-
Notifications
You must be signed in to change notification settings - Fork 525
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to pull EKS add-on images or SSM with FIPS bottlerocket images in an isolated VPC #4372
Comments
Hey @JaseKoonce, thanks for letting us know about your problem. Could you please share a few details of your setup?
aws ec2 get-console-output --instance-id <INSTANCE_ID> --output text --latest
|
Command output (limited to what I believe to be relevant):
Please let me know if you need additional output. Region: The VPC has 0 egress other than VPC endpoints. We have the following endpoints deployed:
|
Thanks! We are looking into this! |
Hello @JaseKoonce, could you please request a support case with AWS and ask to be routed to the Bottlerocket maintainers? The problem is not with Bottlerocket but rather with an AWS service. |
Thank you @arnaldo2792, we already have one open and went ahead and added this info. Thank you for your time and help. |
Sorry for the late reply, this was a bit of a ride! I figured out why Bottlerocket FIPS AMIs fail when used on private subnets. ECR doesn't expose
Setting |
Image I'm using:
bottlerocket-aws-k8s-1.31-fips-x86_64-v1.31.0-24c0647f
What I expected to happen:
The worker nodes will be able to pull the neccesary eks-addon images and I will be able to SSM into the worker nodes.
What actually happened:
The pods are unable to pull the necessary images and I am unable to SSM into the worker nodes.
How to reproduce the problem:
Deploy worker nodes using any FIPS enabled bottlerocket image into an isolated VPC and attempt to deploy amazon EKS add-ons or ssm into the worker nodes.
The text was updated successfully, but these errors were encountered: