Difference between revisions of "Sts:AssumeRoleWithWebIdentity"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
{{lc}} | {{lc}} | ||
(combined from similar events): failed to provision volume with StorageClass "gp2": rpc error: code = Internal desc = [[Could not create volume]] "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": [[could not create volume in EC2]]: [[WebIdentityErr]]: failed to retrieve credentials caused by: AccessDenied: Not authorized to perform [[sts:]]AssumeRoleWithWebIdentity status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890 | (combined from similar events): failed to provision volume with StorageClass "gp2": rpc error: code = Internal desc = [[Could not create volume]] "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": [[could not create volume in EC2]]: [[WebIdentityErr]]: failed to retrieve credentials caused by: AccessDenied: Not authorized to perform [[sts:]]AssumeRoleWithWebIdentity status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890 | ||
+ | |||
+ | == Activities == | ||
+ | * [[Managing the Amazon EBS CSI driver as an Amazon EKS add-on]] | ||
+ | * [[Configuring a Kubernetes service account to assume an IAM role]] | ||
== Related == | == Related == | ||
* [[Could not create volume in EC2]] | * [[Could not create volume in EC2]] | ||
− | |||
− | |||
* [[Terraform Dynamic Credentials Setup Examples]] | * [[Terraform Dynamic Credentials Setup Examples]] | ||
* <code>[[aws-node]]: [[system:serviceaccount]]:kubesystem:aws-node</code> | * <code>[[aws-node]]: [[system:serviceaccount]]:kubesystem:aws-node</code> |
Latest revision as of 16:16, 4 July 2024
(combined from similar events): failed to provision volume with StorageClass "gp2": rpc error: code = Internal desc = Could not create volume "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": could not create volume in EC2: WebIdentityErr: failed to retrieve credentials caused by: AccessDenied: Not authorized to perform sts:AssumeRoleWithWebIdentity status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890
Activities[edit]
- Managing the Amazon EBS CSI driver as an Amazon EKS add-on
- Configuring a Kubernetes service account to assume an IAM role
Related[edit]
- Could not create volume in EC2
- Terraform Dynamic Credentials Setup Examples
aws-node: system:serviceaccount:kubesystem:aws-node
aws_iam_role
See also[edit]
ebs-csi: aws-ebs-csi-driver
: Installation, ProvisioningFailed,sts:AssumeRoleWithWebIdentity
- sts:AssumeRole
- Kubernetes Persistent Volume Claim (PVC) (
kind: PersistentVolumeClaim
), Kubernetes Persistent volumes (PV)(kind: PersistentVolume)
,kubectl describe pvc, kubectl get pvc
, ClaimLost, ProvisioningSucceeded, PV access control
Advertising: