From my AWS EC2 i have an AIM role which provides s3 access on machine level.
This works great from local AWS CLI.
The source gets added, but when trying to access i get:
[qtp1274672203-137] ERROR c.d.d.server.GenericExceptionMapper - Unexpected exception when processing GET http://localhost:9047/apiv2/source//folder/?nocache=1570177566465 : com.amazonaws.services.s3.model.AmazonS3Exception: Access Denied (Service: Amazon S3; Status Code: 403; Error Code: AccessDenied; Request ID:; S3 Extended Request ID: )
Config: No Auth, Public bucket added:
Adding keys is not an option.
I had tried adding the IAM Role to “IAM Role to Assume” - alas as the machine itself has access so i’m not sure why we’d need it
(Btw, you need to put the ARN here, but this is only from the logs, gj on the documentation and the help text )
This generates is not authorised to perform: sts:AssumeRole - Again, why not use the the default mechanism?
How to solve this?