-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[receiver/awscloudwatchreceiver] Support for role_arn this will be used to allow the receiver do a multi stage assume role #29285
Comments
Pinging code owners:
See Adding Labels via Comments if you do not have permissions to add labels yourself. |
As a workaround for Otel Collector Helm Chart Contrib, i was able to create a init container that would write to a emptydir for the assumerole config and Added
|
Hello @mglaserna, I believe the sigv4 authentication extension should be able to be used by the AWS cloud watch receiver to specify |
Pinging code owners for extension/sigv4auth: @Aneurysm9 @erichsueh3. See Adding Labels via Comments if you do not have permissions to add labels yourself. |
Dear maintainers, I think this is still a relevant issue. In my use case, I want to use 1 EKS IRSA service account to assume another iam role in the account/cross account (to run multiple awscloudwatchreceivers in 1 pipeline, like awscloudwatch/acc1, awscloudwatch/acc2 etc). I tried to get it to work with a current, profile based implementation. However, the aws credentials/config file that works with the aws cli, doesn't work with go aws sdk. The current ensureSession() impl seems to default to using the EC2 (instance profile role) instead of the IRSA role no matter what I do.
After a quick poc, I find to get this to work, I need to call assume role via sdk to get this to work. I am able to contribute if you think this is relevant. |
@nikmmd, it sounds like a reasonable need to me, though I'm not very familiar with many of the nuances here. If you submit a PR, we'll try to get it in. |
Actually, I missed @crobert-1's comment. It sounds like this should be possible with the extension? Has this been tested? |
@djaglowski I did not, as I don't see how I can map the extension and profiles together. I can see that sigv4auth extension does assume role, so I understand why it "may" work, but only if the inherited session context from sigv4auth is respected in the ensureSession() and then also for a selected profile when Let me retest how this behaves attempting a similar flow and report back with details. |
Hey!
I can confirm that using the |
@niconosenzo hey, thanks for confirming. Sorry, I wasn't on top of this. I can find time this weekend to wrap up for PR and we can go from there. |
Thanks @nikmmd !, Btw, if I'm seeing it correctly the assume role bits are already there as a connection util package, we might make use of it probably ? |
This issue has been inactive for 60 days. It will be closed in 60 days if there is no activity. To ping code owners by adding a component label, see Adding Labels via Comments, or if you are unsure of which component this issue relates to, please ping Pinging code owners:
See Adding Labels via Comments if you do not have permissions to add labels yourself. |
This issue has been closed as inactive because it has been stale for 120 days with no activity. |
The purpose and use-cases of the new component
Upon cross checking the codebase, i have saw that the awscloudwatchreceiver itself don't have the support for role_arn which will be a great help for having in a multi stage assume role kind of environment
Example configuration for the component
receivers:
awscloudwatch:
region: ap-southeast-1
role_arn: arn:XXXXXXXXXX
logs:
poll_interval: 10s
max_events_per_request: 50
groups:
autodiscover:
prefix: XXXXX
Telemetry data types supported
Logs data being pulled from a multi stage assume role
Is this a vendor-specific component?
Code Owner(s)
No response
Sponsor (optional)
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: