Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

[Bug] waiter state transitioned to Failure #8038

Open
romosa opened this issue Nov 22, 2024 · 2 comments
Open

[Bug] waiter state transitioned to Failure #8038

romosa opened this issue Nov 22, 2024 · 2 comments

Comments

@romosa
Copy link

romosa commented Nov 22, 2024

What were you trying to accomplish?

Creating a new cluster using eksctl.
cluster-name.yaml

apiVersion: eksctl.io/v1alpha5
kind: ClusterConfig

metadata:
  name: rda-nextgen-cluster
  region: us-east-1
  version: '1.30'
  tags:
    karpenter.sh/discovery: rda-nextgen-cluster
    Project: PROJECT
    Owner: "OWNER"
iam:
  withOIDC: true

karpenter:
  version: "v0.37.6"
  createServiceAccount: true
  
vpc:
  id: "vpc-e3acb19a"
  clusterEndpoints:
    publicAccess:  true
    privateAccess: true
  subnets:
    private:
      us-east-1a:
          id: "subnet-02c596ebf9040855b"
      us-east-1b:
          id: "subnet-0eed2c227f4fab862"
      us-east-1c:
          id: "subnet-00b82be5d489fab38"
    
managedNodeGroups:
  - name: rda-nextgen-cluster-ng
    minSize: 1
    maxSize: 2
    instanceType: t3.medium
    desiredCapacity: 1
    volumeSize: 80
    ssh:
      allow: true
    tags:
      Project: PROJECT
      Owner: "OWNER"
    iam:
      attachPolicyARNs:
      - arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy
      - arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy
      - arn:aws:iam::aws:policy/ElasticLoadBalancingFullAccess
      - arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly
      - arn:aws:iam::aws:policy/AmazonEBSCSIDriverPolicy
      - arn:aws:iam::aws:policy/AWSNetworkManagerFullAccess
      withAddonPolicies:
        ebs: true
        efs: true

What happened?

ubuntu@ip-172-31-40-217:~$ eksctl create cluster -f cluster-name.yaml -v 5 
2024-11-22 12:02:55 [▶]  Setting credentials expiry window to 30 minutes
2024-11-22 12:02:55 [▶]  role ARN for the current session is "arn:aws:iam::REDACTED_AWS_ACCOUNT:user/REDACTED_EMAIL"
2024-11-22 12:02:55 [ℹ]  eksctl version 0.194.0
2024-11-22 12:02:55 [ℹ]  using region us-east-1
2024-11-22 12:02:56 [✔]  using existing VPC (vpc-e3acb19a) and subnets (private:map[us-east-1a:{subnet-02c596ebf9040855b us-east-1a 172.31.208.0/20 0 } us-east-1b:{subnet-0eed2c227f4fab862 us-east-1b 172.31.224.0/20 0 } us-east-1c:{subnet-00b82be5d489fab38 us-east-1c 172.31.240.0/20 0 }] public:map[])
2024-11-22 12:02:56 [!]  custom VPC/subnets will be used; if resulting cluster doesn't function as expected, make sure to review the configuration of VPC/subnets
2024-11-22 12:02:56 [ℹ]  nodegroup "cluster-name-ng" will use "" [AmazonLinux2023/1.30]
2024-11-22 12:02:56 [ℹ]  using SSH public key "/home/ubuntu/.ssh/id_rsa.pub" as "eksctl-cluster-name-nodegroup-cluster-name-ng-69:8e:00:33:07:58:ef:a2:2d:5d:47:1c:b1:18:2c:21" 
2024-11-22 12:02:56 [▶]  importing SSH public key "eksctl-cluster-name-nodegroup-cluster-name-ng-69:8e:00:33:07:58:ef:a2:2d:5d:47:1c:b1:18:2c:21"
2024-11-22 12:02:56 [ℹ]  using Kubernetes version 1.30
2024-11-22 12:02:56 [ℹ]  creating EKS cluster "cluster-name" in "us-east-1" region with managed nodes
2024-11-22 12:02:56 [▶]  cfg.json = \
{
    "kind": "ClusterConfig",
    "apiVersion": "eksctl.io/v1alpha5",
    "metadata": {
        "name": "cluster-name",
        "region": "us-east-1",
        "version": "1.30",
        "tags": {
            "Owner": "OWNER",
            "Project": "PROJECT",
            "karpenter.sh/discovery": "cluster-name"
        }
    },
    "iam": {
        "withOIDC": true,
        "vpcResourceControllerPolicy": true
    },
    "accessConfig": {
        "authenticationMode": "API_AND_CONFIG_MAP"
    },
    "vpc": {
        "id": "vpc-e3acb19a",
        "cidr": "172.31.0.0/16",
        "subnets": {
            "private": {
                "us-east-1a": {
                    "id": "subnet-02c596ebf9040855b",
                    "az": "us-east-1a",
                    "cidr": "172.31.208.0/20"
                },
                "us-east-1b": {
                    "id": "subnet-0eed2c227f4fab862",
                    "az": "us-east-1b",
                    "cidr": "172.31.224.0/20"
                },
                "us-east-1c": {
                    "id": "subnet-00b82be5d489fab38",
                    "az": "us-east-1c",
                    "cidr": "172.31.240.0/20"
                }
            }
        },
        "manageSharedNodeSecurityGroupRules": true,
        "nat": {
            "gateway": "Single"
        },
        "clusterEndpoints": {
            "privateAccess": true,
            "publicAccess": true
        }
    },
    "addonsConfig": {},
    "privateCluster": {
        "enabled": false,
        "skipEndpointCreation": false
    },
    "managedNodeGroups": [
        {
            "name": "cluster-name-ng",
            "amiFamily": "AmazonLinux2023",
            "instanceType": "t3.medium",
            "desiredCapacity": 1,
            "minSize": 1,
            "maxSize": 2,
            "volumeSize": 80,
            "ssh": {
                "allow": true,
                "publicKeyPath": "~/.ssh/id_rsa.pub",
                "publicKeyName": "eksctl-cluster-name-nodegroup-cluster-name-ng-69:8e:00:33:07:58:ef:a2:2d:5d:47:1c:b1:18:2c:21"
            },
            "labels": {
                "alpha.eksctl.io/cluster-name": "cluster-name",
                "alpha.eksctl.io/nodegroup-name": "cluster-name-ng"
            },
            "privateNetworking": false,
            "tags": {
                "Owner": "OWNER",
                "Project": "PROJECT",
                "alpha.eksctl.io/nodegroup-name": "cluster-name-ng",
                "alpha.eksctl.io/nodegroup-type": "managed"
            },
            "iam": {
                "attachPolicyARNs": [
                    "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
                    "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
                    "arn:aws:iam::aws:policy/ElasticLoadBalancingFullAccess",
                    "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
                    "arn:aws:iam::aws:policy/AmazonEBSCSIDriverPolicy",
                    "arn:aws:iam::aws:policy/AWSNetworkManagerFullAccess"
                ],
                "withAddonPolicies": {
                    "imageBuilder": false,
                    "autoScaler": false,
                    "externalDNS": false,
                    "certManager": false,
                    "appMesh": null,
                    "appMeshPreview": null,
                    "ebs": true,
                    "fsx": false,
                    "efs": true,
                    "awsLoadBalancerController": false,
                    "albIngress": false,
                    "xRay": false,
                    "cloudWatch": false
                }
            },
            "securityGroups": {
                "withShared": null,
                "withLocal": null
            },
            "volumeType": "gp3",
            "volumeIOPS": 3000,
            "volumeThroughput": 125,
            "disableIMDSv1": true,
            "disablePodIMDS": false,
            "instanceSelector": {},
            "releaseVersion": ""
        }
    ],
    "availabilityZones": [
        "us-east-1a",
        "us-east-1c",
        "us-east-1b"
    ],
    "karpenter": {
        "version": "v0.37.6",
        "createServiceAccount": true
    }
}

2024-11-22 12:02:56 [ℹ]  1 nodegroup (cluster-name-ng) was included (based on the include/exclude rules)
2024-11-22 12:02:56 [ℹ]  will create a CloudFormation stack for cluster itself and 0 nodegroup stack(s)
2024-11-22 12:02:56 [ℹ]  will create a CloudFormation stack for cluster itself and 1 managed nodegroup stack(s)
2024-11-22 12:02:56 [ℹ]  if you encounter any issues, check CloudFormation console or try 'eksctl utils describe-stacks --region=us-east-1 --cluster=cluster-name'
2024-11-22 12:02:56 [ℹ]  Kubernetes API endpoint access will use provided values {publicAccess=true, privateAccess=true} for cluster "cluster-name" in "us-east-1"
2024-11-22 12:02:56 [ℹ]  CloudWatch logging will not be enabled for cluster "cluster-name" in "us-east-1"
2024-11-22 12:02:56 [ℹ]  you can enable it with 'eksctl utils update-cluster-logging --enable-types={SPECIFY-YOUR-LOG-TYPES-HERE (e.g. all)} --region=us-east-1 --cluster=cluster-name'
2024-11-22 12:02:56 [ℹ]  default addons vpc-cni, kube-proxy, coredns were not specified, will install them as EKS addons
2024-11-22 12:02:56 [ℹ]  
2 sequential tasks: { create cluster control plane "cluster-name", 
    2 sequential sub-tasks: { 
        5 sequential sub-tasks: { 
            1 task: { create addons },
            wait for control plane to become ready,
            associate IAM OIDC provider,
            no tasks,
            update VPC CNI to use IRSA if required,
        },
        create managed nodegroup "cluster-name-ng",
    } 
}
2024-11-22 12:02:56 [▶]  started task: create cluster control plane "cluster-name"
2024-11-22 12:02:56 [ℹ]  building cluster stack "eksctl-cluster-name-cluster"
2024-11-22 12:02:56 [▶]  CreateStackInput = &cloudformation.CreateStackInput{StackName:(*string)(0xc000cafb00), Capabilities:[]types.Capability{"CAPABILITY_IAM"}, ClientRequestToken:(*string)(nil), DisableRollback:(*bool)(0xc00095ba00), EnableTerminationProtection:(*bool)(nil), NotificationARNs:[]string(nil), OnFailure:"", Parameters:[]types.Parameter(nil), ResourceTypes:[]string(nil), RetainExceptOnCreate:(*bool)(nil), RoleARN:(*string)(nil), RollbackConfiguration:(*types.RollbackConfiguration)(nil), StackPolicyBody:(*string)(nil), StackPolicyURL:(*string)(nil), Tags:[]types.Tag{types.Tag{Key:(*string)(0xc000ba2d30), Value:(*string)(0xc000ba2d40), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000ba2d50), Value:(*string)(0xc000ba2d60), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000ba2d70), Value:(*string)(0xc000ba2d80), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000ba2d90), Value:(*string)(0xc000ba2da0), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000ba2db0), Value:(*string)(0xc000ba2dc0), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000ba2dd0), Value:(*string)(0xc000ba2de0), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000d8f3f0), Value:(*string)(0xc000d8f400), noSmithyDocumentSerde:document.NoSerde{}}}, TemplateBody:(*string)(0xc000d8f410), TemplateURL:(*string)(nil), TimeoutInMinutes:(*int32)(nil), noSmithyDocumentSerde:document.NoSerde{}}
2024-11-22 12:02:56 [ℹ]  deploying stack "eksctl-cluster-name-cluster"
2024-11-22 12:03:26 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:03:56 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:04:56 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:05:56 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:06:56 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:07:56 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:08:56 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:09:56 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:10:56 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:11:56 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:12:57 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:13:57 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:14:57 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-cluster"
2024-11-22 12:14:57 [▶]  processing stack outputs
2024-11-22 12:14:57 [▶]  completed task: create cluster control plane "cluster-name"
2024-11-22 12:14:57 [▶]  started task: 
    2 sequential sub-tasks: { 
        5 sequential sub-tasks: { 
            1 task: { create addons },
            wait for control plane to become ready,
            associate IAM OIDC provider,
            no tasks,
            update VPC CNI to use IRSA if required,
        },
        create managed nodegroup "cluster-name-ng",
    }

2024-11-22 12:14:57 [▶]  started task: 
    5 sequential sub-tasks: { 
        1 task: { create addons },
        wait for control plane to become ready,
        associate IAM OIDC provider,
        no tasks,
        update VPC CNI to use IRSA if required,
    }

2024-11-22 12:14:57 [▶]  started task: 1 task: { create addons }
2024-11-22 12:14:57 [▶]  started task: create addons
2024-11-22 12:14:57 [▶]  cluster = &types.Cluster{AccessConfig:(*types.AccessConfigResponse)(0xc000e318c0), Arn:(*string)(0xc000ab1fa0), CertificateAuthority:(*types.Certificate)(0xc000ab1ff0), ClientRequestToken:(*string)(nil), ConnectorConfig:(*types.ConnectorConfigResponse)(nil), CreatedAt:time.Date(2024, time.November, 22, 6, 33, 20, 45000000, time.UTC), EncryptionConfig:[]types.EncryptionConfig(nil), Endpoint:(*string)(0xc000ab1ef0), Health:(*types.ClusterHealth)(0xc000e31860), Id:(*string)(nil), Identity:(*types.Identity)(0xc000ab1fc0), KubernetesNetworkConfig:(*types.KubernetesNetworkConfigResponse)(0xc000754c90), Logging:(*types.Logging)(0xc000e31880), Name:(*string)(0xc000ab1f50), OutpostConfig:(*types.OutpostConfigResponse)(nil), PlatformVersion:(*string)(0xc000ab1f70), ResourcesVpcConfig:(*types.VpcConfigResponse)(0xc0001816c0), RoleArn:(*string)(0xc000ab1fb0), Status:"ACTIVE", Tags:map[string]string{"Name":"eksctl-cluster-name-cluster/ControlPlane", "Owner":"OWNER", "Project":"PROJECT", "alpha.eksctl.io/cluster-name":"cluster-name", "alpha.eksctl.io/cluster-oidc-enabled":"true", "alpha.eksctl.io/eksctl-version":"0.194.0", "aws:cloudformation:logical-id":"ControlPlane", "aws:cloudformation:stack-id":"arn:aws:cloudformation:us-east-1:REDACTED_AWS_ACCOUNT:stack/eksctl-cluster-name-cluster/9c214cc0-a89b-11ef-a325-0e3070d00009", "aws:cloudformation:stack-name":"eksctl-cluster-name-cluster", "eksctl.cluster.k8s.io/v1alpha1/cluster-name":"cluster-name", "karpenter.sh/discovery":"cluster-name"}, UpgradePolicy:(*types.UpgradePolicyResponse)(0xc000bd4fc0), Version:(*string)(0xc000ab1f80), ZonalShiftConfig:(*types.ZonalShiftConfigResponse)(nil), noSmithyDocumentSerde:document.NoSerde{}}
2024-11-22 12:14:57 [▶]  resolve conflicts set to OVERWRITE
2024-11-22 12:14:57 [▶]  addon: &{vpc-cni v1.19.0-eksbuild.1  [] map[]  {false false false false false false false} map[]  <nil> false  true [] [] []}
2024-11-22 12:14:57 [!]  recommended policies were found for "vpc-cni" addon, but since OIDC is disabled on the cluster, eksctl cannot configure the requested permissions; the recommended way to provide IAM permissions for "vpc-cni" addon is via pod identity associations; after addon creation is completed, add all recommended policies to the config file, under `addon.PodIdentityAssociations`, and run `eksctl update addon`
2024-11-22 12:14:57 [ℹ]  creating addon
2024-11-22 12:14:58 [▶]  EKS Create Addon output: {%!s(*string=0xc000dceee0) %!s(*string=0xc000dcef00) %!s(*string=0xc000dcef10) %!s(*string=0xc000dceef0) %!s(*string=<nil>) 2024-11-22 06:44:58.044 +0000 UTC %!s(*types.AddonHealth=&{[] {}}) %!s(*types.MarketplaceInformation=<nil>) 2024-11-22 06:44:58.059 +0000 UTC %!s(*string=<nil>) [] %!s(*string=<nil>) %!s(*string=<nil>) CREATING map[] {}}
2024-11-22 12:14:58 [ℹ]  successfully created addon
2024-11-22 12:14:58 [▶]  resolve conflicts set to OVERWRITE
2024-11-22 12:14:58 [▶]  addon: &{kube-proxy v1.30.6-eksbuild.3  [] map[]  {false false false false false false false} map[]  <nil> false  true [] [] []}
2024-11-22 12:14:58 [ℹ]  creating addon
2024-11-22 12:14:58 [▶]  EKS Create Addon output: {%!s(*string=0xc000dcf4b0) %!s(*string=0xc000dcf480) %!s(*string=0xc000dcf490) %!s(*string=0xc000dcf4a0) %!s(*string=<nil>) 2024-11-22 06:44:58.54 +0000 UTC %!s(*types.AddonHealth=&{[] {}}) %!s(*types.MarketplaceInformation=<nil>) 2024-11-22 06:44:58.556 +0000 UTC %!s(*string=<nil>) [] %!s(*string=<nil>) %!s(*string=<nil>) CREATING map[] {}}
2024-11-22 12:14:58 [ℹ]  successfully created addon
2024-11-22 12:14:58 [▶]  resolve conflicts set to OVERWRITE
2024-11-22 12:14:58 [▶]  addon: &{coredns v1.11.1-eksbuild.8  [] map[]  {false false false false false false false} map[]  <nil> false  true [] [] []}
2024-11-22 12:14:58 [ℹ]  creating addon
2024-11-22 12:14:59 [▶]  EKS Create Addon output: {%!s(*string=0xc000243dc0) %!s(*string=0xc000243d80) %!s(*string=0xc000243db0) %!s(*string=0xc000243d90) %!s(*string=<nil>) 2024-11-22 06:44:59.062 +0000 UTC %!s(*types.AddonHealth=&{[] {}}) %!s(*types.MarketplaceInformation=<nil>) 2024-11-22 06:44:59.076 +0000 UTC %!s(*string=<nil>) [] %!s(*string=<nil>) %!s(*string=<nil>) CREATING map[] {}}
2024-11-22 12:14:59 [ℹ]  successfully created addon
2024-11-22 12:14:59 [▶]  completed task: create addons
2024-11-22 12:14:59 [▶]  completed task: 1 task: { create addons }
2024-11-22 12:14:59 [▶]  started task: wait for control plane to become ready
2024-11-22 12:15:29 [!]  API server is unreachable
2024-11-22 12:15:29 [▶]  cluster = &types.Cluster{AccessConfig:(*types.AccessConfigResponse)(0xc000492de0), Arn:(*string)(0xc0006ef570), CertificateAuthority:(*types.Certificate)(0xc0006ef650), ClientRequestToken:(*string)(nil), ConnectorConfig:(*types.ConnectorConfigResponse)(nil), CreatedAt:time.Date(2024, time.November, 22, 6, 33, 20, 45000000, time.UTC), EncryptionConfig:[]types.EncryptionConfig(nil), Endpoint:(*string)(0xc0006ef710), Health:(*types.ClusterHealth)(0xc000492d60), Id:(*string)(nil), Identity:(*types.Identity)(0xc0006ef750), KubernetesNetworkConfig:(*types.KubernetesNetworkConfigResponse)(0xc000ab5ad0), Logging:(*types.Logging)(0xc000492da0), Name:(*string)(0xc0006ef6b0), OutpostConfig:(*types.OutpostConfigResponse)(nil), PlatformVersion:(*string)(0xc0006ef690), ResourcesVpcConfig:(*types.VpcConfigResponse)(0xc000848930), RoleArn:(*string)(0xc0006ef6d0), Status:"ACTIVE", Tags:map[string]string{"Name":"eksctl-cluster-name-cluster/ControlPlane", "Owner":"OWNER", "Project":"PROJECT", "alpha.eksctl.io/cluster-name":"cluster-name", "alpha.eksctl.io/cluster-oidc-enabled":"true", "alpha.eksctl.io/eksctl-version":"0.194.0", "aws:cloudformation:logical-id":"ControlPlane", "aws:cloudformation:stack-id":"arn:aws:cloudformation:us-east-1:REDACTED_AWS_ACCOUNT:stack/eksctl-cluster-name-cluster/9c214cc0-a89b-11ef-a325-0e3070d00009", "aws:cloudformation:stack-name":"eksctl-cluster-name-cluster", "eksctl.cluster.k8s.io/v1alpha1/cluster-name":"cluster-name", "karpenter.sh/discovery":"cluster-name"}, UpgradePolicy:(*types.UpgradePolicyResponse)(0xc000d97a40), Version:(*string)(0xc0006ef6f0), ZonalShiftConfig:(*types.ZonalShiftConfigResponse)(nil), noSmithyDocumentSerde:document.NoSerde{}}
2024-11-22 12:15:29 [▶]  completed task: wait for control plane to become ready
2024-11-22 12:15:29 [▶]  started task: associate IAM OIDC provider
2024-11-22 12:15:29 [▶]  completed task: associate IAM OIDC provider
2024-11-22 12:15:29 [▶]  started task: no tasks
2024-11-22 12:15:29 [▶]  no actual tasks
2024-11-22 12:15:29 [▶]  completed task: no tasks
2024-11-22 12:15:29 [▶]  started task: update VPC CNI to use IRSA if required
2024-11-22 12:15:29 [▶]  addon: &{vpc-cni v1.19.0-eksbuild.1  [arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy] map[]  {false false false false false false false} map[]  <nil> false  true [] [] []}
2024-11-22 12:15:29 [▶]  resolve conflicts set to OVERWRITE
2024-11-22 12:15:29 [▶]  addon: &{vpc-cni v1.19.0-eksbuild.1  [arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy] map[]  {false false false false false false false} map[]  <nil> false  true [] [] []}
2024-11-22 12:15:29 [▶]  found known service account location kube-system/aws-node
2024-11-22 12:15:29 [▶]  service account location provided: kube-system/aws-node, adding sub condition
2024-11-22 12:15:29 [▶]  CreateStackInput = &cloudformation.CreateStackInput{StackName:(*string)(0xc000a95030), Capabilities:[]types.Capability{"CAPABILITY_IAM"}, ClientRequestToken:(*string)(nil), DisableRollback:(*bool)(0xc000aad178), EnableTerminationProtection:(*bool)(nil), NotificationARNs:[]string(nil), OnFailure:"", Parameters:[]types.Parameter(nil), ResourceTypes:[]string(nil), RetainExceptOnCreate:(*bool)(nil), RoleARN:(*string)(nil), RollbackConfiguration:(*types.RollbackConfiguration)(nil), StackPolicyBody:(*string)(nil), StackPolicyURL:(*string)(nil), Tags:[]types.Tag{types.Tag{Key:(*string)(0xc000a94480), Value:(*string)(0xc000a94490), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000a944a0), Value:(*string)(0xc000a944b0), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000a944c0), Value:(*string)(0xc000a944d0), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000a944e0), Value:(*string)(0xc000a944f0), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000a94500), Value:(*string)(0xc000a94510), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000a94520), Value:(*string)(0xc000a94530), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000a95a30), Value:(*string)(0xc000a95ad0), noSmithyDocumentSerde:document.NoSerde{}}}, TemplateBody:(*string)(0xc000a95b00), TemplateURL:(*string)(nil), TimeoutInMinutes:(*int32)(nil), noSmithyDocumentSerde:document.NoSerde{}}
2024-11-22 12:15:30 [ℹ]  deploying stack "eksctl-cluster-name-addon-vpc-cni"
2024-11-22 12:15:30 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-addon-vpc-cni"
2024-11-22 12:16:00 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-addon-vpc-cni"
2024-11-22 12:16:00 [ℹ]  updating addon
2024-11-22 12:16:00 [▶]  &{AddonName:0xc0007c03c0 ClusterName:0xc0005269b0 AddonVersion:0xc000b12a30 ClientRequestToken:<nil> ConfigurationValues:<nil> PodIdentityAssociations:[] ResolveConflicts:OVERWRITE ServiceAccountRoleArn:0xc000b13940 noSmithyDocumentSerde:{}}
2024-11-22 12:16:00 [▶]  &{CreatedAt:2024-11-22 06:46:00.333 +0000 UTC Errors:[] Id:0xc000135010 Params:[{Type:AddonVersion Value:0xc000135030 noSmithyDocumentSerde:{}} {Type:ServiceAccountRoleArn Value:0xc000135040 noSmithyDocumentSerde:{}} {Type:ResolveConflicts Value:0xc000135050 noSmithyDocumentSerde:{}}] Status:InProgress Type:AddonUpdate noSmithyDocumentSerde:{}}
2024-11-22 12:16:10 [ℹ]  addon "vpc-cni" active
2024-11-22 12:16:10 [▶]  completed task: update VPC CNI to use IRSA if required
2024-11-22 12:16:10 [▶]  completed task: 
    5 sequential sub-tasks: { 
        1 task: { create addons },
        wait for control plane to become ready,
        associate IAM OIDC provider,
        no tasks,
        update VPC CNI to use IRSA if required,
    }

2024-11-22 12:16:10 [▶]  started task: create managed nodegroup "cluster-name-ng"
2024-11-22 12:16:10 [▶]  waiting for 1 parallel tasks to complete
2024-11-22 12:16:10 [▶]  started task: create managed nodegroup "cluster-name-ng"
2024-11-22 12:16:10 [▶]  started task: create managed nodegroup "cluster-name-ng"
2024-11-22 12:16:10 [▶]  started task: create managed nodegroup "cluster-name-ng"
2024-11-22 12:16:10 [ℹ]  building managed nodegroup stack "eksctl-cluster-name-nodegroup-cluster-name-ng"
2024-11-22 12:16:10 [▶]  CreateStackInput = &cloudformation.CreateStackInput{StackName:(*string)(0xc000d2e910), Capabilities:[]types.Capability{"CAPABILITY_IAM"}, ClientRequestToken:(*string)(nil), DisableRollback:(*bool)(0xc000d5ada0), EnableTerminationProtection:(*bool)(nil), NotificationARNs:[]string(nil), OnFailure:"", Parameters:[]types.Parameter(nil), ResourceTypes:[]string(nil), RetainExceptOnCreate:(*bool)(nil), RoleARN:(*string)(nil), RollbackConfiguration:(*types.RollbackConfiguration)(nil), StackPolicyBody:(*string)(nil), StackPolicyURL:(*string)(nil), Tags:[]types.Tag{types.Tag{Key:(*string)(0xc000ba2d30), Value:(*string)(0xc000ba2d40), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000ba2d50), Value:(*string)(0xc000ba2d60), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000ba2d70), Value:(*string)(0xc000ba2d80), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000ba2d90), Value:(*string)(0xc000ba2da0), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000ba2db0), Value:(*string)(0xc000ba2dc0), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000ba2dd0), Value:(*string)(0xc000ba2de0), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000d64ae0), Value:(*string)(0xc000d64af0), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000d64b00), Value:(*string)(0xc000d64b10), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000d64b20), Value:(*string)(0xc000d64b30), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000d64b40), Value:(*string)(0xc000d64b50), noSmithyDocumentSerde:document.NoSerde{}}, types.Tag{Key:(*string)(0xc000d64b60), Value:(*string)(0xc000d64b70), noSmithyDocumentSerde:document.NoSerde{}}}, TemplateBody:(*string)(0xc000d64b80), TemplateURL:(*string)(nil), TimeoutInMinutes:(*int32)(nil), noSmithyDocumentSerde:document.NoSerde{}}
2024-11-22 12:16:10 [ℹ]  deploying stack "eksctl-cluster-name-nodegroup-cluster-name-ng"
2024-11-22 12:16:11 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-nodegroup-cluster-name-ng"
2024-11-22 12:16:41 [ℹ]  waiting for CloudFormation stack "eksctl-cluster-name-nodegroup-cluster-name-ng"
2024-11-22 12:16:41 [▶]  failed task: create managed nodegroup "cluster-name-ng" (will not run other sequential tasks)
2024-11-22 12:16:41 [▶]  failed task: create managed nodegroup "cluster-name-ng" (will continue until other parallel tasks are completed)
2024-11-22 12:16:41 [▶]  failed task: create managed nodegroup "cluster-name-ng" (will continue until other parallel tasks are completed)
2024-11-22 12:16:41 [▶]  failed task: create managed nodegroup "cluster-name-ng" (will not run other sequential tasks)
2024-11-22 12:16:41 [▶]  failed task: 
    2 sequential sub-tasks: { 
        5 sequential sub-tasks: { 
            1 task: { create addons },
            wait for control plane to become ready,
            associate IAM OIDC provider,
            no tasks,
            update VPC CNI to use IRSA if required,
        },
        create managed nodegroup "cluster-name-ng",
    }
 (will not run other sequential tasks)
2024-11-22 12:16:41 [!]  1 error(s) occurred and cluster hasn't been created properly, you may wish to check CloudFormation console
2024-11-22 12:16:41 [ℹ]  to cleanup resources, run 'eksctl delete cluster --region=us-east-1 --name=cluster-name'
2024-11-22 12:16:41 [✖]  waiter state transitioned to Failure
Error: failed to create cluster "cluster-name"

How to reproduce it?

Logs

Anything else we need to know?

Using profile ~/user/.aws/credentials

ubuntu@ip-172-31-40-217:~$ cat /etc/os-release 
PRETTY_NAME="Ubuntu 24.04 LTS"
NAME="Ubuntu"
VERSION_ID="24.04"
VERSION="24.04 LTS (Noble Numbat)"
VERSION_CODENAME=noble
ID=ubuntu
ID_LIKE=debian
HOME_URL="https://www.ubuntu.com/"
SUPPORT_URL="https://help.ubuntu.com/"
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
UBUNTU_CODENAME=noble
LOGO=ubuntu-logo

Versions

ubuntu@ip-172-31-40-217:~$ eksctl version
0.194.0
Copy link
Contributor

Hello romosa 👋 Thank you for opening an issue in eksctl project. The team will review the issue and aim to respond within 1-5 business days. Meanwhile, please read about the Contribution and Code of Conduct guidelines here. You can find out more information about eksctl on our website

Copy link
Contributor

This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days.

@github-actions github-actions bot added the stale label Jan 11, 2025
# for free to join this conversation on GitHub. Already have an account? # to comment
Projects
None yet
Development

No branches or pull requests

1 participant