-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Temporary credentials rotation after the start #167
Comments
Goal: Using Logstash to build a cross account pipeline. Observation/Error/Issue: The logstash-output-amazon_es plugin is unable to fetch credentials from the instance profile and is unable to write to the AES domain in another account. Steps to replicate:
Requirement: The logstash-output-amazon_es plugin to fetch credentials from the instance profile. Although, this is said to be supported in README, I wasn't able to figure out a way and couldn't find a documentation for the same. |
It seems that "amazon_es" output lugin accepts only "aws_access_key_id" and "aws_secret_access_key" , but not session_token. Thus, temporary credentials rotation is not feasible while logstash is running. The only possible solution seems to restart logstash periodically, before the expiration of the session token. |
The session token is a temporary credential and can last no more than 36 hours. It may even last less. Because it is temporary and needs to be refreshed, it shouldn't be configured in the file. This plugin supports using the profile defined in the |
It looks like logstash is unable to rotate the credentials without the restart of the service.
This implies that it is mandatory to use long term credentials in the configuration.
It would be nice to have the possibility to configure temporary and rotating credentials coming from an assume role to satisfy the security best practices.
#161
The text was updated successfully, but these errors were encountered: