Difference between revisions of "Error: checking AWS STS access"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
− | Error: checking [[AWS STS]] access – [[cannot get role ARN for current session]]: operation error STS: [[GetCallerIdentity]], failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no [[EC2 IMDS]] role found, operation error [[ec2imds]]: [[GetMetadata]], request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout | + | Error: checking [[AWS STS]] access – [[cannot get role ARN for current session]]: operation error STS: [[GetCallerIdentity]], failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no [[EC2 IMDS]] role found, operation error [[ec2imds]]: [[GetMetadata]], request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: [[i/o timeout]] |
Revision as of 16:58, 5 September 2022
Error: checking AWS STS access – cannot get role ARN for current session: operation error STS: GetCallerIdentity, failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no EC2 IMDS role found, operation error ec2imds: GetMetadata, request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout
See also
- AWS STS
(sts:)
,aws sts
[get-session-token
|get-caller-identity
|assume-role | assume-role-with-web-identity | assume-role-with-saml | get-access-key-info ]
- AWS Security Token Service (STS),
aws sts, aws iam set-security-token-service-preferences
, AWS bearer tokens,sts.amazonaws.com, AssumedRoleUser
Advertising: