Closed mpdude closed 4 years ago
Just out of curiosity: May I ask what your reasons are to use the credentials file instead of an instance role?
It’s complicated: That I had to use the legacy ec2-consistent-snapshot script to make clean snapshots of MySQL MyISAM tables, but that was build with the AWS SDK for Perl, which itself has been abandoned for a long time and exhibits random authentication failures if the instance has an associated instance profile.
But since I opened this issue here, I wrote my own backup script which, in fact, even relies on the instance profile and makes credentials handling easier.
So I am going to close this – thanks anyway!
For reasons, I'd like to avoid using an EC2 Instance Profile to give the
codedeploy-agent
its permissions. Instead, I'd like to use "classic" credentials in the~/.aws/credentials
file.I've set this up with an IAM User that has the same permissions (the same IAM Policy attached) as the role would have.
Still, I get the following errors:
Is this supported at all?