Skip to content

Conversation

@jeremysprofile
Copy link

@jeremysprofile jeremysprofile commented Dec 15, 2025

Add the HumioServiceAccount to the HumioBootstrapTokenConfig to provide the bootstrap pod with the same permissions the Humio cluster pods have. This is necessary as the default ServiceAccount does not necessarily have permissions to access bucket storage, which can be a requirement for bootstrapping to complete successfully.

Add unit tests to validate ServiceAccount is correctly added.

Resolves #1037 .

Tests: In my environment, we had a workaround for this by adding the S3 bucket access to a EC2 node role. Removing that access broke the bootstrapper. Using this PR fixed the bootstrapper.

Risk: Low - only mounts the ServiceAccount to one new location. There might be a race condition in when the ServiceAccount is created vs. when the bootstrapper Pod is created, but if there is, it resolves on its own without intervention.

Add the HumioServiceAccount to the HumioBootstrapTokenConfig to provide the bootstrap pod with the same permissions the Humio nodepool pods have. This is necessary as the `default` ServiceAccount does not necessarily have permissions to access bucket storage, which can be a requirement for bootstrapping to complete successfully.

Add unit tests to validate ServiceAccount is correctly added.

Tests: In my environment, we had a workaround for this by adding the S3 bucket access to a node role. Removing that access broke the bootstrapper. Using this PR fixed the bootstrapper.
Risk: Low - only mounts the ServiceAccount to one new location. There might be a race condition in when the ServiceAccount is created vs. when the bootstrapper Pod is created, but if there is, it resolves on its own without intervention.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Bootstrap Pod fails when S3 access required but not added via EC2 node role

1 participant