Assume role with aws s3 source #15698
Unanswered
ambroserb3
asked this question in
Q&A
Replies: 1 comment
-
Hey @stephanrb3 ! One thing you could try is setting the environment variable The assume role should be applied after credentials are loaded. If unspecified in the Vector config, as you have it, it should use the order mentioned by the SDK here: https://docs.aws.amazon.com/sdk-for-rust/latest/dg/credentials.html. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I'm wondering if I'm missing something with the auth.assume role option for an S3 source?
This is our vector.toml file:
This works locally without assume_role (we use SSO locally), but in our cluster we're baffled. Assume role simply doesn't work. We worked around this by creating an IAM User and just adding the AKID/SKID to the env variables on the pod, but we couldn't figure out why the assume_role option wasn't working. We're able to assume the role from the CLI when we exec into the pod, we also tried creating a k8s service account that assumes the role. The role does have the correct permissions in its access policy.
But it kept giving us this error:
until we created the service account, then the error changed to:
But we triple checked this iam role access policy it definitely has this permission.
I was wondering where assume_role falls into this hierarchy in the docs:
Like am I missing something here, do we still need one of these when assuming a role?
Has anyone else run into this issue with auth.assume_role and found a solution?
Beta Was this translation helpful? Give feedback.
All reactions