-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Static provisioning example errors: /bin/sh: line 0: echo: write error: Input/output error #282
Comments
Hi, thanks for creating this issue. Can you say what IAM permissions you assigned to the policy? Otherwise, can you include the mountpoint logs using this runbook: https://github.com/awslabs/mountpoint-s3-csi-driver/blob/main/docs/LOGGING.md#mountpoint-logs |
Thanks. That was clear. What happened what I gave the specific role to the csi driver addon which has write and read to the specific bucket. I was under the impression, that was only needed. Once I added the same policy to the node, it works perfectly, tks. |
You should be able to give permissions to the role of the CSI Driver addon - could you send logs using the runbook previously linked? |
I'm wondering if the underlying node already had a policy attached which granted read access, and then you are adding the new policy with read&write afterwards which gets picked up. If Mountpoint is unable to find the IAM credentials associated with the driver's service account, it'll currently attempt to use the credentials vended by IMDS. This makes me think it could be a misconfiguration of the IAM Role, specifically the trust policy. Can you double check how you configured it? Please do share here (redacted if necessary). Reviewing Mountpoint logs would still be a good next step. In particular, if you could run with |
/kind bug
What happened?
s3-app logs /bin/sh: line 0: echo: write error: Input/output error
I am able to see the files already in the s3 bucket in the /data path. But I cannot write.
What you expected to happen?
Read and write should work
How to reproduce it (as minimally and precisely as possible)?
EKS Cluster, Create the necessary IAM policy, role and add the Addon. Apply the example static provisioning example
Anything else we need to know?:
nodes are arm64
mount command shows this entry correctly
mountpoint-s3 on /data type fuse (rw,nosuid,nodev,noatime,user_id=0,group_id=0,default_permissions)
No errors in the driver pod.
Environment
kubectl version
): 1.31The text was updated successfully, but these errors were encountered: