-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot load AWS token file when using AWS IAM-backed service accounts #3138
Comments
I can confirm this. Adding the securityContext "fixes" the issue. @geofffranks thanks for pointing to this. |
thanks for reporting @geofffranks -- will take a more detailed look and decide how to proceed. |
Transferring this to the AWS plugin repo. I think for now we probably want to just document this for AWS users using this setup. |
Confirming as of today, 2/12/2020, this issue still exists, and the fix, referenced above by @geofffranks, still works. |
Issue still exists 3/25/2020, fix referenced above still works for resolving the listed error. However, depending on networking configuration, there can be an additional error where velero cannot reach the sts.amazonaws.com endpoint which prevents use of the AWS IAM-backed service accounts. This would be fixed by using a newer version of the aws-sdk though since additional environment variables become available to configure the STS endpoint in v1.25.18. Are there any plans to update the plugin to use a newer version of the aws-sdk? |
Confirmed that this issue still exists. The fix suggested by @geoffranks still works. |
Update: As per @zubron on a different ticket related to this:
Action needed: document the workaround and also the fact that it is addressed on k8s v1.19.0. |
This would probably go under limitations in the AWS Plugin readme. |
This information has been updated on the AWS plugin docs, https://github.com/vmware-tanzu/velero-plugin-for-aws#install-and-start-velero |
What steps did you take and what happened:
We deployed velero v1.2.0-beta1 in an attempt to use AWS IAM backed Service Accounts in EKS, as described in #1965. When velero started, it failed with the following error:
What did you expect to happen:
Velero to start up and work
The output of the following commands will help us better understand what's going on:
kubectl logs deployment/velero -n velero
Anything else you would like to add:
This looks similar to the issue described here: kubernetes-sigs/external-dns#1185, so I applied the fix to our velero deployment yaml, and that resolved the issue. Is this something that can be added to the velero cli's auto-generated deployment yaml?
The text was updated successfully, but these errors were encountered: