Open anemptyair opened 4 years ago
Are you using an AWS Ec2 instance profile or an IAM role for service account (IRSA) ?
Are you using an AWS Ec2 instance profile or an IAM role for service account (IRSA) ?
Yes it is
Duplicates #368
Error parsing Seal configuration: error fetching AWS KMS wrapping key information: NoCredentialProviders: no valid providers in chain. Deprecated. For verbose messaging see aws.Config.CredentialsChainVerboseErrors
still facing this issue, any resolution ?
@nagender1005 I am also facing the same issue. Please share with me the solution if you found it.
Same issue with me. What does this message about not valid providers refers to?
Same issue with me. What does this message about not valid providers refers to?
I have resolved this issue by adding region value in the vault.hcl file for seal "awskms" and upgraded vault to the latest version.
The solution that I found was to provide the access_key
and secret_key
directly to the config
you can also pass in role to assume , I think
seal "awskms"{
access_key = ""
secret_key = ""
region = "ap-south-1"
kms_key_id = "KMSKEY"
}
Hope this works for you.
Hello, a little late but are you using IRSA ?
Describe the bug I set below configration for auto-unseal. And give full kms pemission to eks node role. seal "awskms" { region = "us-west-2" kms_key_id = "8ecb59ea-1fe7-47f4-ab5e-XXXXXXXX" } But get the error from vault logs: Error parsing Seal configuration: error fetching AWS KMS wrapping key information: NoCredentialProviders: no valid providers in chain. Deprecated. For verbose messaging see aws.Config.CredentialsChainVerboseErrors
Expected behavior Vault can be running.
Environment
Chart values: seal "awskms" { region = "us-west-2" kms_key_id = "8ecb59ea-1fe7-47f4-ab5e-XXXXXXXX" }