aws-sqs-trigger-imdsv2

Consume queue messages from AWS SQS in n8n with IAM role

Package Information

Released: 7/22/2025
Downloads: 1 weekly / 11 monthly
Latest Version: 1.2.2
Author: theshiv

Documentation

Banner image

n8n-nodes-aws-sqs-trigger

n8n Trigger node for consumuing queue messages from AWS SQS.

n8n is a fair-code licensed workflow automation platform.

Installation

Operations

Credentials

Compatibility

Resources

License

Installation

Follow the installation guide in the n8n community nodes documentation.

Operations

Receive messages from an AWS SQS queue on a defined trigger time.

Credentials

This node supports two authentication methods:

Access Key Authentication

Uses the existing AWS credentials from n8n. You'll need to configure AWS credentials with:

  • Access Key ID
  • Secret Access Key
  • Region

IAM Role Authentication (Recommended for EC2)

When running n8n on an EC2 instance, you can use the EC2 instance's IAM role for authentication via IMDSv2 (Instance Metadata Service Version 2). This is the recommended approach as it:

  • Eliminates the need to store static credentials
  • Provides automatic credential rotation
  • Follows AWS security best practices

To use IAM Role authentication:

  1. Attach an IAM role to your EC2 instance with appropriate SQS permissions
  2. Select "IAM Role (EC2 Instance)" as the authentication method
  3. Provide the AWS region where your SQS queue is located

Required IAM Permissions:
The IAM role attached to your EC2 instance must include the following permissions:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "sqs:ListQueues",
                "sqs:ReceiveMessage",
                "sqs:DeleteMessage",
                "sqs:DeleteMessageBatch",
                "sqs:GetQueueAttributes"
            ],
            "Resource": "*"
        }
    ]
}

Compatibility

n8n v0.187 and higher.

Resources

License

MIT

Discussion