Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove AWS credential check from cloudwatch output #3583

Merged
merged 1 commit into from
Dec 14, 2017

Conversation

danielnelson
Copy link
Contributor

This method is reported to not work with IAM Instance Profiles, and we
do not want to make any calls that would require additional permissions.

closes #3474

Required for all PRs:

  • Signed CLA.
  • Associated README.md updated.
  • Has appropriate unit tests.

This method is reported to not work with IAM Instance Profiles, and we
do not want to make any calls that would require additional permissions.
@danielnelson danielnelson added area/aws AWS plugins including cloudwatch, ecs, kinesis fix pr to fix corresponding bug labels Dec 14, 2017
@danielnelson danielnelson added this to the 1.5.0 milestone Dec 14, 2017
@danielnelson danielnelson merged commit 5b40173 into master Dec 14, 2017
@danielnelson danielnelson deleted the remove-aws-output-credentials-check branch December 14, 2017 01:51
danielnelson added a commit that referenced this pull request Dec 14, 2017
This method is reported to not work with IAM Instance Profiles, and we
do not want to make any calls that would require additional permissions.

(cherry picked from commit 5b40173)
adamchainz added a commit to adamchainz/telegraf that referenced this pull request Dec 14, 2017
Re-add the check removed in influxdata#3583, but this time using the right API call that doesn't require any additional permissions.

I tested this by running telegraf locally with my personal credentials, and also running `$ aws sts get-caller-identity` on an EC2 instance that had an IAM Role/instance profile with zero permissions.
aromeyer pushed a commit to aromeyer/telegraf that referenced this pull request May 19, 2018
This method is reported to not work with IAM Instance Profiles, and we
do not want to make any calls that would require additional permissions.
codesmith14 pushed a commit to signalfx/telegraf that referenced this pull request Jun 19, 2018
This method is reported to not work with IAM Instance Profiles, and we
do not want to make any calls that would require additional permissions.

(cherry picked from commit 5b40173)
maxunt pushed a commit that referenced this pull request Jun 26, 2018
This method is reported to not work with IAM Instance Profiles, and we
do not want to make any calls that would require additional permissions.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/aws AWS plugins including cloudwatch, ecs, kinesis fix pr to fix corresponding bug
Projects
None yet
Development

Successfully merging this pull request may close these issues.

cloudwatch output plugin not working with ec2 instance profiles.
1 participant