aws-es-proxy icon indicating copy to clipboard operation
aws-es-proxy copied to clipboard

Received 403 from AWSAuth, invalidating credentials for retrial... /_bulk?timeout=1m; ; 403; 0.210s

Open jbizzle3000 opened this issue 4 years ago • 3 comments

Could someone provide guidance... My AWS creds are good for the role tied to the instance. The domain is in the same VPC and allows this role access. I've not seen the last line in the below snippet in any of the other issues. Any help or direction is more than appreciated. Trying to populate the index from a Nutch instance.

./aws-es-proxy-1.3-linux-386 -listen 0.0.0.0:9200 -endpoint https://vpc-webmgmtelasticsearch-secure2-fjsfnpigonh5xnw2d72qq52yma.us-east-1.es.amazonaws.com -verbose INFO[2021-30-11 19:51:04] Listening on 0.0.0.0:9200... INFO[2021-30-11 19:51:49] Using default credentials INFO[2021-30-11 19:51:49] Generated fresh AWS Credentials object ERRO[2021-30-11 19:51:49] Received 403 from AWSAuth, invalidating credentials for retrial 2021/11/30 19:51:49 -> POST; 10.60.x.x:37502; /_bulk?timeout=1m; ; 403; 0.210s

jbizzle3000 avatar Nov 30 '21 20:11 jbizzle3000

Any updates on this, I am encountering the same issue

kirstenmay avatar Feb 21 '22 19:02 kirstenmay

Getting the same error, got the following access policy applied on opensearch:

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::<>:role/aws-es-proxy" }, "Action": "es:", "Resource": "arn:aws:es:us-east-1:<>:domain/test-domain" } ] }

Tried this first with a role, which has completely open. Getting same error with providing AWS keys.

mcrivar avatar Feb 22 '22 17:02 mcrivar

Actually, I was able to fix this now. What needs to be done in addition to AWS Role/User configuration in AWS for the aws-es-proxy, is to add this role/user that is used with it to OpenSearch Roles as internal user/backend role with the ARN.

mcrivar avatar Feb 22 '22 17:02 mcrivar