < honkctl> NAME STATUS AGE | |
10:27 < honkctl> default Active 2m13s | |
10:27 < honkctl> garden Active 2m7s | |
10:27 < honkctl> home Active 2m7s | |
10:27 < honkctl> kube-node-lease Active 2m15s | |
10:27 < honkctl> kube-public Active 2m15s | |
10:27 < honkctl> kube-system Active 2m15s | |
10:27 < honkctl> model-village Active 2m7s | |
10:27 < honkctl> pub | |
10:27 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[0].spec.containers[0]}' | |
10:27 < honkctl> ... | |
10:27 < honkctl> 'map[image:nginx:stable-alpine imagePullPolicy:IfNotPresent name:barkeep ports:[map[containerPort:80 protocol:TCP]] resources:map[limits:map[cpu:100m memory:10Mi] requests:map[cpu:100m memory:10Mi]] terminationMessagePath:/dev/termination-log terminationMessagePolicy:File vo | |
10:27 < honkctl> ... | |
10:27 < gooseguy> !honkctl get rolebindings --as=system:serviceaccount:garden:groundskeeper | |
10:27 < honkctl> Error from server (Forbidden): rolebindings.rbac.authorization.k8s.io is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "rolebindings" in API group "rbac.authorization.k8s.io" in the namespace "pub" | |
10:27 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[1].spec.containers[0]}' | |
10:27 < honkctl> 'map[image:nginx:stable-alpine imagePullPolicy:IfNotPresent name:burly-man ports:[map[containerPort:80 protocol:TCP]] resources:map[limits:map[cpu:100m memory:10Mi] requests:map[cpu:100m memory:10Mi]] terminationMessagePath:/dev/termination-log terminationMessagePolicy:File | |
10:27 < honkctl> ... | |
10:27 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[1].spec.containers[1]}' | |
10:27 < honkctl> error: error executing jsonpath "'{.items[1].spec.containers[1]}'": Error executing template: array index out of bounds: index 1, length 1. Printing more information for debugging the template: | |
10:27 < honkctl> template was: | |
10:27 < honkctl> '{.items[1].spec.containers[1]}' | |
10:27 < honkctl> object given to jsonpath engin | |
10:27 < honkctl> ... | |
10:27 -!- fronkchie [[email protected]] has quit [Ping timeout: 265 seconds] | |
10:27 < indy21> !honkctl describe pod groundskeeper-99c96696f-mmwtk --as=system:serviceaccount:garden:groundskeeper | |
10:27 < honkctl> Name: groundskeeper-99c96696f-mmwtk | |
10:27 < honkctl> Namespace: garden | |
10:27 < honkctl> Priority: 0 | |
10:27 < honkctl> Node: indy21-control-plane/172.17.0.6 | |
10:27 < honkctl> Start Time: Sat, 18 Jan 2020 15:16:09 +0000 | |
10:27 < honkctl> Labels: pod-template-hash=99c96696f | |
10:27 < honkctl> rake=true | |
10:27 < honkctl> Annotations: <none> | |
10:27 < honkctl> Status: R | |
10:27 < honkctl> ... | |
10:27 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name}{\n}' | |
10:27 < honkctl> error: error parsing jsonpath '{.items[*].metadata.name}{\n}', unrecognized character in action: U+005C '\' | |
10:28 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name} ' | |
10:28 < honkctl> Error from server (NotFound): pods "'" not found | |
10:28 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name}' | |
10:28 < honkctl> 'barkeep-7fd8878887-td89c burly-man-56588df9dd-ztmbg delivery-person-65d5c4fcf7-h5rph fetch-kubectl-g26sz old-man-bf794945f-wps6l woman-0 woman-1' | |
10:28 < gooseguy> !honkctl get pods --as=system:serviceaccount:pub:burly-man | |
10:28 < honkctl> Error from server (Forbidden): serviceaccounts "burly-man" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
10:28 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[3].metadata.name}' | |
10:28 < honkctl> 'fetch-kubectl-g26sz' | |
10:28 < yebyen> !honkctl get po | |
10:28 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:28 < honkctl> groundskeeper-99c96696f-8xj8s 1/1 Running 10 21m | |
10:28 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[3].spec.containers[0]}' | |
10:28 < honkctl> 'map[command:[wget https://storage.googleapis.com/kubernetes-release/release/v1.17.0/bin/linux/amd64/kubectl -O /kube/kubectl] image:nginx:stable-alpine imagePullPolicy:IfNotPresent name:fetch resources:map[] terminationMessagePath:/dev/termination-log terminationMessagePoli | |
10:28 < honkctl> ... | |
10:28 < yebyen> !honkctl get event --namespace garden --field-selector involvedObject.name=groundskeeper-99c96696f-8xj8s | |
10:28 < honkctl> LAST SEEN TYPE REASON OBJECT MESSAGE | |
10:28 < honkctl> 21m Warning FailedScheduling pod/groundskeeper-99c96696f-8xj8s 0/1 nodes are available: 1 node(s) had taints that the pod didn't tolerate. | |
10:28 < honkctl> <unknown> Warning FailedSchedulin | |
10:28 < honkctl> ... | |
10:28 < indy21> !honkctl describe pod groundskeeper-99c96696f-mmwtk --as=system:serviceaccount:garden:groundskeeper | |
10:28 < honkctl> Name: groundskeeper-99c96696f-mmwtk | |
10:28 < honkctl> Namespace: garden | |
10:28 < honkctl> Priority: 0 | |
10:28 < honkctl> Node: indy21-control-plane/172.17.0.6 | |
10:28 < honkctl> Start Time: Sat, 18 Jan 2020 15:16:09 +0000 | |
10:28 < honkctl> Labels: pod-template-hash=99c96696f | |
10:28 < honkctl> rake=true | |
10:28 < honkctl> Annotations: <none> | |
10:29 < indy21> !honkctl get sa -n ub | |
10:29 < honkctl> Error from server (Forbidden): serviceaccounts is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "serviceaccounts" in API group "" in the namespace "ub" | |
10:29 < indy21> !honkctl get sa -n pub | |
10:29 < honkctl> Error from server (Forbidden): serviceaccounts is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "serviceaccounts" in API group "" in the namespace "pub" | |
10:29 < indy21> !honkctl get sa -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:29 < honkctl> NAME SECRETS AGE | |
10:29 < honkctl> barkeep 1 15m | |
10:29 < honkctl> burly-man 1 15m | |
10:29 < honkctl> default 1 15m | |
10:29 < honkctl> delivery-person 1 15m | |
10:29 < honkctl> old-man 1 15m | |
10:29 < honkctl> woman 1 15m | |
10:29 < indy21> !honkctl get pods -n pub --as=system:serviceaccount:garden:barkeep | |
10:29 < honkctl> Error from server (Forbidden): serviceaccounts "barkeep" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "garden" | |
10:30 < indy21> !honkctl get roles -n pub --as=system:serviceaccount:garden:barkeep | |
10:30 < honkctl> Error from server (Forbidden): serviceaccounts "barkeep" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "garden" | |
10:30 < indy21> !honkctl get rolebindings -n pub --as=system:serviceaccount:garden:barkeep | |
10:30 < honkctl> Error from server (Forbidden): serviceaccounts "barkeep" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "garden" | |
10:30 < yebyen> !honkctl auth can-i patch statefulset --namespace=pub --as=system:serviceaccount:garden:groundskeeper | |
10:30 < honkctl> yes | |
10:30 < yebyen> !honkctl auth can-i patch deploy --namespace=pub --as=system:serviceaccount:garden:groundskeeper | |
10:30 < honkctl> yes | |
10:30 < indy21> !honkctl get rolebindings,roles,statefulsets,deployments -n pub --as=system:serviceaccount:garden:barkeep | |
10:30 < honkctl> Error from server (Forbidden): serviceaccounts "barkeep" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "garden" | |
10:30 < honkctl> Error from server (Forbidden): serviceaccounts "barkeep" is forbidden: Use | |
10:30 < honkctl> ... | |
10:30 < xmudrii> !honkctl ungoose | |
10:31 <@mrbobbytables> ^^ FYI that reprovisions your cluster | |
10:31 < indy21> !honkctl get rolebindings,roles,statefulsets,deployments -n pub --as=system:serviceaccount:garden:woman | |
10:31 < honkctl> Error from server (Forbidden): serviceaccounts "woman" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "garden" | |
10:31 < honkctl> Error from server (Forbidden): serviceaccounts "woman" is forbidden: User "s | |
10:31 < honkctl> ... | |
10:31 < yebyen> !honkctl get todos -o jsonpath '{.spec.hint}' | |
10:31 < honkctl> Error from server (NotFound): todos.honk.ci "'{.spec.hint}'" not found | |
10:31 < yebyen> !honkctl get todos -o jsonpath '{.spec}' | |
10:31 < honkctl> Error from server (NotFound): todos.honk.ci "'{.spec}'" not found | |
10:31 < xmudrii> !honkctl get po | |
10:31 < honkctl> No resources found in default namespace. | |
10:31 < yebyen> !honkctl get todos -o jsonpath '{@}' | |
10:31 < honkctl> Error from server (NotFound): todos.honk.ci "'{@}'" not found | |
10:32 < yebyen> !honkctl get todos -o jsonpath='{@}' | |
10:32 < honkctl> 'map[apiVersion:v1 items:[map[apiVersion:honk.ci/v1 kind:Todo metadata:map[annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"honk.ci/v1","kind":"Todo","metadata":{"annotations":{},"name":"todo-1"},"spec":{"hint":"Sometimes one must become that t | |
10:32 < honkctl> ... | |
10:32 < yebyen> !honkctl get todos -o jsonpath='{.spec.hint}' | |
10:32 < honkctl> '' | |
10:32 < yebyen> !honkctl get todos todo-2 -o jsonpath='{.spec}' | |
10:32 < honkctl> 'map[hint:Let's go to the Winchester, have a nice cold pint, and wait for this all to blow over. todo:Get to the Pub.]' | |
10:32 < yebyen> !honkctl get todos todo-3 -o jsonpath='{.spec}' | |
10:32 < honkctl> 'map[hint:the grizzly knows the way todo:Get into the model-village.]' | |
10:33 < gooseguy> !honkctl create -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/126eeec9f652d3f76aa2c1aa2aea04618854e57d/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
10:33 < honkctl> pod/beer created | |
10:33 < bdimcheff> !honkctl get po -n pub --as=system:serviceaccount:pub:delivery-person | |
10:33 < honkctl> error: the server doesn't have a resource type "po" | |
10:33 < gooseguy> !honkctl logs beer | |
10:33 < honkctl> Error from server (Forbidden): pods "beer" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
10:33 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper | |
10:33 < honkctl> cat: can't open '/var/run/kubernetes.io/serviceaccount/token': No such file or directory | |
10:33 < yebyen> !honkctl get pods -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:33 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:33 < honkctl> barkeep-7fd8878887-r9787 0/1 CrashLoopBackOff 11 26m | |
10:33 < honkctl> burly-man-56588df9dd-lc4fj 0/1 CrashLoopBackOff 11 26m | |
10:33 < honkctl> delivery-person-65d5c4fcf7-4cvld 0/1 C | |
10:33 < honkctl> ... | |
10:33 < yebyen> !honkctl get pods -n pub --as=system:serviceaccount:garden:groundskeeper -o name | |
10:33 < honkctl> pod/barkeep-7fd8878887-r9787 | |
10:33 < honkctl> pod/burly-man-56588df9dd-lc4fj | |
10:33 < honkctl> pod/delivery-person-65d5c4fcf7-4cvld | |
10:33 < honkctl> pod/fetch-kubectl-w4gmh | |
10:33 < honkctl> pod/old-man-bf794945f-whwmk | |
10:33 < honkctl> pod/woman-0 | |
10:33 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:33 < bdimcheff> !honkctl get pod -n pub --as=system:serviceaccount:pub:delivery-person | |
10:34 < gooseguy> !honkctl create -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/126eeec9f652d3f76aa2c1aa2aea04618854e57d/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
10:34 < honkctl> Error from server (AlreadyExists): error when creating "https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/126eeec9f652d3f76aa2c1aa2aea04618854e57d/beer.yaml": pods "beer" already exists | |
10:34 < gooseguy> !honktl delete pod beer --as=system:serviceaccount:garden:groundskeeper | |
10:35 < gooseguy> !honkctl version | |
10:35 < honkctl> Client Version: version.Info{Major:"1", Minor:"17", GitVersion:"v1.17.0", GitCommit:"70132b0f130acc0bed193d9ba59dd186f0e634cf", GitTreeState:"clean", BuildDate:"2019-12-07T21:20:10Z", GoVersion:"go1.13.4", Compiler:"gc", Platform:"linux/amd64"} | |
10:35 < honkctl> Server Version: version.Info{M | |
10:35 < honkctl> ... | |
10:35 < gooseguy> !honkctl create -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/126eeec9f652d3f76aa2c1aa2aea04618854e57d/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
10:35 < honkctl> Error from server (AlreadyExists): error when creating "https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/126eeec9f652d3f76aa2c1aa2aea04618854e57d/beer.yaml": pods "beer" already exists | |
10:35 < xmudrii> !honkctl version | |
10:35 < honkctl> Client Version: version.Info{Major:"1", Minor:"17", GitVersion:"v1.17.0", GitCommit:"70132b0f130acc0bed193d9ba59dd186f0e634cf", GitTreeState:"clean", BuildDate:"2019-12-07T21:20:10Z", GoVersion:"go1.13.4", Compiler:"gc", Platform:"linux/amd64"} | |
10:35 < honkctl> Server Version: version.Info{M | |
10:35 < honkctl> ... | |
10:35 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:35 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:35 < honkctl> barkeep-76c949f857-krfsn 1/1 Running 0 3m48s | |
10:35 < honkctl> burly-man-b958cff98-t2kjf 1/1 Running 0 3m48s | |
10:35 < honkctl> delivery-person-9868cb979-fdfbs 1/1 Running 0 | |
10:35 < honkctl> ... | |
10:35 < gooseguy> !honkctl delete po beer --as=system:serviceaccount:garden:groundskeeper | |
10:36 < honkctl> pod "beer" deleted | |
10:36 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name}' | |
10:36 < honkctl> 'barkeep-76c949f857-krfsn burly-man-b958cff98-t2kjf delivery-person-9868cb979-fdfbs fetch-kubectl-5tntx old-man-bf794945f-bcbwm woman-0 woman-1' | |
10:36 < gooseguy> !honkctl create -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/126eeec9f652d3f76aa2c1aa2aea04618854e57d/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
10:36 < honkctl> pod/beer created | |
10:36 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper | |
10:36 < honkctl> cat: can't open '/var/run/kubernetes.io/serviceaccount/token': No such file or directory | |
10:36 < gooseguy> !honkctl logs 2nd-beer --as=system:serviceaccount:garden:groundskeeper | |
10:36 < honkctl> Error from server (NotFound): pods "2nd-beer" not found | |
10:36 <@mrbobbytables> okay folks -- if you have pods in crashloopbackoff use !honkctl ungoose to reprovision your cluster -- just please not too many at once or the server will not be happy =p | |
10:37 < gooseguy> !honkctl delete po beer --as=system:serviceaccount:garden:groundskeeper | |
10:37 < bdimcheff> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:37 < honkctl> pod "beer" deleted | |
10:37 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:37 < honkctl> barkeep-7fd8878887-2ms6p 0/1 CrashLoopBackOff 13 29m | |
10:37 < honkctl> burly-man-56588df9dd-sl8b4 0/1 CrashLoopBackOff 13 29m | |
10:37 < honkctl> delivery-person-65d5c4fcf7-xnfd8 0/1 C | |
10:37 < honkctl> ... | |
10:37 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].spec.containers[*].env}' | |
10:37 < honkctl> '' | |
10:37 < bdimcheff> oic | |
10:37 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].spec.volumes[*]}' | |
10:37 < honkctl> 'map[configMap:map[defaultMode:420 name:pint-glass] name:pint-glass] map[name:barkeep-token-q5v58 secret:map[defaultMode:420 secretName:barkeep-token-q5v58]] map[configMap:map[defaultMode:420 name:bucket] name:bucket] map[name:burly-man-token-nl85l secret:map[defaultMode:420 | |
10:37 < honkctl> ... | |
10:38 -!- brrrr [[email protected]] has quit [Quit: brrrr] | |
10:38 < gooseguy> !honkctl create -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/bbf82e8978107faa90b38eda183d00b77f0856bf/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
10:38 < honkctl> pod/beer created | |
10:38 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper | |
10:38 < honkctl> eyJhbGciOiJSUzI1NiIsImtpZCI6IndVM0Fab2txbWZ4WHdWc1llX1pjLWxyWmYwR1UwQ1B3YXdUc2JBYlEtamcifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJwdWIiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlY3JldC5uYW1lIjoiZGVmYXVsdC10b2tl | |
10:38 < honkctl> ... | |
10:38 < gooseguy> welp, thats part of the token anyway | |
10:38 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[0].spec.volumes[*]}' | |
10:38 < honkctl> 'map[configMap:map[defaultMode:420 name:pint-glass] name:pint-glass] map[name:barkeep-token-q5v58 secret:map[defaultMode:420 secretName:barkeep-token-q5v58]]' | |
10:38 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[1].spec.volumes[*]}' | |
10:38 < honkctl> 'map[configMap:map[defaultMode:420 name:bucket] name:bucket] map[name:burly-man-token-nl85l secret:map[defaultMode:420 secretName:burly-man-token-nl85l]]' | |
10:38 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[2].spec.volumes[*]}' | |
10:38 < honkctl> 'map[configMap:map[defaultMode:420 name:box] name:box] map[name:delivery-person-token-56spl secret:map[defaultMode:420 secretName:delivery-person-token-56spl]]' | |
10:39 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[2].metadata.name}' | |
10:39 < honkctl> 'delivery-person-9868cb979-fdfbs' | |
10:39 < gooseguy> !honkctl get pods --token=eyJhbGciOiJSUzI1NiIsImtpZCI6IndVM0Fab2txbWZ4WHdWc1llX1pjLWxyWmYwR1UwQ1B3YXdUc2JBYlEtamcifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJwdWIiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlY3JldC5uYW1lIjoiZGVmYXVsdC10b2tl | |
10:39 < honkctl> error: You must be logged in to the server (Unauthorized) | |
10:39 < xmudrii> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:39 < honkctl> NAME DATA AGE | |
10:39 < honkctl> box 1 7m27s | |
10:39 < honkctl> bucket 1 7m29s | |
10:39 < honkctl> dartboard 1 7m26s | |
10:39 < honkctl> fetch-kubectl 1 7m22s | |
10:39 < honkctl> flower 1 7m25s | |
10:39 < honkctl> pint-glass 1 7m30s | |
10:39 < xmudrii> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper box -o yaml | |
10:39 < honkctl> apiVersion: v1 | |
10:39 < honkctl> data: | |
10:39 < honkctl> index.html: | | |
10:39 < honkctl> <html> | |
10:39 < honkctl> <head> | |
10:39 < honkctl> <meta charset="UTF-8"> | |
10:39 < honkctl> </head> | |
10:39 < honkctl> <body> | |
10:39 < honkctl> <pre> | |
10:39 < honkctl> _. _______ | |
10:39 < honkctl> __.--' | ____...,---''''' .'''-. | |
10:39 < honkctl> _,-' \ ____.. | |
10:39 < honkctl> ... | |
10:39 < xmudrii> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper bucket -o yaml | |
10:39 < honkctl> apiVersion: v1 | |
10:39 < honkctl> data: | |
10:39 < honkctl> index.html: | | |
10:39 < honkctl> <html> | |
10:39 < honkctl> <head> | |
10:39 < honkctl> <meta charset="UTF-8"> | |
10:39 < honkctl> </head> | |
10:39 < honkctl> <body> | |
10:39 < honkctl> <pre> | |
10:39 < honkctl> _.-()______)-._ | |
10:39 < bdimcheff> !honkctl ungoose | |
10:39 < xmudrii> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper bucket -o jsonpath='{.data}' | |
10:39 < honkctl> 'map[index.html:<html> | |
10:39 < honkctl> <head> | |
10:39 < honkctl> <meta charset="UTF-8"> | |
10:39 < honkctl> </head> | |
10:39 < honkctl> <body> | |
10:39 < honkctl> <pre> | |
10:39 < honkctl> _.-()______)-._ | |
10:39 < honkctl> .' '. | |
10:39 < honkctl> / \ | |
10:39 < honkctl> : _________ : | |
10:39 < honkctl> |.--''' '''--.| | |
10:40 < honkctl> ( ) | |
10:40 < honkctl> :'--..._________...--': | |
10:40 < honkctl> : : | |
10:40 < xmudrii> !honkctl describe cm -n pub --as=system:serviceaccount:garden:groundskeeper bucket -o jsonpath='{.data}' | |
10:40 < honkctl> Error: unknown shorthand flag: 'o' in -o | |
10:40 < honkctl> See 'kubectl describe --help' for usage. | |
10:40 < xmudrii> !honkctl describe cm -n pub --as=system:serviceaccount:garden:groundskeeper bucket | |
10:40 < honkctl> Name: bucket | |
10:40 < honkctl> Namespace: pub | |
10:40 < honkctl> Labels: <none> | |
10:40 < honkctl> Annotations: kubectl.kubernetes.io/last-applied-configuration: | |
10:40 < honkctl> {"apiVersion":"v1","data":{"index.html":"\u003chtml\u003e\n\u003chead\u003e\n\u003cmeta charset=\"UTF-8\"\u003e\n\u003c/head\u003e\n\u0 | |
10:40 < honkctl> ... | |
10:41 < bdimcheff> !honkctl version | |
10:41 < honkctl> Unable to connect to the server: EOF | |
10:41 < gooseguy> !honkctl delete po beer --as=system:serviceaccount:garden:groundskeeper | |
10:41 < honkctl> pod "beer" deleted | |
10:42 < xmudrii> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:42 <@jeefy> Honestly. | |
10:42 < honkctl> NAME DATA AGE | |
10:42 < honkctl> box 1 10m | |
10:42 < honkctl> bucket 1 10m | |
10:42 < honkctl> dartboard 1 10m | |
10:42 < honkctl> fetch-kubectl 1 10m | |
10:42 < honkctl> flower 1 10m | |
10:42 < honkctl> pint-glass 1 10m | |
10:42 <@jeefy> Why would you get rid of the beer. | |
10:42 < honkctl> Cluster recreated for bdimcheff.... | |
10:42 < xmudrii> !honkctl get pint-glass -n pub --as=system:serviceaccount:garden:groundskeeper -o yaml | |
10:42 < honkctl> error: the server doesn't have a resource type "pint-glass" | |
10:42 < xmudrii> !honkctl get cm pint-glass -n pub --as=system:serviceaccount:garden:groundskeeper -o yaml | |
10:42 < honkctl> apiVersion: v1 | |
10:42 < honkctl> data: | |
10:42 < honkctl> index.html: | | |
10:42 < honkctl> <html> | |
10:42 < honkctl> <head> | |
10:42 < honkctl> <meta charset="UTF-8"> | |
10:42 < honkctl> </head> | |
10:42 < honkctl> <body> | |
10:42 < honkctl> <pre> | |
10:42 < honkctl> __________ | |
10:42 < honkctl> |__ __ __| | |
10:42 < honkctl> .---| :: :: | | |
10:43 < xmudrii> !honkctl get cm pint-glass -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.data[0]}' | |
10:43 < honkctl> error: error executing jsonpath "'{.data[0]}'": Error executing template: map[string]interface {} is not array or slice. Printing more information for debugging the template: | |
10:43 < honkctl> template was: | |
10:43 < honkctl> '{.data[0]}' | |
10:43 < honkctl> object given to jsonpath engine was: | |
10:43 < honkctl> map[string]interface {}{"apiVe | |
10:43 < honkctl> ... | |
10:44 < xmudrii> !honkctl get all -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:44 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:44 < honkctl> pod/barkeep-76c949f857-krfsn 1/1 Running 0 12m | |
10:44 < honkctl> pod/burly-man-b958cff98-t2kjf 1/1 Running 0 12m | |
10:44 < honkctl> pod/delivery-person-9868cb979-fdfbs | |
10:44 < honkctl> ... | |
10:44 < bdimcheff> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:44 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:44 < honkctl> barkeep-76c949f857-897n2 1/1 Running 0 4m10s | |
10:44 < honkctl> burly-man-b958cff98-hb7g7 1/1 Running 0 4m10s | |
10:44 < honkctl> delivery-person-9868cb979-7khww 1/1 Running 0 | |
10:44 < honkctl> ... | |
10:45 -!- brrrr [[email protected]] has joined #honkctl-jan | |
10:45 < xmudrii> !honkctl get all -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[0].metadata.name}' | |
10:45 < honkctl> 'barkeep-76c949f857-krfsn' | |
10:45 < xmudrii> !honkctl get all -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name}' | |
10:45 < honkctl> 'barkeep-76c949f857-krfsn burly-man-b958cff98-t2kjf delivery-person-9868cb979-fdfbs fetch-kubectl-5tntx old-man-bf794945f-bcbwm woman-0 woman-1 barkeep burly-man delivery-person old-man barkeep-76c949f857 burly-man-b958cff98 delivery-person-9868cb979 old-man-bf794945f woman | |
10:45 < honkctl> ... | |
10:45 < yebyen> !honkctl get services --all-namespaces -o name --as=system:serviceaccount:garden:groundskeeper | |
10:45 < honkctl> Error from server (Forbidden): services is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "services" in API group "" at the cluster scope | |
10:45 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/d562b5bcf9dbb97c350b04ef2cc69b2955787f86/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
10:45 < honkctl> pod/beer created | |
10:45 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper | |
10:45 < yebyen> !honkctl get services -n pub -o name --as=system:serviceaccount:garden:groundskeeper | |
10:45 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper | |
10:46 < gooseguy> !honkctl get all -o custom-columns=NAME:.metadata.name --as=system:serviceaccount:garden:groundskeeper | |
10:46 < honkctl> NAME | |
10:46 < honkctl> barkeep-7fd8878887-bsv72 | |
10:46 < honkctl> beer | |
10:46 < honkctl> burly-man-56588df9dd-dcrqg | |
10:46 < honkctl> delivery-person-65d5c4fcf7-vm6t9 | |
10:46 < honkctl> fetch-kubectl-6hb8z | |
10:46 < honkctl> old-man-bf794945f-hl4rp | |
10:46 < honkctl> woman-0 | |
10:46 < honkctl> woman-1 | |
10:46 < honkctl> barkeep | |
10:46 < honkctl> burly-man | |
10:46 < honkctl> delivery-person | |
10:46 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper | |
10:46 < gooseguy> !hionkctl get events --as=system:serviceaccount:garden:groundskeeper | |
10:47 <@mrbobbytables> oh yeah, other note for everyone -- the todos are there to help you get to the final step | |
10:47 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper | |
10:47 < honkctl> LAST SEEN TYPE REASON OBJECT MESSAGE | |
10:47 < honkctl> 36m Warning FailedScheduling pod/barkeep-7fd8878887-bsv72 0/1 nodes are available: 1 node(s) had taints that the pod didn't tolerate. | |
10:47 < honkctl> <unknown> Warning | |
10:47 < honkctl> ... | |
10:47 < xmudrii> !honkctl get secrets -n pub --as=system:serviceaccount:garden:groundskeeper | |
10:47 < honkctl> NAME TYPE DATA AGE | |
10:47 < honkctl> barkeep-token-q5v58 kubernetes.io/service-account-token 3 15m | |
10:47 < honkctl> burly-man-token-nl85l kubernetes.io/service-account-token 3 15m | |
10:47 < honkctl> default-token-xjdj9 kubernet | |
10:47 < honkctl> ... | |
10:47 < xmudrii> !honkctl get secrets -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metedata.name}' | |
10:47 < honkctl> '' | |
10:47 < gooseguy> !honkctl get todos | |
10:47 < honkctl> NAME TODO | |
10:47 < honkctl> todo-1 Steal the groundskeepers keys. | |
10:47 < honkctl> todo-2 Get to the Pub. | |
10:47 < honkctl> todo-3 Get into the model-village. | |
10:47 < honkctl> todo-4 Steal the beautiful minature golden bell. | |
10:47 < honkctl> todo-5 ...and take it all the way back home. | |
10:47 < xmudrii> !honkctl get secrets -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name}' | |
10:47 < honkctl> 'barkeep-token-q5v58 burly-man-token-nl85l default-token-xjdj9 delivery-person-token-56spl old-man-token-f57nt woman-token-v7bdc' | |
10:47 < xmudrii> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name}' | |
10:47 < honkctl> 'box bucket dartboard fetch-kubectl flower pint-glass' | |
10:48 < gooseguy> !honkctl get cm fetch-kubectl --as=system:serviceaccount:garden:groundskeeper -oyaml | |
10:48 < honkctl> apiVersion: v1 | |
10:48 < honkctl> data: | |
10:48 < honkctl> fetch-kubectl.yaml: | | |
10:48 < honkctl> apiVersion: batch/v1 | |
10:48 < honkctl> kind: Job | |
10:48 < honkctl> metadata: | |
10:48 < honkctl> name: fetch-kubectl | |
10:48 < honkctl> namespace: pub | |
10:48 < honkctl> spec: | |
10:48 < honkctl> backoffLimit: 5 | |
10:48 < honkctl> template: | |
10:48 < honkctl> spec: | |
10:48 < yebyen> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/d562b5bcf9dbb97c350b04ef2cc69b2955787f86/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
10:48 < honkctl> Error from server (Forbidden): error when creating "https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/d562b5bcf9dbb97c350b04ef2cc69b2955787f86/beer.yaml": pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot create r | |
10:48 < honkctl> ... | |
10:49 < yebyen> !honkctl apply -n pub -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/d562b5bcf9dbb97c350b04ef2cc69b2955787f86/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
10:49 < honkctl> pod/beer created | |
10:49 < gooseguy> !honkctl get cm fetch-kubectl --as=system:serviceaccount:garden:groundskeeper -o jsonpath={.data.fetch-kubectl.yaml} | |
10:49 < yebyen> !honkctl -n pub logs beer | |
10:49 < honkctl> Error from server (Forbidden): pods "beer" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
10:49 < yebyen> !honkctl -n pub logs beer --as=system:serviceaccount:garden:groundskeeper | |
10:49 < yebyen> !honkctl -n pub get po | |
10:49 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "pods" in API group "" in the namespace "pub" | |
10:49 < yebyen> !honkctl -n pub get po --as=system:serviceaccount:garden:groundskeeper | |
10:49 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:49 < honkctl> barkeep-7fd8878887-r9787 0/1 CrashLoopBackOff 17 42m | |
10:49 < honkctl> beer 0/1 CrashLoopBackOff 2 37s | |
10:49 < honkctl> burly-man-56588df9dd-lc4fj 0/1 C | |
10:49 < honkctl> ... | |
10:49 < yebyen> !ungoose | |
10:50 < gooseguy> can;t tell if that does what i want sadly | |
10:50 < yebyen> !honkctl -n pub logs beer --as=system:serviceaccount:garden:groundskeeper | |
10:50 < yebyen> sending the token to pastebin is a good idea, I think | |
10:50 < gooseguy> !honkctl get pods beer | |
10:50 < honkctl> Error from server (Forbidden): pods "beer" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
10:50 < xmudrii> !honkctl get deploy -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name}' | |
10:50 < honkctl> 'barkeep burly-man delivery-person old-man' | |
10:50 < yebyen> it would be easier to find it there if it has a title though, I think | |
10:50 < gooseguy> !honkctl get pods beer --as=system:serviceaccount:garden:groundskeeper | |
10:50 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:50 < honkctl> beer 0/1 CrashLoopBackOff 5 5m18s | |
10:51 < gooseguy> time to google pastbin api | |
10:51 < xmudrii> !honkctl get sts -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name}' | |
10:51 < honkctl> 'woman' | |
10:51 < xmudrii> !honkctl get sts -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].spec}' | |
10:51 < honkctl> 'map[podManagementPolicy:OrderedReady replicas:2 revisionHistoryLimit:10 selector:map[matchLabels:map[flower:true]] serviceName:table template:map[metadata:map[creationTimestamp:<nil> labels:map[flower:true]] spec:map[containers:[map[image:nginx:stable-alpine imagePullPolicy | |
10:51 < honkctl> ... | |
10:51 < xmudrii> !honkctl get sts -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].spec.containers[*]}' | |
10:51 < honkctl> '' | |
10:52 < xmudrii> !honkctl get sts -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].spec.template.containers[*]}' | |
10:52 < honkctl> '' | |
10:52 < yebyen> if the cluster endpoint is private though it might not help much to have the whole token | |
10:52 < yebyen> !honkctl -n pub logs beer --as=system:serviceaccount:garden:groundskeeper | |
10:52 < yebyen> !honkctl -n pub get po --as=system:serviceaccount:garden:groundskeeper | |
10:52 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:52 < honkctl> barkeep-7fd8878887-r9787 1/1 Running 19 45m | |
10:52 < honkctl> beer 0/1 CrashLoopBackOff 5 3m40s | |
10:52 < honkctl> burly-man-56588df9dd-lc4fj 1/1 | |
10:52 < honkctl> ... | |
10:53 -!- toocold [~textual@2601:448:c580:13c0:d02b:1a3c:8090:995d] has joined #honkctl-jan | |
10:54 -!- brrrr [[email protected]] has left #honkctl-jan [] | |
10:54 < toocold> !honkctl get ns | |
10:54 < gooseguy> !honkctl delete po beer --as=system:serviceaccount:garden:groundskeeper | |
10:54 < honkctl> pod "beer" deleted | |
10:55 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/fcefd12209c10c38da555ec701bbf6dad6f73bc8/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
10:55 < honkctl> pod/beer created | |
10:55 < gooseguy> !honkctl get pods beer | |
10:55 < honkctl> Error from server (Forbidden): pods "beer" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
10:55 < gooseguy> !honkctl delete po beer --as=system:serviceaccount:garden:groundskeeper | |
10:55 < gooseguy> !honkctl get pods beer --as=system:serviceaccount:garden:groundskeeper | |
10:55 < honkctl> NAME READY STATUS RESTARTS AGE | |
10:55 < honkctl> beer 0/1 Terminating 1 20s | |
10:55 < honkctl> pod "beer" deleted | |
10:55 < xmudrii> Oh well.. I think I'm getting lost. And sleep deprivated too. D: | |
10:55 <@mrbobbytables> the cluster endpoints are private | |
10:56 < yebyen> !honkctl -n pub delete po beer --as=system:serviceaccount:garden:groundskeeper | |
10:56 < honkctl> pod "beer" deleted | |
10:56 < yebyen> this article was awesome btw https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/ | |
10:56 < yebyen> whoever shared that first | |
10:57 < honkctl> NAME STATUS AGE | |
10:57 < honkctl> default Active 2m12s | |
10:57 < honkctl> garden Active 2m7s | |
10:57 < honkctl> home Active 2m7s | |
10:57 < honkctl> kube-node-lease Active 2m13s | |
10:57 < honkctl> kube-public Active 2m13s | |
10:57 < honkctl> kube-system Active 2m13s | |
10:57 < honkctl> model-village Active 2m7s | |
10:57 < honkctl> pub | |
10:57 < honkctl> ... | |
10:57 < toocold> !honkctl get ns | |
10:57 < honkctl> NAME STATUS AGE | |
10:57 < honkctl> default Active 2m28s | |
10:57 < honkctl> garden Active 2m23s | |
10:57 < honkctl> home Active 2m23s | |
10:57 < honkctl> kube-node-lease Active 2m29s | |
10:57 < honkctl> kube-public Active 2m29s | |
10:57 < honkctl> kube-system Active 2m29s | |
10:57 < honkctl> model-village Active 2m23s | |
10:57 < honkctl> pub | |
10:57 < honkctl> ... | |
10:57 < bdimcheff> !honkctl --as=system:serviceaccount:garden:groundskeeper -n model-village get pods | |
10:57 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "pods" in API group "" in the namespace "model-village" | |
10:58 < yebyen> !honkctl -n pub get sa --as=system:serviceaccount:garden:groundskeeper | |
10:58 < honkctl> NAME SECRETS AGE | |
10:58 < honkctl> barkeep 1 51m | |
10:58 < honkctl> burly-man 1 51m | |
10:58 < honkctl> default 1 51m | |
10:58 < honkctl> delivery-person 1 51m | |
10:58 < honkctl> old-man 1 51m | |
10:58 < honkctl> woman 1 51m | |
10:58 < yebyen> !honkctl -n model-village get po --as=system:serviceaccount:pub:woman | |
10:58 < honkctl> Error from server (Forbidden): serviceaccounts "woman" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
10:58 < xmudrii> !honkctl get all -A pub --as=system:serviceaccount:garden:default | |
10:58 < honkctl> error: the server doesn't have a resource type "all" | |
10:58 -!- indy21 [[email protected]] has quit [Ping timeout: 268 seconds] | |
10:58 < xmudrii> !honkctl get all -A --as=system:serviceaccount:garden:default | |
10:58 < honkctl> error: the server doesn't have a resource type "all" | |
10:59 < xmudrii> !honkctl get po -A --as=system:serviceaccount:garden:default | |
10:59 < honkctl> error: the server doesn't have a resource type "po" | |
10:59 < xmudrii> !honkctl get ns -A --as=system:serviceaccount:garden:default | |
10:59 < honkctl> error: the server doesn't have a resource type "ns" | |
10:59 <@mrbobbytables> @yebyen that article is solid | |
11:01 < xmudrii> !honkctl get po -A --as=system:serviceaccount:garden:barkeeper | |
11:01 < honkctl> error: the server doesn't have a resource type "po" | |
11:01 < bdimcheff> !honkctl --as=system:serviceaccount:garden:groundskeeper -n garden get sa | |
11:01 < honkctl> NAME SECRETS AGE | |
11:01 < honkctl> default 1 20m | |
11:01 < honkctl> goose 1 20m | |
11:01 < honkctl> groundskeeper 1 20m | |
11:01 < xmudrii> !honkctl get ns | |
11:01 < honkctl> NAME STATUS AGE | |
11:01 < honkctl> default Active 30m | |
11:01 < honkctl> garden Active 30m | |
11:01 < honkctl> home Active 30m | |
11:01 < honkctl> kube-node-lease Active 30m | |
11:01 < honkctl> kube-public Active 30m | |
11:01 < honkctl> kube-system Active 30m | |
11:01 < honkctl> model-village Active 30m | |
11:01 < honkctl> pub Active 30m | |
11:01 < xmudrii> !honkctl get po -n model-village | |
11:01 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "pods" in API group "" in the namespace "model-village" | |
11:02 < bdimcheff> yeah ok | |
11:02 < gooseguy> !honkctl auth can-i impersonate serviceaccounts --as=system:serviceaccount:garden:groundskeeper | |
11:02 < honkctl> yes | |
11:02 < xmudrii> !honkctl get po -n home | |
11:02 < honkctl> No resources found in home namespace. | |
11:02 < xmudrii> !honkctl get all -n home | |
11:02 < honkctl> No resources found in home namespace. | |
11:02 < yebyen> oh I think I get it | |
11:02 < xmudrii> !honkctl get all -n home --as=system:serviceaccount:garden:groundskeeper | |
11:02 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "pods" in API group "" in the namespace "home" | |
11:02 < honkctl> Error from server (Forbidden): replicationcontrollers is forbidden: User "system:serviceaccount:garden:grou | |
11:02 < honkctl> ... | |
11:03 < yebyen> !honkctl get todos todo-3 -o jsonpath='{.spec}' | |
11:03 < honkctl> 'map[hint:the grizzly knows the way todo:Get into the model-village.]' | |
11:03 < xmudrii> !honkctl get sa -n pub --as=system:serviceaccount:garden:groundskeeper | |
11:03 < honkctl> NAME SECRETS AGE | |
11:03 < honkctl> barkeep 1 31m | |
11:03 < honkctl> burly-man 1 31m | |
11:03 < honkctl> default 1 31m | |
11:03 < honkctl> delivery-person 1 31m | |
11:03 < honkctl> old-man 1 31m | |
11:03 < honkctl> woman 1 31m | |
11:03 < yebyen> !honkctl get todos todo-2 -o jsonpath='{.spec}' | |
11:03 < honkctl> 'map[hint:Let's go to the Winchester, have a nice cold pint, and wait for this all to blow over. todo:Get to the Pub.]' | |
11:03 < yebyen> !honkctl get todos todo-4 -o jsonpath='{.spec}' | |
11:03 < honkctl> 'map[hint: todo:Steal the beautiful minature golden bell.]' | |
11:03 < xmudrii> !honkctl get sa -n pub --as=system:serviceaccount:pub:old-man | |
11:03 < honkctl> Error from server (Forbidden): serviceaccounts "old-man" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
11:03 < gooseguy> smh the new pastbin api requres an pi key | |
11:03 < yebyen> !honkctl get todos todo-4 -o jsonpath='{@}' | |
11:03 < honkctl> 'map[apiVersion:honk.ci/v1 kind:Todo metadata:map[annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"honk.ci/v1","kind":"Todo","metadata":{"annotations":{},"name":"todo-4"},"spec":{"hint":"","todo":"Steal the beautiful minature golden bell."}} | |
11:03 < honkctl> ] | |
11:03 < honkctl> ... | |
11:04 < xmudrii> !honkctl get ns --as=system:serviceaccount:garden:groundskeeper | |
11:04 < honkctl> Error from server (Forbidden): namespaces is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "namespaces" in API group "" at the cluster scope | |
11:04 < xmudrii> !honkctl get ns | |
11:04 < honkctl> NAME STATUS AGE | |
11:04 < honkctl> default Active 32m | |
11:04 < honkctl> garden Active 32m | |
11:04 < honkctl> home Active 32m | |
11:04 < honkctl> kube-node-lease Active 32m | |
11:04 < honkctl> kube-public Active 32m | |
11:04 < honkctl> kube-system Active 32m | |
11:04 < honkctl> model-village Active 32m | |
11:04 < honkctl> pub Active 32m | |
11:04 < toocold> !honkctl get todos | |
11:04 < honkctl> NAME TODO | |
11:04 < honkctl> todo-1 Steal the groundskeepers keys. | |
11:04 < honkctl> todo-2 Get to the Pub. | |
11:04 < honkctl> todo-3 Get into the model-village. | |
11:04 < honkctl> todo-4 Steal the beautiful minature golden bell. | |
11:04 < honkctl> todo-5 ...and take it all the way back home. | |
11:04 < toocold> !honkctl get todos todo-1 | |
11:04 < honkctl> NAME TODO | |
11:04 < honkctl> todo-1 Steal the groundskeepers keys. | |
11:05 < xmudrii> !honkctl config get-contexts | |
11:05 < honkctl> CURRENT NAME CLUSTER AUTHINFO NAMESPACE | |
11:05 < honkctl> * goose-garden-kind-xmudrii kind-xmudrii goose-garden-kind-xmudrii garden | |
11:05 < bdimcheff> !honkctl get todos todo-1 -o jsonpath='{.spec}' | |
11:05 < honkctl> 'map[hint:Sometimes one must become that they honk to reach ones goals. todo:Steal the groundskeepers keys.]' | |
11:05 < yebyen> !honkctl auth can-i get role-binding --as=system:serviceaccount:garden:groundskeeper | |
11:05 < honkctl> Warning: the server doesn't have a resource type 'role-binding' | |
11:05 < yebyen> !honkctl auth can-i get rolebinding --as=system:serviceaccount:garden:groundskeeper | |
11:05 < honkctl> no | |
11:06 < toocold> get todos todo-3 -o jsonpath='{.spec}' | |
11:06 < toocold> !honkctl get todos todo-3 -o jsonpath='{.spec}' | |
11:06 < honkctl> 'map[hint:the grizzly knows the way todo:Get into the model-village.]' | |
11:06 < toocold> !honkctl get todos todo-5 -o jsonpath='{.spec}' | |
11:06 < honkctl> 'map[hint:Cloning oneself should be illegal todo:...and take it all the way back home.]' | |
11:06 < toocold> lol | |
11:06 < yebyen> !honkctl set-context --user=system:serviceaccount:garden:groundskeeper | |
11:06 < honkctl> Error: unknown command "set-context" for "kubectl" | |
11:06 < honkctl> Run 'kubectl --help' for usage. | |
11:06 < yebyen> !honkctl config set-context --user=system:serviceaccount:garden:groundskeeper | |
11:06 < honkctl> error: you must specify a non-empty context name or --current | |
11:07 < yebyen> !honkctl config set-context --current --user=system:serviceaccount:garden:groundskeeper | |
11:07 < honkctl> Context "goose-garden-kind-yebyen" modified. | |
11:07 < yebyen> !honkctl config set-context --current -n pub | |
11:07 < honkctl> Error: unknown shorthand flag: 'n' in -n | |
11:07 < honkctl> See 'kubectl config set-context --help' for usage. | |
11:07 < yebyen> !honkctl config set-context --current --namespace pub | |
11:07 < honkctl> Context "goose-garden-kind-yebyen" modified. | |
11:07 < xmudrii> I'm going to steal that command :P | |
11:07 < yebyen> !honkctl get po | |
11:07 < honkctl> error: EOF | |
11:07 < yebyen> sad | |
11:07 < xmudrii> !honkctl config set-context --current --user=system:serviceaccount:garden:groundskeeper | |
11:07 < honkctl> Context "goose-garden-kind-xmudrii" modified. | |
11:07 < xmudrii> !honkctl get po | |
11:07 < honkctl> error: EOF | |
11:08 < xmudrii> !honkctl get po -n pub | |
11:08 < honkctl> error: EOF | |
11:08 < xmudrii> :( | |
11:08 < xmudrii> !honkctl config set-context --current --user=system:serviceaccount:garden:goose | |
11:08 < honkctl> Context "goose-garden-kind-xmudrii" modified. | |
11:08 < gooseguy> honkctl> Context "goose-garden-kind-yebyen" modified. | |
11:08 < xmudrii> !honkctl get ns | |
11:08 < honkctl> error: EOF | |
11:08 < yebyen> !honkctl get po | |
11:08 < honkctl> error: EOF | |
11:08 < gooseguy> !honkctl config set-context --current --user=system:serviceaccount:garden:groundskeeper | |
11:08 < honkctl> Context "goose-garden-kind-gooseguy" modified. | |
11:08 < xmudrii> Errr :D | |
11:08 < xmudrii> !honkctl ungoose | |
11:08 < yebyen> !honkctl config set-context --current --user=system:serviceaccount:garden:goose | |
11:08 < honkctl> Context "goose-garden-kind-yebyen" modified. | |
11:08 < yebyen> !honkctl get po | |
11:08 < honkctl> error: EOF | |
11:09 < gooseguy> !honkctl get todos | |
11:09 < honkctl> error: EOF | |
11:09 <@jeefy> Hmm. Wonder if the server OOM'd | |
11:10 < xmudrii> !honkctl get ns | |
11:10 < honkctl> Unable to connect to the server: EOF | |
11:10 < bdimcheff> !honkctl version | |
11:10 < honkctl> Client Version: version.Info{Major:"1", Minor:"17", GitVersion:"v1.17.0", GitCommit:"70132b0f130acc0bed193d9ba59dd186f0e634cf", GitTreeState:"clean", BuildDate:"2019-12-07T21:20:10Z", GoVersion:"go1.13.4", Compiler:"gc", Platform:"linux/amd64"} | |
11:10 < honkctl> Server Version: version.Info{M | |
11:10 < honkctl> ... | |
11:10 < yebyen> !honkctl get po | |
11:10 < honkctl> error: EOF | |
11:10 < xmudrii> !honkctl get ns | |
11:10 <@mrbobbytables> https://www.irccloud.com/pastebin/R1jIykkN/ | |
11:10 < honkctl> Unable to connect to the server: EOF | |
11:11 < xmudrii> @mrbobbytables what's that :D | |
11:11 <@mrbobbytables> free -m on the server hosting all these instances | |
11:11 < yebyen> looks like there's plenty of memory | |
11:11 < honkctl> Cluster recreated for xmudrii.... | |
11:11 < xmudrii> !honkctl get ns | |
11:11 < honkctl> NAME STATUS AGE | |
11:11 < honkctl> default Active 2m22s | |
11:11 < honkctl> garden Active 2m17s | |
11:11 < honkctl> home Active 2m17s | |
11:11 < honkctl> kube-node-lease Active 2m23s | |
11:11 < honkctl> kube-public Active 2m23s | |
11:11 < honkctl> kube-system Active 2m23s | |
11:11 < bdimcheff> !honkctl get todos | |
11:11 < honkctl> model-village Active 2m17s | |
11:11 < honkctl> pub | |
11:11 < honkctl> ... | |
11:11 < honkctl> NAME TODO | |
11:11 < honkctl> todo-1 Steal the groundskeepers keys. | |
11:11 < honkctl> todo-2 Get to the Pub. | |
11:11 < honkctl> todo-3 Get into the model-village. | |
11:12 < yebyen> !honkctl get po | |
11:12 < honkctl> error: EOF | |
11:12 < xmudrii> !honkctl auth can-i create rolebindings | |
11:12 < honkctl> no | |
11:12 < yebyen> !honkctl ungoose | |
11:12 < xmudrii> !honkctl auth can-i create rolebindings --as=system:serviceaccount:garden:groundskeeper | |
11:13 < honkctl> no | |
11:13 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/f9507afe163861d2994b08771ac92faa44994064/beer.yaml | |
11:13 < honkctl> error: EOF | |
11:13 < xmudrii> !honkctl auth can-i create rolebindings --as=system:serviceaccount:garden:groundskeeper -n pub | |
11:13 < honkctl> no | |
11:13 < yebyen> !honkctl get po | |
11:13 < honkctl> The connection to the server localhost:8080 was refused - did you specify the right host or port? | |
11:13 < gooseguy> !honkctl get pods | |
11:13 < honkctl> error: EOF | |
11:13 < yebyen> !honkctl get todo | |
11:13 < honkctl> Unable to connect to the server: EOF | |
11:13 < gooseguy> HONKED | |
11:14 < xmudrii> !honkctl get ns | |
11:14 < honkctl> NAME STATUS AGE | |
11:14 < honkctl> default Active 4m49s | |
11:14 < honkctl> garden Active 4m44s | |
11:14 < honkctl> home Active 4m44s | |
11:14 < honkctl> kube-node-lease Active 4m50s | |
11:14 < honkctl> kube-public Active 4m50s | |
11:14 < honkctl> kube-system Active 4m50s | |
11:14 < honkctl> model-village Active 4m44s | |
11:14 < honkctl> pub | |
11:14 < honkctl> ... | |
11:14 < gooseguy> !honkctl get pods | |
11:14 < honkctl> error: EOF | |
11:14 < gooseguy> !honkctl config set-context --current --user=system:serviceaccount:garden:goose | |
11:14 < honkctl> Context "goose-garden-kind-gooseguy" modified. | |
11:14 < xmudrii> !honkctl get ns -o jsonpath='{.items[*].metadata.name}' | |
11:14 < honkctl> 'default garden home kube-node-lease kube-public kube-system model-village pub' | |
11:14 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/f9507afe163861d2994b08771ac92faa44994064/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:14 < honkctl> error: EOF | |
11:15 < yebyen> !honkctl get todo | |
11:15 < xmudrii> !honkctl auth can-i --list -n model-village | |
11:15 < honkctl> Resources Non-Resource URLs Resource Names Verbs | |
11:15 < honkctl> selfsubjectaccessreviews.authorization.k8s.io [] [] [create] | |
11:15 < honkctl> selfsubjectrulesreviews.authorization.k8s.io [] [] | |
11:15 < honkctl> ... | |
11:15 < honkctl> Unable to connect to the server: EOF | |
11:15 < xmudrii> !honkctl auth can-i --list -n model-village -o jsonpath='{.items[0]}' | |
11:15 < honkctl> Error: unknown shorthand flag: 'o' in -o | |
11:15 < honkctl> See 'kubectl auth can-i --help' for usage. | |
11:15 < toocold> !honkctl config set-context --current --user=system:serviceaccount:garden:groundskeeper | |
11:15 < honkctl> Context "goose-garden-kind-toocold" modified. | |
11:15 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/f9507afe163861d2994b08771ac92faa44994064/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:15 < honkctl> error: EOF | |
11:15 < xmudrii> !honkctl auth can-i --list -n model-village -o json | |
11:15 < honkctl> Error: unknown shorthand flag: 'o' in -o | |
11:15 < honkctl> See 'kubectl auth can-i --help' for usage. | |
11:15 < honkctl> Cluster recreated for yebyen.... | |
11:15 < xmudrii> !honkctl auth can-i --list -n model-village --no-headers | |
11:15 < honkctl> selfsubjectaccessreviews.authorization.k8s.io [] [] [create] | |
11:15 < honkctl> selfsubjectrulesreviews.authorization.k8s.io [] [] [create] | |
11:15 < honkctl> namespaces [] [] | |
11:15 < honkctl> ... | |
11:16 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/d4124c3352e338d607c96e592f481ddf4fd74f69/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:16 < honkctl> error: EOF | |
11:16 < gooseguy> !ungoose | |
11:16 < toocold> !honkctl get pods | |
11:16 < honkctl> error: EOF | |
11:16 < xmudrii> !honkctl auth can-i list pods -n model-village --no-headers | |
11:16 < honkctl> error: --no-headers cannot be set without --list specified | |
11:16 < yebyen> !honkctl get todo | |
11:16 < honkctl> NAME TODO | |
11:16 < honkctl> todo-1 Steal the groundskeepers keys. | |
11:16 < honkctl> todo-2 Get to the Pub. | |
11:16 < honkctl> todo-3 Get into the model-village. | |
11:16 < honkctl> todo-4 Steal the beautiful minature golden bell. | |
11:16 < honkctl> todo-5 ...and take it all the way back home. | |
11:16 < gooseguy> !honkctl ungoose | |
11:16 < xmudrii> !honkctl auth can-i list pods -n model-village | |
11:16 < honkctl> no | |
11:16 < xmudrii> !honkctl auth can-i list sa -n model-village | |
11:16 < honkctl> no | |
11:16 < xmudrii> !honkctl auth can-i create sa -n model-village | |
11:16 < honkctl> no | |
11:16 < xmudrii> !honkctl auth can-i create po -n model-village | |
11:16 < honkctl> no | |
11:16 < toocold> !honkctl auth can-i list pods -n garden | |
11:16 < honkctl> error: EOF | |
11:17 < xmudrii> !honkctl auth can-i create deploy -n model-village | |
11:17 < honkctl> no | |
11:17 < xmudrii> !honkctl auth can-i create sts -n model-village | |
11:17 < honkctl> no | |
11:17 < xmudrii> !honkctl auth can-i create rolebinding -n model-village | |
11:17 < honkctl> no | |
11:17 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/d4124c3352e338d607c96e592f481ddf4fd74f69/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:17 < honkctl> Error from server (Forbidden): error when retrieving current configuration of: | |
11:17 < honkctl> Resource: "/v1, Resource=pods", GroupVersionKind: "/v1, Kind=Pod" | |
11:17 < honkctl> Name: "beer", Namespace: "default" | |
11:17 < honkctl> Object: &{map["apiVersion":"v1" "kind":"Pod" "metadata":map["annotations":map["kubectl.kubernet | |
11:17 < honkctl> ... | |
11:17 < xmudrii> !honkctl auth can-i create rolebinding -n model-village --as=system:serviceaccount:garden:groundskeeper | |
11:17 < honkctl> no | |
11:17 < xmudrii> !honkctl auth can-i create deploy -n model-village --as=system:serviceaccount:garden:groundskeeper | |
11:17 < honkctl> no | |
11:17 < yebyen> !honkctl get po | |
11:17 < honkctl> No resources found in garden namespace. | |
11:17 < gooseguy> !honkctl delete pod beer --as=system:serviceaccount:garden:groundskeeper | |
11:17 < honkctl> Unable to connect to the server: read tcp 127.0.0.1:41132->127.0.0.1:33825: read: connection reset by peer | |
11:17 < yebyen> !honkctl get deploy | |
11:17 < honkctl> No resources found in garden namespace. | |
11:18 < yebyen> !honkctl get sa | |
11:18 < honkctl> NAME SECRETS AGE | |
11:18 < honkctl> default 1 4m19s | |
11:18 < honkctl> goose 1 4m28s | |
11:18 < honkctl> groundskeeper 1 4m27s | |
11:18 < gooseguy> !honkctl config set-context --current --namespace=garden | |
11:18 < honkctl> Context "kind-gooseguy" modified. | |
11:18 < bdimcheff> !honkctl get secrets --as=system:serviceaccount:garden:groundskeeper -n pub | |
11:18 < honkctl> NAME TYPE DATA AGE | |
11:18 < honkctl> barkeep-token-p5bgf kubernetes.io/service-account-token 3 37m | |
11:18 < honkctl> burly-man-token-pqksx kubernetes.io/service-account-token 3 37m | |
11:18 < honkctl> default-token-dhq7n kubernet | |
11:18 < honkctl> ... | |
11:18 < gooseguy> !honkctl config set-context --current --namespace=pub | |
11:18 < honkctl> Context "kind-gooseguy" modified. | |
11:18 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/d4124c3352e338d607c96e592f481ddf4fd74f69/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:18 < honkctl> Unable to connect to the server: EOF | |
11:18 < bdimcheff> * !honkctl get secrets --as=system:serviceaccount:garden:groundskeeper -n pub -o name | |
11:18 < honkctl> secret/barkeep-token-p5bgf | |
11:18 < honkctl> secret/burly-man-token-pqksx | |
11:18 < honkctl> secret/default-token-dhq7n | |
11:18 < honkctl> secret/delivery-person-token-pmw6k | |
11:18 < honkctl> secret/old-man-token-8s9t9 | |
11:18 < honkctl> secret/woman-token-2rwsb | |
11:18 < yebyen> !honkctl config set-context --current --namespace=garden | |
11:18 < honkctl> Context "goose-garden-kind-yebyen" modified. | |
11:18 < yebyen> !honkctl get deploy | |
11:18 < honkctl> No resources found in garden namespace. | |
11:18 < yebyen> !honkctl config set-context --current --namespace=pub | |
11:18 < honkctl> Context "goose-garden-kind-yebyen" modified. | |
11:18 < yebyen> !honkctl get deploy | |
11:18 < honkctl> Error from server (Forbidden): deployments.apps is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "deployments" in API group "apps" in the namespace "pub" | |
11:19 < yebyen> !honkctl get deploy --as=system:serviceaccount:garden:groundskeeper | |
11:19 < honkctl> NAME READY UP-TO-DATE AVAILABLE AGE | |
11:19 < honkctl> barkeep 1/1 1 1 5m25s | |
11:19 < honkctl> burly-man 1/1 1 1 5m24s | |
11:19 < honkctl> delivery-person 1/1 1 1 5m23s | |
11:19 < honkctl> old-man 1/1 1 1 | |
11:19 < honkctl> ... | |
11:19 < gooseguy> !honkctl config set-context --current --namespace=pub | |
11:19 < honkctl> Context "kind-gooseguy" modified. | |
11:19 < honkctl> Cluster recreated for gooseguy.... | |
11:20 < xmudrii> !honkctl get sa -n pub --as=system:serviceaccount:garden:groundskeeper | |
11:20 < honkctl> NAME SECRETS AGE | |
11:20 < honkctl> barkeep 1 10m | |
11:20 < honkctl> burly-man 1 10m | |
11:20 < honkctl> default 1 10m | |
11:20 < honkctl> delivery-person 1 10m | |
11:20 < honkctl> old-man 1 10m | |
11:20 < honkctl> woman 1 10m | |
11:20 < yebyen> !honkctl can-i get -n model-village --as=system:serviceaccount:garden:groundskeeper | |
11:20 < honkctl> Error: unknown command "can-i" for "kubectl" | |
11:20 < honkctl> Run 'kubectl --help' for usage. | |
11:20 < yebyen> !honkctl auth can-i get -n model-village --as=system:serviceaccount:garden:groundskeeper | |
11:20 < honkctl> error: you must specify two or three arguments: verb, resource, and optional resourceName | |
11:20 < yebyen> !honkctl auth can-i get service -n model-village --as=system:serviceaccount:garden:groundskeeper | |
11:20 < honkctl> no | |
11:20 < yebyen> !honkctl auth can-i get pods -n model-village --as=system:serviceaccount:garden:groundskeeper | |
11:20 < honkctl> no | |
11:21 < yebyen> !honkctl auth can-i get pods -n model-village --as=system:serviceaccount:pub:woman | |
11:21 < honkctl> Error from server (Forbidden): serviceaccounts "woman" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
11:21 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/f4056c3bc6523b6d5429550251fb55362269ec25/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:21 < honkctl> Error from server (Forbidden): error when creating "https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/f4056c3bc6523b6d5429550251fb55362269ec25/beer.yaml": pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot create r | |
11:21 < honkctl> ... | |
11:21 < toocold> !honkctl ungoose | |
11:21 < gooseguy> !honkctl get pods | |
11:21 < honkctl> No resources found in garden namespace. | |
11:21 < gooseguy> !honkctl config set-context --current --namespace=pub | |
11:21 < honkctl> Context "goose-garden-kind-gooseguy" modified. | |
11:21 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/f4056c3bc6523b6d5429550251fb55362269ec25/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:21 < honkctl> pod/beer created | |
11:22 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper | |
11:22 < gooseguy> !honkctl get pod beer --as=system:serviceaccount:garden:groundskeeper | |
11:22 < honkctl> NAME READY STATUS RESTARTS AGE | |
11:22 < honkctl> beer 0/1 RunContainerError 3 48s | |
11:22 < gooseguy> !honctl get events --as=system:serviceaccount:garden:groundskeeper | |
11:22 < yebyen> I think with that groundskeeper token you could impersonate these other service accounts | |
11:23 < gooseguy> righty | |
11:23 < gooseguy> !honkctl delete pod beer --as=system:serviceaccount:garden:groundskeeper | |
11:23 < honkctl> pod "beer" deleted | |
11:23 < gooseguy> lol i forgot that busybox doesn't have curl | |
11:23 < yebyen> woops | |
11:24 < honkctl> Cluster recreated for toocold.... | |
11:24 < xmudrii> !honkctl get sa -n pub --as=system:serviceaccount:garden:groundskeeper | |
11:24 < honkctl> NAME SECRETS AGE | |
11:24 < honkctl> barkeep 1 14m | |
11:24 < honkctl> burly-man 1 14m | |
11:24 < honkctl> default 1 14m | |
11:24 < honkctl> delivery-person 1 14m | |
11:24 < honkctl> old-man 1 14m | |
11:24 < honkctl> woman 1 14m | |
11:24 < xmudrii> !honkctl get sa -n pub --as=system:serviceaccount:pub:default | |
11:24 < honkctl> Error from server (Forbidden): serviceaccounts "default" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
11:24 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/a60ac56d80de3baed7b2a1bf040360de500f3d33/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:24 < honkctl> pod/beer created | |
11:24 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper | |
11:24 < honkctl> Error from server (BadRequest): container "beer" in pod "beer" is waiting to start: ContainerCreating | |
11:24 < xmudrii> !honkctl get sa -n pub --as=system:serivceaccount:garden:groundskeeper --as=system:serviceaccount:pub:default | |
11:24 < honkctl> Error from server (Forbidden): serviceaccounts "default" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
11:24 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper | |
11:24 < honkctl> Error from server (BadRequest): container "beer" in pod "beer" is waiting to start: ContainerCreating | |
11:25 < toocold> !honkctl config set-context --current --user=system:serviceaccount:garden:groundskeeper | |
11:25 < honkctl> Context "goose-garden-kind-toocold" modified. | |
11:25 < xmudrii> !honkctl get sa -n pub --as=system:serivceaccount:garden:groundskeeper | |
11:25 < honkctl> Error from server (Forbidden): users "system:serivceaccount:garden:groundskeeper" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "users" in API group "" at the cluster scope | |
11:25 < gooseguy> !honkctl get pod beer --as=system:serviceaccount:garden:groundskeeper | |
11:25 < honkctl> NAME READY STATUS RESTARTS AGE | |
11:25 < honkctl> beer 0/1 CrashLoopBackOff 1 23s | |
11:25 < gooseguy> !honctl get events --as=system:serviceaccount:garden:groundskeeper | |
11:25 < xmudrii> !honkctl config set-context --current --user=system:serviceaccount:garden:groundskeeper | |
11:25 < honkctl> Context "goose-garden-kind-xmudrii" modified. | |
11:25 < toocold> !honkctl get pods --as=system:serviceaccount:garden:groundskeeper | |
11:25 < honkctl> error: EOF | |
11:25 < xmudrii> !honkctl get sa | |
11:25 < honkctl> error: EOF | |
11:25 < xmudrii> !honkctl ungoose | |
11:25 < toocold> !honkctl get pods | |
11:25 < honkctl> error: EOF | |
11:25 < toocold> oh FFS | |
11:26 < toocold> honk? | |
11:26 < xmudrii> HONK | |
11:26 < toocold> !honkctl get ns | |
11:26 < honkctl> error: EOF | |
11:26 < xmudrii> I'm wondering does it have to do anything in common with changing the current context | |
11:26 < xmudrii> If yes, sorry :P | |
11:26 < toocold> !honkctl ungoose | |
11:26 < toocold> I'm wondering if it's just me | |
11:26 < yebyen> I think there is a chance that changing the context to a serviceaccount is not a real thing | |
11:27 < yebyen> https://success.docker.com/article/how-to-troubleshoot-kubernetes-serviceaccount-permissions | |
11:27 < yebyen> but with the token, you can impersonate through service account | |
11:27 <@mrbobbytables> you can use a service account, but it requires much more plumbing when using it as a context | |
11:27 < yebyen> not really sure if there's an easier way | |
11:27 <@mrbobbytables> the goose account is a service account | |
11:27 < toocold> fair enough | |
11:27 < toocold> I want a flow chart | |
11:27 < toocold> or an Octant | |
11:28 < honkctl> Cluster recreated for xmudrii.... | |
11:28 <@mrbobbytables> the 280 char limit doesn't help here in IRC, but maybe someday we can go back to twitter XD | |
11:29 < honkctl> Cluster recreated for toocold.... | |
11:29 < toocold> !honkctl get contexts | |
11:29 < honkctl> error: the server doesn't have a resource type "contexts" | |
11:29 < toocold> !honkctl get context | |
11:29 < honkctl> error: the server doesn't have a resource type "context" | |
11:29 < toocold> :P | |
11:30 < xmudrii> !honkctl config get-contexts | |
11:30 < honkctl> CURRENT NAME CLUSTER AUTHINFO NAMESPACE | |
11:30 < honkctl> * goose-garden-kind-xmudrii kind-xmudrii goose-garden-kind-xmudrii garden | |
11:30 < xmudrii> !honkctl get ns | |
11:30 < honkctl> NAME STATUS AGE | |
11:30 < honkctl> default Active 3m59s | |
11:30 < honkctl> garden Active 3m54s | |
11:30 < honkctl> home Active 3m54s | |
11:30 < honkctl> kube-node-lease Active 4m | |
11:30 < honkctl> kube-public Active 4m | |
11:30 < honkctl> kube-system Active 4m | |
11:30 < honkctl> model-village Active 3m54s | |
11:30 < honkctl> pub Acti | |
11:30 < honkctl> ... | |
11:30 < xmudrii> Can we maybe get some additional hints? :joy: | |
11:31 < xmudrii> Although, that might now be fun :P | |
11:31 <@mrbobbytables> lol | |
11:31 < xmudrii> *not | |
11:31 < toocold> !honkctl get rolebindings,roles,statefulsets,deployments -n pub --as=system:serviceaccount:garden:goose | |
11:31 < honkctl> Error from server (Forbidden): serviceaccounts "goose" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "garden" | |
11:31 < honkctl> Error from server (Forbidden): serviceaccounts "goose" is forbidden: User "s | |
11:31 < honkctl> ... | |
11:31 < yebyen> was there a reason the pastebin thing didn't work, it looks like it did work actually | |
11:31 < yebyen> oh, except | |
11:31 < yebyen> https://pastebin.com/saRPZLxy | |
11:31 < yebyen> woops | |
11:32 <@mrbobbytables> there is another way to run a workload as a different user :) I think I've seen a few gists go by with them | |
11:33 < toocold> yeah. I was trying that first | |
11:34 < xmudrii> !honkctl get ns | base64 | |
11:34 < honkctl> Error from server (NotFound): namespaces "|" not found | |
11:34 < honkctl> Error from server (NotFound): namespaces "base64" not found | |
11:34 < xmudrii> !honkctl get cm | |
11:34 < honkctl> No resources found in garden namespace. | |
11:34 < xmudrii> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper | |
11:34 < honkctl> NAME DATA AGE | |
11:34 < honkctl> box 1 7m58s | |
11:34 < honkctl> bucket 1 7m59s | |
11:34 < honkctl> dartboard 1 7m57s | |
11:34 < honkctl> fetch-kubectl 1 7m53s | |
11:34 < honkctl> flower 1 7m55s | |
11:34 < honkctl> pint-glass 1 8m | |
11:34 <@mrbobbytables> !honkctl ungoose | |
11:34 < xmudrii> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper pint-glass | |
11:34 < honkctl> NAME DATA AGE | |
11:34 < honkctl> pint-glass 1 8m7s | |
11:34 < gooseguy> I'm just bad at writing manifests i think | |
11:35 < gooseguy> "Post limit, maximum pastes per 24h reached" :( | |
11:35 <@mrbobbytables> >_< | |
11:35 < yebyen> gtfo | |
11:35 < toocold> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper | |
11:35 < honkctl> NAME READY STATUS RESTARTS AGE | |
11:35 < honkctl> barkeep-76c949f857-w4zr8 1/1 Running 0 8m12s | |
11:35 < honkctl> burly-man-b958cff98-8s8df 1/1 Running 0 8m12s | |
11:35 < honkctl> delivery-person-9868cb979-sjnmk 1/1 R | |
11:35 < honkctl> ... | |
11:36 < gooseguy> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper pint-glass -o jsonpath={.data} | |
11:36 < honkctl> map[index.html:<html> | |
11:36 < honkctl> <head> | |
11:36 < honkctl> <meta charset="UTF-8"> | |
11:36 < honkctl> </head> | |
11:36 < honkctl> <body> | |
11:36 < honkctl> <pre> | |
11:36 < honkctl> __________ | |
11:36 < honkctl> |__ __ __| | |
11:36 < honkctl> .---| :: :: | | |
11:36 < honkctl> | __|__;:__;:__| | |
11:36 < honkctl> | | | __ __ | | |
11:36 < honkctl> | | |:: :: ::| | |
11:36 <@mrbobbytables> !honkctl get po | |
11:36 < honkctl> Unable to connect to the server: EOF | |
11:36 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper | |
11:36 < honkctl> NAME READY STATUS RESTARTS AGE | |
11:36 < honkctl> barkeep-76c949f857-ddpft 1/1 Running 0 10m | |
11:36 < honkctl> burly-man-b958cff98-n4v4w 1/1 Running 0 10m | |
11:36 < honkctl> delivery-person-9868cb979-q2mbs 1/1 Runni | |
11:36 < honkctl> ... | |
11:36 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/26ed92d07484984e660e4e47abb55916f5c163db/beer.yaml | |
11:36 < honkctl> Error from server (Forbidden): error when retrieving current configuration of: | |
11:36 < honkctl> Resource: "/v1, Resource=pods", GroupVersionKind: "/v1, Kind=Pod" | |
11:36 < honkctl> Name: "beer", Namespace: "pub" | |
11:36 < honkctl> Object: &{map["apiVersion":"v1" "kind":"Pod" "metadata":map["annotations":map["kubectl.kubernetes.i | |
11:36 < honkctl> ... | |
11:36 < bdimcheff> gooseguy: you can prolly point ngrok to nc and have something curl that | |
11:37 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/26ed92d07484984e660e4e47abb55916f5c163db/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:37 < honkctl> The Pod "beer" is invalid: spec: Forbidden: pod updates may not change fields other than `spec.containers[*].image`, `spec.initContainers[*].image`, `spec.activeDeadlineSeconds` or `spec.tolerations` (only additions to existing tolerations) | |
11:37 < honkctl> core.PodSpec{ | |
11:37 < honkctl> Volumes: | |
11:37 < honkctl> ... | |
11:37 < gooseguy> !honkctl delete pod beer --as=system:serviceaccount:garden:groundskeeper | |
11:37 < xmudrii> @bdimcheff: I just got similar idea too. :D I want to fire up a server and try to push output to it so I can see all of it | |
11:37 < honkctl> pod "beer" deleted | |
11:37 < honkctl> Cluster recreated for mrbobbytables.... | |
11:37 < xmudrii> But before that... I have to go to eat. I'm hungry goose :p | |
11:37 < gooseguy> yeah i really just need an endpoint i where i can read posts | |
11:37 <@mrbobbytables> enjoy! | |
11:37 < toocold> isn't the output truncated on the back end? | |
11:38 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/ebf94dfd813bb91e3d8b660e5d823c1c/raw/26ed92d07484984e660e4e47abb55916f5c163db/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:38 < honkctl> pod/beer created | |
11:38 < gooseguy> !honkctl get pods beer | |
11:38 < honkctl> Error from server (Forbidden): pods "beer" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
11:38 < gooseguy> !honkctl get pods beer --as=system:serviceaccount:garden:groundskeeper | |
11:38 < honkctl> NAME READY STATUS RESTARTS AGE | |
11:38 < honkctl> beer 0/1 CrashLoopBackOff 1 14s | |
11:38 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper | |
11:38 < honkctl> % Total % Received % Xferd Average Speed Time Time Time Current | |
11:38 < honkctl> Dload Upload Total Spent Left Speed | |
11:38 < honkctl> ... | |
11:38 < gooseguy> dang that one would have worked i think | |
11:39 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper -t1 | |
11:39 < honkctl> Error: unknown shorthand flag: 't' in -t1 | |
11:39 < honkctl> See 'kubectl logs --help' for usage. | |
11:39 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper -tail-1 | |
11:39 < honkctl> Error: unknown shorthand flag: 't' in -tail-1 | |
11:39 < honkctl> See 'kubectl logs --help' for usage. | |
11:39 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper -tail=1 | |
11:39 < honkctl> Error: unknown shorthand flag: 't' in -tail=1 | |
11:39 < honkctl> See 'kubectl logs --help' for usage. | |
11:39 < gooseguy> !honkctl logs beer --as=system:serviceaccount:garden:groundskeeper --tail=1 | |
11:39 < honkctl> Post limit, maximum pastes per 24h reached | |
11:40 < toocold> what even | |
11:40 < bdimcheff> !honkctl apply -f https://gist.githubusercontent.com/bdimcheff/8a75b3b1adfc7e143593076a3a5b38e2/raw/8e07c305c698d2dd32a6d5d9e89f2f7e243060e7/curl.yaml --as=system:serviceaccount:garden:groundskeeper | |
11:40 < honkctl> Error from server (Forbidden): error when creating "https://gist.githubusercontent.com/bdimcheff/8a75b3b1adfc7e143593076a3a5b38e2/raw/8e07c305c698d2dd32a6d5d9e89f2f7e243060e7/curl.yaml": pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot create resou | |
11:40 < honkctl> ... | |
11:41 < bdimcheff> !honkctl apply -f https://gist.githubusercontent.com/bdimcheff/8a75b3b1adfc7e143593076a3a5b38e2/raw/8e07c305c698d2dd32a6d5d9e89f2f7e243060e7/curl.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
11:41 < honkctl> pod/beer created | |
11:41 <@mrbobbytables> for your pod specs, remember that you can use spec.serviceAccountName | |
11:42 < bdimcheff> lol | |
11:42 < gooseguy> sure good tip | |
11:43 <@mrbobbytables> !honkctl --as=system:serviceaccount:garden:groundskeeper get po -n pub | |
11:43 < honkctl> NAME READY STATUS RESTARTS AGE | |
11:43 < honkctl> barkeep-76c949f857-7brfc 1/1 Running 0 8m11s | |
11:43 < honkctl> burly-man-b958cff98-j5jlh 1/1 Running 0 8m11s | |
11:43 < honkctl> delivery-person-9868cb979-5gkkt 1/1 Running 0 | |
11:43 < honkctl> ... | |
11:44 <@mrbobbytables> !honkctl --as=system:serviceaccount:garden:groundskeeper get deploy -n pub | |
11:44 < honkctl> NAME READY UP-TO-DATE AVAILABLE AGE | |
11:44 < honkctl> barkeep 1/1 1 1 8m54s | |
11:44 < honkctl> burly-man 1/1 1 1 8m53s | |
11:44 < honkctl> delivery-person 1/1 1 1 8m52s | |
11:44 < honkctl> old-man 0/1 1 0 | |
11:44 < honkctl> ... | |
11:45 < gooseguy> !honkctl --as=system:serviceaccount:garden:groundskeeper get po -n pub | |
11:45 < honkctl> NAME READY STATUS RESTARTS AGE | |
11:45 < honkctl> barkeep-76c949f857-xwjv5 1/1 Running 0 28m | |
11:45 < honkctl> beer 0/1 CrashLoopBackOff 6 7m46s | |
11:45 < honkctl> burly-man-b958cff98-whcmz 1/1 Run | |
11:45 < honkctl> ... | |
11:46 < gooseguy> !honkctl delete pod beer --as=system:serviceaccount:garden:groundskeeper | |
11:46 < honkctl> pod "beer" deleted | |
11:47 < gooseguy> ngrock working for you bdimcheff? | |
11:47 < bdimcheff> !honkctl apply -f https://gist.githubusercontent.com/bdimcheff/8a75b3b1adfc7e143593076a3a5b38e2/raw/d0167b89a4cb395c3f446d2174c89c726fe4edac/curl.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
11:47 < honkctl> The Pod "beer" is invalid: spec: Forbidden: pod updates may not change fields other than `spec.containers[*].image`, `spec.initContainers[*].image`, `spec.activeDeadlineSeconds` or `spec.tolerations` (only additions to existing tolerations) | |
11:47 < honkctl> core.PodSpec{ | |
11:47 < honkctl> Volumes: | |
11:47 < honkctl> ... | |
11:48 < bdimcheff> !honkctl delete pod -n pub beer --as=system:serviceaccount:garden:groundskeeper | |
11:48 < honkctl> pod "beer" deleted | |
11:49 < bdimcheff> gooseguy: yeah in principle but the shell escaping shit is broken still | |
11:49 < bdimcheff> !honkctl apply -f https://gist.githubusercontent.com/bdimcheff/8a75b3b1adfc7e143593076a3a5b38e2/raw/d0167b89a4cb395c3f446d2174c89c726fe4edac/curl.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
11:49 < honkctl> pod/beer created | |
11:49 < yebyen> !honkctl --token | |
11:49 < yebyen> eyJhbGciOiJSUzI1NiIsImtpZCI6IiJ9.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJkZW1vIiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZWNyZXQubmFtZSI6ImRlZmF1bHQtdG9rZW4tanRmOXIiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlcnZpY2UtYWNjb3VudC5uYW1lIjoiZGVmYXVsdCIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VydmljZS1hY2NvdW50LnVpZCI6ImMxOTJkYzY4LTk3OWEtMTFl | |
11:49 < yebyen> OS04OTdkLTdlNDI3NWUxMjI4ZiIsInN1YiI6InN5c3RlbTpzZXJ2aWNlYWNjb3VudDpkZW1vOmRlZmF1bHQifQ.oLMKyqJga5u6i2apLUuqUA5Dz2R2Kp2kLEMpx37v-XTCRdpON9IKvuTmFSE6X4Ekl_t8zPOvFTJptZ91xLw69XL0EulUqoXlARgtlPoddGlNI30WoIB6xaNCiHjvMZfKv_y9Ygrd-_JTSn5WooEc1DyDhvKLE86Pzgq1_wKgSJA0wfmXe9pFZRcfXZ581bcGUJsg2bLMWgm0jHmBwQrIyAk2WL-RYZHzk261rIGOM_yA9JlhuISNr7VlOYlShjYpd1XGq2VXrlPjn2jEkHeMLEVlpr4Jk_K1GUDHFhjqBi0vFrBk4WQJAgAa5K1Wxe | |
11:49 < yebyen> Ly3MzZdQIMtmv5BWYxeJfVPA | |
11:49 < honkctl> Error: flag needs an argument: --token | |
11:49 < honkctl> See 'kubectl --help' for usage. | |
11:49 < yebyen> oops | |
11:50 < bdimcheff> lol | |
11:50 < yebyen> that's a live one | |
11:50 < yebyen> not even the honkci token :big oops: | |
11:50 <@mrbobbytables> lol | |
11:50 < bdimcheff> !honkctl get pod --as=system:serviceaccount:garden:groundskeeper -n pub beer | |
11:50 < honkctl> NAME READY STATUS RESTARTS AGE | |
11:50 < honkctl> beer 1/1 Running 2 98s | |
11:51 < bdimcheff> !honkctl logs --as=system:serviceaccount:garden:groundskeeper -n pub beer | |
11:51 < honkctl> % Total % Received % Xferd Average Speed Time Time Time Current | |
11:51 < honkctl> Dload Upload Total Spent Left Speed | |
11:51 < honkctl> ... | |
11:51 < bdimcheff> !honkctl delete pod -n pub beer --as=system:serviceaccount:garden:groundskeeper | |
11:51 <@mrbobbytables> !honkctl --as=system:serviceaccount:garden:groundskeeper get pvc -n pub | |
11:51 < honkctl> NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE | |
11:51 < honkctl> kubectl Bound pvc-27d01857-c09f-4e1a-8f18-2bd846ca7496 1Gi RWX standard 15m | |
11:51 < gooseguy> !honkctl config set-context --current --user=system:serviceaccount:garden:groundskeeper | |
11:51 < honkctl> Context "goose-garden-kind-gooseguy" modified. | |
11:51 < gooseguy> !honkctl get pods | |
11:51 < honkctl> error: EOF | |
11:51 < gooseguy> !honkctl get pods -n pub | |
11:51 < honkctl> error: EOF | |
11:51 < gooseguy> !honkctl config set-context --current --user=system:serviceaccount:garden:goose | |
11:51 < honkctl> Context "goose-garden-kind-gooseguy" modified. | |
11:51 < bdimcheff> gists reference actual versions lol | |
11:51 < honkctl> pod "beer" deleted | |
11:52 < bdimcheff> !honkctl apply -f https://gist.githubusercontent.com/bdimcheff/8a75b3b1adfc7e143593076a3a5b38e2/raw/d0167b89a4cb395c3f446d2174c89c726fe4edac/curl.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
11:52 < honkctl> pod/beer created | |
11:52 < gooseguy> !honkctl get pods -n pub --as=system:serviceaccount:garden:groundskeeper | |
11:52 < honkctl> error: EOF | |
11:52 < gooseguy> !honkctl ungoose | |
11:52 < yebyen> !honkctl apply -f https://gist.githubusercontent.com/kingdonb/d97b0fa1689ba6e6f75e65fe462c78b2/raw/24dbdc1eccec3f09f603d964c221ac11546f0582/beer.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
11:52 < honkctl> pod/beer created | |
11:52 <@mrbobbytables> I think switching to that messes up the context beyond recovery =/ | |
11:52 < yebyen> !honkctl logs -f beer -n pub --as=system:serviceaccount:garden:groundskeeper | |
11:52 < honkctl> Error from server (BadRequest): container "beer" in pod "beer" is waiting to start: ContainerCreating | |
11:52 <@mrbobbytables> then you have to ungoose yourself | |
11:52 < yebyen> !honkctl logs -f beer -n pub --as=system:serviceaccount:garden:groundskeeper | |
11:52 < honkctl> % Total % Received % Xferd Average Speed Time Time Time Current | |
11:52 < honkctl> Dload Upload Total Spent Left Speed | |
11:52 < honkctl> ... | |
11:53 < gooseguy> !ungoose | |
11:53 < gooseguy> !honkctl config set-context --current --namespace=pub | |
11:53 < honkctl> Context "kind-gooseguy" modified. | |
11:53 < gooseguy> !honkctl get pods --as=system:serviceaccount:garden:groundskeeper | |
11:54 < yebyen> i got the groundskeeper's keys! | |
11:54 < honkctl> Error from server (InternalError): an error on the server ("") has prevented the request from succeeding (get pods) | |
11:54 < gooseguy> hell yeah | |
11:54 -!- bingo48 [[email protected]] has joined #honkctl-jan | |
11:55 < gooseguy> !honkctl get pods --as=system:serviceaccount:garden:groundskeeper | |
11:55 < bdimcheff> did someone just post their token to my ngrok lol | |
11:55 < xmudrii> Do you just run ngrok or you have to make some webserver? | |
11:55 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "pods" in API group "" in the namespace "pub": RBAC: [clusterrole.rbac.authorization.k8s.io "psp-default" not found, clusterrole.rbac.authorization.k8s.io | |
11:55 < honkctl> ... | |
11:55 < yebyen> I used ngrok | |
11:55 < honkctl> Cluster recreated for gooseguy.... | |
11:55 < gooseguy> !honkctl get pods --as=system:serviceaccount:garden:groundskeeper | |
11:55 < honkctl> No resources found in garden namespace. | |
11:55 < toocold> ngrok scares me | |
11:55 < bingo48> H | |
11:55 < bdimcheff> yeah i just got an unexpected token request suddenly | |
11:55 < yebyen> !honkctl get pods -n model-village --as=system:serviceaccount:pub:woman | |
11:55 < yebyen> --token=eyJhbGciOiJSUzI1NiIsImtpZCI6IlZfMXoyWkljcG9YRlEzamIyaGNDNGNVcWZlLXZ1YWptMlJRNmd1RGlmQ1UifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJwdWIiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlY3JldC5uYW1lIjoiZGVmYXVsdC10b2tlbi1wbWg4bCIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VydmljZS1hY2NvdW50Lm5hbWUiOiJkZWZhdWx0Iiwia3ViZXJuZXRlcy5pby9zZXJ2aW | |
11:55 < yebyen> NlYWNjb3VudC9zZXJ2aWNlLWFjY291bnQudWlkIjoiODYzNmE2MDUtYTQyOS00OThkLWFjN2MtNmFiNTk2Nzk1ODMzIiwic3ViIjoic3lzdGVtOnNlcnZpY2VhY2NvdW50OnB1YjpkZWZhdWx0In0.NbM89FvlhFUg3BZSGasSeCVulzULjYFlS5il2q9dAmk5FQhpmMglP8ZM_sMTuosV763c8O7BtaFWQT-gRnqAqYNHjlTaDj35FOlYK4TLDu8WRuolCh88hFCfgGkiJoDcYBUJHnX51kcFCzFrr0_TmhLeonBiGw2t1yVw0nTrW19evtoYTXuV1XzXU24rvE_vZx2MAXtPyYhKBNUp69__QEhoBtppat12XOv76tcEidCNhX-tlB3E8nfsOcyPGL9 | |
11:55 < yebyen> BIQtLuGQVoDOyCv5CpzxM31TnvssFCOR8ogZpBlwUwTdGQWO_TDXcCGMf3EpmOgJ2dFeNcgA69e0FXCXGNp0BwA | |
11:55 < honkctl> Error from server (Forbidden): serviceaccounts "woman" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
11:55 < toocold> HONK | |
11:56 < gooseguy> !honkctl config set-context --current --namespace=pub | |
11:56 < honkctl> Context "goose-garden-kind-gooseguy" modified. | |
11:56 < yebyen> next problem is, 512 character message limit in IRC | |
11:56 < gooseguy> !honkctl get pods --as=system:serviceaccount:garden:groundskeeper | |
11:56 < honkctl> NAME READY STATUS RESTARTS AGE | |
11:56 < honkctl> barkeep-76c949f857-w28nl 1/1 Running 0 2m34s | |
11:56 < honkctl> burly-man-b958cff98-g94l7 1/1 Running 0 2m34s | |
11:56 < honkctl> delivery-person-9868cb979-bsdk8 1/1 Running 0 | |
11:56 < honkctl> ... | |
11:56 <@mrbobbytables> !honkctl --as=system:serviceaccount:garden:groundskeeper -n pub get pvc kubectl | |
11:56 < honkctl> NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE | |
11:56 < honkctl> kubectl Bound pvc-27d01857-c09f-4e1a-8f18-2bd846ca7496 1Gi RWX standard 20m | |
11:56 < bingo48> !honkctl get pods -A | |
11:57 < bdimcheff> !honkctl delete pod -n pub beer --as=system:serviceaccount:garden:groundskeeper | |
11:58 < honkctl> pod "beer" deleted | |
11:58 < bdimcheff> !honkctl apply -f https://gist.githubusercontent.com/bdimcheff/8a75b3b1adfc7e143593076a3a5b38e2/raw/93b0dfb890493ed0bcf6e457c9d3ee2060e28a7f/curl.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
11:58 < honkctl> Error from server (Forbidden): error when creating "https://gist.githubusercontent.com/bdimcheff/8a75b3b1adfc7e143593076a3a5b38e2/raw/93b0dfb890493ed0bcf6e457c9d3ee2060e28a7f/curl.yaml": pods "beer" is forbidden: error looking up service account pub/groundskeeper: serviceacc | |
11:58 < honkctl> ... | |
11:59 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "pods" in API group "" at the cluster scope | |
12:00 < bdimcheff> !honkctl get sa -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:00 < honkctl> NAME SECRETS AGE | |
12:00 < honkctl> barkeep 1 79m | |
12:00 < honkctl> burly-man 1 79m | |
12:00 < honkctl> default 1 79m | |
12:00 < honkctl> delivery-person 1 79m | |
12:00 < honkctl> old-man 1 79m | |
12:00 < honkctl> woman 1 79m | |
12:01 < bdimcheff> !honkctl apply -f https://gist.githubusercontent.com/bdimcheff/8a75b3b1adfc7e143593076a3a5b38e2/raw/94d3ae77f19504de5d26591bcaf5598d05035623/curl.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:01 < honkctl> pod/beer created | |
12:02 -!- bingo48 [[email protected]] has quit [Remote host closed the connection] | |
12:02 < bdimcheff> !honkctl logs --as=system:serviceaccount:garden:groundskeeper -n pub beer | |
12:02 < honkctl> % Total % Received % Xferd Average Speed Time Time Time Current | |
12:02 < honkctl> Dload Upload Total Spent Left Speed | |
12:03 < bdimcheff> !honkctl delete pod -n pub beer --as=system:serviceaccount:garden:groundskeeper | |
12:03 < xmudrii> !honkctl apply -f https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/de137881ebf1b7abb766ec9ddf95920752612a9c/beer.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:03 < honkctl> pod/free-beer created | |
12:03 < honkctl> pod "beer" deleted | |
12:03 < xmudrii> Woohoo, I got the token too | |
12:03 < yebyen> !honkctl nice | |
12:03 < honkctl> Error: unknown command "nice" for "kubectl" | |
12:03 < honkctl> Run 'kubectl --help' for usage. | |
12:04 < yebyen> LOL | |
12:04 < yebyen> time to clear out the driveway | |
12:05 <@mrbobbytables> lol | |
12:05 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/dee6f060959cb2b2e4cdef376ceb5b71a78c036f/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:05 < honkctl> pod/cuddle created | |
12:06 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:06 -!- toocold [~textual@2601:448:c580:13c0:d02b:1a3c:8090:995d] has quit [Quit: My MacBook has gone to sleep. ZZZzzz…] | |
12:06 < gooseguy> !honkctl get pods cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:06 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:06 < honkctl> cuddle 0/1 CrashLoopBackOff 2 47s | |
12:06 < xmudrii> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:06 < honkctl> NAME DATA AGE | |
12:06 < honkctl> box 1 40m | |
12:06 < honkctl> bucket 1 40m | |
12:06 < honkctl> dartboard 1 40m | |
12:06 < honkctl> fetch-kubectl 1 39m | |
12:06 < honkctl> flower 1 40m | |
12:06 < honkctl> pint-glass 1 40m | |
12:06 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper | |
12:06 < honkctl> LAST SEEN TYPE REASON OBJECT MESSAGE | |
12:06 < honkctl> 13m Warning FailedScheduling pod/barkeep-76c949f857-w28nl 0/1 nodes are available: 1 node(s) had taints that the pod didn't tolerate. | |
12:06 < honkctl> <unknown> Warning | |
12:06 < honkctl> ... | |
12:06 -!- indy21 [[email protected]] has joined #honkctl-jan | |
12:07 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:07 < xmudrii> !honkctl delete -f https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/de137881ebf1b7abb766ec9ddf95920752612a9c/beer.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:07 < honkctl> pod "cuddle" deleted | |
12:07 < honkctl> pod "free-beer" deleted | |
12:07 < xmudrii> !honkctl create -f https://gist.githubusercontent.com/xmudrii/f280db8bff7c7ab12f708b916825a8cd/raw/a4a3f3be809ea09dadf7672d77284153bb30e75f/cm.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:07 < honkctl> pod/free-beer created | |
12:08 < indy21> !honkctl get todos | |
12:08 < honkctl> NAME TODO | |
12:08 < honkctl> todo-1 Steal the groundskeepers keys. | |
12:08 < honkctl> todo-2 Get to the Pub. | |
12:08 < honkctl> todo-3 Get into the model-village. | |
12:08 < honkctl> todo-4 Steal the beautiful minature golden bell. | |
12:08 < honkctl> todo-5 ...and take it all the way back home. | |
12:08 < gooseguy> get that beer partner | |
12:08 <@mrbobbytables> lol | |
12:09 < xmudrii> !honkctl delete -f https://gist.githubusercontent.com/xmudrii/f280db8bff7c7ab12f708b916825a8cd/raw/a4a3f3be809ea09dadf7672d77284153bb30e75f/cm.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:09 < honkctl> pod "free-beer" deleted | |
12:09 < bdimcheff> !honkctl delete pod -n pub beer --as=system:serviceaccount:garden:groundskeeper | |
12:09 < honkctl> Error from server (NotFound): pods "beer" not found | |
12:10 < xmudrii> !honkctl create -f https://gist.githubusercontent.com/xmudrii/f280db8bff7c7ab12f708b916825a8cd/raw/0bac19cfca3247c83c106313edc7250b1b1ce0fb/cm.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:10 < honkctl> pod/free-beer created | |
12:10 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/908447b76b4535afe608ed382b050563f4fded38/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:10 < honkctl> pod/cuddle created | |
12:10 < gooseguy> !honkctl get pods cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:10 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:10 < honkctl> cuddle 0/1 RunContainerError 0 5s | |
12:10 < bdimcheff> !honkctl apply -f https://gist.githubusercontent.com/bdimcheff/8a75b3b1adfc7e143593076a3a5b38e2/raw/9c7fc74d71d1d26b4f9cfd914f4b164c9bfed9ba/curl.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:10 < honkctl> pod/beer created | |
12:10 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:10 < honkctl> pod "cuddle" deleted | |
12:10 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper | |
12:10 < honkctl> LAST SEEN TYPE REASON OBJECT MESSAGE | |
12:10 < honkctl> 17m Warning FailedScheduling pod/barkeep-76c949f857-w28nl 0/1 nodes are available: 1 node(s) had taints that the pod didn't tolerate. | |
12:10 < honkctl> <unknown> Warning | |
12:10 < honkctl> ... | |
12:10 -!- toocold [~textual@2601:448:c580:13c0:8102:ba45:ca17:97e2] has joined #honkctl-jan | |
12:10 < indy21> !honkctl get todo todo-1 -o jsonpath='{spec.hint}' | |
12:10 < honkctl> error: error executing jsonpath "'{spec.hint}'": Error executing template: unrecognized identifier spec. Printing more information for debugging the template: | |
12:10 < honkctl> template was: | |
12:10 < honkctl> '{spec.hint}' | |
12:10 < honkctl> object given to jsonpath engine was: | |
12:10 < honkctl> map[string]interface {}{"apiVersion":"honk.ci | |
12:10 < honkctl> ... | |
12:11 < gooseguy> !honkctl scale deploy barkeep --replicas=0 --as=system:serviceaccount:garden:groundskeeper | |
12:11 < honkctl> deployment.apps/barkeep scaled | |
12:11 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper | |
12:11 < honkctl> LAST SEEN TYPE REASON OBJECT MESSAGE | |
12:11 < honkctl> 17m Warning FailedScheduling pod/barkeep-76c949f857-w28nl 0/1 nodes are available: 1 node(s) had taints that the pod didn't tolerate. | |
12:11 < honkctl> <unknown> Warning | |
12:11 < honkctl> ... | |
12:11 < indy21> !honkctl describe todo todo-1 | |
12:11 < honkctl> Name: todo-1 | |
12:11 < honkctl> Namespace: | |
12:11 < honkctl> Labels: <none> | |
12:11 < honkctl> Annotations: kubectl.kubernetes.io/last-applied-configuration: | |
12:11 < honkctl> {"apiVersion":"honk.ci/v1","kind":"Todo","metadata":{"annotations":{},"name":"todo-1"},"spec":{"hint":"Sometimes one must become that they | |
12:11 < honkctl> ... | |
12:12 < gooseguy> !honkctl get pvc --as=system:serviceaccount:garden:groundskeeper | |
12:12 < honkctl> NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE | |
12:12 < honkctl> kubectl Bound pvc-b1812c1c-047d-434e-9864-ad8f5385cee0 1Gi RWX standard 18m | |
12:12 < gooseguy> !honkctl get pvc --as=system:serviceaccount:garden:groundskeeper -oyaml | |
12:12 < honkctl> apiVersion: v1 | |
12:12 < honkctl> items: | |
12:12 < honkctl> - apiVersion: v1 | |
12:12 < honkctl> kind: PersistentVolumeClaim | |
12:12 < honkctl> metadata: | |
12:12 < honkctl> annotations: | |
12:12 < honkctl> kubectl.kubernetes.io/last-applied-configuration: | | |
12:12 < honkctl> {"apiVersion":"v1","kind":"PersistentVolumeClaim","metadata":{"annotations":{"note-1":"Use this to access kubec | |
12:12 < honkctl> ... | |
12:12 < bdimcheff> !honkctl logs --as=system:serviceaccount:garden:groundskeeper -n pub beer | |
12:12 < honkctl> % Total % Received % Xferd Average Speed Time Time Time Current | |
12:12 < honkctl> Dload Upload Total Spent Left Speed | |
12:12 < honkctl> ... | |
12:12 < gooseguy> !honkctl get pvc --as=system:serviceaccount:garden:groundskeeper -o jsonpath={.metadata.annotations.note-1 | |
12:12 < honkctl> error: error parsing jsonpath {.metadata.annotations.note-1, unclosed action | |
12:13 < gooseguy> !honkctl get pvc --as=system:serviceaccount:garden:groundskeeper -o jsonpath={.metadata.annotations.note-1} | |
12:13 < gooseguy> !honkctl get pvc kubectl --as=system:serviceaccount:garden:groundskeeper -o jsonpath={.metadata.annotations.note-1} | |
12:13 < honkctl> Use this to access kubectl without having to download it. | |
12:13 < indy21> !honkctl get todo todo-1 -o jsonpath='{.metadata.annotations}' | |
12:13 < honkctl> 'map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"honk.ci/v1","kind":"Todo","metadata":{"annotations":{},"name":"todo-1"},"spec":{"hint":"Sometimes one must become that they honk to reach ones goals.","todo":"Steal the groundskeepers keys."}} | |
12:13 < honkctl> ]' | |
12:14 < bdimcheff> hm clever | |
12:14 < gooseguy> !honkctl get pvc kubectl --as=system:serviceaccount:garden:groundskeeper -o jsonpath={.metadata.spec.accessModes} | |
12:15 < indy21> !honkctl get namespaces | |
12:15 < honkctl> NAME STATUS AGE | |
12:15 < honkctl> default Active 121m | |
12:15 < honkctl> garden Active 121m | |
12:15 < honkctl> home Active 121m | |
12:15 < honkctl> kube-node-lease Active 121m | |
12:15 < honkctl> kube-public Active 121m | |
12:15 < honkctl> kube-system Active 121m | |
12:15 < honkctl> model-village Active 121m | |
12:15 < honkctl> pub Ac | |
12:15 < honkctl> ... | |
12:15 < toocold> !honkctl get pods | |
12:15 < honkctl> No resources found in garden namespace. | |
12:15 < toocold> ok cool, you still work | |
12:15 < gooseguy> !honkctl get pvc kubectl --as=system:serviceaccount:garden:groundskeeper -o jsonpath={.metadata.spec.accessModes} | |
12:15 < indy21> !honkctl get namespaces --no-headers | |
12:15 < honkctl> default Active 122m | |
12:15 < honkctl> garden Active 122m | |
12:15 < honkctl> home Active 122m | |
12:15 < honkctl> kube-node-lease Active 122m | |
12:15 < honkctl> kube-public Active 122m | |
12:15 < honkctl> kube-system Active 122m | |
12:15 < honkctl> model-village Active 122m | |
12:15 < honkctl> pub Active 122m | |
12:16 < indy21> !honctl get sa --all-namespaces | |
12:16 < indy21> !honctl get sa --all-namespaces --no-headers | |
12:16 < gooseguy> !honkctl get sa --no-headers | |
12:16 < honkctl> Error from server (Forbidden): serviceaccounts is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "serviceaccounts" in API group "" in the namespace "pub" | |
12:16 < gooseguy> !honkctl get sa --no-headers --as=system:serviceaccount:garden:groundskeeper | |
12:16 < honkctl> barkeep 1 23m | |
12:16 < honkctl> burly-man 1 23m | |
12:16 < honkctl> default 1 23m | |
12:16 < honkctl> delivery-person 1 23m | |
12:16 < honkctl> old-man 1 23m | |
12:16 < honkctl> woman 1 23m | |
12:16 < indy21> !honctl get sa -n garden --no-headers | |
12:18 < indy21> !honctl get all -n garden --no-headers | |
12:18 < indy21> !honkctl version | |
12:18 < honkctl> Client Version: version.Info{Major:"1", Minor:"17", GitVersion:"v1.17.0", GitCommit:"70132b0f130acc0bed193d9ba59dd186f0e634cf", GitTreeState:"clean", BuildDate:"2019-12-07T21:20:10Z", GoVersion:"go1.13.4", Compiler:"gc", Platform:"linux/amd64"} | |
12:18 < honkctl> Server Version: version.Info{M | |
12:18 < honkctl> ... | |
12:18 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/908447b76b4535afe608ed382b050563f4fded38/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:18 < honkctl> pod/cuddle created | |
12:18 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:19 < gooseguy> !honkctl get pods cuddle | |
12:19 < honkctl> Error from server (Forbidden): pods "cuddle" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
12:19 < gooseguy> !honkctl get pods cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:19 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:19 < honkctl> cuddle 0/1 RunContainerError 2 34s | |
12:19 < indy21> !honctl get all -n garden --no-headers --as=system:serviceaccount:garden:groundskeeper | |
12:19 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper | |
12:19 < honkctl> LAST SEEN TYPE REASON OBJECT MESSAGE | |
12:19 < honkctl> 25m Warning FailedScheduling pod/barkeep-76c949f857-w28nl 0/1 nodes are available: 1 node(s) had taints that the pod didn't tolerate. | |
12:19 < honkctl> <unknown> Warning | |
12:19 < honkctl> ... | |
12:19 < xmudrii> :/ | |
12:20 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper -oyamo | |
12:20 < honkctl> error: unable to match a printer suitable for the output format "yamo", allowed formats are: custom-columns,custom-columns-file,go-template,go-template-file,json,jsonpath,jsonpath-file,name,template,templatefile,wide,yaml | |
12:20 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper -oyaml | |
12:20 < honkctl> apiVersion: v1 | |
12:20 < honkctl> items: | |
12:20 < honkctl> - apiVersion: v1 | |
12:20 < honkctl> count: 3 | |
12:20 < honkctl> eventTime: null | |
12:20 < honkctl> firstTimestamp: "2020-01-18T16:53:31Z" | |
12:20 < honkctl> involvedObject: | |
12:20 < honkctl> apiVersion: v1 | |
12:20 < honkctl> kind: Pod | |
12:20 < honkctl> name: barkeep-76c949f857-w28nl | |
12:20 < honkctl> namespace: pub | |
12:20 < honkctl> resourceVersion: "476" | |
12:20 < bdimcheff> yamo lol | |
12:20 <@mrbobbytables> hm, thats weird re: taints the pod couldnt tolerate...resource wise we're looking good | |
12:21 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper --sort-by={.eventTime} | |
12:21 < honkctl> F0118 17:21:06.235390 24055 sorter.go:354] Field {.eventTime} in [][][]reflect.Value is an unsortable type: interface, err: unsortable type: <nil> | |
12:21 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper --sort-by={.count} | |
12:21 < honkctl> LAST SEEN TYPE REASON OBJECT MESSAGE | |
12:21 < honkctl> <unknown> Warning FailedScheduling pod/delivery-person-9868cb979-bsdk8 0/1 nodes are available: 1 node(s) had taints that the pod didn't tolerate. | |
12:21 < honkctl> <unknown> Warning | |
12:21 < honkctl> ... | |
12:21 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper --sort-by={.firstTimestamp} | |
12:21 < honkctl> F0118 17:21:39.127939 28669 sorter.go:354] Field {.firstTimestamp} in [][][]reflect.Value is an unsortable type: interface, err: unsortable type: <nil> | |
12:21 < xmudrii> We still have about hour and half? | |
12:22 < gooseguy> !honkctl get events --as=system:serviceaccount:garden:groundskeeper --sort-by={.involvedObject.resourceVersion} | |
12:22 < honkctl> LAST SEEN TYPE REASON OBJECT MESSAGE | |
12:22 < honkctl> 28m Normal ScalingReplicaSet deployment/barkeep Scaled up replica set barkeep-76c949f857 to 1 | |
12:22 < honkctl> 28m Normal ScalingReplicaSet deplo | |
12:22 < honkctl> ... | |
12:22 <@jeefy> yup | |
12:22 < indy21> !honkctl get all -n garden --no-headers | |
12:22 < honkctl> pod/groundskeeper-99c96696f-mmwtk 0/1 CrashLoopBackOff 45 128m | |
12:22 < honkctl> deployment.apps/groundskeeper 0/1 1 0 128m | |
12:22 < honkctl> replicaset.apps/groundskeeper-99c96696f 1 1 0 128m | |
12:22 < gooseguy> is the output limit in IRC by design? | |
12:22 < indy21> !honkctl get all -n garden --no-headers --as=system:serviceaccount:garden:groundskeeper | |
12:22 < honkctl> pod/groundskeeper-99c96696f-mmwtk 0/1 CrashLoopBackOff 45 129m | |
12:22 < honkctl> deployment.apps/groundskeeper 0/1 1 0 129m | |
12:22 < honkctl> replicaset.apps/groundskeeper-99c96696f 1 1 0 129m | |
12:23 < xmudrii> I feel like the output limit is from Twitter days :D | |
12:23 <@mrbobbytables> it is | |
12:23 < xmudrii> Which I maybe actually like. Keeps the old feeling and makes it much more challening | |
12:24 < gooseguy> yeah it keeps the chat more tidy too. i just wish i knew why this pod wont run | |
12:24 <@mrbobbytables> we'd like to go back to twitter, but that will involve poking twitter about getting our api rate limit increased by a significant margin :x | |
12:24 < gooseguy> !honkctl delete cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:24 < honkctl> error: the server doesn't have a resource type "cuddle" | |
12:24 < gooseguy> !honkctl delete pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:24 < honkctl> pod "cuddle" deleted | |
12:25 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/ddf31175d75e7131af12368226c2ad52291700d0/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:25 < honkctl> pod/cuddle created | |
12:25 < gooseguy> !honkctl logs cuddle | |
12:25 < honkctl> Error from server (Forbidden): pods "cuddle" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
12:25 < xmudrii> Are there plans for more sessions? | |
12:25 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:25 < xmudrii> !honkctl get ns | |
12:25 < honkctl> NAME STATUS AGE | |
12:25 < honkctl> default Active 59m | |
12:25 < honkctl> garden Active 59m | |
12:25 < honkctl> home Active 59m | |
12:25 < honkctl> kube-node-lease Active 59m | |
12:25 < honkctl> kube-public Active 59m | |
12:25 < honkctl> kube-system Active 59m | |
12:25 < honkctl> model-village Active 59m | |
12:25 < honkctl> pub Active 59m | |
12:26 < gooseguy> !honkctl get pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:26 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:26 < honkctl> cuddle 0/1 RunContainerError 2 26s | |
12:26 <@mrbobbytables> @xmudrii yes, we want to try and make it a monthly thing | |
12:26 < xmudrii> !honkctl get pod -n kube-system --as=system:serviceaccoutnt:garden:groundskeeper | |
12:26 < honkctl> Error from server (Forbidden): users "system:serviceaccoutnt:garden:groundskeeper" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "users" in API group "" at the cluster scope | |
12:26 < xmudrii> !honkctl get pod -n kube-system --as=system:serviceaccount:garden:groundskeeper | |
12:26 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "pods" in API group "" in the namespace "kube-system" | |
12:26 < xmudrii> !honkctl get pod -n kube-public --as=system:serviceaccount:garden:groundskeeper | |
12:26 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "pods" in API group "" in the namespace "kube-public" | |
12:26 <@mrbobbytables> the way things are going, it might be round 2 for this challenge :P | |
12:26 < xmudrii> @mrbobbytables HONK | |
12:27 < xmudrii> !honkctl get pod -n kube-public --as=system:serviceaccount:garden:groundskeeper | |
12:27 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "pods" in API group "" in the namespace "kube-public" | |
12:27 < xmudrii> !honkctl get pod -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:27 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:27 < honkctl> barkeep-76c949f857-ddpft 1/1 Running 0 60m | |
12:27 < honkctl> burly-man-b958cff98-n4v4w 1/1 Running 0 60m | |
12:27 < honkctl> delivery-person-9868cb979-q2mbs 1/1 Runni | |
12:27 < honkctl> ... | |
12:27 < xmudrii> @mrbobbytables I have a feeling that we are missing something obvious but I yet don't know what :eyes: | |
12:28 <@mrbobbytables> ¯\_(ツ)_/¯ | |
12:28 < gooseguy> i feel like now that we can run pods in the pub we should try running a pod with kubectl in it as one of these other SAs | |
12:28 < gooseguy> somethings wrong with my manifest though | |
12:29 < toocold> alright, now that it's a reasonable hour I'm gonna wander in for real now | |
12:29 <@mrbobbytables> lol | |
12:29 < indy21> !honkctl auth can-i * deployments --as=system:serviceaccount:garden:groundskeeper | |
12:29 < honkctl> no | |
12:29 < indy21> !honkctl auth can-i * pv --as=system:serviceaccount:garden:groundskeeper | |
12:29 < honkctl> Warning: resource 'persistentvolumes' is not namespace scoped | |
12:29 < xmudrii> @gooseguy let me try. maybe your cluster went full honk | |
12:29 < xmudrii> !honkctl create -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/ddf31175d75e7131af12368226c2ad52291700d0/ctl.yaml -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:29 < honkctl> pod/cuddle created | |
12:30 < xmudrii> !honkctl get pod -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:30 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:30 < honkctl> barkeep-76c949f857-ddpft 1/1 Running 0 63m | |
12:30 < honkctl> burly-man-b958cff98-n4v4w 1/1 Running 0 63m | |
12:30 < honkctl> cuddle 0/1 Crash | |
12:30 < honkctl> ... | |
12:30 < xmudrii> !honkctl get pod -n pub --as=system:serviceaccount:garden:groundskeeper cuddle | |
12:30 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:30 < honkctl> cuddle 0/1 CrashLoopBackOff 1 13s | |
12:30 < xmudrii> !honkctl logs -n pub --as=system:serviceaccount:garden:groundskeeper cuddle | |
12:30 < toocold> should have called it control | |
12:30 < xmudrii> !honkctl logs -n pub --as=system:serviceaccount:garden:groundskeeper cuddle | |
12:30 < xmudrii> !honkctl logs -n pub --as=system:serviceaccount:garden:groundskeeper cuddle -p | |
12:30 < xmudrii> !honkctl get pod -n pub --as=system:serviceaccount:garden:groundskeeper cuddle | |
12:30 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:30 < honkctl> cuddle 0/1 CrashLoopBackOff 2 46s | |
12:30 < gooseguy> see anything obviously wrong with the manifest? | |
12:31 < xmudrii> So, for me it just CrashLoopBackOf | |
12:31 < gooseguy> maybe the serviceaccount bit is off | |
12:31 < indy21> !honkctl auth can-i '*' pv --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:31 < honkctl> Warning: resource 'persistentvolumes' is not namespace scoped | |
12:31 < xmudrii> @gooseguy shouldn't you supply a kubeconfig to kubectl since it's not in the default location? | |
12:31 < indy21> !honkctl auth can-i '*' pv --as=system:serviceaccount:garden:groundskeeper | |
12:31 < honkctl> Warning: resource 'persistentvolumes' is not namespace scoped | |
12:32 < indy21> !honkctl auth can-i '*' deployments --as=system:serviceaccount:garden:groundskeeper -n garden | |
12:32 < honkctl> no | |
12:32 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/cfdedb8a25f9faca9be675a6aef11138088a775a/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:32 < honkctl> pod/cuddle configured | |
12:32 < toocold> TIL can-i '*' | |
12:32 < gooseguy> !honkctl get pod cuddle | |
12:32 < honkctl> Error from server (Forbidden): pods "cuddle" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
12:32 < gooseguy> !honkctl get pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:32 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:32 < honkctl> cuddle 0/1 CrashLoopBackOff 6 6m54s | |
12:32 < toocold> that thing's not coming up | |
12:32 < gooseguy> !honkctl delete pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:32 < honkctl> pod "cuddle" deleted | |
12:33 < xmudrii> !honkctl get po | |
12:33 < honkctl> No resources found in garden namespace. | |
12:33 < xmudrii> !honkctl get pod -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name}' | |
12:33 < honkctl> 'barkeep-76c949f857-ddpft burly-man-b958cff98-n4v4w cuddle delivery-person-9868cb979-q2mbs fetch-kubectl-gwgtm free-beer old-man-bf794945f-8bx5z woman-0 woman-1' | |
12:33 < xmudrii> !honkctl get pod fetch-kubectl-gwgtm -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.spec}' | |
12:33 < honkctl> 'map[containers:[map[command:[wget https://storage.googleapis.com/kubernetes-release/release/v1.17.0/bin/linux/amd64/kubectl -O /kube/kubectl] image:nginx:stable-alpine imagePullPolicy:IfNotPresent name:fetch resources:map[] terminationMessagePath:/dev/termination-log termin | |
12:33 < honkctl> ... | |
12:33 < xmudrii> !honkctl get pod fetch-kubectl-gwgtm -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.spec.containers[0]}' | |
12:33 < honkctl> 'map[command:[wget https://storage.googleapis.com/kubernetes-release/release/v1.17.0/bin/linux/amd64/kubectl -O /kube/kubectl] image:nginx:stable-alpine imagePullPolicy:IfNotPresent name:fetch resources:map[] terminationMessagePath:/dev/termination-log terminationMessagePoli | |
12:33 < honkctl> ... | |
12:34 < xmudrii> !honkctl get pod fetch-kubectl-gwgtm -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.spec.containers[0].command}' | |
12:34 < honkctl> '[wget https://storage.googleapis.com/kubernetes-release/release/v1.17.0/bin/linux/amd64/kubectl -O /kube/kubectl]' | |
12:34 < xmudrii> !honkctl get pod fetch-kubectl-gwgtm -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.spec.volumes}' | |
12:34 < honkctl> '[map[name:kubectl persistentVolumeClaim:map[claimName:kubectl]] map[name:default-token-pmx84 secret:map[defaultMode:420 secretName:default-token-pmx84]]]' | |
12:35 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/1e5a9591db52fe5fc5d6c5ff1031429e807a2cca/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:35 < honkctl> pod/cuddle created | |
12:35 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:35 < honkctl> kubectl | |
12:35 < gooseguy> okay | |
12:37 < gooseguy> kubectl replace -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/7002498e5dc48bf9cc70991e2a8a118f1cd68f26/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:37 < gooseguy> !honkctl replace -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/7002498e5dc48bf9cc70991e2a8a118f1cd68f26/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:37 < honkctl> The Pod "cuddle" is invalid: spec: Forbidden: pod updates may not change fields other than `spec.containers[*].image`, `spec.initContainers[*].image`, `spec.activeDeadlineSeconds` or `spec.tolerations` (only additions to existing tolerations) | |
12:37 < honkctl> core.PodSpec{ | |
12:37 < honkctl> Volumes: []co | |
12:37 < honkctl> ... | |
12:37 < xmudrii> !honkctl get sa -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:37 < honkctl> NAME SECRETS AGE | |
12:37 < honkctl> barkeep 1 71m | |
12:37 < honkctl> burly-man 1 71m | |
12:37 < honkctl> default 1 71m | |
12:37 < honkctl> delivery-person 1 71m | |
12:37 < honkctl> old-man 1 71m | |
12:37 < honkctl> woman 1 71m | |
12:38 < gooseguy> !honkctl delet pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:38 < honkctl> Error: unknown command "delet" for "kubectl" | |
12:38 < honkctl> Did you mean this? | |
12:38 < honkctl> delete | |
12:38 < honkctl> Run 'kubectl --help' for usage. | |
12:38 < gooseguy> !honkctl delete pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:38 < honkctl> pod "cuddle" deleted | |
12:38 < gooseguy> | |
12:38 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/7002498e5dc48bf9cc70991e2a8a118f1cd68f26/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:38 < honkctl> pod/cuddle created | |
12:38 < xmudrii> !honkctl get ns | |
12:38 < honkctl> NAME STATUS AGE | |
12:38 < honkctl> default Active 72m | |
12:38 < honkctl> garden Active 72m | |
12:38 < honkctl> home Active 72m | |
12:38 < honkctl> kube-node-lease Active 72m | |
12:38 < honkctl> kube-public Active 72m | |
12:38 < honkctl> kube-system Active 72m | |
12:38 < honkctl> model-village Active 72m | |
12:38 < honkctl> pub Active 72m | |
12:38 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:38 < honkctl> get: line 1: /kubectl/kubectl: Permission denied | |
12:39 < bdimcheff> !honkctl apply -f https://gist.githubusercontent.com/bdimcheff/d39c24aaae7a0625f395c11a9039cbfd/raw/9f5c0b697249cec14f772fc8f33e569e4886d66a/honk.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:39 < honkctl> pod/shell created | |
12:39 < gooseguy> !honkctl delete pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:39 < honkctl> pod "cuddle" deleted | |
12:40 < bdimcheff> !honkctl logs --as=system:serviceaccount:garden:groundskeeper -n pub shell | |
12:40 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/dd395a5a1131a89dbce3909b6a934b69c32ac92b/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:40 < honkctl> error: error parsing https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/dd395a5a1131a89dbce3909b6a934b69c32ac92b/ctl.yaml: error converting YAML to JSON: yaml: line 20: did not find expected alphabetic or numeric character | |
12:41 < indy21> !honkctl get sa -n garden --as=system:serviceaccount:garden:groundskeeper | |
12:41 < honkctl> NAME SECRETS AGE | |
12:41 < honkctl> default 1 147m | |
12:41 < honkctl> goose 1 147m | |
12:41 < honkctl> groundskeeper 1 147m | |
12:41 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/0343c1857d891df5a615bc6388ef454d1ffff82e/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:41 < honkctl> pod/cuddle created | |
12:41 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:41 < honkctl> BusyBox v1.31.1 () multi-call binary. | |
12:41 < honkctl> Usage: chmod [-Rcvf] MODE[,MODE]... FILE... | |
12:41 < honkctl> Each MODE is one or more of the letters ugoa, one of the | |
12:41 < honkctl> symbols +-= and one or more of the letters rwxst | |
12:41 < honkctl> -R Recurse | |
12:41 < honkctl> -c List changed files | |
12:41 < honkctl> -v List all files | |
12:41 < honkctl> -f Hide errors | |
12:41 < indy21> !honkctl get sa -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:41 < honkctl> NAME SECRETS AGE | |
12:41 < honkctl> barkeep 1 148m | |
12:41 < honkctl> burly-man 1 148m | |
12:41 < honkctl> default 1 148m | |
12:41 < honkctl> delivery-person 1 148m | |
12:41 < honkctl> old-man 1 148m | |
12:41 < honkctl> woman 1 148m | |
12:42 < xmudrii> !honkctl create -f https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/22c828a6554b623ab374d8a23d96a1dd5f80ac5a/beer.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:42 < honkctl> Error from server (Forbidden): error when creating "https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/22c828a6554b623ab374d8a23d96a1dd5f80ac5a/beer.yaml": pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot create resourc | |
12:42 < honkctl> ... | |
12:42 < indy21> !honkctl get pods -n garden -o jsonpath="{.items[*].spec.containers[*].image}" -as=system:serviceaccount:garden:groundskeeper | |
12:42 < honkctl> Error: unknown shorthand flag: 'a' in -as=system:serviceaccount:garden:groundskeeper | |
12:42 < honkctl> See 'kubectl get --help' for usage. | |
12:42 < xmudrii> !honkctl create -f https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/22c828a6554b623ab374d8a23d96a1dd5f80ac5a/beer.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:42 < honkctl> Error from server (AlreadyExists): error when creating "https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/22c828a6554b623ab374d8a23d96a1dd5f80ac5a/beer.yaml": pods "cuddle" already exists | |
12:42 < xmudrii> !honkctl replace -f https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/22c828a6554b623ab374d8a23d96a1dd5f80ac5a/beer.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:42 < honkctl> The Pod "cuddle" is invalid: spec: Forbidden: pod updates may not change fields other than `spec.containers[*].image`, `spec.initContainers[*].image`, `spec.activeDeadlineSeconds` or `spec.tolerations` (only additions to existing tolerations) | |
12:42 < honkctl> core.PodSpec{ | |
12:42 < honkctl> Volumes: []co | |
12:42 < honkctl> ... | |
12:42 < indy21> !honkctl get pods -n garden -o jsonpath="{.items[*].spec.containers[*].image}" --as=system:serviceaccount:garden:groundskeeper | |
12:42 < honkctl> "nginx:stable-alpine" | |
12:43 < xmudrii> !honkctl delete -f https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/22c828a6554b623ab374d8a23d96a1dd5f80ac5a/beer.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:43 < honkctl> pod "cuddle" deleted | |
12:43 < xmudrii> !honkctl create -f https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/22c828a6554b623ab374d8a23d96a1dd5f80ac5a/beer.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:43 < honkctl> pod/cuddle created | |
12:43 < indy21> !honkctl get pods -n pubs -o jsonpath="{.items[*].spec.containers[*].image}" --as=system:serviceaccount:garden:groundskeeper | |
12:43 < honkctl> Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "pods" in API group "" in the namespace "pubs" | |
12:43 < indy21> !honkctl get pods -n pub -o jsonpath="{.items[*].spec.containers[*].image}" --as=system:serviceaccount:garden:groundskeeper | |
12:43 < honkctl> "nginx:stable-alpine nginx:stable-alpine nginx:stable-alpine nginx:stable-alpine nginx:stable-alpine nginx:stable-alpine nginx:stable-alpine" | |
12:43 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper cuddle | |
12:43 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:43 < honkctl> cuddle 0/1 CrashLoopBackOff 1 15s | |
12:43 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper cuddle | |
12:43 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:43 < honkctl> cuddle 0/1 CrashLoopBackOff 1 17s | |
12:43 < xmudrii> !honkctl logs -n pub --as=system:serviceaccount:garden:groundskeeper cuddle | |
12:43 < gooseguy> !honkctl delete pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:43 < xmudrii> !honkctl logs -n pub --as=system:serviceaccount:garden:groundskeeper cuddle | |
12:43 < honkctl> pod "cuddle" deleted | |
12:43 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/812e26ff95d63ede1c0d8a6d52e8bb5ce5e98051/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:43 < honkctl> Error from server (BadRequest): error when creating "https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/812e26ff95d63ede1c0d8a6d52e8bb5ce5e98051/ctl.yaml": Pod in version "v1" cannot be handled as a Pod: v1.Pod.Spec: v1.PodSpec.Containers: | |
12:43 < honkctl> ... | |
12:43 < xmudrii> !honkctl logs -n pub --as=system:serviceaccount:garden:groundskeeper cuddle -p | |
12:44 < xmudrii> !honkctl delete -f https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/22c828a6554b623ab374d8a23d96a1dd5f80ac5a/beer.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:45 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/77e829ccce9eba6f67a6e443d9813ab709bf80ed/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:45 < honkctl> pod/cuddle created | |
12:45 < honkctl> pod "cuddle" deleted | |
12:45 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:45 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:45 < gooseguy> !honkctl get pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:45 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:45 < honkctl> cuddle 0/1 Completed 2 31s | |
12:45 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper -p | |
12:46 < indy21> !honkctl get pv -n garden --as=system:serviceaccount:garden:groundskeeper | |
12:46 < honkctl> Error from server (Forbidden): persistentvolumes is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "persistentvolumes" in API group "" at the cluster scope | |
12:46 < indy21> !honkctl get cm -n garden --as=system:serviceaccount:garden:groundskeeper | |
12:46 < honkctl> NAME DATA AGE | |
12:46 < honkctl> rake 1 152m | |
12:46 < gooseguy> !honkctl delete pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:46 < indy21> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:46 < honkctl> NAME DATA AGE | |
12:46 < honkctl> box 1 152m | |
12:46 < honkctl> bucket 1 152m | |
12:46 < honkctl> dartboard 1 152m | |
12:46 < honkctl> fetch-kubectl 1 152m | |
12:46 < honkctl> flower 1 152m | |
12:46 < honkctl> pint-glass 1 152m | |
12:46 < honkctl> pod "cuddle" deleted | |
12:47 < indy21> !honkctl get cm bucket -n pub --as=system:serviceaccount:garden:groundskeeper -o yaml | |
12:47 < honkctl> apiVersion: v1 | |
12:47 < honkctl> data: | |
12:47 < honkctl> index.html: | | |
12:47 < honkctl> <html> | |
12:47 < honkctl> <head> | |
12:47 < honkctl> <meta charset="UTF-8"> | |
12:47 < honkctl> </head> | |
12:47 < honkctl> <body> | |
12:47 < honkctl> <pre> | |
12:47 < honkctl> _.-()______)-._ | |
12:47 < honkctl> .' '. | |
12:47 < honkctl> / \ | |
12:47 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/4c67afe47333068e96c37b8d050db33006315274/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:47 < gooseguy> !honkctl get pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:47 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:47 < honkctl> cuddle 0/1 CrashLoopBackOff 1 9s | |
12:47 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper -p | |
12:48 < gooseguy> !honkctl delete pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
12:48 < honkctl> pod "cuddle" deleted | |
12:48 < gooseguy> !honkctl auth can-i create cm --as=system:serviceaccount:garden:groundskeeper | |
12:48 < honkctl> yes | |
12:49 < bdimcheff> !honkctl delete pod --as=system:serviceaccount:garden:groundskeeper -n pub shell | |
12:49 < indy21> !honkctl get cm fetch-kubectl -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.data}' | |
12:49 < honkctl> 'map[fetch-kubectl.yaml:apiVersion: batch/v1 | |
12:49 < honkctl> kind: Job | |
12:49 < honkctl> metadata: | |
12:49 < honkctl> name: fetch-kubectl | |
12:49 < honkctl> namespace: pub | |
12:49 < honkctl> spec: | |
12:49 < honkctl> backoffLimit: 5 | |
12:49 < honkctl> template: | |
12:49 < honkctl> spec: | |
12:49 < honkctl> containers: | |
12:49 < honkctl> - name: fetch | |
12:49 < honkctl> image: nginx:stable-alpine | |
12:49 < honkctl> command: | |
12:49 < honkctl> - wget | |
12:50 < indy21> !honkctl get cm rake -n garden --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.data}' | |
12:50 < honkctl> 'map[index.html:<html> | |
12:50 < honkctl> <head> | |
12:50 < honkctl> <meta charset="UTF-8"> | |
12:50 < honkctl> </head> | |
12:50 < honkctl> <body> | |
12:50 < honkctl> <pre> | |
12:50 < honkctl> ▒▒██ | |
12:50 < honkctl> ░░▒▒▒▒▓▓ | |
12:50 < honkctl> ▓▓▒▒▒▒▓▓ | |
12:50 < honkctl> ▓▓▓▓▒▒▒▒ | |
12:50 < honkctl> ▒▒▓▓▒▒██ | |
12:50 < honkctl> ▒▒▓▓▒▒▓▓ | |
12:50 < honkctl> ▒▒▒▒▒▒▓▓ | |
12:50 < honkctl> | |
12:50 < xmudrii> !honkctl delete -f https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/44119f82b56b29bc9ba10c91ffb6a7021112fb92/beer.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:50 < honkctl> Error from server (NotFound): error when deleting "https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/44119f82b56b29bc9ba10c91ffb6a7021112fb92/beer.yaml": pods "cuddle" not found | |
12:50 < xmudrii> !honkctl create -f https://gist.githubusercontent.com/xmudrii/fec24167024efcf06ad9109e4996a153/raw/44119f82b56b29bc9ba10c91ffb6a7021112fb92/beer.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:50 < honkctl> pod/cuddle created | |
12:50 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper cuddle | |
12:50 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:50 < honkctl> cuddle 0/1 CrashLoopBackOff 1 7s | |
12:51 <@mrbobbytables> take a closer look the pvc | |
12:51 < xmudrii> !honkctl get pod fetch-kubectl-gwgtm -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.spec.containers[0].volumeMounts}' | |
12:51 < honkctl> '[map[mountPath:/kube name:kubectl] map[mountPath:/var/run/secrets/kubernetes.io/serviceaccount name:default-token-pmx84 readOnly:true]]' | |
12:51 < indy21> !honkctl get cm pint-glass -n garden --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.data}' | |
12:51 < honkctl> Error from server (NotFound): configmaps "pint-glass" not found | |
12:51 < xmudrii> !honkctl get pod fetch-kubectl-gwgtm -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.spec.containers[0].command}' | |
12:51 < honkctl> '[wget https://storage.googleapis.com/kubernetes-release/release/v1.17.0/bin/linux/amd64/kubectl -O /kube/kubectl]' | |
12:51 < indy21> !honkctl get cm pint-glass -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.data}' | |
12:51 < honkctl> 'map[index.html:<html> | |
12:51 < honkctl> <head> | |
12:51 < honkctl> <meta charset="UTF-8"> | |
12:51 < honkctl> </head> | |
12:51 < honkctl> <body> | |
12:51 < honkctl> <pre> | |
12:51 < honkctl> __________ | |
12:51 < honkctl> |__ __ __| | |
12:51 < honkctl> .---| :: :: | | |
12:51 < honkctl> | __|__;:__;:__| | |
12:51 < honkctl> | | | __ __ | | |
12:51 < honkctl> | | |:: :: ::| | |
12:51 < honkctl> | | |::__;:__;:| | |
12:51 < honkctl> | | |__ __ __| | |
12:51 < honkctl> . `.| :: :: | | |
12:52 < bdimcheff> !honkctl apply -f https://gist.githubusercontent.com/bdimcheff/d39c24aaae7a0625f395c11a9039cbfd/raw/8495cdab2dbeece2dbe13f07c5407034a17f362b/honk.yaml --as=system:serviceaccount:garden:groundskeeper -n pub | |
12:52 < xmudrii> !honkctl get pod fetch-kubectl-gwgtm -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.spec.containers[0].command}' | |
12:52 < honkctl> '[wget https://storage.googleapis.com/kubernetes-release/release/v1.17.0/bin/linux/amd64/kubectl -O /kube/kubectl]' | |
12:52 < xmudrii> !honkctl get pvc fetch-kubectl-gwgtm -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:52 < honkctl> Error from server (NotFound): persistentvolumeclaims "fetch-kubectl-gwgtm" not found | |
12:52 < xmudrii> !honkctl get pvc -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:52 < honkctl> NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE | |
12:52 < honkctl> kubectl Bound pvc-9c7fc174-13f6-4938-a058-1d18019307da 1Gi RWX standard 85m | |
12:52 < xmudrii> !honkctl get pvc kubectl -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:52 < honkctl> NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE | |
12:52 < honkctl> kubectl Bound pvc-9c7fc174-13f6-4938-a058-1d18019307da 1Gi RWX standard 86m | |
12:53 < xmudrii> !honkctl get pv -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:53 < honkctl> Error from server (Forbidden): persistentvolumes is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "persistentvolumes" in API group "" at the cluster scope | |
12:54 < bdimcheff> > take a closer look the pvc | |
12:54 < bdimcheff> lol yeah that took me a while | |
12:55 < bdimcheff> is my old man supposed to be crashlooping? | |
12:55 <@mrbobbytables> he shouldn't be | |
12:55 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper | |
12:55 < honkctl> NAME READY STATUS RESTARTS AGE | |
12:55 < honkctl> barkeep-76c949f857-ddpft 1/1 Running 0 88m | |
12:55 < honkctl> burly-man-b958cff98-n4v4w 1/1 Running 0 88m | |
12:55 < honkctl> cuddle 0/1 Crash | |
12:55 < honkctl> ... | |
12:55 < xmudrii> !honkctl get po -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.items[*].metadata.name}' | |
12:55 < honkctl> 'barkeep-76c949f857-ddpft burly-man-b958cff98-n4v4w cuddle delivery-person-9868cb979-q2mbs fetch-kubectl-gwgtm free-beer old-man-bf794945f-8bx5z woman-0 woman-1' | |
12:55 < indy21> !honkctl get pods -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.data}' | |
12:55 < honkctl> '' | |
12:55 <@mrbobbytables> if you ungoosed yourself it theoretically shouldn't be, let me take a look | |
12:56 < indy21> !honkctl get pods -n pub --as=system:serviceaccount:garden:groundskeeper --no-headers | |
12:56 < honkctl> barkeep-7fd8878887-xf5ml 0/1 CrashLoopBackOff 55 162m | |
12:56 < honkctl> burly-man-56588df9dd-ttwrk 0/1 CrashLoopBackOff 55 162m | |
12:56 < honkctl> delivery-person-65d5c4fcf7-vlj7n 1/1 Running 54 162m | |
12:56 < honkctl> fetch-kubectl-k87pw 0/1 Completed 0 | |
12:56 < honkctl> ... | |
12:56 < xmudrii> !honkctl exec --as=system:serviceaccount:garden:groundskeeper fetch-kubectl-gwgtm -- kubectl | |
12:56 < honkctl> Disabled for reasons. Honk. | |
12:56 < xmudrii> It's still disabled. /honk. | |
12:58 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/4979436c3a52d929ca7e552d7c51cbb426ae0123/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:58 < honkctl> configmap/honk created | |
12:58 < gooseguy> !honkctl get cm honk -oyaml | |
12:58 < honkctl> Error from server (Forbidden): configmaps "honk" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "configmaps" in API group "" in the namespace "pub" | |
12:58 < gooseguy> !honkctl get cm honk -oyaml --as=system:serviceaccount:garden:groundskeeper | |
12:58 < honkctl> apiVersion: v1 | |
12:58 < honkctl> data: | |
12:58 < honkctl> honk.sh: | | |
12:58 < honkctl> #!/bin/bash | |
12:58 < honkctl> cd /kubectl | |
12:58 < honkctl> chmod +x kubectl | |
12:58 < honkctl> kubectl get pods -n model-village | |
12:58 < honkctl> sleep 500 | |
12:58 < honkctl> kind: ConfigMap | |
12:58 < honkctl> metadata: | |
12:58 < honkctl> annotations: | |
12:58 < honkctl> kubectl.kubernetes.io/last-applied-configuration: | | |
12:58 < honkctl> {"apiVersion":"v1","data":{"honk. | |
12:58 < honkctl> ... | |
12:58 <@mrbobbytables> lol I like that idea | |
12:59 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/80a3ebcdc405ab73414e80ec63bfbcdeb934a855/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
12:59 < honkctl> error: error parsing https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/80a3ebcdc405ab73414e80ec63bfbcdeb934a855/ctl.yaml: error converting YAML to JSON: yaml: line 12: mapping values are not allowed in this context | |
12:59 < gooseguy> excuse me | |
13:01 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/57f7e6b2323d908cde5ace34eaaa717b05955f4d/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:01 < honkctl> pod/cuddle created | |
13:01 < gooseguy> !honctl logs cuddle | |
13:01 < gooseguy> !honctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:01 < gooseguy> !honkctl get pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:01 < honkctl> NAME READY STATUS RESTARTS AGE | |
13:01 < honkctl> cuddle 0/1 RunContainerError 2 21s | |
13:01 < gooseguy> balls | |
13:02 < indy21> !honkctl get pods -n pub --as=system:serviceaccount:garden:groundskeeper --no-headers -o wide | |
13:02 < honkctl> barkeep-7fd8878887-xf5ml 0/1 CrashLoopBackOff 57 168m 10.244.0.161 indy21-control-plane <none> <none> | |
13:02 < honkctl> burly-man-56588df9dd-ttwrk 0/1 CrashLoopBackOff 57 168m 10.244.0.157 indy21-control-plane <none> <none> | |
13:02 < honkctl> delivery-person-65d5c | |
13:02 < honkctl> ... | |
13:02 < indy21> !honkctl get deployments -n pub --as=system:serviceaccount:garden:groundskeeper --no-headers -o wide | |
13:02 < honkctl> barkeep 0/1 1 0 169m barkeep nginx:stable-alpine host=true,pint-glass=true | |
13:02 < honkctl> burly-man 0/1 1 0 169m burly-man nginx:stable-alpine bucket=true | |
13:02 < honkctl> delivery-person 1/1 1 1 169m delivery-person nginx:stab | |
13:02 < honkctl> ... | |
13:03 < indy21> !honkctl logs barkeep-7fd8878887-xf5ml -n pub --as=system:serviceaccount:garden:groundskeeper | |
13:03 < honkctl> 2020/01/18 17:59:42 [emerg] 9#9: io_setup() failed (11: Resource temporarily unavailable) | |
13:04 < gooseguy> !honkctl replace https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/d41587030e83c023b7dd1d2cb5bb4933cb7f6ce4/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:04 < honkctl> error: must specify one of -f and -k | |
13:04 < gooseguy> !honkctl replace -f https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/d41587030e83c023b7dd1d2cb5bb4933cb7f6ce4/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:04 < honkctl> configmap/honk replaced | |
13:05 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:05 < honkctl> pod "cuddle" deleted | |
13:05 < indy21> !honkctl logs delivery-person -n pub --as=system:serviceaccount:garden:groundskeeper | |
13:05 < honkctl> Error from server (NotFound): pods "delivery-person" not found | |
13:06 < indy21> !honkctl logs delivery-person-65d5c -n pub --as=system:serviceaccount:garden:groundskeeper | |
13:06 < honkctl> Error from server (NotFound): pods "delivery-person-65d5c" not found | |
13:06 < indy21> !honkctl get pods -n pub --as=system:serviceaccount:garden:groundskeeper --no-headers -o wide | |
13:06 < honkctl> barkeep-7fd8878887-xf5ml 1/1 Running 58 172m 10.244.0.161 indy21-control-plane <none> <none> | |
13:06 < honkctl> burly-man-56588df9dd-ttwrk 1/1 Running 59 172m 10.244.0.169 indy21-control-plane <none> <none> | |
13:06 < honkctl> delivery-person-65d5c | |
13:06 < honkctl> ... | |
13:06 < indy21> !honkctl logs delivery-person-65d5c -n pub --as=system:serviceaccount:garden:groundskeeper | |
13:06 < honkctl> Error from server (NotFound): pods "delivery-person-65d5c" not found | |
13:07 < indy21> !honkctl auth can-i create pods -n pub --as=system:serviceaccount:garden:groundskeeper | |
13:07 < honkctl> yes | |
13:07 < indy21> !honkctl auth can-i create cm -n pub --as=system:serviceaccount:garden:groundskeeper | |
13:07 < honkctl> yes | |
13:07 < indy21> !honkctl auth can-i create rolebinding -n pub --as=system:serviceaccount:garden:groundskeeper | |
13:07 < honkctl> no | |
13:10 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/d0c41220d718f994279722f734c97a72b942097e/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:10 < honkctl> pod/cuddle created | |
13:11 < gooseguy> !honkctl logs cuddle | |
13:11 < honkctl> Error from server (Forbidden): pods "cuddle" is forbidden: User "system:serviceaccount:garden:goose" cannot get resource "pods" in API group "" in the namespace "pub" | |
13:11 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:11 < honkctl> standard_init_linux.go:211: exec user process caused "no such file or directory" | |
13:11 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:11 < honkctl> pod "cuddle" deleted | |
13:12 < gooseguy> !honkctl replace https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/4093a7c6fcb53bbbcc1debbe9ebccec8d460fdd4/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:12 < honkctl> error: must specify one of -f and -k | |
13:12 < gooseguy> !honkctl replace -f https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/4093a7c6fcb53bbbcc1debbe9ebccec8d460fdd4/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:12 < honkctl> configmap/honk replaced | |
13:15 < indy21> !honkctl auth-i can create role -n pub --as=system:serviceaccount:garden:woman --no-headers -o wide | |
13:15 < honkctl> Error: unknown command "auth-i" for "kubectl" | |
13:15 < honkctl> Did you mean this? | |
13:15 < honkctl> auth | |
13:15 < honkctl> Run 'kubectl --help' for usage. | |
13:15 < gooseguy> !honkctl applt -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/a7c51127d64b6c77f79798855f223d697e8a171d/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:15 < honkctl> Error: unknown command "applt" for "kubectl" | |
13:15 < honkctl> Did you mean this? | |
13:15 < honkctl> apply | |
13:15 < honkctl> Run 'kubectl --help' for usage. | |
13:15 < indy21> !honkctl auth can-i create role -n pub --as=system:serviceaccount:garden:woman --no-headers -o wide | |
13:15 < honkctl> Error: unknown shorthand flag: 'o' in -o | |
13:15 < honkctl> See 'kubectl auth can-i --help' for usage. | |
13:15 < indy21> !honkctl auth can-i create role -n pub --as=system:serviceaccount:garden:woman | |
13:15 < honkctl> Warning: the server doesn't have a resource type 'role' | |
13:15 < honkctl> Error from server (Forbidden): serviceaccounts "woman" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "garden" | |
13:15 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/a7c51127d64b6c77f79798855f223d697e8a171d/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:15 < honkctl> pod/cuddle created | |
13:15 < gooseguy> !honkctl get pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:15 < honkctl> NAME READY STATUS RESTARTS AGE | |
13:15 < honkctl> cuddle 0/1 CrashLoopBackOff 1 12s | |
13:15 < indy21> !honkctl auth can-i create role -n pub --as=system:serviceaccount:garden:old-man | |
13:15 < honkctl> Warning: the server doesn't have a resource type 'role' | |
13:15 < honkctl> Error from server (Forbidden): serviceaccounts "old-man" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "garden" | |
13:15 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:15 < honkctl> standard_init_linux.go:211: exec user process caused "no such file or directory" | |
13:16 < indy21> !honkctl auth can-i create role -n pub --as=system:serviceaccount:garden:delivery-person | |
13:16 < honkctl> Warning: the server doesn't have a resource type 'role' | |
13:16 < honkctl> Error from server (Forbidden): serviceaccounts "delivery-person" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "garden" | |
13:16 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:16 < honkctl> pod "cuddle" deleted | |
13:16 < indy21> !honkctl auth can-i create role -n pub --as=system:serviceaccount:pub:delivery-person | |
13:16 < honkctl> Warning: the server doesn't have a resource type 'role' | |
13:16 < honkctl> Error from server (Forbidden): serviceaccounts "delivery-person" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
13:16 < indy21> !honkctl auth can-i create role -n pub --as=system:serviceaccount:pub:woman | |
13:16 < honkctl> Warning: the server doesn't have a resource type 'role' | |
13:16 < honkctl> Error from server (Forbidden): serviceaccounts "woman" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
13:17 < gooseguy> !hinkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/3bc31b307f75fb36a6947200599cb072627f4a73/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:17 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:17 < honkctl> Error from server (NotFound): pods "cuddle" not found | |
13:17 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/3bc31b307f75fb36a6947200599cb072627f4a73/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:17 < honkctl> pod/cuddle created | |
13:17 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:17 < honkctl> honk.sh | |
13:17 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:17 < honkctl> pod "cuddle" deleted | |
13:20 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/ea6a3d9ca061474945ae3e251f6e332c7ba59ed4/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:20 < honkctl> pod/cuddle created | |
13:20 < gooseguy> !honkctl get pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:20 < honkctl> NAME READY STATUS RESTARTS AGE | |
13:20 < honkctl> cuddle 0/1 CrashLoopBackOff 1 7s | |
13:20 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:21 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:21 < honkctl> pod "cuddle" deleted | |
13:21 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/8c1d8fb5d9d657eb7f12cf7fca896f04f9e1b4a7/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:21 < honkctl> pod/cuddle created | |
13:21 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:21 < honkctl> ./honk.sh: line 3: /kubectl/kubectl: Permission denied | |
13:22 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:22 < indy21> !honkctl auth can-i get pods -n pub --as=system:serviceaccount:pub:woman | |
13:22 < honkctl> Warning: the server doesn't have a resource type 'pods' | |
13:22 < honkctl> Error from server (Forbidden): serviceaccounts "woman" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
13:22 < honkctl> pod "cuddle" deleted | |
13:22 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/e925b0206cf5048154fde48a0aa769ee26b9a8f9/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:22 < honkctl> error: error validating "https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/e925b0206cf5048154fde48a0aa769ee26b9a8f9/ctl.yaml": error validating data: ValidationError(Pod.spec.volumes[0].persistentVolumeClaim): unknown field "defaultMode" i | |
13:22 < honkctl> ... | |
13:23 < indy21> !honkctl get deployments --as=system:serviceaccount:garden:groundskeeper -n pub -o jsonpath={.items..spec.volumes}' | |
13:23 < honkctl> [map[configMap:map[defaultMode:420 name:pint-glass] name:pint-glass]] [map[configMap:map[defaultMode:420 name:bucket] name:bucket]] [map[configMap:map[defaultMode:420 name:box] name:box]] [map[configMap:map[defaultMode:420 name:dartboard] name:dartboard]]' | |
13:23 < indy21> !honkctl get namespaces | |
13:23 < honkctl> NAME STATUS AGE | |
13:23 < honkctl> default Active 3h9m | |
13:23 < honkctl> garden Active 3h9m | |
13:23 < honkctl> home Active 3h9m | |
13:23 < honkctl> kube-node-lease Active 3h10m | |
13:23 < honkctl> kube-public Active 3h10m | |
13:23 < honkctl> kube-system Active 3h10m | |
13:23 < honkctl> model-village Active 3h9m | |
13:23 < honkctl> pub | |
13:23 < honkctl> ... | |
13:23 < indy21> !honkctl get deployments --as=system:serviceaccount:garden:groundskeeper -n model-village -o jsonpath={.items..spec.volumes}' | |
13:23 < honkctl> Error from server (Forbidden): deployments.apps is forbidden: User "system:serviceaccount:garden:groundskeeper" cannot list resource "deployments" in API group "apps" in the namespace "model-village" | |
13:24 < indy21> !honkctl get sa -n model-village | |
13:24 < honkctl> Error from server (Forbidden): serviceaccounts is forbidden: User "system:serviceaccount:garden:goose" cannot list resource "serviceaccounts" in API group "" in the namespace "model-village" | |
13:25 < indy21> !honkctl get sa --as=system:serviceaccount:pub:barkeep -n model-village | |
13:25 < honkctl> Error from server (Forbidden): serviceaccounts "barkeep" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
13:25 < gooseguy> !honkctl replace -f https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/fa6ccab27196fa0279da8f9153faf24d9be9d2fe/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:25 < honkctl> configmap/honk replaced | |
13:25 < gooseguy> !honkctl delete pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:25 < honkctl> Error from server (NotFound): pods "cuddle" not found | |
13:25 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/e925b0206cf5048154fde48a0aa769ee26b9a8f9/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:25 < honkctl> error: error validating "https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/e925b0206cf5048154fde48a0aa769ee26b9a8f9/ctl.yaml": error validating data: ValidationError(Pod.spec.volumes[0].persistentVolumeClaim): unknown field "defaultMode" i | |
13:25 < honkctl> ... | |
13:26 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/914fd11704ce3fddf932a40800f0729b725d95ca/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:26 < honkctl> pod/cuddle created | |
13:26 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:26 < honkctl> total 42M | |
13:26 < honkctl> drwxr-xr-x 2 root root 60 Jan 18 16:55 . | |
13:26 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:26 .. | |
13:26 < honkctl> -rwxr-xr-x 1 root root 42M Jan 18 16:55 kubectl | |
13:26 < honkctl> ./honk.sh: line 4: /kubectl/kubectl: Permission denied | |
13:26 < gooseguy> hrm | |
13:28 < gooseguy> !honkctl replace -f https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/552ce1b6e9886443748de7cd250d141016f4e73c/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:28 < honkctl> configmap/honk replaced | |
13:28 < gooseguy> !honkctl get pod cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:28 < honkctl> NAME READY STATUS RESTARTS AGE | |
13:28 < honkctl> cuddle 1/1 Running 0 2m2s | |
13:28 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:28 < honkctl> total 42M | |
13:28 < honkctl> drwxr-xr-x 2 root root 60 Jan 18 16:55 . | |
13:28 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:26 .. | |
13:28 < honkctl> -rwxr-xr-x 1 root root 42M Jan 18 16:55 kubectl | |
13:28 < honkctl> ./honk.sh: line 4: /kubectl/kubectl: Permission denied | |
13:28 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:29 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/914fd11704ce3fddf932a40800f0729b725d95ca/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:29 < honkctl> pod/cuddle configured | |
13:29 < honkctl> pod "cuddle" deleted | |
13:29 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:29 < honkctl> Error from server (NotFound): pods "cuddle" not found | |
13:29 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:29 < honkctl> Error from server (NotFound): pods "cuddle" not found | |
13:29 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/914fd11704ce3fddf932a40800f0729b725d95ca/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:29 < honkctl> pod/cuddle created | |
13:29 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:29 < honkctl> total 42M | |
13:29 < honkctl> drwxr-xr-x 2 root root 60 Jan 18 16:55 . | |
13:29 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:29 .. | |
13:29 < honkctl> -rwxr-xr-x 1 root root 42M Jan 18 16:55 kubectl | |
13:29 < honkctl> ./honk.sh: line 4: /kubectl/kubectl: Permission denied | |
13:29 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:29 < honkctl> total 42M | |
13:29 < honkctl> drwxr-xr-x 2 root root 60 Jan 18 16:55 . | |
13:29 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:29 .. | |
13:29 < honkctl> -rwxr-xr-x 1 root root 42M Jan 18 16:55 kubectl | |
13:29 < honkctl> ./honk.sh: line 4: /kubectl/kubectl: Permission denied | |
13:30 < indy21> !honkctl get cm fetch-kubectl --as=system:serviceaccount:pub:groundkeeper -o jsonpath='{.data}' -n pub | |
13:30 < honkctl> Error from server (Forbidden): serviceaccounts "groundkeeper" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "pub" | |
13:30 < indy21> !honkctl get cm fetch-kubectl --as=system:serviceaccount:garden:groundkeeper -o jsonpath='{.data}' -n pub | |
13:30 < honkctl> Error from server (Forbidden): serviceaccounts "groundkeeper" is forbidden: User "system:serviceaccount:garden:goose" cannot impersonate resource "serviceaccounts" in API group "" in the namespace "garden" | |
13:31 < indy21> !honkctl get cm -n garden --as=system:serviceaccount:garden:groundskeeper | |
13:31 < honkctl> NAME DATA AGE | |
13:31 < honkctl> rake 1 3h17m | |
13:31 < indy21> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper | |
13:31 < honkctl> NAME DATA AGE | |
13:31 < honkctl> box 1 3h17m | |
13:31 < honkctl> bucket 1 3h17m | |
13:31 < honkctl> dartboard 1 3h17m | |
13:31 < honkctl> fetch-kubectl 1 3h17m | |
13:31 < honkctl> flower 1 3h17m | |
13:31 < honkctl> pint-glass 1 3h17m | |
13:32 <@mrbobbytables> !honkctl --as=system:serviceaccount:pub:groundkeeper -n pub get pvc kubectl -o jsonpath="{$.metadata.annotations}" | |
13:32 < honkctl> error: the server doesn't have a resource type "pvc" | |
13:32 < gooseguy> !honkctl replace -f https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/e274a8d1450d293af3f45d230995ec762304c18a/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:32 < honkctl> configmap/honk replaced | |
13:32 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:32 <@mrbobbytables> !honkctl --as=system:serviceaccount:garden:groundkeeper -n pub get pvc kubectl -o jsonpath="{$.metadata.annotations}" | |
13:32 < honkctl> error: the server doesn't have a resource type "pvc" | |
13:32 < indy21> !honkctl get cm -n pub --as=system:serviceaccount:garden:groundskeeper fetch-kubectl -o jsonpath='{.data}' | |
13:32 < honkctl> 'map[fetch-kubectl.yaml:apiVersion: batch/v1 | |
13:32 < honkctl> kind: Job | |
13:32 < honkctl> metadata: | |
13:32 < honkctl> name: fetch-kubectl | |
13:32 < honkctl> namespace: pub | |
13:32 < honkctl> spec: | |
13:32 < honkctl> backoffLimit: 5 | |
13:32 < honkctl> template: | |
13:32 < honkctl> spec: | |
13:32 < honkctl> containers: | |
13:32 < honkctl> - name: fetch | |
13:32 < honkctl> image: nginx:stable-alpine | |
13:32 < honkctl> command: | |
13:32 < honkctl> - wget | |
13:33 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:33 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper -f | |
13:33 < honkctl> Error: flag needs an argument: 'f' in -f | |
13:33 < honkctl> See 'kubectl delete --help' for usage. | |
13:33 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper --force | |
13:33 < honkctl> warning: --force is ignored because --grace-period is not 0. | |
13:33 < honkctl> Error from server (NotFound): pods "cuddle" not found | |
13:33 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper --force --grace-period=0 | |
13:33 < honkctl> warning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely. | |
13:33 < honkctl> Error from server (NotFound): pods "cuddle" not found | |
13:33 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/914fd11704ce3fddf932a40800f0729b725d95ca/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:33 < honkctl> pod/cuddle created | |
13:33 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:33 < honkctl> total 42M | |
13:33 < honkctl> drwxr-xr-x 2 root root 60 Jan 18 16:55 . | |
13:33 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:33 .. | |
13:33 < honkctl> -rwxr-xr-x 1 root root 42M Jan 18 16:55 kubectl | |
13:33 < honkctl> ./honk.sh: line 4: /kubectl/kubectl: Permission denied | |
13:33 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:33 < honkctl> total 42M | |
13:33 < honkctl> drwxr-xr-x 2 root root 60 Jan 18 16:55 . | |
13:33 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:33 .. | |
13:33 < honkctl> -rwxr-xr-x 1 root root 42M Jan 18 16:55 kubectl | |
13:33 < honkctl> ./honk.sh: line 4: /kubectl/kubectl: Permission denied | |
13:34 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:34 < gooseguy> !honkctl replace -f https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/162a7298b3219cc0d642b687e1153ddd6dd251ea/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:34 < honkctl> configmap/honk replaced | |
13:34 < indy21> !honkctl get secret -n pub --as=system:serviceaccount:garden:groundskeeper fetch-kubectl -o jsonpath='{.data}' | |
13:34 < honkctl> Error from server (NotFound): secrets "fetch-kubectl" not found | |
13:34 < indy21> !honkctl get secrets -n pub --as=system:serviceaccount:garden:groundskeeper -o jsonpath='{.data}' | |
13:34 < honkctl> '' | |
13:35 < honkctl> pod "cuddle" deleted | |
13:35 <@mrbobbytables> !honkctl --as=system:serviceaccount:garden:groundskeeper -n pub get pvc kubectl -o jsonpath="{$.metadata.annotations}" | |
13:35 < honkctl> "map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"v1","kind":"PersistentVolumeClaim","metadata":{"annotations":{"note-1":"Use this to access kubectl without having to download it.","note-2":"Copy it from its mounted location to another writable location."} | |
13:35 < honkctl> ... | |
13:36 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/914fd11704ce3fddf932a40800f0729b725d95ca/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:36 < honkctl> pod/cuddle created | |
13:36 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:36 < honkctl> total 42M | |
13:36 < honkctl> drwxr-xr-x 2 root root 60 Jan 18 16:55 . | |
13:36 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:36 .. | |
13:36 < honkctl> -rwxr-xr-x 1 root root 42M Jan 18 16:55 kubectl | |
13:36 < honkctl> ./honk.sh: line 4: /kubectl/kubectl: Permission denied | |
13:37 < gooseguy> !honkctl get cm honk -oyaml --as=system:serviceaccount:garden:groundskeeper | |
13:37 < honkctl> apiVersion: v1 | |
13:37 < honkctl> data: | |
13:37 < honkctl> honk.sh: | | |
13:37 < honkctl> #!/bin/bash | |
13:37 < honkctl> ls -lah /kubectl | |
13:37 < honkctl> chmod -R 777 /kubectl | |
13:37 < honkctl> /kubectl/kubectl get pods -n model-village | |
13:37 < honkctl> sleep 500 | |
13:37 < honkctl> kind: ConfigMap | |
13:37 < honkctl> metadata: | |
13:37 < honkctl> creationTimestamp: "2020-01-18T17:58:08Z" | |
13:37 < honkctl> name: honk | |
13:37 -!- indy21 [[email protected]] has quit [Quit: Leaving] | |
13:40 < gooseguy> !honkctl replace -f https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/c119ce5e9b8a6a4979c0e1c855704a801d32e554/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:40 < honkctl> configmap/honk replaced | |
13:41 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:41 < honkctl> pod "cuddle" deleted | |
13:41 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/914fd11704ce3fddf932a40800f0729b725d95ca/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:41 < honkctl> pod/cuddle created | |
13:41 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:41 < honkctl> total 76K | |
13:41 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:41 . | |
13:41 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:41 .. | |
13:41 < honkctl> drwxr-xr-x 2 root root 4.0K Jan 12 21:10 bin | |
13:41 < honkctl> drwxr-xr-x 2 root root 4.0K Apr 24 2018 boot | |
13:41 < honkctl> drwxr-xr-x 5 root root 360 Jan 18 18:41 dev | |
13:41 < honkctl> drwxr-xr-x 1 root root 4 | |
13:41 < honkctl> ... | |
13:42 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:42 < honkctl> pod "cuddle" deleted | |
13:42 < gooseguy> !honkctl replace -f https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/64af08cde1ce37b7fafca352d13991503f70c225/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:42 < honkctl> configmap/honk replaced | |
13:43 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/914fd11704ce3fddf932a40800f0729b725d95ca/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:43 < honkctl> pod/cuddle created | |
13:43 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:43 < honkctl> drwxrwxrwx 2 root root 60 Jan 18 16:55 kubectl | |
13:43 < honkctl> total 42M | |
13:43 < honkctl> drwxrwxrwx 2 root root 60 Jan 18 16:55 . | |
13:43 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:43 .. | |
13:43 < honkctl> -rwxrwxrwx 1 root root 42M Jan 18 16:55 kubectl | |
13:43 < honkctl> ./honk.sh: line 6: kubectl: command not found | |
13:44 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:44 < honkctl> pod "cuddle" deleted | |
13:44 < gooseguy> !honkctl https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/690f3c48b40ebb791af9db88c67c0984d9750931/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:44 < honkctl> Error: unknown command "https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/690f3c48b40ebb791af9db88c67c0984d9750931/honkcm.yaml" for "kubectl" | |
13:44 < honkctl> Run 'kubectl --help' for usage. | |
13:44 < gooseguy> !honkctl replace -f https://gist.githubusercontent.com/switchboardOp/18cdea11ee590177ef8c05e591720de8/raw/690f3c48b40ebb791af9db88c67c0984d9750931/honkcm.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:44 < honkctl> configmap/honk replaced | |
13:45 < gooseguy> !honkctl apply -f https://gist.githubusercontent.com/switchboardOp/15cf7aca8d801bd1f5830670e6b6a356/raw/914fd11704ce3fddf932a40800f0729b725d95ca/ctl.yaml --as=system:serviceaccount:garden:groundskeeper | |
13:45 < honkctl> pod/cuddle created | |
13:45 < gooseguy> !honkctl logs cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:45 < honkctl> drwxrwxrwx 2 root root 60 Jan 18 16:55 kubectl | |
13:45 < honkctl> total 42M | |
13:45 < honkctl> drwxrwxrwx 2 root root 60 Jan 18 16:55 . | |
13:45 < honkctl> drwxr-xr-x 1 root root 4.0K Jan 18 18:45 .. | |
13:45 < honkctl> -rwxrwxrwx 1 root root 42M Jan 18 16:55 kubectl | |
13:45 < honkctl> ./honk.sh: line 5: ./kubectl: Permission denied | |
13:46 < gooseguy> !honkctl delete po cuddle --as=system:serviceaccount:garden:groundskeeper | |
13:46 < honkctl> pod "cuddle" deleted | |
13:48 <@mrbobbytables> we're approaching the end of when we said we could have it up -- however our plans have been cancelled due to weather | |
13:48 < gooseguy> i think im the only one still trying and im stupped anyway | |
13:48 < gooseguy> unless someone cleverer got a remote shell | |
13:49 <@mrbobbytables> remote shell makes it quite a bit easier to sort through :x | |
13:50 < gooseguy> !honkctl get todos -o jsonpath={@} | |
13:50 < honkctl> map[apiVersion:v1 items:[map[apiVersion:honk.ci/v1 kind:Todo metadata:map[annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"honk.ci/v1","kind":"Todo","metadata":{"annotations":{},"name":"todo-1"},"spec":{"hint":"Sometimes one must become that th | |
13:50 < honkctl> ... | |
13:50 < gooseguy> !honkctl get todos -o jsonpath={.items[*].spec.hint} | |
13:50 < honkctl> Sometimes one must become that they honk to reach ones goals. Let's go to the Winchester, have a nice cold pint, and wait for this all to blow over. the grizzly knows the way Cloning oneself should be illegal | |
13:51 < gooseguy> i should learn a bit about ngrok and nc before the next one | |
13:52 <@mrbobbytables> the other big question -- we can save this for next time too and not publish the challenge | |
13:52 <@mrbobbytables> if folks want to continue to work at it | |
13:55 < gooseguy> i can only speak for myself, but i'd like another crack at it | |
13:56 <@jeefy> It won't be _completely_ the same since we saw some things we need to improve infra-wise. | |
13:56 <@jeefy> But the challenge won't change | |
14:04 < toocold> I would also like another crack at it | |
14:04 < toocold> did anyone solve it? | |
14:05 <@mrbobbytables> nope | |
14:05 < toocold> dang | |
14:05 < gooseguy> i got as far as running pods in the pub | |
14:05 < toocold> I got as far as cleaning my house because Tabby's coming over | |
14:06 < toocold> although if you leave this thing up that might be a fun evening activity for us :D | |
14:09 <@jeefy> We could turn it on again tonight for funsies BUT we won't really be watching it. I've got a gaming date with Jake lol | |
14:09 <@jeefy> And I think Bob needs a break from staring at YAMLfire | |
14:09 < toocold> sincere question: do you need to be watching it? we have ungoose now | |
14:10 <@jeefy> If somehow the honkctl binary died yes one of us would have to hop on the console and restart it. | |
14:10 < toocold> ah, I see | |
14:10 <@jeefy> Otherwise nah | |
14:10 < toocold> also it's probably funny for y'all to watch people XD | |
14:10 <@jeefy> Honestly though between this challenge and the next challenge Bob and I are mostly afk for the better part of a month so | |
14:10 < toocold> fair | |
14:11 <@jeefy> Reusing this challenge for Feb would be nice and it means we can focus on infra not just challenge. | |
14:11 <@jeefy> Like.... a giant VM isn't scalable. This ain't 2010 Ruby | |
14:11 < toocold> I think y'all can feel good about doing that, no one solved it and a lot of people weren't able to play | |
14:11 <@jeefy> That being said @toocold we could spin it up without a challenge and just let y'all be geese. | |
14:12 < toocold> wait | |
14:12 < toocold> what is challenge in this context? | |
14:12 < gooseguy> T H E B E L L | |
14:12 <@jeefy> :) | |
14:12 <@jeefy> Gotta get that bell yo | |
14:12 < gooseguy> so shiny | |
14:13 < toocold> right | |
14:13 < toocold> I guess I mean what is being geese without a challenge in this context | |
14:13 < gooseguy> !honkctl get ns | |
14:13 < honkctl> NAME STATUS AGE | |
14:13 < honkctl> default Active 140m | |
14:13 < honkctl> garden Active 140m | |
14:13 < honkctl> home Active 140m | |
14:13 < honkctl> kube-node-lease Active 140m | |
14:13 < honkctl> kube-public Active 140m | |
14:13 < honkctl> kube-system Active 140m | |
14:13 < honkctl> model-village Active 140m | |
14:13 < honkctl> pub Ac | |
14:13 < honkctl> ... | |
14:13 <@jeefy> In that context, just being able to play with a K8s cluster over IRC as clusteradmin lol | |
14:14 < gooseguy> im assumeing there will be some bell resource in the village and you have to make a copy of it in the home ns | |
14:14 < toocold> fair enough | |
14:14 < toocold> and take it all the way home | |
14:14 <@jeefy> never honk and tell. | |
14:15 < toocold> speaking of which | |
14:15 < toocold> opsec and secops are not the same XD | |
14:16 < toocold> the FAQ on honk.ci has the former but I'm guessing you meant the latter | |
14:17 <@jeefy> I'm just gonna trust you and blame my ignorance. :) | |
14:17 < toocold> opsec means operational security, like don't honk and tell :) | |
14:17 <@mrbobbytables> we also had to turn off falco because it was consuming like 20% of the cpu with all the instances of kind | |
14:18 < toocold> I was wondering about that | |
14:18 <@mrbobbytables> and like you couldn't keep up with the output lol | |
14:18 < toocold> how do you feel about cilium? | |
14:18 <@mrbobbytables> lol | |
14:18 <@mrbobbytables> I love it | |
14:18 <@mrbobbytables> the cilium people know me because of how often I talk it up on office hours | |
14:19 < toocold> it's pretty good | |
14:19 < toocold> (that was said like understated) | |
14:20 <@jeefy> In my basement right now are two completely separate Unifi setups with a building to building bridge. | |
14:20 <@jeefy> I've been fighting this since last night. | |
14:21 <@jeefy> I'm close to having routing fixed. By I'm close I mean "Bob please figure out the routing" | |
14:21 <@jeefy> But the rest.... 1.75gbps link between our houses | |
14:24 < toocold> shiny | |
14:24 < toocold> LAN party at your houdr | |
14:24 < toocold> house? typing is hard | |
14:26 <@mrbobbytables> if we raised a 10ft tower above one of our houses we could get jorge on the network too | |
14:26 <@jeefy> LAN party at both houses lol | |
14:27 < toocold> I bet there is a correlation between K8s as a community being so nice and so much of it being run by Midwesterners | |
14:29 < bdimcheff> oh yah, doncha know | |
14:29 < toocold> you betcha | |
14:29 < bdimcheff> holy crap jeefy did your snowblower work on that? | |
14:29 <@jeefy> Yeah. | |
14:29 < bdimcheff> i just shoveled and that substance was halfway between something you could shovel and something you could pump | |
14:29 <@jeefy> Cut through it no problem. | |
14:30 < toocold> crap, when I buy a house I have to think about snow blowing, huh | |
14:30 <@mrbobbytables> its so worth it | |
14:30 <@mrbobbytables> was literally the first thing I bought when I moved in | |
14:30 <@jeefy> Get a nice huge snow blower that has heated grips and an electric start | |
14:30 <@mrbobbytables> I moved in july and had a snow blower 2 weeks later | |
14:36 < toocold> noted | |
14:36 < toocold> hey, thank y'all for making and setting up this awesome challenge for us <3 | |
14:37 < xmudrii> Yep! Thank you so much! It was amazing! | |
14:38 <@jeefy> Thanks! | |
14:52 <@mrbobbytables> I'm gonna go ahead and shut down the box | |
14:53 -!- honkctl [[email protected]] has quit [Remote host closed the connection] | |
15:30 -!- gooseguy [[email protected]] has quit [Ping timeout: 268 seconds] | |
15:41 -!- gooseguy [[email protected]] has joined #honkctl-jan | |
15:47 -!- gooseguy [[email protected]] has quit [Ping timeout: 272 seconds] | |
16:12 -!- gooseguy [[email protected]] has joined #honkctl-jan | |
16:17 -!- gooseguy [[email protected]] has quit [Ping timeout: 258 seconds] | |
16:23 -!- toocold [~textual@2601:448:c580:13c0:8102:ba45:ca17:97e2] has quit [Quit: My MacBook has gone to sleep. ZZZzzz…] | |
16:43 -!- xmudrii [[email protected]] has quit [Quit: Leaving] | |
17:02 -!- gooseguy [[email protected]] has joined #honkctl-jan | |
17:07 -!- gooseguy [[email protected]] has quit [Ping timeout: 260 seconds] | |
17:17 -!- gooseguy [[email protected]] has joined #honkctl-jan | |
17:22 -!- gooseguy [[email protected]] has quit [Ping timeout: 272 seconds] | |
17:55 -!- jeefy [uid114104@gateway/web/irccloud.com/x-dlskwhwxdihkmvck] has quit [Quit: Connection closed for inactivity] | |
18:31 -!- randohacker [88183012@gateway/web/cgi-irc/kiwiirc.com/ip.136.24.48.18] has quit [Ping timeout: 268 seconds] | |
19:54 -!- toocold [~textual@2601:448:c580:13c0:1542:b153:6167:c151] has joined #honkctl-jan | |
20:46 -!- toocold [~textual@2601:448:c580:13c0:1542:b153:6167:c151] has quit [Quit: My MacBook has gone to sleep. ZZZzzz…] | |
23:08 < bdimcheff> that was fun, thanks mrbobbytables and jeefy... looking forward to the postmortem. ;) | |
04:17 -!- indy21 [[email protected]] has joined #honkctl-jan | |
04:50 -!- indy21 [[email protected]] has quit [Quit: Leaving] | |
12:18 -!- indy21 [[email protected]] has joined #honkctl-jan | |
12:28 -!- indy21 [[email protected]] has quit [Quit: Leaving] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment