Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

sns-controller doesn't work with Pod Identity associations #2145

Closed
nicraMarcin opened this issue Aug 28, 2024 · 2 comments
Closed

sns-controller doesn't work with Pod Identity associations #2145

nicraMarcin opened this issue Aug 28, 2024 · 2 comments

Comments

@nicraMarcin
Copy link

Describe the bug
Setting Pod Identity associations in EKS with Amazon EKS Pod Identity Agent v1.3.0-eksbuild.1 doesn't work

2024/08/28 05:28:15 Ignoring, HTTP credential provider invalid endpoint host, "169.254.170.23", only loopback hosts are allowed. <nil>                 
2024-08-28T05:28:15.650Z    ERROR    setup    Unable to create controller manager    {"aws.service": "sns", "error": "unable to determine account ID: unable to get caller identity: NoCredentialProviders: no valid providers in chain. Deprecated.\n\tFor verbose messaging see aws.Config.CredentialsChainV
erboseErrors"}                                                                                                                                         
main.main                                                                                                                                              
    /github.com/aws-controllers-k8s/sns-controller/cmd/controller/main.go:71                                                                           
runtime.main                                                                                                                                           
    /usr/local/go/src/runtime/proc.go:250 

Other controllers like s3, eks works

Steps to reproduce
Add EKS Pod Identity Agent, create association pod's serviceAccount with IAM Role, restart service.
Service gets such variables from agent:

AWS_STS_REGIONAL_ENDPOINTS: regional                                                                                                
AWS_CONTAINER_CREDENTIALS_FULL_URI: http://169.254.170.23/v1/credentials
AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE:  /var/run/secrets/pods.eks.amazonaws.com/serviceaccount/eks-pod-identity-token

Environment

  • Kubernetes version 1.29
  • Using EKS (yes/no), if so version? YES
  • AWS service targeted (S3, RDS, etc.) SNS
@aws-controllers-k8s aws-controllers-k8s deleted a comment Aug 28, 2024
@a-hilaly
Copy link
Member

a-hilaly commented Sep 6, 2024

Hi @nicraMarcin i have played with ACK controllers under PIA before and they worked as expected. Are you still running into this issue? if yes, can provide some manifests we can use to reproduce and provide feedback?

@nicraMarcin
Copy link
Author

Hi,
thank you for your answer and I'm sorry for confusion. I didn't notice that I installed older version 1.0.1.
I've upgraded it to 1.0.13 and works.
Thank you

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants