In a load balanced Fargate service, each task has it's own set of temporary credentials but share the same IAM role.
EvaporateJS only allows the configuration of one set of access key and session key. If the instance signing a URL has a different set of keys from the one supplied in the client setup, then I get 403 errors.
The only way I can think of making this work without something like sticky sessions in the LB (yuck), is to store the temporary credentials in a some shared store (ex. Redis) such that all load balanced instances are signing with the same credentials. But then there is session expiry management throwing a wrench in there.
Is there a typical pattern for handling signing or configuring the client when using an IAM Role in a load balanced scenario?
In a load balanced Fargate service, each task has it's own set of temporary credentials but share the same IAM role.
EvaporateJS only allows the configuration of one set of access key and session key. If the instance signing a URL has a different set of keys from the one supplied in the client setup, then I get 403 errors.
The only way I can think of making this work without something like sticky sessions in the LB (yuck), is to store the temporary credentials in a some shared store (ex. Redis) such that all load balanced instances are signing with the same credentials. But then there is session expiry management throwing a wrench in there.
Is there a typical pattern for handling signing or configuring the client when using an IAM Role in a load balanced scenario?