-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[filebeat] Credentials error with S3+SQS input in 8.4.0 #32888
Comments
I was not able to reproduce from awss3 integration test with filebeat running on a local machine, providing only I wonder if this is specific to running filebeat on an ec2 instance and having the sdk relying on the ec2 instance metadata |
we have discovered a workaround for this for now, which is to remove the custom endpoint configuration from either the fleet managed or filebeat configuration. the value must be removed entirely, not left as the default value of it's still not 100% clear why this affects the credential scope, but we are continuing to work on figuring it out. we believe the reason that this is not immediately reproducible with standalone filebeat compared to agent is that OOTb, the filebeat configuration does not include the custom endpoint config, whereas in agent, it defaults to |
I can confirm this has worked for me too, not sure what has happened but we didn't get this error before updating |
@elastic/obs-cloud-monitoring could you update this issue with some more details including a list of affected versions and what version contains the fix? Do any Fleet integrations that use
Known issue documentation: https://www.elastic.co/guide/en/beats/libbeat/8.4/release-notes-8.4.1.html#_known_issue. |
@aspacca Please correct me if I'm wrong. Affected Beats version: 8.4.0 and 8.4.1 When user is not using the custom Once 8.4.2 Beats version is released, my understanding is this should be fixed automatically. |
@andrewkroh our custom endpoint resolver was set only when
|
I'll have to update my PR with cloudflare logpush as that hadn't been merged when I wrote it. |
@legoguy1000 , @kaiyan-sheng is already taking care of it with elastic/integrations#4207 thanks :) |
To repro, setup an AWS logs integration with elastic agent running in EC2 and the S3+SQS input. You will likely see SQS errors like this:
We believe this is due to changes in the SDK brought in with #31224. It looks like the SQS endpoint
SigningRegion
is not being set in the SDK configuration.The reason for this appears to be that we are using a custom endpoint resolver when building the S3/SQS configuration. At this point it's unclear to me why we aren't just using the default resolver here. I can't see what benefits we get by maintaining the custom version.
The text was updated successfully, but these errors were encountered: