Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"Unable to read bucket encryption" warnings since kops 1.10 upgrade #6014

Closed
xanonid opened this issue Oct 29, 2018 · 4 comments
Closed

"Unable to read bucket encryption" warnings since kops 1.10 upgrade #6014

xanonid opened this issue Oct 29, 2018 · 4 comments

Comments

@xanonid
Copy link

xanonid commented Oct 29, 2018

Version: kops 1.10.0, k8s 1.10.9 on AWS

Since an upgrade to kops 1.10 from 1.9, the cluster produces following warnings:

I1025 13:05:51.932713 629 s3context.go:210] Unable to read bucket encryption policy: will encrypt using AES256

These are caused by GetBucketEncryption calls to s3, which are not allowed by the current default masters & nodes IAM policy. By adding allowed s3:GetEncryptionConfiguration for the kops state bucket to the masters and nodes IAM policy, the issue can be solved manually.

The bug seems to be a regression from #5921 or #5194.

@rhyas
Copy link
Contributor

rhyas commented Nov 3, 2018

Looks like PR 4235 added the feature to check for base bucket encryption, but it didn't make the policy change to allow this check. This means there are a ton of CloudTrail events for failed calls. s3:GetEntryptionConfiguration needs to be added to the default policy created for masters.

@xanonid
Copy link
Author

xanonid commented Nov 3, 2018

Thanks @rhyas for your PR #6039.

@rifelpet
Copy link
Member

@xanonid is this issue safe to close? It appears to have been resolved.

@xanonid
Copy link
Author

xanonid commented Dec 13, 2018

@rifelpet I could not yet test it, but it seems ok for me to close the ticket.

@xanonid xanonid closed this as completed Dec 13, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants