-
Notifications
You must be signed in to change notification settings - Fork 5.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Re-add AWS credential check from cloudwatch output #3587
Re-add AWS credential check from cloudwatch output #3587
Conversation
Re-add the check removed in influxdata#3583, but this time using the right API call that doesn't require any additional permissions. I tested this by running telegraf locally with my personal credentials, and also running `$ aws sts get-caller-identity` on an EC2 instance that had an IAM Role/instance profile with zero permissions.
@danielnelson @sbalagopal @arohter please check :) |
Thank you @adamchainz, I triggered circleci to create packages in case it is helpful for testing: Let me know if anyone needs a different package type. |
Thanks! I extracted and ran the amd64 binary on my ec2 instance with an instance profile and it started fine:
I then detached the instance profile and ran again, and the connect test failed:
|
(using simple test config:
) |
I did quick testing using the rpm provided and was working as expected. I
tried using the simple configuration that Adam posted above (with minor
changes) and with the IAM role, telegraf was able to connect and post
metrics to cloudwatch.
Thank you for the quick fix!
Best regards,
Sabarish
…On Fri, Dec 15, 2017 at 11:30 AM, Adam Johnson ***@***.***> wrote:
(using simple test config:
[agent]
debug = true
[[outputs.cloudwatch]]
region = "eu-west-1"
namespace = "InfluxData/Telegraf"
[[inputs.cpu]]
)
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#3587 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ASpAt01DFzuaW85e5yiXxhDpxHSo9lpiks5tAgsIgaJpZM4RCtwz>
.
--
Regards,
Sabarish
|
👌 |
Re-add the check removed in #3583, but this time using the right API call that doesn't require any additional permissions. Fixes #3474.
I tested this by running telegraf locally with my personal credentials, and also running
$ aws sts get-caller-identity
on an EC2 instance that had an IAM Role/instance profile with zero permissions.Required for all PRs: