-
Notifications
You must be signed in to change notification settings - Fork 129
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for non-implicit AddTags in Create* API calls #200
Comments
When a solution will be merged,is it going to be applied to older versions of eks-blueprints? |
No, this is the new home of EKS Blueprint addons and changes will be made here (if required) |
Hello @bryantbiggs If I understand, now we need to use aws-ia/eks-blueprints-addons/aws instead of aws-ia/terraform-aws-eks-blueprints//modules. So any idea on when we fix this issue ? The fix is to remove l160 :
|
@gmercadal or @bryantbiggs How do you add the IAM policy as a workaround in the meantime while PR 229 gets released? The would be adding the following or linked IAM profile into the {
"Effect": "Allow",
"Action": [
"elasticloadbalancing:AddTags"
],
"Resource": [
"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*",
"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*",
"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*"
],
"Condition": {
"StringEquals": {
"elasticloadbalancing:CreateAction": [
"CreateTargetGroup",
"CreateLoadBalancer"
]
},
"Null": {
"aws:RequestTag/elbv2.k8s.aws/cluster": "false"
}
}
} into the aws_load_balancer_controller_helm_config = {
...
} Alternatively, is it possible to use |
PR #229 was released under v1.6.0 |
@cdesch We did not have it yet, but I see that the issue has been fixed in v1.6.0 as per @bryantbiggs comment. We're going to bump it. |
Please describe your question here
We've been receiving notifications from AWS due to a policy change where the
AddTags
permission is no longer implicit forCreate*
API calls. We've reviewed the latest v4 IAM policy for the AWS load balancer controller and apparently it is missing some permissions in order to avoid those notifications. After August these calls will start failing.Checking the latest IAM policy it apparently adds a new statement to cover that change:
Do you plan to update the policy accordingly and create a new version?
Provide a link to the example/module related to the question
https://github.com/aws-ia/terraform-aws-eks-blueprints/blob/v4/modules/kubernetes-addons/aws-load-balancer-controller/data.tf
Additional context
The text was updated successfully, but these errors were encountered: