You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/concepts/work-distribution/manifestwork.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -345,7 +345,7 @@ following permission for the managed cluster:
345
345
permission, this is why we can grant work-agent service account extra permissions using ManifestWork
346
346
347
347
So if the workload manifests to be applied on the managed cluster exceeds the above permission, for example some
348
-
Customer Resource instances, there will be an error `... is forbidden: User "system:serviceaccount:open-cluster-management-agent:klusterlet-work-sa" cannot get resource ...`
348
+
Custom Resource instances, there will be an error `... is forbidden: User "system:serviceaccount:open-cluster-management-agent:klusterlet-work-sa" cannot get resource ...`
349
349
reflected on the ManifestWork status.
350
350
351
351
To prevent this, the service account `klusterlet-work-sa` used by the work-agent needs to be given the corresponding
@@ -604,7 +604,7 @@ spec:
604
604
Work-agent uses the SubjectAccessReview API to check whether an executor has permission to the manifest resources, which
605
605
will cause a large number of SAR requests to the managed cluster API-server, so we provided a new feature gate
606
606
`ExecutorValidatingCaches`(in release `0.10.0`) to cache the result of the executor's permission to the manifest
607
-
resource, it is only works when the managed cluster uses
607
+
resource, it only works when the managed cluster uses
0 commit comments