-
Notifications
You must be signed in to change notification settings - Fork 229
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot connect to AWS EKS with SSO #1716
Comments
From my experience this seems to happen because the CA cert being used to connect to the API endpoint is the one being mounted in with the service account in the container at /var/run/secrets/kubernetes.io/serviceaccount. If your cluster is signed by a different CA then the one used for your api endpoint then you'll see this. In my case the cluster CA was self-signed and the api endpoint was a letsencrypt signed. |
cc/ @yolossn . |
I have a similar issue with EKS (but without SSO): there are "Bad Gateway" messages in the UI. Just in case: version 0.23.1 on macOS. |
Can confirm what @kdeyko says. I have a similar issue with a custom OIDC binary we invoke from exec. If we open the app through point-and-click (macOS), we just get bad gateway and lots of errors in the dev console connecting to localhost. If I open up in a terminal via |
This looks like it can be related to #1885 |
I hope a fix for this is in the latest release. Is anyone able to confirm if the latest release works for them or not? |
I still see the issue on v0.24.0. |
The issue also still exists for me on v0.24.0 |
I still see the issue on 0.24.0 |
The same using Helm chart |
I wanted to use Headlamp, but the Authentication using a Service Account is not working. I use EKS (with SSO) and kubectl or other tools, and they work on my desktop, not so headlamp. |
Hi @dev-2-4-h . We do want to fix this issue and we thought it had been fixed, but apparently it's still happening. The issue is marked as a blocker and will be our focus for the coming weeks. So please allows us a bit more time and patience, as we want to solve this problem for everybody. |
BTW @dev-2-4-h , can you help us debug this? If you run headlamp from the command line, will it be able to use the exec in kubeconfig? This is an issue we had and we thought we had fixed but apparently it's still happening. |
@joaquimrocha -Thanks for your replay and I love to help. However, I have no clue where to start. |
@dev-2-4-h , no worries. With the info we got now I think we can pursue this issue. I will ping you and the others when we have a test build with a fix, so you can try and let us know if it's working for you. Thank you! |
@yolossn I think these fixes help with this issue too? |
Yes, Also |
Folks, there are a number of fixes for this now in the latest release. So I’m going to close this now, but please comment if there’s still an issue for you. |
Hi, just to let you know that, unfortunately, I'm still experiencing the issue (Version 0.25.1 (0.25.1)). Clusters connected via AWS SSO, "Bad Gateway". The same cluster connected outside SSO, no problem. |
Thanks @mattiaperi I'll reopen this. |
Following up on this. In previous versions I was able to leverage the workaround by launching headlamp from the terminal via I cannot connect to even my local clusters that do not use SSO. I have to close and relaunch Headlamp via meanwhile k9s/openlens/kubectl all work without any issues. |
When running with @acelinkio solution: I ran I'm not sure if this was what fixed it for me (also logged in to GKE and Omni clusters, that were also logging errors on the console, even if I didn't access them) but for now it seems to be working. EDIT: On a different day, started HeadLamp and got the same error described on this Issue, of not being able to authenticate. This time I logged in to Omni, GCloud and AWS, to login to all of my clusters, and after that I was able to login normally. |
I am having issues getting headlamp to connect to my AWS EKS cluster.
It works fine in OpenLens and kubectl. Not sure how headlamp connects, but perhaps it needs additional related AWS libraries loaded if using something in AWS SDK directly?
We are using AWS Identity Center (formerly AWS SSO) to authenticate to the cluster, so maybe that's the issue? The UI just says Bad Gaterway and the logs have this. No idea which certificate it can't verify?
The text was updated successfully, but these errors were encountered: