-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[exporter/awss3exporter] Add the ability to assume the role provided by s3uploader.role_arn #28674
Conversation
Thank you for your contribution! Please follow the following instructions:
|
thanks @atoulme! updated as well as added some tests! |
…by s3uploader:.role_arn
hey @fatsheep9146! would you like me to keep updating the branch to keep in sync with main for merge, or is that something the reviewer who merges typically will handle? |
hey @songy23, sorry to bother, but any chance you would be able to help me out to get this merged in? |
@open-telemetry/collector-contrib-maintainer this should be good to go 🙏 |
…by s3uploader.role_arn (open-telemetry#28674) **Description:** <Describe what has changed.> Adding a feature - This feature allows role assumption for s3 exportation. It is especially useful on Kubernetes clusters that are using [IAM roles for service accounts](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) **Testing:** Deployed to a Kubernetes cluster as well as an EC2 instance and verified it would assume the correct role and publish logs to the respective s3 bucket. **Documentation:** README updated
…by s3uploader.role_arn (open-telemetry#28674) **Description:** <Describe what has changed.> Adding a feature - This feature allows role assumption for s3 exportation. It is especially useful on Kubernetes clusters that are using [IAM roles for service accounts](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) **Testing:** Deployed to a Kubernetes cluster as well as an EC2 instance and verified it would assume the correct role and publish logs to the respective s3 bucket. **Documentation:** README updated
Description:
Adding a feature - This feature allows role assumption for s3 exportation. It is especially useful on Kubernetes clusters that are using IAM roles for service accounts
Testing:
Deployed to a Kubernetes cluster as well as an EC2 instance and verified it would assume the correct role and publish logs to the respective s3 bucket.
Documentation:
README updated