Skip to content

Conversation

@tal-haim
Copy link
Contributor

@tal-haim tal-haim commented Dec 28, 2025

📝 Description

Fix MLRun enterprise system-tests pod log collection failures caused by EKS exec-auth issues:
Ensure the system-tests CI container has the required aws-iam-authenticator binary (kubeconfig exec plugin).
Make pod-log collection more robust on long runs by refreshing kubeconfig and retrying once on 401 Unauthorized (expired EKS token).


🛠️ Changes Made

CI: Install aws-iam-authenticator into the run-system-tests-enterprise-ci container and add curl dependency (required by kubeconfig exec auth).

✅ Checklist

  • I updated the documentation (if applicable)
  • I have tested the changes in this PR
  • I confirmed whether my changes are covered by system tests
    • If yes, I ran all relevant system tests and ensured they passed before submitting this PR
    • I updated existing system tests and/or added new ones if needed to cover my changes
  • If I introduced a deprecation:

🧪 Testing

Ran enterprise system tests in CI and validated:
kubeconfig exec auth no longer fails with No such file or directory: aws-iam-authenticator
on test failures after long runtime, pod log collection no longer fails with 401 Unauthorized and logs are printed


🔗 References

  • Ticket link:
  • Design docs links:
  • External links:

🚨 Breaking Changes?

  • Yes (explain below)
  • No

…kubeconfig exec authentication with AWS EKS.
@tal-haim tal-haim requested a review from a team December 28, 2025 14:27
@liranbg liranbg changed the title [CI] Included a step to install aws-iam-authenticator, necessary for … [CI] Included a step to install aws-iam-authenticator Dec 29, 2025
@tal-haim tal-haim merged commit 9e3f8f6 into mlrun:development Dec 29, 2025
19 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants