jeevan
jeevan
Can't we simply avoid this by not using the Service Account that is enabled for Pod Identity webhook?
By the looks of it you don't have the token inject by the Webhook. The `amazon-eks-pod-identity` webhook adds the token in this file `/var/run/secrets/eks.amazonaws.com/serviceaccount/token` Please check these env vars is...
Not sure this is a solution but kind of worked around by changing this param ``` client = Client(auto_batch_tracing=False) evaluate(....,client=client,...) ``` It takes more time though but finishes without any...
There is no way to recover form this unless we open the stat json file and remove the dependencies than upload the json to remote state store.
I am using azure cli to trigger the adhoc backup and getting below error where it doesn't provide any clue which input has the issue. ``` (BMSUserErrorInvalidInput) Input provided for...
Facing the same issue.
Could we get this released as soon as possible? Blocking our deployment.
Facing the same issue. We are running `openfga/openfga:v1.8.7` image version and running single container (one replicaset with 1 instance.) [logs.txt](https://github.com/user-attachments/files/19536547/logs.txt)