Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Received 403 from AWSAuth, invalidating credentials for retrial... /_bulk?timeout=1m; ; 403; 0.210s #110

Open
jbizzle3000 opened this issue Nov 30, 2021 · 3 comments

Comments

@jbizzle3000
Copy link

Could someone provide guidance... My AWS creds are good for the role tied to the instance. The domain is in the same VPC and allows this role access. I've not seen the last line in the below snippet in any of the other issues. Any help or direction is more than appreciated. Trying to populate the index from a Nutch instance.

./aws-es-proxy-1.3-linux-386 -listen 0.0.0.0:9200 -endpoint https://vpc-webmgmtelasticsearch-secure2-fjsfnpigonh5xnw2d72qq52yma.us-east-1.es.amazonaws.com -verbose
INFO[2021-30-11 19:51:04] Listening on 0.0.0.0:9200...
INFO[2021-30-11 19:51:49] Using default credentials
INFO[2021-30-11 19:51:49] Generated fresh AWS Credentials object
ERRO[2021-30-11 19:51:49] Received 403 from AWSAuth, invalidating credentials for retrial
2021/11/30 19:51:49 -> POST; 10.60.x.x:37502; /_bulk?timeout=1m; ; 403; 0.210s

@kirstenmay
Copy link

Any updates on this, I am encountering the same issue

@mcrivar
Copy link

mcrivar commented Feb 22, 2022

Getting the same error, got the following access policy applied on opensearch:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::<>:role/aws-es-proxy"
},
"Action": "es:",
"Resource": "arn:aws:es:us-east-1:<>:domain/test-domain
"
}
]
}

Tried this first with a role, which has completely open.
Getting same error with providing AWS keys.

@mcrivar
Copy link

mcrivar commented Feb 22, 2022

Actually, I was able to fix this now.
What needs to be done in addition to AWS Role/User configuration in AWS for the aws-es-proxy, is to add this role/user that is used with it to OpenSearch Roles as internal user/backend role with the ARN.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants