To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/c7fa0816-d05a-43ae-8629-fae9c34a64c4%40googlegroups.com.
Hi Hridyesh,
What is in the Vault logs? Expirations are logged; if Vault is having trouble performing the revocation in AWS that error should be getting logged too.
Best,
Jeff
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/45c2190f-ac13-486f-abcf-dd111921f363%40googlegroups.com.
The root credentials need permission to perform various IAM actions. These are the actions that the AWS secret backend uses to manage IAM credentials. Here is an example IAM policy that would grant these permissions:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"iam:CreateAccessKey",
"iam:CreateUser",
"iam:PutUserPolicy",
"iam:ListGroupsForUser",
"iam:ListUserPolicies",
"iam:ListAccessKeys",
"iam:DeleteAccessKey",
"iam:DeleteUserPolicy",
"iam:RemoveUserFromGroup",
"iam:DeleteUser"
],
"Resource": [
"arn:aws:iam::ACCOUNT-ID-WITHOUT-HYPHENS:user/vault-*"
]
}
]
}Glad it's working!
I have added it to the doc and it's deploying to the docs site now.
--Jeff
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/6fbaa521-7384-43c2-8c96-43cf2aa7a2fe%40googlegroups.com.