Skip to content

Commit 94e0431

Browse files
authored
Merge pull request #1121 from nekomachi-touge/patch-1
fix: include error output in the related NOTE admonition
2 parents 6cfadb0 + 583f304 commit 94e0431

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

latest/ug/manage-access/aws-access/enable-iam-roles-for-service-accounts.adoc

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,11 +48,13 @@ If output is returned, then you already have an IAM OIDC provider for your clust
4848
eksctl utils associate-iam-oidc-provider --cluster $cluster_name --approve
4949
----
5050
+
51-
NOTE: If you enabled the EKS VPC endpoint, the EKS OIDC service endpoint couldn't be accessed from inside that VPC. Consequently, your operations such as creating an OIDC provider with `eksctl` in the VPC will not work and will result in a timeout. An example error message follows:
52-
+
51+
[NOTE]
52+
====
53+
If you enabled the EKS VPC endpoint, the EKS OIDC service endpoint couldn't be accessed from inside that VPC. Consequently, your operations such as creating an OIDC provider with `eksctl` in the VPC will not work and will result in a timeout. An example error message follows:
5354
----
5455
** server cant find oidc.eks.<region-code>.amazonaws.com: NXDOMAIN
5556
----
57+
====
5658
+
5759
To complete this step, you can run the command outside the VPC, for example in {aws} CloudShell or on a computer connected to the internet. Alternatively, you can create a split-horizon conditional resolver in the VPC, such as Route 53 Resolver to use a different resolver for the OIDC Issuer URL and not use the VPC DNS for it. For an example of conditional forwarding in CoreDNS, see the https://github.com/aws/containers-roadmap/issues/2038[Amazon EKS feature request] on GitHub.
5860

0 commit comments

Comments
 (0)