-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IAM role assumption doesn't seem to work in v0.5.1 #575
Comments
I'm confused by your roles: both the node (kiam) and the option to External DNS have the same role name "qbernetes-staging-external-dns". Having the Maybe you don't even need |
I had added
So kiam is definitely working for |
Oh wow, I think I found the issue: aws cli debug output:
after adding debug logging and cert chain logging to external-dns and rebuilding container:
On a
boto is calling the metadata API in some way that has a slash at the end, so it gets I think this is ultimately a kiam issue, in that case... |
@Eronarn maybe it's the same (or related) as jtblin/kube2iam#130 ? |
Yep, looks like there is a corresponding issue here that I didn't see because it's been closed: uswitch/kiam#43 Thanks for your patience! Closing. |
mtail just recently became a larger Go based plugin, so change. Signed-off-by: Ahmet Alp Balkan <[email protected]>
Role assumption was addressed by this PR: https://github.com/kubernetes-incubator/external-dns/pull/524/files
Which is stated as released as of v0.5.0 in the release notes. However, it isn't working for me in v0.5.1 with the suggested configuration. I get these logs out of the pod:
This is the relevant part of the Deployment:
To check that kiam itself is working, I hop inside the pod with:
$ kubectl exec -it external-dns-6f9dc578c6-pg2h2 -- /bin/sh
I confirm that I have access to assume the role with:
To confirm that role works as expected, I install the AWS CLI inside the container:
$ apk -Uuv add groff less python py-pip && pip install awscli
Then I run this:
I can see that boto is using the role, and the commands are working. Yet the external DNS pod is still reporting
NoCredentialProviders
with this role, even when it's set to*
like so:Curious if there is something obvious I've missed, or if there is some bug in how external-dns is trying to assume/use roles.
The text was updated successfully, but these errors were encountered: