sts:AssumeRoleWithWebIdentity
Jump to navigation
Jump to search
(combined from similar events): failed to provision volume with StorageClass "gp2": rpc error: code = Internal desc = Could not create volume "pvc-641db932-4715-4f5a-b2d2-9c0c4117dd27": could not create volume in EC2: WebIdentityErr: failed to retrieve credentials caused by: AccessDenied: Not authorized to perform sts:AssumeRoleWithWebIdentity status code: 403, request id: 6bc69eb4-96a6-4167-b5e3-1234567890
Activities[edit]
- Managing the Amazon EBS CSI driver as an Amazon EKS add-on
- Configuring a Kubernetes service account to assume an IAM role
Related[edit]
- Could not create volume in EC2
- Terraform Dynamic Credentials Setup Examples
aws-node: system:serviceaccount:kubesystem:aws-node
aws_iam_role
See also[edit]
ebs-csi: aws-ebs-csi-driver
: Installation, ProvisioningFailed,sts:AssumeRoleWithWebIdentity
- sts:AssumeRole
- Kubernetes Persistent Volume Claim (PVC) (
kind: PersistentVolumeClaim
), Kubernetes Persistent volumes (PV)(kind: PersistentVolume)
,kubectl describe pvc, kubectl get pvc
, ClaimLost, ProvisioningSucceeded, PV access control
Advertising: