-
Notifications
You must be signed in to change notification settings - Fork 108
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Workaround for pods not being able to access EC2 IMDS #56
Comments
Same issue happens when running Cloudwatch agent on EKS Fargate. The metadata service isn't available so the agent decides it is running On-prem and starts to look for credentials in |
I have added an ENV VAR |
Thank you for the information. I disabled IMDS v1 but had to back off setting hop count to 1 on EKS because otherwise the agent could not start. The reason was several other manifests here don't have the |
In my EKS cluster I have disabled the Instance Metadata Service (IMDS) v1 and set the IMDS hop count to 1, to prevent pods from accessing the IMDS. This prevents the
cloudwatch-agent
daemonset from starting, since it looks into the EC2 IMDS.Is there a config item or workaround to use this agent without allowing pods to access the EC2 IMDS?
The text was updated successfully, but these errors were encountered: