You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The service account created by the module lacks the necessary permissions to support the gcfs (Image streaming) feature.
Specifically, it does not include the roles/serviceusage.serviceUsageConsumer permission, which is required for image streaming to function correctly. This results in pods failing to start on affected nodes.
GCP deprecate the old role called: roles/container.nodeServiceAccount
and the new one doesn't have the required permissions (roles/container.defaultNodeServiceAccount)
Expected behavior
The service account created by the module should include all necessary roles and permissions,
including roles/serviceusage.serviceUsageConsumer, to support GKE features like image streaming without manual intervention.
GCP had a role before called roles/container.nodeServiceAccount which included the reqired policy for that:
but they decided to deprecate it and moved to a new one called roles/container.defaultNodeServiceAccount, the new one doesn't have serviceusage.services.use by default and therefore giving errors when image streaming is enabled.
the expected behavior is that the module will check if image streaming is enabled and add another role to the newly created service account which includes roles/serviceusage.serviceUsageConsumer
Observed behavior
The service account created by the module does not include roles/serviceusage.serviceUsageConsumer, causing Our pods started to fail off, and could not start, with many errors such as
bus error
pods starting but getting stuck
input/output errors
and we started to get errors on the node: level=error msg="AuthRefresh fails for one secret" error="rpc error: code = PermissionDenied desc = Caller does not have required permission to use project xxx. Grant the caller the roles/serviceusage.serviceUsageConsumer role, or a custom role with the serviceusage.services.use permission, by visiting https://console.developers.google.com/iam-admin/iam/project?project=xxx and then retry.
we noticed that the role of the service account the modules creates changed, and that the policy is missing.
The following was a difficult to investigate, I didn't found any GKE updates about the change.
we opened a ticket about the change and the support said to either add the policy somehow, or use the roles/container.nodeServiceAgent
I think the module should add another role to the creation of the service account when gcfs enabled - (roles/serviceusage.serviceUsageConsumer) or changing the default role to roles/container.nodeServiceAgent.
Thank you!
The text was updated successfully, but these errors were encountered:
TL;DR
The service account created by the module lacks the necessary permissions to support the gcfs (Image streaming) feature.
Specifically, it does not include the roles/serviceusage.serviceUsageConsumer permission, which is required for image streaming to function correctly. This results in pods failing to start on affected nodes.
GCP deprecate the old role called: roles/container.nodeServiceAccount
and the new one doesn't have the required permissions (roles/container.defaultNodeServiceAccount)
Expected behavior
The service account created by the module should include all necessary roles and permissions,
including roles/serviceusage.serviceUsageConsumer, to support GKE features like image streaming without manual intervention.
GCP had a role before called roles/container.nodeServiceAccount which included the reqired policy for that:
but they decided to deprecate it and moved to a new one called roles/container.defaultNodeServiceAccount, the new one doesn't have serviceusage.services.use by default and therefore giving errors when image streaming is enabled.
the expected behavior is that the module will check if image streaming is enabled and add another role to the newly created service account which includes roles/serviceusage.serviceUsageConsumer
Observed behavior
The service account created by the module does not include roles/serviceusage.serviceUsageConsumer, causing Our pods started to fail off, and could not start, with many errors such as
and we started to get errors on the node:
level=error msg="AuthRefresh fails for one secret" error="rpc error: code = PermissionDenied desc = Caller does not have required permission to use project xxx. Grant the caller the roles/serviceusage.serviceUsageConsumer role, or a custom role with the serviceusage.services.use permission, by visiting https://console.developers.google.com/iam-admin/iam/project?project=xxx and then retry.
we noticed that the role of the service account the modules creates changed, and that the policy is missing.
Terraform Configuration
Terraform Version
Additional information
The following was a difficult to investigate, I didn't found any GKE updates about the change.
we opened a ticket about the change and the support said to either add the policy somehow, or use the roles/container.nodeServiceAgent
I think the module should add another role to the creation of the service account when gcfs enabled - (roles/serviceusage.serviceUsageConsumer) or changing the default role to roles/container.nodeServiceAgent.
Thank you!
The text was updated successfully, but these errors were encountered: