You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi,
I'd like the exporter to connect to a managed AWS Elasticsearch, and to assume IAM Role rather than specify a username+password. I've configured the cluster to work with IAM roles rather than users.
If the POD is running in EKS, AWS credentials can be fetched using IAM Roles for Service Account (IRSA): https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
Is it possible to add such support to this project?
Thank you.
The text was updated successfully, but these errors were encountered:
@steveteuber For IRSA implementation with least privileges the use of aws.role-arn throws the below error: caller=roundtripper.go:61 msg="failed to retrive aws credentials" err="operation error STS: AssumeRole, https response error StatusCode: 403
AWS role:
Hi,
I'd like the exporter to connect to a managed AWS Elasticsearch, and to assume IAM Role rather than specify a username+password. I've configured the cluster to work with IAM roles rather than users.
If the POD is running in EKS, AWS credentials can be fetched using IAM Roles for Service Account (IRSA):
https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
Is it possible to add such support to this project?
Thank you.
The text was updated successfully, but these errors were encountered: