I managed to get access to the cluster using the clusters creator credentials.
And yes, the configmap is empty, I’m seeing many authenticator errors from the iam-eks-user-mapper.
[ERRO] 2023/08/23 10:17 InvalidClientTokenId: The security token included in the request is invalid.
status code: 403, request id: 57167a8b-0675-468e-9b54-33e4e6416be4
[INFO] 2023/08/23 10:17 successfully updated user roles
[INFO] 2023/08/23 10:17 &ConfigMap{ObjectMeta:k8s_io_apimachinery_pkg_apis_meta_v1.ObjectMeta{Name:aws-auth,GenerateName:,Namespace:kube-system,SelfLink:,UID:7f10ff8b-e7ee-43eb-9e26-e6f523986926,ResourceVersion:171046175,Generation:0,CreationTimestamp:2022-06-20 00:13:58 +0000 UTC,DeletionTimestamp:<nil>,DeletionGracePeriodSeconds:nil,Labels:map[string]string{},Annotations:map[string]string{},OwnerReferences:[],Finalizers:[],ClusterName:,Initializers:nil,ManagedFields:[{vpcLambda Update v1 2022-06-20 00:13:58 +0000 UTC nil} {kubectl-edit Update v1 2022-07-12 10:21:26 +0000 UTC nil} {app Update v1 2023-08-14 16:27:38 +0000 UTC nil}],},Data:map[string]string{mapRoles: - groups:
- system:bootstrappers
- system:nodes
rolearn: arn:aws:iam::594084547872:role/qovery-eks-workers-z16cd1bde
username: system:node:{{EC2PrivateDNSName}}
,mapUsers: []
,},BinaryData:map[string][]byte{},}
[ERRO] 2023/08/23 10:17 InvalidClientTokenId: The security token included in the request is invalid.
status code: 403, request id: 47b53392-9612-40b7-b958-9cdb7dd8982f
[INFO] 2023/08/23 10:17 successfully updated user roles
[INFO] 2023/08/23 10:17 &ConfigMap{ObjectMeta:k8s_io_apimachinery_pkg_apis_meta_v1.ObjectMeta{Name:aws-auth,GenerateName:,Namespace:kube-system,SelfLink:,UID:7f10ff8b-e7ee-43eb-9e26-e6f523986926,ResourceVersion:171046175,Generation:0,CreationTimestamp:2022-06-20 00:13:58 +0000 UTC,DeletionTimestamp:<nil>,DeletionGracePeriodSeconds:nil,Labels:map[string]string{},Annotations:map[string]string{},OwnerReferences:[],Finalizers:[],ClusterName:,Initializers:nil,ManagedFields:[{vpcLambda Update v1 2022-06-20 00:13:58 +0000 UTC nil} {kubectl-edit Update v1 2022-07-12 10:21:26 +0000 UTC nil} {app Update v1 2023-08-14 16:27:38 +0000 UTC nil}],},Data:map[string]string{mapRoles: - groups:
- system:bootstrappers
- system:nodes
rolearn: arn:aws:iam::594084547872:role/qovery-eks-workers-z16cd1bde
username: system:node:{{EC2PrivateDNSName}}
,mapUsers: []
,},BinaryData:map[string][]byte{},}
[ERRO] 2023/08/23 10:17 InvalidClientTokenId: The security token included in the request is invalid.
status code: 403, request id: 2aa3eeb4-2531-4dee-89fa-81ebec685182
[INFO] 2023/08/23 10:17 successfully updated user roles
[INFO] 2023/08/23 10:17 &ConfigMap{ObjectMeta:k8s_io_apimachinery_pkg_apis_meta_v1.ObjectMeta{Name:aws-auth,GenerateName:,Namespace:kube-system,SelfLink:,UID:7f10ff8b-e7ee-43eb-9e26-e6f523986926,ResourceVersion:171046175,Generation:0,CreationTimestamp:2022-06-20 00:13:58 +0000 UTC,DeletionTimestamp:<nil>,DeletionGracePeriodSeconds:nil,Labels:map[string]string{},Annotations:map[string]string{},OwnerReferences:[],Finalizers:[],ClusterName:,Initializers:nil,ManagedFields:[{vpcLambda Update v1 2022-06-20 00:13:58 +0000 UTC nil} {kubectl-edit Update v1 2022-07-12 10:21:26 +0000 UTC nil} {app Update v1 2023-08-14 16:27:38 +0000 UTC nil}],},Data:map[string]string{mapRoles: - groups:
- system:bootstrappers
- system:nodes
rolearn: arn:aws:iam::594084547872:role/qovery-eks-workers-z16cd1bde
username: system:node:{{EC2PrivateDNSName}}
,mapUsers: []
,},BinaryData:map[string][]byte{},}
[ERRO] 2023/08/23 10:18 InvalidClientTokenId: The security token included in the request is invalid.
status code: 403, request id: 7feaa61b-2e89-4bfa-b337-0660a8d96402
[INFO] 2023/08/23 10:18 successfully updated user roles
[INFO] 2023/08/23 10:18 &ConfigMap{ObjectMeta:k8s_io_apimachinery_pkg_apis_meta_v1.ObjectMeta{Name:aws-auth,GenerateName:,Namespace:kube-system,SelfLink:,UID:7f10ff8b-e7ee-43eb-9e26-e6f523986926,ResourceVersion:171046175,Generation:0,CreationTimestamp:2022-06-20 00:13:58 +0000 UTC,DeletionTimestamp:<nil>,DeletionGracePeriodSeconds:nil,Labels:map[string]string{},Annotations:map[string]string{},OwnerReferences:[],Finalizers:[],ClusterName:,Initializers:nil,ManagedFields:[{vpcLambda Update v1 2022-06-20 00:13:58 +0000 UTC nil} {kubectl-edit Update v1 2022-07-12 10:21:26 +0000 UTC nil} {app Update v1 2023-08-14 16:27:38 +0000 UTC nil}],},Data:map[string]string{mapRoles: - groups:
- system:bootstrappers
- system:nodes
rolearn: arn:aws:iam::594084547872:role/qovery-eks-workers-z16cd1bde
username: system:node:{{EC2PrivateDNSName}}
,mapUsers: []
,},BinaryData:map[string][]byte{},}
I tried adding stephane to the configmap using eksctl but it quickly got wiped again (almost instant)
What’s the next course of action, it seems like the deployment that was triggered failed and caused issues in our cluster, can you suggest how we can deploy the application manually to amend this issue? This is the result of describing the deployment
Name: iam-eks-user-mapper
Namespace: kube-system
CreationTimestamp: Mon, 20 Jun 2022 12:16:07 +1200
Labels: app.kubernetes.io/instance=iam-eks-user-mapper
app.kubernetes.io/managed-by=Helm
app.kubernetes.io/name=iam-eks-user-mapper
app.kubernetes.io/version=0.1.0
helm.sh/chart=iam-eks-user-mapper-0.1.0
Annotations: deployment.kubernetes.io/revision: 2
meta.helm.sh/release-name: iam-eks-user-mapper
meta.helm.sh/release-namespace: kube-system
Selector: app.kubernetes.io/instance=iam-eks-user-mapper,app.kubernetes.io/name=iam-eks-user-mapper
Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable
StrategyType: RollingUpdate
MinReadySeconds: 0
RollingUpdateStrategy: 25% max unavailable, 25% max surge
Pod Template:
Labels: app.kubernetes.io/instance=iam-eks-user-mapper
app.kubernetes.io/name=iam-eks-user-mapper
Service Account: iam-eks-user-mapper
Containers:
iam-eks-user-mapper:
Image: public.ecr.aws/r3m4q3r9/iam-eks-user-mapper:v1.0.0
Port: <none>
Host Port: <none>
Command:
./app
--aws-iam-group
Admins
--k8s-cap
system:masters
Limits:
cpu: 20m
memory: 32Mi
Requests:
cpu: 10m
memory: 32Mi
Environment:
AWS_REGION: eu-west-1
AWS_ACCESS_KEY_ID: <REDACTED>
AWS_SECRET_ACCESS_KEY: <set to the key 'awsKey' in secret 'iam-eks-user-mapper'> Optional: false
Mounts: <none>
Volumes: <none>
Conditions:
Type Status Reason
---- ------ ------
Progressing True NewReplicaSetAvailable
Available True MinimumReplicasAvailable
OldReplicaSets: iam-eks-user-mapper-6477f5848d (0/0 replicas created)
NewReplicaSet: iam-eks-user-mapper-6498884dcd (1/1 replicas created)
Events: <none>