Skip to content

[EKS] [Request]: IAM Roles for Service Accounts don't work with sts vpc endpoint #586

@oleksii-boiko-ua

Description

@oleksii-boiko-ua

Tell us about your request
I'm trying to use "IAM Roles for Service Accounts" in private VPC without Internet, Nat Gateways. It works fine in VPC with internet access.

Which service(s) is this request for?
EKS

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
When I deploy pod with a service account in spec everything looks fine, pod is mutating and the environment variables and necessary setting are automatically injected. Then I'm accessing pod via kubectl exec and run command

aws s3 ls --region eu-west-1 --debug

or any other and I see that it's trying to connect to global sts Starting new HTTPS connection (1): sts.amazonaws.com:443 and failed with a timeout. How can I force it to use my regional sts vpc endpoint like sts.eu-west-1.amazonaws.com?

Are you currently working around this issue?
I even tried to add cname record in coredns but recived

botocore.exceptions.SSLError: SSL validation failed for https://sts.amazonaws.com/ ("hostname 'sts.amazonaws.com' doesn't match either of 'sts.eu-west-1.amazonaws.com', '*.sts.eu-west-1.vpce.amazonaws.com'",)

Metadata

Metadata

Assignees

No one assigned

    Labels

    EKSAmazon Elastic Kubernetes ServiceProposedCommunity submitted issue

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions