-
-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add additional IAM policy to allow cluster role to use KMS key provided for cluster encryption #1915
feat: Add additional IAM policy to allow cluster role to use KMS key provided for cluster encryption #1915
Conversation
…provided for cluster encryption
Why does eks_addons depend on node groups? https://github.com/terraform-aws-modules/terraform-aws-eks/pull/1915/files#diff-dc46acf24afd63ef8c556b77c126ccc6e578bc87e3aa09a931f33d9bf2532fbbR255 It seems like, when using VPC CNI, the addon should be created/setup before node pools are created. Not sure about the other add-ons but seems to make more sense for node pools to depend on addons than the other way around (although I didn't dig in deep enough to see why the dependencies are setup like that in the first place) |
## [18.8.0](v18.7.3...v18.8.0) (2022-03-02) ### Features * Add additional IAM policy to allow cluster role to use KMS key provided for cluster encryption ([#1915](#1915)) ([7644952](7644952))
This PR is included in version 18.8.0 🎉 |
@mariadb-nickvenenga - see here #1840 (comment) |
@antonbabenko @bryantbiggs I have just upgrade a working Terraform eks cluster to 18.8.0 and get this: Any thoughts? Thanks! |
@youwalther65 do you have a reproduction of your configs that we can take a look at? |
ah, I think I know actually - you are providing your own IAM role for the cluster, you're not using the IAM role created by the module - is that correct @youwalther65 ? |
Yes, exactly @bryantbiggs |
@bryantbiggs - same issue here...
|
@bryantbiggs - I reverted to 18.7.3 & the plan runs successfully |
@youwalther65 / @darrenfurr please let me know if v18.8.1 resolves the issue for you if you get a chance, thank you 🙏🏽 |
@bryantbiggs - 18.8.1 worked successfully. Thanks for the quick fix. |
Same here @bryantbiggs - 18.8.1 worked successfully. Thanks for the quick fix.. |
## [18.8.0](terraform-aws-modules/terraform-aws-eks@v18.7.3...v18.8.0) (2022-03-02) ### Features * Add additional IAM policy to allow cluster role to use KMS key provided for cluster encryption ([#1915](terraform-aws-modules/terraform-aws-eks#1915)) ([b666996](terraform-aws-modules/terraform-aws-eks@b666996))
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
Motivation and Context
Breaking Changes
How Has This Been Tested?
examples/*
projectscomplete
exampleeks_managed_node_group
exampleirsa_autoscale_refresh
example