Closed mitsha-microsoft closed 1 year ago
Closing this issue. There was an user error in our script that passed the value for the client Id used a variable (we used the wrong case and it was not passing any value). After fixing it, the deployment works now
Have you
What steps did you take and what happened: We are deploying to AKS with an identity profile and added an
omsagent
add on profile on the aks cluster. We are also deploying a CSI Driver.There are multiple user assigned identities on my AKS's VMSS. Despite having specified the clientId in my SecretProviderClass, I am being told to specify the clientId.
az aks show -n <name-of-cluster> -g <RG-of-cluster> --query "identity"
az vmss identity show --name <VMSSName> --resource-group <aks-ManagedRG-name>
SecretProviderClass.yaml
The relevant values are passed via helm and ensured that the value for
cert.msi_client_id
is passed as the<Value-of-clientId>
for the identity we assigned to the aksBut the pods for our service get stuck in the
ContainerCreating
state and we get this error message:What did you expect to happen: I expected the pods to mount the secret volume, and the driver to use the specified ID.
Anything else you would like to add: What's odd is that we have been using the same scripts to deploy CSI drivers, and deploy these images and those work fine without any errors. We are deploying new clusters and are facing errors with this
Which access mode did you use to access the Azure Key Vault instance: User Assigned Managed Identity
Environment:
kubectl version
andkubectl get nodes -o wide
): v1.24.9