<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Nifi PutS3Object error with AMI Role (AwsCredentialsProviderControlerService) in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Nifi-PutS3Object-error-with-AMI-Role/m-p/193844#M68632</link>
    <description>&lt;P&gt;In Nifi with the PutS3Object, we get an error using AWS Credentials Provider service.&lt;/P&gt;&lt;P&gt;AwsCredentialsProviderControlerService is configured to use IAM roles  as follows:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Use Default Credentials = True &lt;BR /&gt;Use Anonymous Credentials = False &lt;BR /&gt;Assume Role ARN = arn:aws:iam::ahjhdiauisjkk:role/role-test &lt;BR /&gt;Assume Role Session Name = nifitest (*arbitary name*) &lt;BR /&gt;Session time = 3600 &lt;BR /&gt;&lt;BR /&gt;No other values are set in the AwsCredentialsProviderControlerService&lt;/P&gt;&lt;P&gt;We are using IAM roles because of organizational policies.&lt;/P&gt;&lt;P&gt;The error is loosely transcribe here (it may contain typos):&lt;/P&gt;&lt;PRE&gt;13:40:46 EDT - All Nodes - ERROR
PutS3Object[id=asdfasdfasdfasdf] Failed to put StandardFlowFileRecord[uuid=xxxxxxxx,claim=StandardContentClaim[resourceClaim=StandardResourceClaim[id=11111111, container=default,section=1], offset=0,length=222222],offset=1,name=test3,size=33333] to Amazon S2 due to com.amazonaws.services.securitytokenmodel.AWSSEcurityToeknServiceException: User: arn:aws:sts::7777777:assumed-role/role-hdf-node/i-03333330000 is not authorized to perform: sts:Assumerole on resource: arn:aws:sts::7777777:role/role-hdf-node (Service: AWSSecurityToeknService;Status Code: 403; Error Code: AccessDenied; Request ID: aaaaaaaaaaaa) 
com.amazonaws.services.securitytokenmodel.AWSSEcurityToeknServiceException: User: arn:aws:sts::7777777:assumed-role/role-hdf-node/i-03333330000 is not authorized to perform: sts:Assumerole on resource: arn:aws:sts::7777777:role/role-hdf-node (Service: AWSSecurityToeknService;Status Code: 403; Error Code: AccessDenied; Request ID: aaaaaaaaaaaa) &lt;/PRE&gt;&lt;P&gt;Thanks for any help.&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;</description>
    <pubDate>Wed, 27 Sep 2017 05:48:57 GMT</pubDate>
    <dc:creator>james_jones</dc:creator>
    <dc:date>2017-09-27T05:48:57Z</dc:date>
    <item>
      <title>Nifi PutS3Object error with AMI Role (AwsCredentialsProviderControlerService)</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Nifi-PutS3Object-error-with-AMI-Role/m-p/193844#M68632</link>
      <description>&lt;P&gt;In Nifi with the PutS3Object, we get an error using AWS Credentials Provider service.&lt;/P&gt;&lt;P&gt;AwsCredentialsProviderControlerService is configured to use IAM roles  as follows:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Use Default Credentials = True &lt;BR /&gt;Use Anonymous Credentials = False &lt;BR /&gt;Assume Role ARN = arn:aws:iam::ahjhdiauisjkk:role/role-test &lt;BR /&gt;Assume Role Session Name = nifitest (*arbitary name*) &lt;BR /&gt;Session time = 3600 &lt;BR /&gt;&lt;BR /&gt;No other values are set in the AwsCredentialsProviderControlerService&lt;/P&gt;&lt;P&gt;We are using IAM roles because of organizational policies.&lt;/P&gt;&lt;P&gt;The error is loosely transcribe here (it may contain typos):&lt;/P&gt;&lt;PRE&gt;13:40:46 EDT - All Nodes - ERROR
PutS3Object[id=asdfasdfasdfasdf] Failed to put StandardFlowFileRecord[uuid=xxxxxxxx,claim=StandardContentClaim[resourceClaim=StandardResourceClaim[id=11111111, container=default,section=1], offset=0,length=222222],offset=1,name=test3,size=33333] to Amazon S2 due to com.amazonaws.services.securitytokenmodel.AWSSEcurityToeknServiceException: User: arn:aws:sts::7777777:assumed-role/role-hdf-node/i-03333330000 is not authorized to perform: sts:Assumerole on resource: arn:aws:sts::7777777:role/role-hdf-node (Service: AWSSecurityToeknService;Status Code: 403; Error Code: AccessDenied; Request ID: aaaaaaaaaaaa) 
com.amazonaws.services.securitytokenmodel.AWSSEcurityToeknServiceException: User: arn:aws:sts::7777777:assumed-role/role-hdf-node/i-03333330000 is not authorized to perform: sts:Assumerole on resource: arn:aws:sts::7777777:role/role-hdf-node (Service: AWSSecurityToeknService;Status Code: 403; Error Code: AccessDenied; Request ID: aaaaaaaaaaaa) &lt;/PRE&gt;&lt;P&gt;Thanks for any help.&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2017 05:48:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Nifi-PutS3Object-error-with-AMI-Role/m-p/193844#M68632</guid>
      <dc:creator>james_jones</dc:creator>
      <dc:date>2017-09-27T05:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi PutS3Object error with AMI Role (AwsCredentialsProviderControlerService)</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Nifi-PutS3Object-error-with-AMI-Role/m-p/193845#M68633</link>
      <description>&lt;PRE&gt;com.amazonaws.services.securitytokenmodel.AWSSEcurityToeknServiceException: User: arn:aws:sts::7777777:assumed-role/role-hdf-node/i-03333330000 is not authorized to perform: sts:Assumerole on resource: arn:aws:sts::7777777:role/role-hdf-node.&lt;/PRE&gt;&lt;P&gt;that probably is the root cause, you may have to give cross role permission in AWS IAM , to the credential taht is setup on the ec2 node hosting nifi.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2017 23:24:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Nifi-PutS3Object-error-with-AMI-Role/m-p/193845#M68633</guid>
      <dc:creator>knarayanan</dc:creator>
      <dc:date>2017-09-27T23:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi PutS3Object error with AMI Role (AwsCredentialsProviderControlerService)</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Nifi-PutS3Object-error-with-AMI-Role/m-p/193846#M68634</link>
      <description>&lt;P&gt;Thanks &lt;A rel="user" href="https://community.cloudera.com/users/10180/knarayanan.html" nodeid="10180"&gt;@Karthik Narayanan&lt;/A&gt;. We do not see an option for cross role permission. Would it have another name? They did grant "Assumerole" but it is actually the same account so I'm not sure why it would need to assume a role in the first place.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2017 01:48:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Nifi-PutS3Object-error-with-AMI-Role/m-p/193846#M68634</guid>
      <dc:creator>james_jones</dc:creator>
      <dc:date>2017-09-28T01:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi PutS3Object error with AMI Role (AwsCredentialsProviderControlerService)</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Nifi-PutS3Object-error-with-AMI-Role/m-p/193847#M68635</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/2229/jamesjones.html" nodeid="2229"&gt;@james.jones&lt;/A&gt;
&lt;/P&gt;&lt;P&gt; Hi not sure what it is called, but the what i think has to happen is the credentials that you are using for your ec2 machine, if that is xyz. You need allow xyz to impersonate arn:aws:sts::7777777:assumed-role/role-hdf-node/i-03333330000. &lt;/P&gt;&lt;P&gt;see if this helps &lt;A href="http://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_cross-account-with-roles.html" target="_blank"&gt;http://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_cross-account-with-roles.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2017 20:53:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Nifi-PutS3Object-error-with-AMI-Role/m-p/193847#M68635</guid>
      <dc:creator>knarayanan</dc:creator>
      <dc:date>2017-09-28T20:53:40Z</dc:date>
    </item>
  </channel>
</rss>

