- Newest
- Most votes
- Most comments
The error you're experiencing with nginx-ingress-controller after upgrading from EKS 1.33 to 1.34 is related to authentication issues. The error message "the server has asked for the client to provide credentials" indicates that the controller can't authenticate with the Kubernetes API server.
This issue is likely related to service account authentication changes or IAM role configuration problems after the upgrade. When you upgrade an EKS cluster, sometimes the authentication mechanisms need to be updated as well.
Here are some steps to resolve this issue:
-
Check if the service account for your nginx-ingress-controller has the proper permissions and is correctly configured.
-
Verify that the IAM role associated with the service account has the necessary permissions and is properly attached.
-
Make sure the service account has automountServiceAccountToken set to true, which allows it to access the Kubernetes API.
-
If you're using IAM Roles for Service Accounts (IRSA), ensure that the proper annotations are present on the service account.
-
Check if there were any changes to RBAC policies or ClusterRoles that might affect the nginx-ingress-controller's ability to communicate with the API server.
This issue is similar to other credential-related problems that can occur after EKS upgrades, where components that previously worked fine suddenly lose their ability to authenticate with the cluster. Upgrading the nginx-ingress-controller to a version that's fully compatible with EKS 1.34 might also help resolve the issue.
Sources
Failed build model due to NoCredentialProviders: no valid providers in chain. Deprecated. For verbose messaging see aws.Config.CredentialsChainVerboseErrors | AWS re:Post
Relevant content
- asked a year ago
- asked a year ago
- asked 9 months ago
- AWS OFFICIALUpdated 7 months ago
- AWS OFFICIALUpdated 3 months ago
- AWS OFFICIALUpdated 10 days ago
