Open MohammadAlavi1986 opened 1 year ago
The helm chart creates the service account by default https://github.com/external-secrets/external-secrets/blob/a4508a809161a291f658ae4fa9ad84a10f66a06a/deploy/charts/external-secrets/values.yaml#L71
I think one issue is that we are not passing the name of the service account down to the chart correctly https://github.com/aws-ia/terraform-aws-eks-blueprints-addons/blob/c5f51610e469e741eceb1c4cb185d317cbe6ddd2/main.tf#LL1944C3-L1944C35
Sorry, I created the issue in the wrong repo. K8s service account for the external secret controller is created by the helm chart. However ClusterSecretStore
and SecretStore
resources are using two separate service accounts (cluster-secretstore-sa
and secretstore-sa
), which were used to be created by the local irsa module, but after migrating to the iam-role-for-service-accounts-eks
module these two service accounts are NOT being created.
yes, I moved the issue here since this is where the implementation lives for the addon. We will look at fixing this here and making the appropriate changes in the respective examples
Description
The two
ClusterSecretStore
andSecretStore
custom resources use IRSA to access AWS secret manager and SSM parameter store, but service accounts specified in theses two resources are not being created.Unlike the local
../../modules/irsa
module, theterraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks
module does not create Kubernetes service account resources. Since no service accounts are being created,ClusterSecretStore
andSecretStore
resources will be created with anInvalidProviderConfig
status.Versions
Module version [Required]: ~> 1.0
Terraform version: v1.2.2
Provider version(s):
provider registry.terraform.io/gavinbunney/kubectl v1.14.0
provider registry.terraform.io/hashicorp/aws v5.4.0
provider registry.terraform.io/hashicorp/cloudinit v2.3.2
provider registry.terraform.io/hashicorp/helm v2.10.1
provider registry.terraform.io/hashicorp/kubernetes v2.21.1
provider registry.terraform.io/hashicorp/time v0.9.1
provider registry.terraform.io/hashicorp/tls v4.0.4
Module version(s):
Reproduction Code [Required]
Steps to reproduce the behavior: Run
terraform apply
inexamples/external-secrets
directory.Expected behaviour
Actual behaviour
Terminal Output Screenshot(s)
Additional context