-
Notifications
You must be signed in to change notification settings - Fork 423
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue upgrading from v0.4.0 to v0.5.0 #288
Comments
/assign @wongma7 |
@chinthakagodawita I think what you want is However, either way you should not be getting |
@wongma7 That might be it. I should be able to give it another test in the next week or two, will update you once I know more. |
I'm working on upgrading Kops' integration with aws-iam-authenticator and am running into a similar issue. the new
My cluster does not have an EKS ConfigMap or any Logs without
and then no further logs from any of the failed authn requests. Logs with
Is this expected? I know this project is pre 1.0 release so breaking changes can be expected, but
I'm happy to open a PR if we can agree on the expected behavior and flag description. |
I can confirm @rifelpet's findings. Looks like that When I run If however, I run with just
|
I've opened a PR to fix this, please take a look at https://github.com/kubernetes-sigs/aws-iam-authenticator/pull/303/files#diff-04c6e90faac2675aa89e2176d2eec7d8R85 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Hi,
We're running a kops cluster with a manually installed version of
v0.4.0
which has been working with no issues.We're attempting an upgrade on to
v0.5.0
(specificallyv0.5.0-alpine-3.7
) with the following server arguments:I added
backend-mode
flag so that it uses our existing configmap, prior to adding this the daemonset did not log anything pastwaiting for informer caches to sync
(logs below).Post-upgrade, all
kubectl
commands fail with:error: You must be logged in to the server (Unauthorized)
.Token verification appears to work, i.e. running:
aws-iam-authenticator token -i CLUSTER
aws-iam-authenticator verifiy -i CLUSTER -t TOKEN
The daemonset's logs have the below, with the final log line repeating:
Are we missing an upgrade step? I've tried regenerating the certs that kops uses and rolling the masters but nothing seems to help.
The text was updated successfully, but these errors were encountered: