Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deprecate pod discovery #25

Open
mikkeloscar opened this issue Jun 18, 2019 · 1 comment
Open

Deprecate pod discovery #25

mikkeloscar opened this issue Jun 18, 2019 · 1 comment

Comments

@mikkeloscar
Copy link
Contributor

Deprecate and later remove the feature of automatically discovering IAM roles by looking at pod with a secret mount named aws-iam-*

The feature is very limited and has been replaced by #13

@Deepak1100
Copy link

How can we stop this pod discovery?
as this causing lots of errors in iam-controller pods

Failed to get credentials for role authenticator-token-zrxnp: AccessDenied: User: arn:aws:sts::xxxx:assumed-role/nodes.xxxx/xxxx is not authorized to perform: sts:AssumeRole on resource: arn:aws:iam::xxx:role/authenticator-token-zrxnp\n\tstatus code: 403

we don't have any such role neither awsIamRole CR
but we do have aws-iam-authenticator pod and it has secret with aws-iam-authenticator used by same pod

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants