Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for credential provided by sts.AssumeRole #50

Open
mahdi-hdi opened this issue Aug 4, 2017 · 1 comment
Open

Support for credential provided by sts.AssumeRole #50

mahdi-hdi opened this issue Aug 4, 2017 · 1 comment

Comments

@mahdi-hdi
Copy link

mahdi-hdi commented Aug 4, 2017

Currently, the plugin just uses static aws_access_key and aws_secret_key credential or keys provided by Ec2 AIM role. It might be useful to support credential provided by AWS STS which gives the ability to assume different roles.
An use-case is when you want to put metrics to Cloudwatch in another AWS account. So, you should create a role with proper policies and then use aws sts to assume the role in order to get temporary keys.

@mkozjak
Copy link

mkozjak commented Mar 29, 2020

Agree. Another use-case is usage on embedded devices that leverage AWS IoT Core to log all system stdout and stderr pipes before the aws iot client kicks in.
awslabs/amazon-cloudwatch-publisher#2

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants