Open
Description
When creating an EKS cluster, the nodegroup's CloudFormation stack fails to to create. Looking at the AWS GUI, I see the following error message:
This AWS::AutoScaling::AutoScalingGroup resource is in a CREATE_FAILED state.
Resource handler returned message: "Group did not stabilize. Last scaling activity: 'eksctl.cluster.k8s.io/v1alpha1/cluster-name' is not a valid tag key. Tag keys must match pattern ([0-9a-zA-Z\\-_+=,.@:]{1,255}), and must not be a reserved name ('.', '..', '_index'). Launching EC2 instance failed." (RequestToken: eeb4351e-96d0-fef8-a86b-8d70fd3b4f41, HandlerErrorCode: NotStabilized)
Again, this is for the nodegroup CloudFormation template, NOT the cluster CloudFormation template - that gets created successfully
eksctl version: 0.208.0
I attempted to create a cluster via the following command:
eksctl create cluster -f /tmp/eksctl_cluster.yml
Contents of /tmp/eksctl_cluster.yml:
apiVersion: eksctl.io/v1alpha5
kind: ClusterConfig
metadata:
name: bax-cluster
region: us-east-1
version: "1.32"
vpc:
subnets:
public:
us-east-1a: { id: OMITTED }
us-east-1b: { id: OMITTED }
us-east-1c: { id: OMITTED }
nodeGroups:
- name: standard
# Which security group(s) to assign to all worker nodes
securityGroups:
withShared: true
withLocal: true
attachIDs: ['OMITTED']
amiFamily: AmazonLinux2023
instanceType: t3.small
desiredCapacity: 2
ssh:
allow: true
publicKeyPath: OMITTED
# This option tells eksctl to use the specified security group(s) for SSH access, rather
# than auto-generating a security group rule that allows SSH access from anywhere.
sourceSecurityGroupIds: ['OMITTED']