Ahil Mathew Eapachen
Ahil Mathew Eapachen
@Krebsmar I've hit the same issue now with AKS cluster. Did you manage to resolve this?
@matthewi I haven't setup SCRAM. I'll try that. Thank you. :)
Your PAT token needs to have the `read:public_key` permissions under `admin:public_key`.
This is how our healthprobe ends up looking like - @akshaysngupta
Any update on this PR? I am also looking at utilizing refresh_tokens issued by the IdP.
Looks like the IRSA needs the `iam:GetInstanceProfile` permission. > User: arn:aws:sts::1234567789:assumed-role/KarpenterIRSA-dev/169941234567890 is not authorized to perform: iam:GetInstanceProfile on resource: instance profile dev_16604098787662 because no identity-based policy allows the iam:GetInstanceProfile action\n\tstatus...
Is there any way to lookup for the existence of a resource without the function actually throwing an error? For context - I am trying to get `getUserAssignedIdentityOutput` but it...
This would really nice. Need this to start using Crossplane
Any chance we can get this merged?
@MarkKharitonov - Tried that,still getting the error - ``` 2023/06/09 04:26:06 [ERROR] admission webhook error: failed to get auto cmd, error: GET https://myprivateacr.azurecr.io/oauth2/token?scope=repository%3Aclient%3Apull&service=myprivateacr.azurecr.io: UNAUTHORIZED: authentication required, visit https://aka.ms/acr/authorization for more...