Difference between revisions of "AWS Security Token Service (STS)"
Jump to navigation
Jump to search
Line 14: | Line 14: | ||
eksctl get cluster | eksctl get cluster | ||
− | Error: checking AWS STS access – cannot get role ARN for current session: operation error STS: [[GetCallerIdentity]], failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no [[EC2 IMDS]] role found, operation error [[ec2imds]]: GetMetadata, request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout | + | Error: checking AWS STS access – cannot get role ARN for current session: operation error STS: [[GetCallerIdentity]], failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no [[EC2 IMDS]] role found, operation error [[ec2imds]]: [[GetMetadata]], request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout |
== See also == | == See also == |
Revision as of 16:56, 5 September 2022
Since 2015 available in every region https://aws.amazon.com/blogs/security/aws-security-token-service-is-now-available-in-every-aws-region/
Activities
- Read sts blog: https://aws.amazon.com/blogs/security/tag/aws-sts/
- Read StackOverflow related questions: https://stackoverflow.com/questions/tagged/aws-sts?tab=Votes
Related
eksctl get cluster Error: checking AWS STS access – cannot get role ARN for current session: operation error STS: GetCallerIdentity, failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no EC2 IMDS role found, operation error ec2imds: GetMetadata, request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout
See also
Advertising: