2016-08-30 20:24:59.940 - WARN SimpleDBRecorder - [SimpleDBRecorder.java:287] Error while trying to auto-create SimpleDB domain
com.amazonaws.AmazonClientException: Unable to load AWS credentials from any provider in the chain
--
You received this message because you are subscribed to the Google Groups "Simian Army Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to simianarmy-users+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Thanks for your response.
If you aren't seeing this there is a config issue. If you do see this it is something else.--
Where do I find the logs
You received this message because you are subscribed to a topic in the Google Groups "Simian Army Users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/simianarmy-users/uos_R6RYV4I/unsubscribe.
To unsubscribe from this group and all its topics, send an email to simianarmy-users+unsubscribe@googlegroups.com.
If you are using the latest code, you should see a message like this in the log:Using STSAssumeRoleSessionCredentialsProvider with assume role <your assumeRoleArn>If you aren't seeing this there is a config issue. If you do see this it is something else.
On Tue, Aug 30, 2016 at 3:33 PM, Bindu Madhavi V K <binduma...@gmail.com> wrote:
Thanks for your response.I am setting the following property:simianarmy.client.aws.assumeRoleArn = arn:aws:iam::<ARN>:role/<Role Name>AWS Cli commands are going through, so it means it is able to reach AWS.And one more point is this instance is behind proxy
--
You received this message because you are subscribed to the Google Groups "Simian Army Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to simianarmy-use...@googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to simianarmy-users+unsubscribe@googlegroups.com.
"Statement": [
{
"Action": [
"sts:AssumeRole",
"sts:DecodeAuthorizationMessage"
],
"Effect": "Allow",
"Resource": [
"arn:aws:iam::*:role/JanitorMonkey"
]
}
]
}simianarmy.client.aws.assumeRoleArn=arn:aws:iam::XXXXXX:role/JanitorMonkey
{
"Statement": [
{
"Action": [
"ec2:deletevolume",
"ec2:deletesnapshot",
"ec2:deregisterimage",
"ec2:describeconversiontasks",
"ec2:describeexporttasks",
"ec2:describeimportsnapshottasks",
"ec2:describelicenses",
"ec2:describemovingaddresses",
"ec2:describenetworkinterfaceattribute",
"ec2:describespotdatafeedsubscription",
"ec2:describespotfleetinstances",
"ec2:describespotfleetrequesthistory",
"ec2:reportinstancestatus",
"ec2:resetinstanceattribute",
"ec2:resetsnapshotattribute",
"ec2:unmonitorinstances",
"ec2:terminateinstances",
"ses:sendemail",
.....etc.....
],
"Effect": "Allow",
"Resource": [
"*"
]
}
]
}Hi Ed,Thanks for the help so far. I think where I'm having issues running SimianArmy is setting up the AWS role's policy correctly so that it can be assumed by the instance. Essentially this is what I have:- I created a new role, CHAOS, that will be assigned to an EC2 instance. I want chaos to run with an assumed role.- I added the needed policy for chaos (https://github.com/Netflix/SimianArmy/wiki/Quick-Start-Guide#setup-user-or-role-policies), but the additional policy to run chaos with assume role is where I am lost: "There is some additional set up required within AWS (the sts:AssumeRole action must be allowed on this role)" (https://github.com/Netflix/SimianArmy/wiki/Client-Settings#simianarmyclientawsassumerolearn)- Since the instance itself is getting an instance role of CHAOS, any AWS API calls made from the CLI should pick up the instance role's permissions/keys. It seems to be working from the CLI (I can access the SDB created by chaos, for example), but it is not getting picked up by simianarmy (the property "simianarmy.client.aws.assumeRoleArn" does show that is it is picked up upon starting chaos). On a more theoretical point, why should the assume role action be needed on this role, since any program running on that EC2 instance should be able to get that role's API credentials as the EC2 instance itself has that role?In essence, would you be able to share the AWS policy required to run SimianArmy with assume role?
Thanks!Tariq