-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Keda 2.9.1 on AKS with Pod-Identity Looks for AzureCLICredential- #4026
Comments
Hi, |
Could the problem be that no provider in the chain can get the token, and you only see the error from the first one?, I have to try it |
no there are MI pod identity that works fine |
I've experienced the same issue upgrading from (Helm Chart) 2.8.2. Using AAD pod identity works perfectly with that version. The only change I make is to upgrade to 2.9.2 We have a single Azure SDK is supposed to return the last error. Is it possible that the credentials are not being added to the chain? Is there an error at https://github.com/kedacore/keda/blob/main/pkg/scalers/azure_servicebus_scaler.go#L330 that means it's not added? |
Interesting point... Maybe it's added IDK why 🤔 |
I have added a logger in case of errors that prevent the addition of it. The tags are |
I have reproduced the issue, but it doesn't seem related with the |
I have found the issue and sadly it's really complex to solve properly because the SDK it's totally closed for extension... For the moment, I'm going to undo the change that unified both identity providers (which I hope is the future) meanwhile we try to include our requirements. |
thanks for the update @JorTurFer |
So what options do we have for those of us experiencing this particular issue, are on : TIA |
The only option atm is to downgrade KEDA to 2.8.1 or switching from aad-pod-identity to azure workload identity. This PR solves the issue but we don't plan (not yet at least) to do a hotfix release. You could use My suggestion is to switch to aad workload identity because aad-pod-identity is deprecated and will be unmaintained at the end of this year (I don't remember the exact date), but I understand that this could require more effort than other options. |
I could move to workload identity, however, that too exhibits the same sort of issue (documented here #3977). So it feels like whichever way I go I'm going to hit an issue. |
Are you using Mariner distro too? That issue is located with Mariner distro |
@jmos5156 i would say the most stable we see no errors on this configuration |
We using Ubuntu 18.04.6 LTS and see the issue.
|
That distro isn't affected by the error with workload identity, as I said, the issue is with the distro and workload identity, not with KEDA itself, I have in production workloads using workload identity indeed and I haven't seen that problem. |
I'm not sure if anyone is experiencing this same issue after upgrading to the version 2.9.2 or above, instead of working as expected now it just displays a different error. Thought it would be worth asking if anyone experienced the same. @JorTurFer 2023-09-12T18:11:14Z ERROR azure_servicebus_scaler error getting service bus entity length {"type": "ScaledObject", "namespace": "staging", "name": "functionx", "error": "ChainedTokenCredential: failed to acquire a token.\nAttempted credentials:\n\tmanaged identity timed out"} |
The bug was solved by this commit: #4030 |
I'm afraid I tried upgrading to v2.10.1 and v2.11.2 and I keep getting the same error I described above. I wished it had more information on what it could be but I am left in the dark with a 'managed identity timed out' message, without changing anything from v2.8 to the versions above. @JorTurFer Thanks for answering so quickly, was hoping someone with the same issue could shed some light.
|
If you have tried v2.10.1 and v2.11.2 and if fails, I'd suggest creating an issue for it because this issue was for a specific problem and it was already fixed |
Report
when running Keda 2.9.1 with Pod Identity ( No Workload Identity) , the DefaultAzureCredentials() chain look for AzureCLICredentials but fails on "/bin/sh azurecli file not found"
The AzureCLICredential should be remvoed from the Chain list
Expected Behavior
Default Azure Credentials has options to opt-Out several Chain providers such as VisualStudioCredentials /AzureCLI Credentials etc.
so since this is Pod-Identity with distroless image the Azure CLI should not be part of this chain
Actual Behavior
many "AzureCLICredential: fork/exec /bin/sh: no such file or directory\n\terror reading service account token"
Steps to Reproduce the Problem
Logs from KEDA operator
KEDA Version
2.9.1
Kubernetes Version
1.24
Platform
Microsoft Azure
Scaler Details
Azure Service Bus
Anything else?
No response
The text was updated successfully, but these errors were encountered: