-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CrashLoopBackOff due to EC2MetadataError #573
Comments
@janavenkat what is the security impact by having the hop limit to 2? |
@szuecs thank you for the response.
I didn't provisioned cluster by using Kubernetes on top of AWS. |
We having the exact same issue, but on only one cluster out of 80+, not sure why. Debug logs:
We using an explicit IAM role though, so not sure why it needs to connect to ec2 instance metadata....doesnt it only need to do that when using the worker node IAM role, in cases where you ARENT using an explicit, controller-only role via OIDC? |
@jbilliau-rcd we use the metadata to auto-detect the vpcId and clusterId, call stack: kube-ingress-aws-controller/aws/adapter.go Line 243 in 1718cd1
kube-ingress-aws-controller/controller.go Line 300 in 1718cd1
kube-ingress-aws-controller/controller.go Line 284 in 1718cd1
kube-ingress-aws-controller/controller.go Line 96 in 1718cd1
you can pass these flags to omit auto detection: kube-ingress-aws-controller/controller.go Lines 149 to 151 in 1718cd1
|
@jbilliau-rcd did this happen again to you? You showed a connection reset by peer, which likely means some AWS internal issue happened at the time.
|
Hmmm nope, mustve been transient, we run this controller on 170 clusters and all seem healthy. |
Most likely we can not do anything here |
Related issue #455
For security reasons I changed the EC2 instance metadata hop limit from 2 to 1, this causing ingress controller crashes because of getting access denied from aws instance metadata endpoint.
By reading the repo document
Am using EKS cluster and ingress controller setup with IAM role for service account. Is there any way to disable the ingress controller not to request the EC2 instance metadata?
The text was updated successfully, but these errors were encountered: