-
Notifications
You must be signed in to change notification settings - Fork 882
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vault Agent Injector Annotations are not creating : External EKS #731
Comments
Hi @jgourmelen, the next place to look is in the logs of the injector pod, vault-agent-injector-554c56bb59-tl99l. If you can share the values used to deploy the chart in ClusterB, and the annotations used in the app, that would be helpful. |
same issue here, the vault injector does not have any informative logs
Log level = debug I was suspecting it is an issue with
The agent seems up and reachable from pods |
Hi folks, another place to look for clues is the kube-apiserver logs, which should report failures to call the mutating webhook service. @dcshiman The vault injector shouldn't typically be logging |
any other way rather then looking at api server log? @tvoran EKS 1.23,
global:
enabled: true
tlsDisable: false
externalVaultAddr: "${VAULT_ADDR}"
injector:
enabled: true
replicas: 1
leaderElector:
enabled: true
metrics:
enabled: true
externalVaultAddr: "${VAULT_ADDR}"
image:
repository: "hashicorp/vault-k8s"
tag: "1.0.0"
pullPolicy: IfNotPresent
agentImage:
repository: "hashicorp/vault"
tag: "1.11.3"
agentDefaults:
cpuLimit: "100m"
cpuRequest: "10m"
memLimit: "100Mi"
memRequest: "10Mi"
authPath: "auth/kubernetes"
nodeSelector:
kubernetes.io/os: linux
nodegroup-name: critical-addons-tools-ng
tolerations:
- key: "CriticalAddonsOnly"
operator: "Equal"
value: "true"
effect: "NoExecute"
server:
enabled: false
ui:
enabled: false
csi:
enabled: false Update : fixed |
@kholisrag Glad you got it working! The communication requirements for vault-k8s are outlined here as well. |
HI. I will just add one qlue for others. I had same issue, reason was not default CNI (calico) for EKS. |
I am not getting this, can you explain better right 👀 |
In my case I use Calico instead of default aws-node. Calico works diffrently then default CNI, it assignes IPs from local Calico network istead of using IPs from AWS subnets. For simplicity: when you set "hostNetwork" for iunjector it will get IP not from Calico local network but from aws subnets Lines 328 to 330 in 50f7439
|
Describe the bug
I have 2 AWS EKS Cluster.
ClusterA : Full Vault installation (Helm)
ClusterB : ExternalAddr (to ClusterA) configuration for vault injector (Helm)
Injector is OK inside CLusterA.
But, inside ClusterB injector do nothing :
My pod is always with status (1/1) and not (2/2)
I didn't find any interesting log inside vault.
I don't know what can i do.
I have used this tutorial : https://learn.hashicorp.com/tutorials/vault/kubernetes-external-vault
Environment
The text was updated successfully, but these errors were encountered: