You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
How did you deploy Kubeflow Pipelines (KFP)?
I deployed using the kustomize manifests.
KFP version:
2.4.0
Steps to reproduce
Deploy KFP 2.4 on an EKS cluster using the 2.4 kustomize manifests.
Create an S3 bucket in the same region (my-kfp-bucket).
Create an IAM role (KubeflowS3Role) with a trust policy matching system:serviceaccount:my-namespace:ml-pipeline.
Attach the appropriate S3 permissions via KubeflowS3Policy to that role.
Annotate the ml-pipeline ServiceAccount with the role ARN.
Restart the deployment and observe that the ml-pipeline pod fails with “Access Denied” when checking the S3 bucket, while no related IRSA events appear in CloudTrail.
The API server logs show:
F0306 08:19:04.525174 7 client_manager.go:502] Failed to check if object store bucket exists. Error: Access Denied.
No relevant events appear in CloudTrail for the failing S3 requests (e.g., no ListBucket or GetBucketLocation calls under the IRSA role).
Expected result
The ml-pipeline pod should successfully connect to the S3 bucket via IRSA.
CloudTrail should log S3 calls (e.g., ListBucket, GetBucketLocation) under the IRSA role ARN.
Materials and Reference
Namespace & Service Account:
Namespace: my-namespace
ServiceAccount: ml-pipeline, annotated with:
eks.amazonaws.com/role-arn: arn:aws:iam::<ACCOUNT_ID>:role/KubeflowS3Role
2. IAM Role:
Deployment:
The ml-pipeline deployment uses serviceAccountName: ml-pipeline in my-namespace.
ConfigMap:
The configuration references s3://my-kfp-bucket for the bucket name, and the region is set to us-east-2.
Steps to Reproduce
Deploy KFP 2.4 on an EKS cluster in us-east-2 using the official 2.4 Helm charts.
Create an S3 bucket in the same region (my-kfp-bucket).
Create an IAM role (KubeflowS3Role) with a trust policy matching system:serviceaccount:my-namespace:ml-pipeline.
Attach the appropriate S3 permissions via KubeflowS3Policy to that role.
Annotate the ml-pipeline ServiceAccount with the role ARN.
Restart the deployment and observe that the ml-pipeline pod fails with “Access Denied” when checking the S3 bucket, while no related IRSA events appear in CloudTrail.
Impacted by this bug? Give it a 👍.
The text was updated successfully, but these errors were encountered:
Environment
I deployed using the kustomize manifests.
2.4.0
Steps to reproduce
my-kfp-bucket
).KubeflowS3Role
) with a trust policy matchingsystem:serviceaccount:my-namespace:ml-pipeline
.KubeflowS3Policy
to that role.ml-pipeline
ServiceAccount with the role ARN.ml-pipeline pod
fails with “Access Denied” when checking the S3 bucket, while no related IRSA events appear in CloudTrail.The API server logs show:
F0306 08:19:04.525174 7 client_manager.go:502] Failed to check if object store bucket exists. Error: Access Denied.
No relevant events appear in CloudTrail for the failing S3 requests (e.g., no ListBucket or GetBucketLocation calls under the IRSA role).
Expected result
Materials and Reference
eks.amazonaws.com/role-arn: arn:aws:iam::<ACCOUNT_ID>:role/KubeflowS3Role
2. IAM Role:
KubeflowS3Role
arn:aws:iam::<ACCOUNT_ID>:role/KubeflowS3Role
Deployment:
The ml-pipeline deployment uses
serviceAccountName: ml-pipeline
inmy-namespace
.ConfigMap:
The configuration references
s3://my-kfp-bucket
for the bucket name, and the region is set tous-east-2
.Steps to Reproduce
Deploy KFP 2.4 on an EKS cluster in
us-east-2
using the official 2.4 Helm charts.Create an S3 bucket in the same region (
my-kfp-bucket
).Create an IAM role (
KubeflowS3Role
) with a trust policy matchingsystem:serviceaccount:my-namespace:ml-pipeline.
Attach the appropriate S3 permissions via
KubeflowS3Policy
to that role.Annotate the
ml-pipeline
ServiceAccount with the role ARN.Restart the deployment and observe that the
ml-pipeline
pod fails with “Access Denied” when checking the S3 bucket, while no related IRSA events appear in CloudTrail.Impacted by this bug? Give it a 👍.
The text was updated successfully, but these errors were encountered: