-
We are having problem getting Atlantis to be able to run TF commands against the EKS cluster.
Pod is deployed with a serviceAccount
That Service account is wired up for IRSA
The pod has all the env vars I would expect
it works at a basic level
Our Gitlab instance is deployed the same way, and it works. So I dont think its an issue on the aws/auth side Our dockerfile
When i hop into the pod, i can run aws CLI, but generating a token fails
Makes sense, since this chart runs you as a user, which doesnt have a home dir. Im not sure why that is, but its expected. So i tried to run as the atlantis user, and that lets you generate a token
but no matter what, I get. Which i really doubt, since we have already confirmed we have a SA, that has access to AWS s3, and that it exists in the aws-auth configmap.
|
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 2 replies
-
even trying kubectl manually, doesnt work Get token/config
get kubectl
do something
|
Beta Was this translation helpful? Give feedback.
-
I'm not sure that's the case. We can see the iam role is in the config
map, we can see the service account has the iam role and that the pod has
the service account.
Everything else works with that setup.
I will launch an ephemeral container with the same setup so I can isolate this to
the Atlantis container itself.
…On Wed, Jan 25, 2023, 7:02 PM nitrocode ***@***.***> wrote:
If you're getting the same issue with kubectl then it doesn't sound like
an Atlantis issue. This sounds like an issue in the eks auth config map
permissions
—
Reply to this email directly, view it on GitHub
<#257 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABFBNZ5357DPX3FBWT3VGDLWUG5IFANCNFSM6AAAAAAUG2EUTE>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
I want to thank you for being a much better person than I am, because I am an idiot.
|
Beta Was this translation helpful? Give feedback.
@nitrocode
I want to thank you for being a much better person than I am, because I am an idiot.
AWS_ROLE_ARN=arn:aws-us-gov:iam::xxx:role/role-prod-atlantis
~="rolearn": "arn:aws-us-gov:iam::xxx:role/role-atlantis-prod"