-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Error reading aws/creds/my-role: Get http://127.0.0.1:8200/v1/aws/creds/my-role: net/http: request canceled (Client.Timeout exceeded while awaiting headers) #5878
Comments
In the /var/log/messages file I can see below errors when I try to execute vault read aws/creds/my-role
|
Hi @pawarrchetan -- that error most likely means your box doesn't have network connectivity to be able to talk to the AWS IAM endpoints. Does your machine have outbound internet access (e.g., in a subnet with routes to either an IGW or NAT, a security group that permits outbound access to 0.0.0.0/0, no iptables rules on the machine blocking outbound internet access)? |
@joelthompson however my machine has access to the AWS API endpoints as I can easily use aws cli to communicate with the AWS resources. Non-authoritative answer: I can list the S3 buckets in my account using aws cli. aws s3api list-buckets{ Regards... |
The ListBucket command could be going through an S3 VPC Endpoint, while the IAM calls wouldn't. Can you use the awscli to make an IAM call, e.g., |
@joelthompson aws iam get-user{ |
ANy update on the request ? Regards... |
I'm facing a similar issue but for Assume role credentials. |
I'm facing the same issue. Is this a confirmed bug? |
this is my code sanitized for here.
my vault is running and showing as initialized. When I run the above code it is successful. however when I run the following: vault read /aws/creds/my-role
|
We have two different issues here. @TomHowarth your Regarding the first issue from @pawarrchetan, it looks networking related to me. If this still persists, I'd like to know more about the network configuration you're using, how the VPC is set up, which region you're running. |
We haven't heard back regarding this issue in over 24 days. To try and keep our GitHub issues current, we'll be closing this issue in approximately seven days if we do not hear back regarding this issue. Please let us know if you can still reproduce this issue, and if there is any more information you could share, otherwise we'll be closing this issue. |
Closing for now. Let us know if you have any more information! |
Describe the bug
After using the AWS Secrets Backend in VAULT I am getting below error after using the correct credentials stored in VAULT.
[root@ip-100-66-12-90 tf]# vault read aws/creds/my-role
Error reading aws/creds/my-role: Get http://127.0.0.1:8200/v1/aws/creds/my-role: net/http: request canceled (Client.Timeout exceeded while awaiting headers)
To Reproduce
Steps to reproduce the behavior:
access_key=ABCDEFGHIJKL
secret_key=AcVFGCbhjksluyCGD/JHGDPbps2X
region=eu-central-1
-- Above entry is dummy keys.
vault write aws/roles/my-role
credential_type=iam_user
policy_document=-<<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"iam:DeleteAccessKey",
"iam:GetUserPolicy",
"iam:GetAccessKeyLastUsed",
"iam:UpdateAccessKey",
"iam:GetUser",
"iam:ListRolePolicies",
"iam:CreateAccessKey",
"iam:ListAccessKeys"
],
"Resource": "arn:aws:iam::80527613****:user/ark-key-rotate"
},
{
"Sid": "VisualEditor1",
"Effect": "Allow",
"Action": [
"iam:GenerateCredentialReport",
"iam:GetContextKeysForCustomPolicy",
"iam:ListPolicies",
"iam:ListUsers",
"iam:GetAccountAuthorizationDetails",
"iam:GetCredentialReport",
"iam:DeleteAccessKey",
"iam:GetUserPolicy",
"iam:GetAccessKeyLastUsed",
"iam:UpdateAccessKey",
"iam:GetUser",
"iam:ListRolePolicies",
"iam:CreateAccessKey",
"iam:ListAccessKeys"
],
"Resource": "*"
}
]
}
EOF
Success! Data written to: aws/roles/my-role
vault read aws/creds/my-role
Error reading aws/creds/my-role: Get http://127.0.0.1:8200/v1/aws/creds/my-role: net/http: request canceled (Client.Timeout exceeded while awaiting headers)
Expected behavior
The output should contain the new temporary IAM credentials which can be used to login to AWS CLI.
Environment:
vault status
):vault status
Key Value
Seal Type shamir
Initialized true
Sealed false
Total Shares 3
Threshold 2
Version 0.11.4
Cluster Name vault-cluster-fb591cdc
Cluster ID a924d375-d667-0303-2d1d-4ecfaed1f4de
HA Enabled false
Vault CLI Version (retrieve with
vault version
):vault version
Vault v0.11.4 ('612120e76de651ef669c9af5e77b27a749b0dba3')
Server Operating System/Architecture:
Amazon Linux
Linux ip-100-66-12-**.eu-central-1.compute.internal 4.14.42-61.37.amzn2.x86_64 Initial Website Import #1 SMP Mon May 21 23:43:11 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
Vault server configuration file(s):
Additional context
I would like to know what could be the problem here.
I have also added the credentials for the master user in the .aws/credentials file.
but the error still persists.
The text was updated successfully, but these errors were encountered: