-
Notifications
You must be signed in to change notification settings - Fork 806
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
default kmsKeyID is not used when value is null #1267
Comments
@amilanoski This is actually abnormal behavior. From the AWS API doc "If this parameter is not specified, your KMS key for Amazon EBS is used". I just tested this on my end and confirmed that the CSI driver indeed uses the default CMK kms key when set in the AWS console. From previous project maintainers: #80 As a first step, I would ensure you are creating the CMK in the right region. |
Thanks for confirming @torredil and updating the docs. I have tested some different paths with default EBS CMK configured in the console. option 1 - values.yaml - encryption:true
option 2 - values.yaml - no encryption set
option 3 - values.yaml - encryption set + kmskeyid
Results:
Do you think docs should be updated, so that users who have a custom default EBS CMK set to not set parameters.encrypted or parameters.kmsKeyId ? |
@amilanoski could you provide a full test case for scenario 1? When testing, I get scenario 2's behavior (using the default EBS key) when specifying |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/close I am still not able to reproduce the above issue. If anyone is able to reproduce the issue explained in scenario 1, please reach out with more information. |
@ConnorJC3: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/kind bug
What happened?
default kmskeyid is not used even though CMK is set in EC2 Dashboard >EBS Encryption
What you expected to happen?
For aws-csi-driver to use the default CMK kms key when set in the aws console.
How to reproduce it (as minimally and precisely as possible)?
values.yaml
Anything else we need to know?:
kms key is set to the aws generated kms key rather then the CMK we have created.
only work around is to set the kmskeyid to the arn we require. Either the docs need to be updated or there is a bug. I am not sure. Hoping for some guidance and answers. Thanks in advance.
Environment
kubectl version
):The text was updated successfully, but these errors were encountered: