-
Notifications
You must be signed in to change notification settings - Fork 810
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(aws assumerolewithwebidentity): fixed s3 access for ruler to use… #4738
Conversation
… IRSA for assumerolewithwebidentity Signed-off-by: Hannes Blut <hannes.blut-extern@deutschebahn.com> (external expert on behalf of DB Netz AG)
The default credential resolver should support web identity already; I don't think we need to implement assume role with web identity manually here. |
@alvinlin123, the aws client sdk implements the assumeRoleWithWebIdentity correctly, however as far as I could tell, |
Hmm this is weird, because we run alert manager and ruler using IRSA too, without any issue. We might need to dig deeper into what is happening for you. Do you have the latest error message? Most like you are right, the client initialization may be in complement or there may be some other env var in play here. Would it be possible to maybe do a build with debug logging turned on for the session, and see what's going on? I will do some code reading in the meanwhile. |
I'll add a detailled bug report with debug logging tomorrow. |
@blut also, if you can post your alertmanager/ruler config (include s3 client) it may help me to troubleshoot :) Also do you know if the environment you are running allows global STS endpoint (ttps://sts.amazonaws.com)? I had some customers hitting weird issues because their firewall/proxy don't allow the global STS endpoint. Would setting an env variable And it's not that I don't want to merge this PR, I am more worry about AWS SDK has a bug or something; that's why I appreciate your help on this :-) |
Hi @alvinlin123
As seen in the attached pod.yaml, the required Edit: The firewall should not be an issue, since the ruler and all the other cortex components are deployed to the same cluster & nodes. The cortex components also share the same serviceaccount. |
No description provided. |
I will take a closer look. Thank you for getting back. I will take a look asap :) |
Hi @alvinlin123, did you find a chance to check out my configuration? |
@blut I'll take a look today, forgot to ask which commit/version of Cortex you are using? |
@blut I think I know what's going on. Can you remove the The config result in AWS SDK's |
We're still on cortex v1.9.0, deployed to kubernetes using tanka.
It appears the region is defined somewhere separately. |
This issue has been automatically marked as stale because it has not had any activity in the past 60 days. It will be closed in 15 days if no further activity occurs. Thank you for your contributions. |
@blut do you still have same issue? |
Hi @alvinlin123, we've switched to Mimir, where this issue is resolved. Feel free to close. |
fixed s3 access for ruler to use assumerolewithwebidentity in an IRSA setup on AWS
This PR includes some code to use assume role with web identity and utilize standard env. variables to enable IRSA.
Which issue(s) this PR fixes:
Fixes 3740
Checklist
CHANGELOG.md
updated - the order of entries should be[CHANGE]
,[FEATURE]
,[ENHANCEMENT]
,[BUGFIX]