You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@flume.apache.org by "Ashish Paliwal (JIRA)" <ji...@apache.org> on 2014/11/05 12:34:34 UTC

[jira] [Resolved] (FLUME-1691) Allow use of EC2 roles with S3 sink

     [ https://issues.apache.org/jira/browse/FLUME-1691?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Ashish Paliwal resolved FLUME-1691.
-----------------------------------
       Resolution: Won't Fix
    Fix Version/s: v0.9.5

Won't fix. 0.X branch not maintained anymore

> Allow use of EC2 roles with S3 sink
> -----------------------------------
>
>                 Key: FLUME-1691
>                 URL: https://issues.apache.org/jira/browse/FLUME-1691
>             Project: Flume
>          Issue Type: Improvement
>          Components: Sinks+Sources
>    Affects Versions: v0.9.4
>            Reporter: Steve Stogner
>            Priority: Minor
>             Fix For: v0.9.5
>
>
> If you assign an IAM role to an EC2 instance, then AWS exposes role credentials through the metadata interface.  These credentials are temporary credentials that AWS rolls periodically.  When making calls to AWS with temporary credentials, you have to use a token in addition to the access ID and secret key.  Flume would impress if it would default to the EC2 role credentials when using an S3 sink with no credentials configuration required.  Flume would either refresh the credentials from the metadata with every call to S3 or when it detects that the credentials have expired.  Users could still override the use of role credentials with user credentials via the current configuration method (fs.s3.awsAccessKeyId, fs.s3.awsSecretAccessKey, fs.s3n.awsAccessKeyId, fs.s3n.awsSecretAccessKey).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)