Skip to content
Discussion options

You must be logged in to vote

Problem:
My Karpenter nodes were stuck with pending CSRs (Certificate Signing Requests), and the kubelet logs showed TLS handshake errors like:
http: TLS handshake error ... no serving certificate available for the kubelet

When checking the CSRs, the requests were not coming from system:node: but from the STS-assumed role ARN:

arn:aws:sts:::assumed-role//

Root Cause:
I mistakenly added the same IAM role used by Karpenter nodes both:

In the EKS Access Entries (via aws eks access-entry)

And in the legacy aws-auth ConfigMap.

This caused the kubelet to authenticate via STS rather than the expected node identity (system:node:), preventing automatic CSR approval.

SOLUTION:
I removed the EKS Acc…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by Piercuta
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
1 participant