-
Notifications
You must be signed in to change notification settings - Fork 424
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Always getting error: You must be logged in to the server (Unauthorized) #275
Comments
Have you tried, before doing Yes, aws-iam-authenticator is giving you a token, but kubectl looks at $HOME/.kube/config for a kubeconfig file. Running I believe, you just need to make sure you are making that call to It also looks you passed the name of your user not the name of the cluster to |
@swoldemi I did. |
Sorry, I guess I mean't updating your kubeconfig after you assume the role? Assuming AWS_ACCESS_KEY_ID=<Key ID> AWS_SECRET_ACCESS_KEY=<Secret Access Key> \
AWS_SESSION_TOKEN=<Session Token> aws eks update-kubeconfig --name crop-cluster |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
I've tried to solve this case, used root ARN and custom ARN, adding user into role, creating cluster with root, creating cluster with custom id, creating cluster in console with both id, using aws, using aws-iam-authenticator, using custom profile in .aws/config, changing token in .kube/config to real token, etc., etc., etc. aws sts get-caller-identity worked. All information seems correct but I was not able to achieve to access kubernetes console. A lot of people are talking about this message in communities here and there since 2018. |
If here is an AWS developers who are in EKS, please prepare your new linux machine and get kubectl, aws and aws-iam-authenticator, and make a new AWS account and try to create a new EKS cluster. And can you update EKS document on AWS website? |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Might not be the same cause but I just ran into this and in my case I created my cluster on a different computer as a different IAM user than the computer/user I was trying to access the cluster with. The instructions from here helped me figure out that I needed to add the user that didn't create the cluster to the configmap. From 2nd computer:
From computer/user that created cluster:
If you're hitting this my suspicion would be that you created the cluster as a different user/role than you are trying to access with. Maybe instead of using the web console try creating with aws-cli or eksctl. Hope this helps someone. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Had a similar issue recently. It ended up being something simple that I may not have noticed for a while had there not been another engineer on the team who had run into it before. The rolearn I had added was a copy & paste of the ARN shown in the console. So it looked something like this:
Turns out you are not supposed to add the ARN path here (not sure why). Removing it, so now we had |
I have the same problem with the assumed role? I tried ti add the role arn but not the assume role beacuse dont let me something like that: |
I got the same error and resolved. thanks |
Using the assumed-role didn't work for me. Had to use the actual "role" (from IAM click on the role and get the arn). Remove the path between role/path/<ROLE_NAME> I.e.
|
just run the below command with proper region and cluster name . it worked. |
I am currently playing around with AWS EKS
But I always get
error: You must be logged in to the server (Unauthorized)
when trying to runkubectl cluster-info
command.I have read a lot of AWS documentation and look at lots of similar issues who face the same problem. Unfortunately, none of them resolves my problem.
So, this is what I did
crop-portal
crop-cluster
crop-cluster
namecrop-cluster
(cluster and role have the same name)crop-portal
aws eks update-kubeconfig --name crop-cluster
to update the kube configaws sts assume-role --role-arn crop-cluster-arn --role-session-name eks-access
aws sts get-caller-indentity
and now the result says it used assume role alreadykubectl cluster
and alwaysget error: You must be logged in to the server (Unauthorized)
when I run
aws-iam-authenticator token -i crop-cluster
, it gave me the token andwhen I run
aws-iam-authenticator verify -t token -i crop-portal
, it also passed&{ARN:arn:aws:sts::529972849116:assumed-role/crop-cluster/1572605554603576170 CanonicalARN:arn:aws:iam::529972849116:role/crop-cluster AccountID:529972849116 UserID:AROAXWZGX5HOBZPVGAUKC SessionName:1572605554603576170}
I don't know what is wrong or what I miss. I try so hard to get it works but I really don't know what to do after this.
Some people suggest creating a cluster with awscli instead of GUI. I tried both methods and none of them work. Either creating with awscli or GUI is the same for me.
Please someone helps :(
The text was updated successfully, but these errors were encountered: