-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enforcing v2 of AWS IDMS causes Access Denied error #3143
Comments
Looks like we need to investigate / find out how to enable v2 IDMS with minio library. Help wanted! (: |
I've looked at the minIO documentation, and it seems like it doesn't have support for IDMSv2. Is there a reason for using minIO rather than the AWS SDK? |
Hello 👋 Looks like there was no activity on this issue for the last two months. |
stale bot, we still need this. |
Hello 👋 Looks like there was no activity on this issue for the last two months. |
Still needed. |
Hello 👋 Looks like there was no activity on this issue for the last two months. |
Still needed. |
Hello 👋 Looks like there was no activity on this issue for the last two months. |
👍 Still needed |
Closing for now as promised, let us know if you need this to be reopened! 🤗 |
I think this is still to be resolved. I'm not sure why the stale bot ignored my comment. |
Is it still to be resolved? |
I believe this is still needed. I don't know why the issue was closed. |
@bwplotka Can you un-close this? It's definitely still needed.. |
Looks like Minio now supports this IDMS v2 (minio/minio-go#1489) and so probably just needs a Thanos-side code change? |
Thanos, Prometheus and Golang version used:
Note: I've also tried with the latest stable version of Thanos (0.14) but the same error appeared.
Object Storage Provider:
What happened:
Following AWS security recommendations I have enforced usage of v2 IDMS on EC2 instances of Thanos Compactor. This has caused the following error to appear in logs:
which seems to be coming from fetcher.go file, which in turn seems to be using Minio library. (I wonder if upgrading Minio could help at all).
Also note that when I remove the policy, error reliably disappears, so it shouldn't be related with permissions to access a bucket.
What you expected to happen:
No errors.
How to reproduce it (as minimally and precisely as possible):
Enforce v2 of IDMS on Compactor EC2 instance, which includes two steps:
metadata_options.http_tokens
to "required"Full logs to relevant components: N/A
Anything else we need to know: N/A
The text was updated successfully, but these errors were encountered: