-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Specifying iam_path, causes node access issues in aws-auth config map. #1595
Comments
looks that this is in Lines 47 to 49 in 5ce72fa
and there is comment about kubernetes-sigs/aws-iam-authenticator#153 I dont know does this is still related or not. We will need to investigate this deeper |
@daroga0002 Please use labels to reflect the status. Someone else from the community may be able to help if they see it. For e.g., |
@leanrobot can you test if #1524 fixes also your issue? I think it's the same. |
This issue has been automatically marked as stale because it has been open 30 days |
This issue was automatically closed because of stale in 10 days |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
Setting up an EKS cluster at my company. I noticed that if I specify the
iam_path
input variable for theeks
module, the first apply succeeds, but a subsequent apply will cause the node's IAM role mapping to be removed from the config-map, and replaced with one that does not include the proper IAM path in the ARN.This causes the node's group health to become
degraded
in the EKS console.By removing
iam_path
from the input parameters, the module behaves as expected for first and all subsequent applies.Versions
terraform-aws-modules/eks/aws 17.20.0
Reproduction
Steps to reproduce the behavior:
Workspace:
default
Cleared Cache: yes
map_roles
to be constantly updated, the entry for the worker node.Code Snippet to Reproduce
Expected behavior
I expected that the correct iam role -> cluster role mapping would be set up to allow the control plane and node group to communicate.
Actual behavior
Nodes would enter a degraded state unless I did either of the following:
iam_path
input to the modulemap_roles
input.Terminal Output Screenshot(s)
The text was updated successfully, but these errors were encountered: