-
Notifications
You must be signed in to change notification settings - Fork 174
Issues: aws/amazon-eks-pod-identity-webhook
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Injection of region environment variables appears to ignore
envFrom.configMapRef
#248
opened Dec 6, 2024 by
badgerspoke
Cannot use wildcard (*) namespace in kops when using IRSA
#237
opened Aug 21, 2024 by
SohamChakraborty
The Service account for Pod identity agent is not getting the required details to work
#226
opened Apr 19, 2024 by
vipan06
Get error during creation of pod with service-account that has eks.amazonaws.com/role-arn annotation
#225
opened Apr 18, 2024 by
cynepco3hahue
k8s.io/client-go/informers/factory.go:159: failed to list *v1.ServiceAccount: Unauthorized
#212
opened Feb 23, 2024 by
mthak
Webhook stops injecting Env Vars or Volumes/VolumeMounts on previously working deployment
#194
opened Sep 29, 2023 by
maximethebault
Allow for wildcard of the namespace in the IAM condition for namespaces with a pattern
#193
opened Sep 28, 2023 by
RaJiska
Inject AWS_REGION/AWS_DEFAULT_REGION even if pod doesn't have serviceAccount
#192
opened Sep 18, 2023 by
mbonica1990
Customizable Reinvocation Policy for the Amazon EKS Pod Identity Webhook during Cluster Creation
#187
opened Jun 1, 2023 by
sparsh-95
Webhook not injecting Env Vars or Volumes/VolumeMounts on initial deployment to a new cluster
#174
opened Feb 7, 2023 by
ahuffman
Different ARN role usage in the EKS POD (which has service account defined with another ARN role)
#154
opened May 27, 2022 by
malligit
Ability to extract namespace and/or service account name to use as variable in policy
#152
opened May 2, 2022 by
yarozen
Previous Next
ProTip!
Exclude everything labeled
bug
with -label:bug.