Difference between revisions of "Sts:AssumeRoleWithWebIdentity"
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{lc}} | {{lc}} | ||
− | (combined from similar events): failed to provision volume with StorageClass "gp2": rpc error: code = Internal desc = [[Could not create volume]] "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": [[could not create volume in EC2]]: [[WebIdentityErr]]: failed to retrieve credentials caused by: AccessDenied: Not authorized to perform sts:AssumeRoleWithWebIdentity status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890 | + | (combined from similar events): failed to provision volume with StorageClass "gp2": rpc error: code = Internal desc = [[Could not create volume]] "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": [[could not create volume in EC2]]: [[WebIdentityErr]]: failed to retrieve credentials caused by: AccessDenied: Not authorized to perform [[sts:]]AssumeRoleWithWebIdentity status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890 |
== Related == | == Related == | ||
Line 8: | Line 8: | ||
* [[Terraform Dynamic Credentials Setup Examples]] | * [[Terraform Dynamic Credentials Setup Examples]] | ||
* <code>[[aws-node]]: [[system:serviceaccount]]:kubesystem:aws-node</code> | * <code>[[aws-node]]: [[system:serviceaccount]]:kubesystem:aws-node</code> | ||
+ | * <code>[[aws_iam_role]]</code> | ||
== See also == | == See also == |
Revision as of 09:45, 12 June 2024
(combined from similar events): failed to provision volume with StorageClass "gp2": rpc error: code = Internal desc = Could not create volume "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": could not create volume in EC2: WebIdentityErr: failed to retrieve credentials caused by: AccessDenied: Not authorized to perform sts:AssumeRoleWithWebIdentity status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890
Related
- Could not create volume in EC2
- Managing the Amazon EBS CSI driver as an Amazon EKS add-on
- Configuring a Kubernetes service account to assume an IAM role
- Terraform Dynamic Credentials Setup Examples
aws-node: system:serviceaccount:kubesystem:aws-node
aws_iam_role
See also
ebs-csi: aws-ebs-csi-driver
: Installation, ProvisioningFailed,sts:AssumeRoleWithWebIdentity
- Kubernetes Persistent Volume Claim (PVC) (
kind: PersistentVolumeClaim
), Kubernetes Persistent volumes (PV)(kind: PersistentVolume)
,kubectl describe pvc, kubectl get pvc
, ClaimLost, ProvisioningSucceeded, PV access control
Advertising: