Hello macmiranda,
Thank you for looking into my issue.
I have check the ClusterRoleBinding and it exists:
k describe clusterrolebindings.rbac.authorization.k8s.io vault-injector-server-binding
Name: vault-injector-server-binding
Labels: app.kubernetes.io/instance=vault-injector
app.kubernetes.io/managed-by=Helm
app.kubernetes.io/name=vault
helm.sh/chart=vault-0.24.1
Annotations: meta.helm.sh/release-name: vault-injector
meta.helm.sh/release-namespace: vault
Role:
Kind: ClusterRole
Name: system:auth-delegator
Subjects:
Kind Name Namespace
---- ---- ---------
ServiceAccount vault-injector vault
As for the short-lives token solution, it is not working on my side with the following error:
vault write auth/kubernetes/config kubernetes_host="$KUBE_HOST"
Error writing data to auth/kubernetes/config: Error making API request.
URL: PUT https://vault.REDACTED.net:8200/v1/auth/kubernetes/config
Code: 400. Errors:
* open /var/run/secrets/kubernetes.io/serviceaccount/ca.crt: no such file or directory