Difference between revisions of "AWS Security Token Service (STS)"

From wikieduonline
Jump to navigation Jump to search
Line 14: Line 14:
  
 
  eksctl get cluster
 
  eksctl get cluster
  Error: checking AWS STS access – cannot get role ARN for current session: operation error STS: [[GetCallerIdentity]], failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no [[EC2 IMDS]] role found, operation error [[ec2imds]]: GetMetadata, request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout
+
  Error: checking AWS STS access – cannot get role ARN for current session: operation error STS: [[GetCallerIdentity]], failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no [[EC2 IMDS]] role found, operation error [[ec2imds]]: [[GetMetadata]], request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout
  
 
== See also ==
 
== See also ==

Revision as of 16:56, 5 September 2022


Since 2015 available in every region https://aws.amazon.com/blogs/security/aws-security-token-service-is-now-available-in-every-aws-region/

Activities

Related

eksctl get cluster
Error: checking AWS STS access – cannot get role ARN for current session: operation error STS: GetCallerIdentity, failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no EC2 IMDS role found, operation error ec2imds: GetMetadata, request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout

See also

Advertising: