Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for Amazon Elasticsearch Service #443

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

jmtsi
Copy link

@jmtsi jmtsi commented Jun 17, 2021

This is based on @JackFazackerley's initial work from here: #353

I rebased this against the latest master and added additional credential provider, so this also works with pod IAM roles when running in EKS.

@jmtsi jmtsi force-pushed the aws-signing branch 3 times, most recently from 2469ef1 to 283e7c4 Compare June 17, 2021 20:39
esAWS = kingpin.Flag("es.aws", "Enable support for Amazon Elasticsearch Service").
Default("false").Envar("ES_AWS").Bool()
esAWSRegion = kingpin.Flag("es.aws-region", "Sets the AWS region").
Default("").Envar("ES_AWS_REGION").String()
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have no idea why go fmt enforces this indentation... Would fail the CircleCI tests otherwise

Signed-off-by: Jami Karvanen <jami.karvanen@yle.fi>
@jmtsi jmtsi mentioned this pull request Jun 29, 2021
@roidelapluie
Copy link
Contributor

Can we leverage https://github.com/prometheus/common/tree/main/sigv4 for the sigv4 part? does it make sense?

@jmtsi
Copy link
Author

jmtsi commented Jun 29, 2021

Great idea, but It seems like it uses the default credential chain and AFAIK it doesn't support pod IAM roles without adding WebIdentityRoleProvider to the chain :-/

Maybe this implementation is good for now and I'll file an issue against the prometheus lib?

@folksgl
Copy link

folksgl commented Nov 3, 2021

Would love to see AWS ES signing support included -- Is this still being worked on? Does it need support?

@justinpjose
Copy link

Any progress with this ticket? It would be very useful for AWS ES signing support to be included for us as we require it

@visla-xugeng
Copy link

I am using AWS elasticsearch. I plan to use chart, prometheus-elasticsearch-exporter, to monitor it. A quick question here:
what's the uri of es? Is the Domain endpoint (VPC) uri?

es:
uri: http://localhost:9200

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants