gray-barista-66205
09/04/2025, 6:45 AMacceptable-knife-37130
09/04/2025, 7:53 AMgray-barista-66205
09/04/2025, 8:02 AMacceptable-knife-37130
09/05/2025, 4:56 AMRoleBinding for a namespace with the required permission ).
That way you can just create a role binding for a particular namespace as below:
kind = "Role"
That will limit the scope. Its worth the extra effort as scope creep is a real issue, and might come back to bite when no one is lookinggray-barista-66205
09/25/2025, 1:51 PMacceptable-knife-37130
09/26/2025, 4:33 AMnamespace in values.yaml.
https://github.com/flyteorg/flyte/blob/master/charts/flyte-core/values.yaml
Depending on your cloud provider change the values in the below folder:
https://github.com/flyteorg/flyte/tree/master/charts/flyte-core
Lot of the namespace are dynamically loaded as variables. you might need to modify thosegray-barista-66205
09/29/2025, 7:50 AMflyte-core with namespace scope!
However, tasks are not running because FlytePropeller throws the following errors:
• Failed to watch *v1.Pod: failed to list *v1.Pod: pods is forbidden: User "system:serviceaccount:flyte-staging:flytepropeller" cannot list resource "pods" in API group "" at the cluster scope
• Failed to list *v1alpha1.FlyteWorkflow: <http://flyteworkflows.flyte.lyft.com|flyteworkflows.flyte.lyft.com> is forbidden: User "system:serviceaccount:flyte-staging:flytepropeller" cannot list resource "flyteworkflows" in API group "<http://flyte.lyft.com|flyte.lyft.com>" at the cluster scope
It seems that when using a Role and RoleBinding, the flytepropeller service account doesn't have sufficient permissions to list Pods or CRD resources across the cluster.
Once I switched back to using a ClusterRole and ClusterRoleBinding, everything started working again.
I’m wondering if anyone has successfully configured Flyte to run in namespace-scoped mode (without cluster-wide permissions)?gray-barista-66205
09/29/2025, 10:56 AMacceptable-knife-37130
09/30/2025, 4:49 AM