Tom Klein
01/02/2022, 7:55 PMservice account
but it seems insufficient and we noticed some warning in the docs about that but couldn't really decipher what it would mean for us since we don't use these methods to define permissions:Anna Geller
eksctl create iamserviceaccount --cluster=<clusterName> --name=s3-read-only --attach-policy-arn=arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
eksctl docs explain it best hereAnna Geller
Tom Klein
01/03/2022, 11:42 AMeksctl
tool and that they already attached a policy with permissions for S3 (and the particular needed bucket) and for some reason we’re still getting AccessDenied 😞Tom Klein
01/10/2022, 2:47 PMAnna Geller
Tom Klein
01/10/2022, 3:20 PMAmazonS3ReadOnlyAccess
except that it also restricts access just to the bucket where the flows are stored in )Tom Klein
01/10/2022, 3:21 PMAnna Geller
Tom Klein
01/10/2022, 4:00 PMTom Klein
01/10/2022, 4:01 PMeksctl
is simply not how we work with our setup since (from what i understand) it’s a manual command - and for them everything is defined using Helm recipes and configurations on top of YAML, etc.
(e.g. even if they use it, then it will work now but it would not persist beyond the current life of the cluster, if it has to be recreated, duplicated, or anything similar)
again, this is all just my modest understanding of their world 😆Anna Geller
Anna Geller
Tom Klein
01/10/2022, 4:03 PMKubernetesRun
) are the ones lacking the permissions --- it looks like (from what i understand) that the agent has it properlyTom Klein
01/10/2022, 4:04 PMTom Klein
01/10/2022, 4:04 PMAnna Geller
Tom Klein
01/10/2022, 4:25 PMTom Klein
01/10/2022, 4:26 PMTom Klein
01/10/2022, 4:27 PMAnna Geller