-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
no identity-based policy allows the elasticloadbalancing:AddTags #3044
Comments
We just faced the exact same issue today, also on v2.4.4. By removing this condition, the problem seems to be resolved: https://github.com/kubernetes-sigs/aws-load-balancer-controller/blob/v2.4.4/docs/install/iam_policy.json#L160-L165 |
I am running into this issue using AWS CDK to deploy an EKS stack with
|
duplicate of #2692? |
it's a duplicate of #2692, which is caused by a IAM change in ELB for tag resource on creation. ELB team have already rollback their change. We'll sync with ELB team to update the IAM permission needed and update our default IAM policy. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
For anyone who has encountered the same issue, we have found a solution in CDK. Here is the solution, The key to solving the problem is to explicitly declare the policy of the ALB controller and assign it when creating the cluster. |
/remove-lifecycle rotten I am facing this issue with aws-load-balancer-controller helm chart 1.4.8 v2.4.7 provisioned using v4.32.1 of https://github.com/aws-ia/terraform-aws-eks-blueprints Ingress nginx failed to provision NLB because of this issue. |
This is fixed with this PR - #3046 |
/close |
@johngmyers: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Description
The current IAM policy published in the AWS Doc and AWS Load Balancer Controller GitHub page has incompatible definitions in it. This causes AWS Load Balancer Controller failing in provisioining an ELB due to some Addtag errors. Seems identical to this previous GitHub issue.
Versions
Module Version [Required]:
AWS Load Balancer controller 2.4.4 (also tested with 2.4.4)
EKS v1.24
Reproduction Code [Required]
Expected behaviour
For AWS Load Balancer Controller to provision an NLB.
Actual behaviour
No NLBs are provisioned. And AWS Load Balancer Controller generates the following error.
{"level":"error","ts":1676040723.3378003,"logger":"controller.service","msg":"Reconciler error","name":"frontendnlb","namespace":"workshop","error":"AccessDenied: User: arn:aws:sts::xxxxxxxxxxxx:assumed-role/eksctl-mycluster-addon-iamserviceaccount-kub-Role1-ALZQNS3HQWFQ/1676040699752964147 is not authorized to perform: elasticloadbalancing:AddTags on resource: arn:aws:elasticloadbalancing:eu-west-2:578334270511:targetgroup/k8s-workshop-frontend-8a6a890206/* because no identity-based policy allows the elasticloadbalancing:AddTags action\n\tstatus code: 403, request id: 4ee09784-239c-4afb-94f1-958b50134d8c"}
The text was updated successfully, but these errors were encountered: