You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on May 22, 2024. It is now read-only.
A customer was not able to deploy Custom Resources Custom::AWSCDK-EKS-KubernetesResource when deploying stack. Here is one of create failure event:
The error message on Cloudformation is: Custom::AWSCDK-EKS-KubernetesResource EKSStackAwsAuthmanifest75D20040 CREATE_FAILED Received response status [FAILED] from custom resource. Message returned: TimeoutError: {"state":"TIMEOUT","reason":"Waiter has timed out"} at checkExceptions ...
Also found the following error message in CloudTrail: User: arn:aws:sts::[redacted]:assumed-role/EKSStack-awscdka-ProviderframeworkonEventS-duAmMCwNZO6z/EKSStack-awscdka-ProviderframeworkonEvent-4NeK4zj7Z6ab is not authorized to perform: lambda:GetFunctionConfiguration on resource: arn:aws:lambda:[redacted]:[redacted]:function:EKSStack-awscdkawseksKube-Handler886CB40B-3fOpwrZnomNI because no identity-based policy allows the lambda:GetFunctionConfiguration action
They failed with permission issue. Because before custom resources created failed, there were many lambda:GetFunctionConfiguration access denied events [2].
The workaround was that manually add the following IAM permission to provider lambda execution role , and then update the stack, the template could be deployed successfully.
A customer was not able to deploy Custom Resources
Custom::AWSCDK-EKS-KubernetesResource
when deploying stack. Here is one of create failure event:The error message on Cloudformation is:
Custom::AWSCDK-EKS-KubernetesResource EKSStackAwsAuthmanifest75D20040 CREATE_FAILED Received response status [FAILED] from custom resource. Message returned: TimeoutError: {"state":"TIMEOUT","reason":"Waiter has timed out"} at checkExceptions ...
Also found the following error message in CloudTrail:
User: arn:aws:sts::[redacted]:assumed-role/EKSStack-awscdka-ProviderframeworkonEventS-duAmMCwNZO6z/EKSStack-awscdka-ProviderframeworkonEvent-4NeK4zj7Z6ab is not authorized to perform: lambda:GetFunctionConfiguration on resource: arn:aws:lambda:[redacted]:[redacted]:function:EKSStack-awscdkawseksKube-Handler886CB40B-3fOpwrZnomNI because no identity-based policy allows the lambda:GetFunctionConfiguration action
They failed with permission issue. Because before custom resources created failed, there were many
lambda:GetFunctionConfiguration
access denied events [2].The workaround was that manually add the following IAM permission to provider lambda execution role , and then update the stack, the template could be deployed successfully.
This issue may related to upstream CDK issue: aws/aws-cdk#26838
The text was updated successfully, but these errors were encountered: