You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 19, 2023. It is now read-only.
The AWS SDKs have been updated with a new credential provider that calls sts:AssumeRoleWithWebIdentity, exchanging the Kubernetes-issued OIDC token for AWS role credentials
But I couldnt understand how to use those credentials with this plugin
The text was updated successfully, but these errors were encountered:
Once you have configured IRSA (IAM Roles for Service Accounts) you can simply omit credentials/profile options to this plugin and it will just work as it does in other Kubernetes with IRSA enabled pods.
I have applied IRSA for logtsash pod but plugin still tries to use assume role from node instead of the new IRSA role. @infa-ddeore is it works for you?
cc: @lukewaite
AWS recently launched "IAM Roles for Service Accounts", here is more information on that https://aws.amazon.com/blogs/opensource/introducing-fine-grained-iam-roles-service-accounts/
how to use these credentials in this plugin?
the blog says:
The AWS SDKs have been updated with a new credential provider that calls sts:AssumeRoleWithWebIdentity, exchanging the Kubernetes-issued OIDC token for AWS role credentials
But I couldnt understand how to use those credentials with this plugin
The text was updated successfully, but these errors were encountered: