-
Notifications
You must be signed in to change notification settings - Fork 129
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
External Secrets not working on Fargate #55
Comments
This issue has been automatically marked as stale because it has been open 30 days |
the EKS module provides this access by default which should resolve this issue under v5 now https://github.com/terraform-aws-modules/terraform-aws-eks/blob/df1b62548c1d8c7117f4ab45c5b494de64b34cb8/node_groups.tf#L165-L172 |
sorry - mis-read, looks like we need to set addon to use this port. |
Correct PR link is external-secrets/external-secrets#1981 |
Got this issue, still lost 1-2hours trying to find the solution until I found this, confirmed as working in my end aswell (I changed the port for my system in helm values) |
latest workaround on fargate deployment for me is enable_external_secrets = true
# ISSUES: https://github.com/aws-ia/terraform-aws-eks-blueprints-addons/issues/55
external_secrets = {
values = [
yamlencode({ "webhook" : { "port" = "9443" } })
]
} |
Description
When using the external-secrets addon and the addon runs on Fargate pods, the validation webhook deployment pod doesn't work, the api-server can't connect with errors
The root cause is that the helm chart for external-secrets uses the port
10250
and when the pod runs in fargate it conflict with kubelet port10250
We should update
Versions
Module version [Required]: latest released
Terraform version: latest
Provider version(s): latest
Reproduction Code [Required]
Steps to reproduce the behavior:
Expected behaviour
external-dns to be ok
Actual behaviour
error
Terminal Output Screenshot(s)
erros on api-server:
Additional context
An issue was opened to see if the helm chart default value port could be change for new releases
https://github.com/external-secrets/external-secrets/issues/19815
Workaround for now to set the port to
9443
and make sure security group rules allows access from control plane to nodes on this port.We should default to port 9443 for the external-dns module.
This was found during customer POC
The text was updated successfully, but these errors were encountered: