-
Notifications
You must be signed in to change notification settings - Fork 554
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to create PVC due to missing ClusterRole access to secret for dynamic efs #696
Comments
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/kind bug
What happened?
The creation of a PVC fails due to missing permissions when using dynamic EFS provisioning.
We can see this error log in the efs-csi-controller pod :
I0513 07:49:31.449884 1 event.go:282] Event(v1.ObjectReference{Kind:"PersistentVolumeClaim", Namespace:"my-ns", Name:"fbr-testing", UID:"7fb0a868-4237-40ed-adac-d7d1a62c2acf", APIVersion:"v1", ResourceVersion:"364527245", FieldPath:""}): type: 'Warning' reason: 'ProvisioningFailed' failed to provision volume with StorageClass "efs-dynamic": error getting secret efs-dynamic in namespace kube-system: secrets "efs-dynamic" is forbidden: User "system:serviceaccount:kube-system:efs-csi-controller-sa" cannot get resource "secrets" in API group "" in the namespace "kube-system"
What you expected to happen?
The creation of a new PVC using the class referenced for dynamic provisioning (in the case efs-dynamic) should work.
How to reproduce it (as minimally and precisely as possible)?
Deploy the driver and try to create a PVC as this one :
Anything else we need to know?:
This is related to these lines commented out :
aws-efs-csi-driver/deploy/kubernetes/base/controller-serviceaccount.yaml
Line 39 in cff2c27
Maybe we can narrow down the permissions to only the name of the secret (that's what I did to fix)
Environment
kubectl version
): 1.21The text was updated successfully, but these errors were encountered: