-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
LB controller spontaneously loses permission to add tags #3383
Comments
pretty sure we ran into this today , still reviewing no changes to cluster/perms/etc, suddently ingress creation fails for perms. last worked like a week ago somewhat assume aws side changes |
We also ran into this yesterday, I assume it is related to this issue #2692 Is that condition block blocking the controller from adding the tags that the condition requires? |
Same issue here with an (albeit EOL) cluster v1.22. No changes whatsoever to infra, won't work anymore unless replacing the condition block as shown in #2692 . |
We're hitting this on 2.4.4 on EKS 1.21 since September 8th, 19:00:00 UTC-0. EDIT: we're hitting this in some 1.21 clusters, not all of them. |
Ran into this using eks module |
Hi @cpetestewart, @elebiodaslingshot, @LCaparelli, @MichielVanDerWinden-inQdo, @KlausVii, @mnort, thanks for reaching out. This issue is related to a recent change in the AWS ELB api call - from 8/30/2023, the 'Create*' API call will fail and return an error if there's no access to We have updated our IAM template to address this issue since v2.4.7. Can you please check that your iam policy is updated with this block: https://github.com/kubernetes-sigs/aws-load-balancer-controller/blob/main/docs/install/iam_policy.json#L202. |
For context - This change is made in ELB [1] https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html |
This comment points to the solution and the doc was updated here I guess we just need to keep looking very close to the doc for changes/releases frequently 😸 I added that statement to the controller policy and that fixed the issue for me. |
This issue also appears when the AWS resources the controller is trying to reconcile no longer exist. It's a confusing error because it sends you on an IAM policy goose chase in this case. |
We have 0 infra changes and bumped into this issue 2 days ago. Our services were impacted with this unexpected changes.
@oliviassss Do you have a reference link for above ^^^ that I can explain the changes to my team? Thank you. To add more data point here, we've deployed on 09/06/2023 without any issues. It doesn't make sense to me if the API changes from 8/30/2023. |
@imZack, since AWS load balancer controller calls |
@oliviassss thank you for your response. Please help to escalate the concern to the ELB team. You can imagine the services without the Load Balancers running leads to lots of problems. |
Hello @imZack, I am L. Felipe from the Elastic Load Balancing team. As mentioned previously in this thread, this change is expected, and the final part of it occurred during the time period mentioned (September 7 - 12, 2023). This update requires explicit permissions for ELB APIs that include the ability to create tags when creating resources, e.g., tag-on-create APIs. This affects all APIs that can create or manipulate tags; |
Thank you @luisfelipess for the further explanation. We do appreciate the effort that you and your team on the security aspect. I suggest AWS can well-documented these changes somewhere instead of only notifying potentially affected users on the PHD since there are tons of guides, blogs, and notes referring to the wrong usage. |
@oliviassss The new changes work great, thanks. @luisfelipess Thanks for the info. Please be advised that my company has 6 accounts that this change affected and not one got notified of the change. |
Hey @luisfelipess, Thanks for chiming in on this. However, as @cpetestewart mentioned, I also have 20+ AWS accounts that didn't get any notification whatsoever about the mentioned change. I'm happy to get in touch with the support team and provide some account IDs and usage patterns, as it seems that the approach you're using to identify impacted customers is not entirely accurate. |
Hello, I have a 3 EKS clusters running k8s Upon reviewing the IAM policy attached to the role the Load Balancer controller is assuming, it does not have the statement @andresvia posted a link to a few posts up. Ideally I don't manually add the policy statement as all our env's are automated and will overwrite drift. Should the app version 2.6.1 AWS Load Balancer include this fix? |
@kevinchiu-mlse, hi, we have the updated IAM policy template since v2.4.7. However, when you upgrade the AWS LBC version, the IAM policy does not update automatically, since it's not a managed policy, and we rely on users to update it. Please see the release note: https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/tag/v2.4.7 |
thanks @oliviassss . I see in the EKS Blueprints Addons 5.0 the policy is updated in and managed in the load balancer controller module, however on clusters still running 4.32.1 or older, the policy is outdated. Worst case is I can attach a custom policy to the LBC role. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Describe the bug
Recently, out of the blue, we started getting an error from the load balancer controller in our EKS clusters across several accounts. The specific error was that it did not have permission elasticloadbalancing:AddTags. Nothing had changed on our side. We did not upgrade the controller nor change the IAM role.
We traced the error to this clause in the IAM permissions:
The only thing that fixed this was removing the "Condition" clause. Then the controller operated as normally.
This may not be an issue with the LB controller, but before I go to AWS support with this, anyone have any clue as to what is causing this? Note that this is exactly what is currently in the LB controller repo. We have not changed this ever since it was first installed.
Steps to reproduce
We're not sure. As indicated above, this started happening out of the blue.
Expected outcome
I expect that if I make zero changes to the cluster, the controller deployment, and the IAM role that everything will continue to function as before.
Environment
Additional Context:
The text was updated successfully, but these errors were encountered: