-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
eksctl create iamserviceaccount with --override-existing-serviceaccounts does not update existing seriviceaccounts #2665
Comments
|
If the SA gets deleted, whether created by |
@kishorj only reason I can think of here is because eksctl relies heavily on existing stacks. If there is a stack or isn't a stack for a resource. So if you do a I've run into similar issue with nodegroup updates. Back in 0.24.0 I was able to use eksctl to update an existing, non eksctl, managed nodegroup. I was able to issue an update on the nodegroup to the next kubernetes version. However if running 0.28.1 it scanned for a matching stack for the managed nodegroup, couldn't find it and refused to upgrade via the API. I think scanning for stacks is helpful but should always fall back to API calls as the source of truth (kubernetes api in the case of the service account or aws api in the case of the managed nodegroup) |
Ultimately, this is due to the fact that |
Duplicate of #1497 |
What happened?
I had an existing k8s serviceaccount object, and when I run the eksctl imserviceaccount with --override-existing-serviceaccounts, I don't see the serviceaccount being updated with the
eks.amazonaws.com/role-arn
annotation.I had to delete the existing role via
eksctl delete iamserviceaccount
first and run theeksctl create iamserviceaccount
again for the serviceaccount object to get updated.What you expected to happen?
When the
-override-existing-serviceaccounts
flag was specified, I expected the k8s serviceaccount to get updated with the annotation.How to reproduce it?
eksctl create iamserviceaccount -cluster=my-cluster --namespace=kube-system --name=my-controller --attach-policy-arn=arn:aws:iam::<account_id>:policy/ALBIngressControllerIAMPolicy --approve
kubectl delete serviceaccount my-controller -n kube-system
--override-existing-serviceaccounts
optionAnything else we need to know?
Versions
Please paste in the output of these commands:
Logs
The text was updated successfully, but these errors were encountered: