-
Notifications
You must be signed in to change notification settings - Fork 175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Incompatible with grpc health probes #165
Comments
I have also just encountered this issue, and was wondering if there is a fix or a work around available yet? |
Just to add to this, when checking the audit log, you can see the webhook patch contents, which has stripped the
|
Again, I have pulled down the code and added a test for GRPC and can replicate this on version v0.3.0, but it seems to be working with v0.4.0. Is there an easy way to verify what version is running with EKS? And is there a way to update this?
|
The |
Yeah I'm aware, as I asked above I was hoping there might be a work around or a different fix. As it currently stands EKS 1.24 has GRPC health checks broken which is a major issue. |
@lareeth Do you mind filing it here - https://github.com/aws/containers-roadmap/issues (if you haven't already raised it with EKS folks, do you have a ticket?) |
@lareeth A workaround I tested is to install the webhook manually into the cluster. This will create a pod-identity-webhook pod running in the dataplane - outside of EKS management so you will be responsible for monitoring it. This is of course not ideal but should unblock you from carrying out further testing. Once the new version of the webhook is released onto EKS, you can revert back to using the EKS managed pod-identity-webhook. |
I'll raise a ticket there and see what they say.
I'll give this a try, we are using Flux so it should be easy to revert once it's fixed. Thanks for the suggestion |
Another workaround - which is a bit more radical than the one proposed above - is to instead of using the EKS Pod Identity ( |
same issue still in EKS v1.27.1-eks-2f008fe |
@soasurs please open a service ticket and ask them to investigate |
What happened:
gRPC probes were introduced in Kubernetes 1.24, adding a new field
grpc
toProbe
(used inreadinessProbe
andlivenessProbe
). The pod identity webhook seems to be incompatible with this. Pods with a service account with theeks.amazonaws.com/role-arn
annotation can't be created:What you expected to happen:
gRPC probes working, and the pod identity webhook working
How to reproduce it (as minimally and precisely as possible):
Observe that this example pod can be deployed and works as expected:
Create a Kubernetes service account
my-sa
with theeks.amazonaws.com/role-arn
annotation set, and try to use it in a new pod:This error message is returned:
Anything else we need to know?:
Environment:
The text was updated successfully, but these errors were encountered: