-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
UTC Logger.check error: failed to get caller #103
Comments
It shouldn't cause any functionality impact but we will clean it up, the error is from the Uber/zap logger. |
Hey! Using VPC CNI v1.16.0 I'm still facing this Issue. |
@Jufik - Are you checking pod logs for policy logs when you enable - |
Am i doing something wrong, because I am using 1.16.3 and still see |
The problem persists, and I'm encountering it with aws-network-policy-agent:v1.0.8-eksbuild.1 and eks 1.27. Can we consider reopening the issue? @jayanthvn @jdn5126 Additionally, when I enable both the enable-cloudwatch-logs and enable-policy-event-logs parameters, the pods get stuck in a crashloopbackoff state with exit code 1, and no logs are generated. |
I can confirm that this issue still persists with EKS 1.28 / aws-network-policy-agent:v1.1.0-eksbuild.1 |
I'm seeing a similar issue with EKS 1.29 and CNI : v1.16.2-eksbuild.1. Looks the issue needs to be reopened unless we missing something ?
|
I was getting this error with EKS 1.29 and VPC CNI v1.17.1, but it went away after commenting serviceAccountArn property in my CDK resource
|
That potentially indicate that role missing some permissions which are present on nodegroup's role |
Using VPC CNI addon 1.17.1, based on observing log data, this error seems to occur only when a policy verdict is being made. So the more verdicts you have, the more spammy this log is. If it helps anything, our settings are: {
"enableNetworkPolicy": "true",
"env": {
"AWS_VPC_ENI_MTU": "1480",
"AWS_VPC_K8S_CNI_LOG_FILE": "stdout",
"AWS_VPC_K8S_PLUGIN_LOG_FILE": "stderr",
"AWS_VPC_K8S_CNI_CUSTOM_NETWORK_CFG": "true"
},
"nodeAgent": {
"enablePolicyEventLogs": "true",
"enableCloudWatchLogs": "true",
}
} We also have some IRSA policy attached to deliver the cloudwatch logs (which are working, by the way -- we see policy verdicts in CW) |
Fix is released with network policy agent v1.1.2 for the original issue of logs having failed to get caller... - https://github.com/aws/amazon-vpc-cni-k8s/releases/tag/v1.18.2. Please test and let us know if there are any issues. |
looks like with v1.15.1 of the aws vpc cni the output for the aws-eks-nodeagent just says
The text was updated successfully, but these errors were encountered: