-
Notifications
You must be signed in to change notification settings - Fork 320
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EKS] [bug]: EKS Auto-Mode NodePools NotReady with Custom Path Node IAM Role #2486
Comments
This was very frustrating to debug. The error in the node-class was "Role (my roles) is unauthorized to join nodes to the cluster" so I was looking in cloud-trail for failures related to the role. Having access to logs for the managed controls would have been a great help, here. |
Does your EKS cluster role have a path? That's what's documented in this issue. |
Also adding that the EKS cluster role also has this same issue. If either the Node or Cluster IAM role has a path on creation, then nodepools fail to move out of NotReady status. Did a replication for this in my sandbox environment. |
In the NodeClasses configuration, you must enter the role name and not the arn, as noted in the documentation. Then it works fine |
Thanks for reporting this. We're actively working on this. Based on what we know so far, there are a bunch of different things in play here:
|
@saurav-agarwalla is this viable to triage as accepted? |
Community Note
Tell us about your request
This is to report a bug related to NodePool creation for custom path Node IAM roles.
Which service(s) is this request for?
EKS, more specifically EKS Auto-Mode related to NodePools
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
The backend SDK utilized in conjunction with EKS Auto-Mode encounters an issue when handling NodePools that remain in a NotReady status due to custom path node IAM roles. This problem arises during the creation process of these NodePools. The SDK employs the "DescribeAccessEntry" API to verify the mapping of the Node IAM role to an Access Entry. However, a limitation exists in the SDK's implementation of this API call. While the SDK includes the IAM role name in the request parameters, it fails to account for any custom paths associated with the role. Consequently, when dealing with Node IAM roles that have custom paths, the API responds with AccessDenied errors. These errors prevent the NodePools from progressing beyond the NotReady status, effectively hindering their proper initialization and functionality within the EKS Auto-Mode environment.
The expected behavior should be for the backend SDK to account for both custom and non-custom path based node IAM roles.
The observed behavior is the following:
Are you currently working around this issue?
Using IAM roles without custom paths fixes this issue. However, for organizations that require path based IAM roles, this can cause limitations.
Additional context
EKS cluster version: 1.31
Attachments
If you think you might have additional information that you'd like to include via an attachment, please do - we'll take a look. (Remember to remove any personally-identifiable information.)
The text was updated successfully, but these errors were encountered: