-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Missing Policy for the k8s-cluster-autoscaler to read ASG Tags #4465
Missing Policy for the k8s-cluster-autoscaler to read ASG Tags #4465
Conversation
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Welcome @RafaelMoreira1180778! |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: RafaelMoreira1180778 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/area provider/aws Hey, thanks for the PR, can you please follow the instructions to sign the CLA in the first comment? |
/assign @gjtempleton The use of autodiscovery by tags, and the requirement to add the permission for
|
@RafaelMoreira1180778: PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi @RafaelMoreira1180778, have you had a chance to address the feedback on the PR? |
CLA not signed, comments not addressed, closing. Feel free to reopen once fixed. |
When deploying the template for the example for the
auto-discovery
of the ASG on AWS (tweaked to my needs) I noticed this error being thrown:aws_cloud_provider.go:389] Failed to create AWS Manager: cannot autodiscover ASGs: AccessDenied: User: [assumed-role] is not authorized to perform: autoscaling:DescribeTags because no identity-based policy allows the autoscaling:DescribeTags action
After adding the
autoscaling:DescribeTags
alongside all the others present in the README.file the k8s-cluster-autoscaler started being able to discover new ASG correctly.