-
Notifications
You must be signed in to change notification settings - Fork 240
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
User "system:serviceaccount:kube-system:azure-cns" cannot list resource "clustersubnetstates" after update to 1.30.4 control plane #3063
Comments
As workaround I have to add this ClusterRole and it's binding. ---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
namespace: kube-system
name: nodeTempClusterSubnetByHand
rules:
- apiGroups: ["acn.azure.com"]
resources: ["clustersubnetstates"]
verbs: ["get", "list", "watch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: nodeTempClusterSubnetByHandRoleBinding
namespace: kube-system
subjects:
- kind: ServiceAccount
name: azure-cns
namespace: kube-system
roleRef:
kind: ClusterRole
name: nodeTempClusterSubnetByHand
apiGroup: rbac.authorization.k8s.io
--- |
@petrkr you can delete the CRD to mitigate this |
What time is "imminently" ? In Czech it means hours to maximum 2 days.. here it is already 2 weeks and BUG is still there. BUG which cause you can not deploy or run new containers. |
This issue is stale because it has been open for 2 weeks with no activity. Remove stale label or comment or this will be closed in 7 days |
Issue closed due to inactivity. |
Hey ! How inactivity ? Is it fixed already ? I do not see in latest AKS release update to fixed version yet |
@petrkr this fix was released to AKS in CNS v1.6.13. Are you still seeing issues with the ClusterSubnetStates CRD? |
I did not saw changes in AKS yet. I'll check tomorrow at work |
Seems new azure-cns missing some roles/permissions. After update to Kubernetes 1.30.4 CNS is unable to authorize against API
As result there can not be assigned new IP address to PODs which causes this error
Maybe role binding is missing in https://github.com/Azure/azure-container-networking/blob/master/cns/azure-cns.yaml ?
As results is stuck cluster.
The text was updated successfully, but these errors were encountered: