-
Notifications
You must be signed in to change notification settings - Fork 143
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS Access Key Id not match using aws iam user #753
Comments
THe error is
|
we've noticed every time it generates a new access key while making the connection, not the one in the config. the config is being read, but the one in the actual connection is not the same. |
Finally, we are able to see the issue, if we are using iam role, everytime, medus is using a temporary role keyid for the connection, it will skip reading the /etc/medusa-secrets/credentials . However, if we are using iam user, we have to remove SA setup, so it will take default /etc/medusa-secrets/credentials . and do the backups without issue.s |
Hello @dxu-sfx ! It has been some time since we had an issue with this, so I'm a bit rusty on this topic. Just like the documentation says, you first need to create an IAM Policy to declare what permissions should be granted. Then you have two options - assign this policy to a role or to a user. The user aproach seems to be what you're already doing. You create the user, attach the policy to it, generate credentials for the user, place them on the node and reference them in the config file. The idea behind the role is that you can skip a bunch of this. What you do is configure the instance itself (or the container) to assume this role. This means the instance will implicitly run with the permissions of this role. So, in conclusion, please check if you have the assume role thing set up, and try removing the credentials from the config (and the file system). |
Hello @dxu-sfx ! Did you manage to work this out? Is there something more we can help with? |
Project board link
Hello there,
I am having an issue in using iam user & role properly. folliwng https://github.com/thelastpickle/cassandra-medusa/blob/edb76efd6078715a6311e24e1a1fd08641e92810/docs/aws_s3_setup.md#create-an-aws-iam-role-or-aws-iam-user-for-backups
Here is the medusa container, where I configured the s3 and key files , medusa standalone is having same config as this containers
keyid and key is created and match with what I have in the S3 user
This is my medus yaml file.
It seems I can connect to S3, but ever since it is trying to upload file, it is throwing issue to me
I can leverage my script and it can properly talk to s3 with my S3 bucket which works, However, what could be the issue if this is throwing the issue to me if medusa is running the same process itself?
Can you reproduce this or do you have any clue how should I debug this?
┆Issue is synchronized with this Jira Story by Unito
┆Issue Number: MED-12
The text was updated successfully, but these errors were encountered: