assume-role

Terraform: Issue with assume_role

本秂侑毒 提交于 2021-02-09 11:17:04
问题 I'm trying to solve this mystery for few days now, but no joy. Basically, Terraform cannot assume role and failing with: Initializing the backend... 2019/10/28 09:13:09 [DEBUG] New state was assigned lineage "136dca1a-b46b-1e64-0ef2-efd6799b4ebc" 2019/10/28 09:13:09 [INFO] Setting AWS metadata API timeout to 100ms 2019/10/28 09:13:09 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id 2019/10/28 09:13:09 [INFO] AWS Auth provider used:

Terraform: Issue with assume_role

安稳与你 提交于 2021-02-09 11:13:03
问题 I'm trying to solve this mystery for few days now, but no joy. Basically, Terraform cannot assume role and failing with: Initializing the backend... 2019/10/28 09:13:09 [DEBUG] New state was assigned lineage "136dca1a-b46b-1e64-0ef2-efd6799b4ebc" 2019/10/28 09:13:09 [INFO] Setting AWS metadata API timeout to 100ms 2019/10/28 09:13:09 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id 2019/10/28 09:13:09 [INFO] AWS Auth provider used:

Terraform: Issue with assume_role

夙愿已清 提交于 2021-02-09 11:12:39
问题 I'm trying to solve this mystery for few days now, but no joy. Basically, Terraform cannot assume role and failing with: Initializing the backend... 2019/10/28 09:13:09 [DEBUG] New state was assigned lineage "136dca1a-b46b-1e64-0ef2-efd6799b4ebc" 2019/10/28 09:13:09 [INFO] Setting AWS metadata API timeout to 100ms 2019/10/28 09:13:09 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id 2019/10/28 09:13:09 [INFO] AWS Auth provider used:

AWS STS to list buckets gives access denied

大城市里の小女人 提交于 2020-03-04 19:36:09
问题 I have a bucket with empty bucket policy, block public access turned ON (ACLs and Bucket) and trying to list buckets using IAM policy tied to user using STS AssumeRole with following attached policy. { "Version": "2012-10-17", "Statement": [ { "Action": [ "s3:GetObject", "s3:GetBucket*", "s3:ListBucket*", "s3:ListAllMyBuckets" ], "Effect": "Allow", "Resource": [ "arn:aws:s3:::my-test-bucket/*" ] } ] } The assumed role credentials are used during the STS session in python (boto3) s3c = boto3

How to access aws resources created in other account

让人想犯罪 __ 提交于 2020-02-07 02:37:07
问题 In my use case, I want to access DynamoDB table created in AWS account A and Lambda created in account B. For this I have followed many references on Internet which suggests me to use AWS assume role feature. I have added following permission in Lambda execution role { "Version": "2012-10-17", "Statement": { "Effect": "Allow", "Action": "sts:AssumeRole", "Resource": "arn:aws:iam::aws-account-A-number:role/test-db-access" } } Following is the trust relationship of Lambda { "Version": "2012-10

unable to assume role after enforcing MFA policy

回眸只為那壹抹淺笑 提交于 2019-12-25 01:38:39
问题 I created a new policy to enforce IAM user to setup MFA using the policy in this link https://docs.aws.amazon.com/en_pv/IAM/latest/UserGuide/reference_policies_examples_aws_my-sec-creds-self-manage.html Now the IAM user has AdministratorAccess already..so now with applying this force MFA policy now the user has 2 policies attached. The AWS managed policy AdministratorAccess and the new Managed policy i created Force_MFA now when i try to run ansible iwth module https://docs.ansible.com