-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wrong role is using instead of s3-csi-driver-sa #300
Comments
Hey @touch-dev-null, thanks for reporting the issue. Could you please try updating your trust policy's subject field to specify the full service account name instead of using {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Federated": "arn:aws:iam::XXX:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/YYY"
},
"Action": "sts:AssumeRoleWithWebIdentity",
"Condition": {
"StringEquals": {
"oidc.eks.us-east-1.amazonaws.com/id/YYY:aud": "sts.amazonaws.com",
- "oidc.eks.us-east-1.amazonaws.com/id/YYY:sub": "system:serviceaccount:kube-system:s3-csi-*"
+ "oidc.eks.us-east-1.amazonaws.com/id/YYY:sub": "system:serviceaccount:kube-system:s3-csi-driver-sa"
}
}
}
]
} I think the documentation states that you need to change condition from |
@unexge Now, I uninstalled plugin and tried to install it with helm. Same result. Helm was uninstalled. Now I got your answer, updated role again with full name, install plugin - and now it is working =) Anyway, thank you for response, and yes, it looks like it is good idea to update doc to use full name! Thank you! |
The documentation has been updated to clarify the confusion caused. This issue is now resolved and closed. |
/kind bug
What happened?
Followed by instructions: https://docs.aws.amazon.com/eks/latest/userguide/s3-csi.html
Created:
a) Created policy
b) AWS Role - AmazonEKS_S3_CSI_DriverRole:
c) Installed Add On via AWS Web Console
I am able to see new pods "s3-csi-node-..." and it looks like it is working, but I have an issue during run my test pod:
Most important thing here - "User: arn:aws:sts::XXX:assumed-role/EKSNodeDevRole". Why it try to use this role instead of "AmazonEKS_S3_CSI_DriverRole" ?
Daemonset:
Serviceaccount:
My test pod:
All "tests" currently in one
namespace
-kube-system
Also, I can see in AWS WEB Console "Last activity": - (none) for AmazonEKS_S3_CSI_DriverRole
So, for some reason - this "plugin" is using my Cluster Node role instead of AmazonEKS_S3_CSI_DriverRole.
Any suggestions?
Environment
kubectl version
): 1.30The text was updated successfully, but these errors were encountered: