Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add more keystore backends to support Functionbeat cloud providers #15879

Closed
kvch opened this issue Jan 27, 2020 · 7 comments
Closed

Add more keystore backends to support Functionbeat cloud providers #15879

kvch opened this issue Jan 27, 2020 · 7 comments
Labels
Functionbeat Stalled Team:Elastic-Agent Label for the Agent team Team:Integrations Label for the Integrations team

Comments

@kvch
Copy link
Contributor

kvch commented Jan 27, 2020

Right now the keystore only supports file backend. However, this is not suited to run on serverless environments where less restrictive permissions are required to read a file.

Possible backends for providers:

In the meantime, users should use environment variables to pass secrets to Functionbeat.

Original issue: #15808

@exekias
Copy link
Contributor

exekias commented Feb 13, 2020

ping @kaiyan-sheng @ChrsMark for awareness

@ChrsMark
Copy link
Member

ChrsMark commented Feb 13, 2020

It would interesting for Kubernetes secrets too, related to #8847. Also related to #5832

@kaiyan-sheng
Copy link
Contributor

kaiyan-sheng commented Feb 14, 2020

For AWS credentials, IAM roles can also be used for authentication without requiring a file at the backend: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-api.html. Also, #12464 might be related too.

For other credentials/variables, AWS parameter store seems to be a good option!

@botelastic
Copy link

botelastic bot commented Feb 4, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@botelastic botelastic bot added the Stalled label Feb 4, 2021
@botelastic botelastic bot closed this as completed Mar 6, 2021
@zube zube bot removed the [zube]: Done label Jun 5, 2021
@toby-lego
Copy link

This is still an issue. We're trying to use functionbeats but don't want to put secure credentials in environment variables. Any integration with AWS Secrets Manager or System Parameter would be very useful.

@ChrsMark ChrsMark added the Team:Elastic-Agent Label for the Agent team label Oct 6, 2021
@elasticmachine
Copy link
Collaborator

Pinging @elastic/agent (Team:Elastic-Agent)

@matthewbarreiro
Copy link

This is still an issue for me as well. We use AWS roles for AWS resources, but Functionbeat still needs a password for Elastic Cloud. We can't use environment variables because Lambda does not obfuscate in the AWS console.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Functionbeat Stalled Team:Elastic-Agent Label for the Agent team Team:Integrations Label for the Integrations team
Projects
None yet
Development

No branches or pull requests

8 participants