You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 26, 2022. It is now read-only.
Currently, the kubernetes-external-secrets pod is not able to assume the role and is using the node assigned role instead, although the aws-sdk version in nodejs supports the new feature.
The text was updated successfully, but these errors were encountered:
@Flydiverny I have now checked all of the related issues.
Everything seems to be configured properly on my side, but I am experiending the same issue as url
Somehow I managed to link to the wrong issue was meant to refer to #161
I haven't tested this myself but my understanding is that if kiam or something else provides credentials to the pod, these are used before the IRSA credentials.
Please verify that you are not using other means of providing AWS credentials to the pod that have higher priority than TokenFileWebIdentityCredentials which should be what is used for IRSA
The new feature which supports assigning IAM roles directly to pods was recently released:
https://aws.amazon.com/blogs/opensource/introducing-fine-grained-iam-roles-service-accounts/
Currently, the kubernetes-external-secrets pod is not able to assume the role and is using the node assigned role instead, although the aws-sdk version in nodejs supports the new feature.
The text was updated successfully, but these errors were encountered: