-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Insufficient permissions when using karpenter irsa without discovery tags #295
Comments
I have come across the same issue today. This is due to the conditional on the runInstances policy. The use case for this is, the EKS cluster and the its worker security group is provisioned by using the public terraform module. In the event that the same worker SG is being used for Karpenter managed instances, the policy linked below prevents it to run instances. |
This issue has been resolved in version 5.5.4 🎉 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
The issue is described in the PR
Versions
Reproduction Code [Required]
Steps to reproduce the behavior:
AWSNodeTemplate
like thiskarpenter.sh/discovery/foo-cluster: foo-cluster
instead refer to them with their ID'sExpected behavior
The node comes up without a problem
Actual behavior
The karpenter controller fails to run the instance, and instead gives me an UnAuthorizedError which it prints in the logs.
The message indicates that I miss the correct privilege to run
ec2:RunInstances
since the security group I try to use is missing theec2:ResourceTag/karpenter.sh/discovery/foo-cluster
.The text was updated successfully, but these errors were encountered: