-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kops doesn't respect AWS_PROFILE when using ROLE_ARN #7753
Comments
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale Still an issue. |
The problem here is that support for I needed this feature in 1.11 and have backported a patch (https://gist.github.com/mattclegg/af6e71c4934d91772ab8b6a72ac225a1). It should be straight forward to also do for 1.10 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Same issue here |
I also see this using KOPS 1.18. /reopen |
same issue with Kops 1.18 |
try to setup environment varieble AWS_SDK_LOAD_CONFIG |
This worked for me and I am on Kops 1.14. If anyone is using arn roles to assume into the profile please use this and give it a go. |
1. What
kops
version are you running? The commandkops version
, will displaythis information.
Version 1.10.0 (git-8b52ea6d1)
2. What Kubernetes version are you running?
kubectl version
will print theversion if a cluster is running or provide the Kubernetes version specified as
a
kops
flag.Irrelevant.
3. What cloud provider are you using?
AWS
4. What commands did you run? What is the simplest way to reproduce this issue?
Given an ec2 instance in account-A with an instance profile role with permissions to assume an admin role in account-B, we setup
~/.aws/credentials
such thatWe then create an S3 bucket in account-b called
my-kops-state
, henceforth referenced as$KOPS_STATE_STORE
Then, set the appropriate AWS ENV variables:
At this point, using the AWS CLI, we can verify S3 bucket connectivity.
However, running even the simplest
kops
command will fail due to s3 access issues.5. What happened after the commands executed?
Kops fails to access the s3 bucket, meaning it's clearly using the wrong credentials.
6. What did you expect to happen?
Kops should use the same credentials as the AWS CLI, set via the
AWS_PROFILE
environment variable, and thus be able to access the state bucket.7. Please provide your cluster manifest. Execute
kops get --name my.example.com -o yaml
to display your cluster manifest.You may want to remove your cluster name and other sensitive information.
N/A
8. Please run the commands with most verbose logging by adding the
-v 10
flag.Paste the logs into this report, or in a gist and provide the gist link here.
9. Anything else do we need to know?
All other tools using the AWS SDK (including Go) are working just fine with this setup. The role we are assuming has full admin privileges to the account owning the bucket.
The text was updated successfully, but these errors were encountered: