Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

[EKS] [request]: Incorrect Access Policy created for AWS-managed windows node group with custom AMI #2327

Open
iancward opened this issue Apr 9, 2024 · 1 comment
Labels
EKS Managed Nodes EKS Managed Nodes EKS Amazon Elastic Kubernetes Service Proposed Community submitted issue

Comments

@iancward
Copy link

iancward commented Apr 9, 2024

Community Note

  • Please vote on this issue by adding a 馃憤 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Tell us about your request
AWS-managed Windows node group with custom AMI/launch template doesn't get correct permissions when Access Policies are enabled in cluster.

Which service(s) is this request for?
EKS

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
We're trying to adopt Access Entries for EKS and we've found that, when creating an AWS-managed Windows node group, the Access Policy is created as "EC2 Linux" rather than "EC2 Windows." The result is that the node doesn't get appropriate cluster permissions and kube-proxy throws errors.

Are you currently working around this issue?
We're working around this by creating the Access Policy entry prior to creating the node group.

@iancward iancward added the Proposed Community submitted issue label Apr 9, 2024
@mikestef9 mikestef9 added EKS Amazon Elastic Kubernetes Service EKS Managed Nodes EKS Managed Nodes labels Apr 9, 2024
@mikestef9
Copy link
Contributor

This is a known limitation, and the workaround you are doing is correct. It's impossible for EKS to know if a custom AMI is going to be used in a Linux or Windows node group. We guess Linux since it's by the far the most commonly used OS type. This problem exists whether you are using aws-auth config map, or access entry, it's not a new problem introduced with access entry.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
EKS Managed Nodes EKS Managed Nodes EKS Amazon Elastic Kubernetes Service Proposed Community submitted issue
Projects
None yet
Development

No branches or pull requests

2 participants