You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Create a VAC for which a tag is specified which will be created on the EBS volume
Set the volume attribute class on a PVC
EBS CSI volume fails with error:
"Error from AWS API" err="api error UnauthorizedOperation: You are not authorized to perform this operation. User: ebs-csi-role is not authorized to perform: ec2:CreateTags on resource: <volume_arn> because no identity-based policy allows the ec2:CreateTags action.
Is removed from the policy, EBS CSI controller is able to create a tag specified in VAC on an EBS volume.
Actual behavior
EBS CSI fails to create tag due to AWS policy which permits creating tags only on a ec2:CreateAction
The text was updated successfully, but these errors were encountered:
matej-topolovec
changed the title
EBS CSI IRSA policy preventing creating tags on an EBS volume if case of using VAC
EBS CSI IRSA policy preventing creating tags on an EBS volume in case of using VAC
Apr 11, 2025
Description
Hi,
currently AWS EBS CSI IRSA policy prevents EBS CSI to edit tags if VAC with tag specifications are applied to a pvc. This is the preventing policy:
So the condition only permits creating tags on CreateAction while DeleteTags does not implement any condition.
If your request is for a new feature, please use the
Feature request
template.Versions
5.54.0
1.11.4
v5.83.0
Reproduction Code [Required]
kubectl apply -f manifests/pod-with-volume.yaml
kubectl apply -f manifests/volumeattributesclass.yaml
Steps to reproduce the behavior:
"Error from AWS API" err="api error UnauthorizedOperation: You are not authorized to perform this operation. User: ebs-csi-role is not authorized to perform: ec2:CreateTags on resource: <volume_arn> because no identity-based policy allows the ec2:CreateTags action.
failed to create tags" err="operation error EC2: CreateTags, https response error StatusCode: 403
Expected behavior
When the condition:
Is removed from the policy, EBS CSI controller is able to create a tag specified in VAC on an EBS volume.
Actual behavior
EBS CSI fails to create tag due to AWS policy which permits creating tags only on a ec2:CreateAction
The text was updated successfully, but these errors were encountered: