-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
elasticloadbalancing:DescribeLoadBalancerAttributes missing in IAM policy #632
Comments
@spr-mweber3 Can you share the ingress resources that triggers a CF stack where this happens? I can't find we set this permission anywhere in our production system and we didn't see this problem you describe. I wonder if you use some of the more special annotations from the controller? |
There is nothing special in regards to annotations on that ingresses. In fact, we're applying the same ingresses with the same annotations in new clusters. We're using the same v0.14.24 of the controller everywhere. The additional permission doesn't seem to be needed for already deployed load balancers. We have a lot of them managed by the controller and don't see any issue but if you try to create a new one, you'll be able to see that something changed. Even more, somehow the naming schema of the created load balancers changed. Earlier, the load balancers were named I tried to figure out what changed, but didn't succeed. To me it looks like it's something at AWS on their API, which maybe causes different behavior inside the controller as a consequence. |
What? |
Yep, it's true. I'm not kidding. It's the same image. We're using I mean, did you try it yourself as well? I'm not aware of any changes on our side which would be able to cause that. We're provisioning and deprovision identical setups and it just started recently that we monitor the issues described here. Can that be somehow related to changes at AWS to support SGs on NLBs? Or changes in the API at CloudFormation? Because in fact it's not the controller itself who creates the resources, it's the CloudFormation stack which now seems to do stuff differently than before. |
@spr-mweber3 can you share the ingress you use, then we can try with the same (ofc. hide your internal details like hostnames and so). |
Sure thing. apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
annotations:
zalando.org/aws-load-balancer-shared: "false"
name: a-name
namespace: default
spec:
rules:
- host: a-name.foo.bar
http:
paths:
- backend:
service:
name: a-service
port:
number: 8080
path: /
pathType: Prefix |
Ok, that is very basic |
@spr-mweber3 If you diff the CF stack of a "good" cluster and the "bad" cluster, do they differ? I tried it with our controller and version v0.14.30 and everything works fine without the permission. |
Hey,
referring to the documented pre-requirements regarding the IAM policy. It seems there was a change somewhen somewhere. I was not able to find out where exactly. Matter of fact is, we didn't do any update to the controller recently. So I think that can be ruled out.
It now seems to be required that in the policy for the controller
elasticloadbalancing:DescribeLoadBalancerAttributes
permission is required.Otherwise the controller will not be able to succeed anymore with provisioning the resources through CloudFormation.
The text was updated successfully, but these errors were encountered: