Difference between revisions of "Sts:AssumeRoleWithWebIdentity"
Jump to navigation
Jump to search
Line 12: | Line 12: | ||
== See also == | == See also == | ||
* {{aws-ebs-csi-driver}} | * {{aws-ebs-csi-driver}} | ||
+ | * {{sts:AssumeRole}} | ||
* {{PVC}} | * {{PVC}} | ||
[[Category:Storage]] | [[Category:Storage]] |
Revision as of 16:06, 4 July 2024
(combined from similar events): failed to provision volume with StorageClass "gp2": rpc error: code = Internal desc = Could not create volume "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": could not create volume in EC2: WebIdentityErr: failed to retrieve credentials caused by: AccessDenied: Not authorized to perform sts:AssumeRoleWithWebIdentity status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890
Related
- Could not create volume in EC2
- Managing the Amazon EBS CSI driver as an Amazon EKS add-on
- Configuring a Kubernetes service account to assume an IAM role
- Terraform Dynamic Credentials Setup Examples
aws-node: system:serviceaccount:kubesystem:aws-node
aws_iam_role
See also
ebs-csi: aws-ebs-csi-driver
: Installation, ProvisioningFailed,sts:AssumeRoleWithWebIdentity
- sts:AssumeRole
- Kubernetes Persistent Volume Claim (PVC) (
kind: PersistentVolumeClaim
), Kubernetes Persistent volumes (PV)(kind: PersistentVolume)
,kubectl describe pvc, kubectl get pvc
, ClaimLost, ProvisioningSucceeded, PV access control
Advertising: