-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add more keystore backends to support Functionbeat cloud providers #15879
Comments
ping @kaiyan-sheng @ChrsMark for awareness |
For AWS credentials, IAM roles can also be used for authentication without requiring a file at the backend: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-api.html. Also, #12464 might be related too. For other credentials/variables, AWS parameter store seems to be a good option! |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This is still an issue. We're trying to use functionbeats but don't want to put secure credentials in environment variables. Any integration with AWS Secrets Manager or System Parameter would be very useful. |
Pinging @elastic/agent (Team:Elastic-Agent) |
This is still an issue for me as well. We use AWS roles for AWS resources, but Functionbeat still needs a password for Elastic Cloud. We can't use environment variables because Lambda does not obfuscate in the AWS console. |
Right now the keystore only supports file backend. However, this is not suited to run on serverless environments where less restrictive permissions are required to read a file.
Possible backends for providers:
In the meantime, users should use environment variables to pass secrets to Functionbeat.
Original issue: #15808
The text was updated successfully, but these errors were encountered: