-
|
Hello everyone, Since three weeks, i have the same problem... The ec2 node created by karpenter works well and the pods are running on it but the certificate is never approved and issued. I did the aws-auth config map, and have the sames roles as karpenter like the tuto 'Getting Started with Karpenter', but it's still not working... I build everything with aws cdk. kubectl describe csr csr-7r9nm my aws-auth config map apiVersion: v1 Please help, this is the only thing not working and I cannot do "kubectl logs" cmd because this problem. Thks everyone. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
|
Problem: When checking the CSRs, the requests were not coming from system:node: but from the STS-assumed role ARN: arn:aws:sts:::assumed-role// Root Cause: In the EKS Access Entries (via aws eks access-entry) And in the legacy aws-auth ConfigMap. This caused the kubelet to authenticate via STS rather than the expected node identity (system:node:), preventing automatic CSR approval. SOLUTION: After that, nodes authenticated correctly as system:node:, and CSRs were automatically approved and issued as expected: Approved,Issued |
Beta Was this translation helpful? Give feedback.
Problem:
My Karpenter nodes were stuck with pending CSRs (Certificate Signing Requests), and the kubelet logs showed TLS handshake errors like:
http: TLS handshake error ... no serving certificate available for the kubelet
When checking the CSRs, the requests were not coming from system:node: but from the STS-assumed role ARN:
arn:aws:sts:::assumed-role//
Root Cause:
I mistakenly added the same IAM role used by Karpenter nodes both:
In the EKS Access Entries (via aws eks access-entry)
And in the legacy aws-auth ConfigMap.
This caused the kubelet to authenticate via STS rather than the expected node identity (system:node:), preventing automatic CSR approval.
SOLUTION:
I removed the EKS Acc…