-
Notifications
You must be signed in to change notification settings - Fork 68
unable to obtain workload identity auth #198
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hello friend, |
Hi there, So I ran same binding command again and after that when I checked Identity i showed correct value - After that issue was gone. Hope it helps someone else. |
@lalitc113 It took me a moment during the setup as well and I think the documentation should be improved. In our case this solved the issue:
gcloud iam service-accounts add-iam-policy-binding \
csi-driver-provider-gcp@<GCP_PROJECT_ID>.iam.gserviceaccount.com \
--role roles/iam.workloadIdentityUser \
--member "serviceAccount:<GCP_PROJECT_ID>.svc.id.goog[kube-system/secrets-store-csi-driver-provider-gcp]" and adding the required annotiation in the helm serviceAccount:
annotations:
{
iam.gke.io/gcp-service-account: csi-driver-provider-gcp@<GCP_PROJECT_ID>.iam.gserviceaccount.com,
}
name: secrets-store-csi-driver-provider-gcp I really hope this will save someone else some time setting this up. |
@clemenspeters We have created a service account and attached it to our pods with the workload identity this works most of the time but sometimes times out trying to get the workload identity. Is your method more efficient that only the csi-secrets-store-provider-gcp is making the call rather than all the pods that mount secrets |
@psandhu79 we are also experiencing timeout issues when have the service account attached to the pods. Most of the time it works fine but recently we had a bunch of cronjobs all starting at the same time, all using the same service account. We are seeing errors like |
Question
After setting up the CSI drivers I am getting below error
Error:
Unable to attach or mount volumes: unmounted volumes=[mysecret], unattached volumes=[mysecret kube-api-access-d]: timed out waiting for the condition | FailedMount |
-- | -- | -- | -- | -- | --
MountVolume.SetUp failed for volume "mysecret" : rpc error: code = Unknown desc = failed to mount secrets store objects for pod app-ns/myapp-deployment-25lp23-svvcp, err: rpc error: code = PermissionDenied desc = unable to obtain auth for mount: unable to obtain workload identity auth: unable to fetch gcp service account token: rpc error: code = PermissionDenied desc = Permission 'iam.serviceAccounts.getAccessToken' denied on resource (or it may not exist). error details: name = ErrorInfo reason = IAM_PERMISSION_DENIED domain = iam.googleapis.com metadata = map[permission:iam.serviceAccounts.getAccessToken]
all permission are in place but still getting this error
Requesting you to please suggest any solution for this issue
The text was updated successfully, but these errors were encountered: