-
Notifications
You must be signed in to change notification settings - Fork 175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The Service account for Pod identity agent is not getting the required details to work #226
Comments
By the looks of it you don't have the token inject by the Webhook. The |
Hi, I am having the same issues on v1.3.0-eksbuild.1 and kubernetes 1.30 AWS CLI version inside the pod: Same setup as vipan, just trying to get a pod to list s3 buckets within an account. If I remove the pod identity association and instead append the permissions to the node's role, I can successfully list all s3 buckets. So this is definitely an Amazon EKS Pod Identity issue Additionally, here are the error logs from the agent: |
AWS Support just fixed this issue for me. In case you have a similar setup. One thing I did not mention in this thread is that our EKS cluster is only exposed to a Corporate Network and has no direct access to the internet. To go around this, our IT team deployed a proxy inside the Corporate Network which we have to go through everytime we want to make requests to the internet. We have set our nodes to use this proxy via aws launch template user data variable and we append it to /etc/environment. So in order to solve the issue, set the proxy environment variable for the daemonset: kubectl set env ds/eks-pod-identity-agent https_proxy="your://proxy.url" -n kube-system |
What happened:
We are using EKS pod identity agent to grant RDS access for a pod. For testing purpose, we have attached S3 full access to the IAM role and when we run aws s3 ls command from pod it says :
Further on investigation, we found the below error:
The pod is deployed in namespace vipan and the service account is pod-identity. When we describe the sa, it is empty.
We followed this doc https://docs.aws.amazon.com/eks/latest/userguide/pod-id-agent-setup.html to setup the EKS pod identity and ideally, AWS or EKS should add the details in the Service account.
What you expected to happen:
The pod should be able to access the S3.
How to reproduce it (as minimally and precisely as possible):
Setup the EKS pod identity agent following the doc https://docs.aws.amazon.com/eks/latest/userguide/pod-id-agent-setup.html
Installed the add-on + Created an VPC endpoint for eks-auth + Created a role, namespace, service account + Attached that SA to a pod
Anything else we need to know?:
NA
Environment:
aws eks describe-cluster --name <name> --query cluster.platformVersion
): eks.5aws eks describe-cluster --name <name> --query cluster.version
): 1.29The text was updated successfully, but these errors were encountered: