- Newest
- Most votes
- Most comments
Currently, core devices provisioned with the fleet provisioning plugin will always store the device identity credentials at the greengrass root folder. The configuration keys you updated are not supported by the fleet provisioning plugin yet. So, the device identity credentials (cert and the private key) are still stored at the root folder.
It appears that you're encountering an issue where AWS IoT Greengrass is not recognizing the custom certificate paths you've specified in your configuration. This is a known challenge when working with Greengrass fleet provisioning.
To address this issue, consider the following steps:
-
Double-check your config.yaml file to ensure the paths are correctly specified and there are no typos.
-
Verify that the certificates and keys are actually present in the locations you've specified (/greengrass-setup/ in your case).
-
Make sure you're using the latest version of the AWS IoT Greengrass Core software, as older versions might have bugs related to custom certificate paths.
-
In your greengrass-entrypoint.sh script, ensure that the INIT_CONFIG variable is correctly set to point to your custom config.yaml file.
-
Check the Greengrass logs for any error messages or warnings related to certificate loading or file paths.
-
If you're using a Docker container, ensure that the volumes are correctly mapped so that Greengrass can access the certificate files in the specified locations.
-
Try using absolute paths instead of relative paths for the certificate locations in your config.yaml file.
-
If the issue persists, you might need to modify the Greengrass core software to explicitly use your custom paths. This would involve editing the Java code responsible for loading the certificates.
-
As a workaround, you could try symlinking your custom certificate locations to the default locations that Greengrass is using.
If none of these steps resolve the issue, you may need to contact AWS support for further assistance, as there could be an underlying issue with the Greengrass software itself.
Remember that when working with AWS IoT Greengrass, it's crucial to follow security best practices, especially when handling certificates and private keys.
Sources
Device onboarding to AWS IoT using Virtual Private Cloud endpoints | The Internet of Things on AWS – Official Blog
Install and run AWS IoT Greengrass on the core device - AWS IoT Greengrass
Relevant content
- asked 6 months ago
- asked 4 years ago
- AWS OFFICIALUpdated a year ago
