Open ardixit-msft-la opened 5 months ago
ping @elmiko this seems related to cluster-api, could you maybe have a look? Thanks!
good spot @voelzmo , this definitely seems related to cluster-api.
@jackfrancis you might have interest in this given the capz callout.
Agree w/ @elmiko, this is either an issue in the Azure cluster-autoscaler provider, or w/ the CAPZ AKS flow
cc @nojnhuh @willie-yao
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
Which component are you using?:
capz-controller-manager
What version of the component are you using?:
Component version: v1.15.2
What k8s version are you using (
kubectl version
)?:kubectl version
OutputClient Version: v1.29.2 Kustomize Version: v5.0.4-0.20230601165947-6ce0bf390ce3 Server Version: v1.28.9
What environment is this in?:
Azure
What did you expect to happen?:
As managed user identity has contributor accesses at subscription level, the expectation was to see access to azure resources without auth error.
What happened instead?:
Hitting following error: failed to get user-assigned identity ClientID: ManagedIdentityCredential authentication failed GET http://169.254.169.254/metadata/identity/oauth2/token
How to reproduce it (as minimally and precisely as possible):
How to reproduce it (as minimally and precisely as possible):
Monitor the capz-controller-manager logs for following error: failed to get user-assigned identity ClientID: ManagedIdentityCredential authentication failed GET http://169.254.169.254/metadata/identity/oauth2/token