-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support IRSA for SQS Scalar #837
Comments
according to go.sum, we're using aws-sdk-go v1.25.6 which should be fine. The error message is about not being able to find file env:
- name: AWS_ROLE_ARN
value: arn:aws:iam::123456789012:role/eksctl-irptest-addon-iamsa-default-my-serviceaccount-Role1-UCGG6NDYZ3UE
- name: AWS_WEB_IDENTITY_TOKEN_FILE
value: /var/run/secrets/eks.amazonaws.com/serviceaccount/token
volumeMounts:
- mountPath: /var/run/secrets/eks.amazonaws.com/serviceaccount
name: aws-iam-token
readOnly: true
volumes:
- name: aws-iam-token
projected:
defaultMode: 420
sources:
- serviceAccountToken:
audience: sts.amazonaws.com
expirationSeconds: 86400
path: token If you do
do you see those added on the deployment? |
@ahmelsayed Thanks for the quick response.
As you can see the pod does seem to the the right credentials mounted to it.
So I am not really sure what I can do. I would appreciate any help Thanks |
I would really appreciate if anyone can help. Currently we are using a custom auto scalar based on a public GitHub repo. We'd like to get away from that and use KEDA where possible. I originally created this issue as a feature request but it seems like IRSA should already be supported. Can it be changed to a defect? Regards, Nas |
I wonder if it's the same issue as aws/amazon-eks-pod-identity-webhook#8 what do you see if you run
keda container doesn't run as root by default There is a workaround descriped here kubernetes-sigs/external-dns#1185 (comment) but I haven't verified it. |
Hi, I have ran into IRSA problem with Grafana, I am not sure KEDA is similar to it ? grafana/grafana#20473 (comment) The solution is to add securityContext. Could you try to add to KEAD operator ? securityContext:
fsGroup: 1001
runAsGroup: 1001
runAsUser: 1001 |
Can confirm this works with IRSA with the following
|
@ben11211 thanks! Would you mind contributing this info to the Troubleshooting guide? Thanks! |
The one thing that got me using the helm chart was thinking that worked setting the context's here https://github.com/kedacore/charts/blob/master/keda/values.yaml#L76 That sets the context for the containers but the securitycontexts need to go in the section for the pod. I had to fork the helm chart to make that change |
@mzupan keen to send a PR for this? |
Sorry for taking such a long time to get back to this.
Closing this issue |
In my case I was missing "identityOwner: keda" on the TriggerAuthentication object which made it work.
|
A clear and concise description of what you want to happen.
We use EKS as our kubernetes cluster. To allow our pods to authenticate against AWS to access AWS services, we use IAM Roles for Service Accounts (IRSA). We'd like to use the same approach on the KEDA operator so the scalar can get AWS authentication from the operator.
Specification
I suspect this may be because the SQS scalar isn't using the right SDK version
I'd really appreciate some help with this.
Regards
Nas
The text was updated successfully, but these errors were encountered: