-
Notifications
You must be signed in to change notification settings - Fork 519
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conflicting aws credentials environment keys and missing documentation on dynamodb #55
Comments
Hi @YannickTeKulve thanks for trying out digger!
So you wish to support a separate state backend such as minio and in this case you have a separate set of keys like
I assume you mean the DynamoDB table which is created by digger for locks. Digger creates this dynamoDB table called Let me know if it is what you meant! |
Minio: terraform s3 backend can used for minio but uses AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY env (it's not logical, but it does work this way). |
I have added some documentation on the required access for DynamoDB here: https://diggerhq.gitbook.io/digger-docs/cloud-providers/aws let me know if anything I missed! |
I'll get back to you RE Minio shortly |
Hey @YannickTeKulve we will support will this resolve your issue of dealing with multiple keys? |
Yes I think it would |
Hi
I wanted to try digger but running in a few issues:
The text was updated successfully, but these errors were encountered: