Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cherry-pick #17658 to 7.x: Add support for IAM role arn in aws config #17726

Merged
merged 1 commit into from
Apr 20, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions CHANGELOG.next.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -252,6 +252,7 @@ https://github.com/elastic/beats/compare/v7.0.0-alpha2...master[Check the HEAD d
- Update supported versions of `redis` output. {pull}17198[17198]
- Update documentation for system.process.memory fields to include clarification on Windows os's. {pull}17268[17268]
- Add `urldecode` processor to for decoding URL-encoded fields. {pull}17505[17505]
- Add support for AWS IAM `role_arn` in credentials config. {pull}17658[17658] {issue}12464[12464]

*Auditbeat*

Expand Down
10 changes: 10 additions & 0 deletions filebeat/docs/aws-credentials-examples.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,16 @@ filebeat.inputs:
session_token: '${AWS_SESSION_TOKEN:""}'
----

* Use IAM role ARN
+
[source,yaml]
----
filebeat.inputs:
- type: s3
queue_url: https://sqs.us-east-1.amazonaws.com/123/test-queue
role_arn: arn:aws:iam::123456789012:role/test-mb
----

* Use shared AWS credentials file
+
[source,yaml]
Expand Down
12 changes: 11 additions & 1 deletion filebeat/docs/modules/aws.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,8 @@ that represent actions taken by a user, role or AWS service.

The `aws` module requires AWS credentials configuration in order to make AWS API calls.
Users can either use `access_key_id`, `secret_access_key` and/or
`session_token`, or use shared AWS credentials file.
`session_token`, or use `role_arn` AWS IAM role, or use shared AWS credentials file.

Please see <<aws-credentials-options,AWS credentials options>> for more details.

include::../include/gs-link.asciidoc[]
Expand All @@ -51,6 +52,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

cloudwatch:
enabled: false
Expand All @@ -63,6 +65,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

ec2:
enabled: false
Expand All @@ -75,6 +78,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

elb:
enabled: false
Expand All @@ -87,6 +91,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

s3access:
enabled: false
Expand All @@ -99,6 +104,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

vpcflow:
enabled: false
Expand All @@ -111,6 +117,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb
----

*`var.queue_url`*::
Expand Down Expand Up @@ -147,6 +154,9 @@ Second part of access key.
*`var.session_token`*::
Required when using temporary security credentials.

*`var.role_arn`*::
AWS IAM Role to assume.

[float]
=== cloudtrail fileset

Expand Down
12 changes: 12 additions & 0 deletions metricbeat/docs/aws-credentials-examples.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,18 @@ metricbeat.modules:
session_token: '${AWS_SESSION_TOKEN:""}'
----

* Use IAM role ARN
+
[source,yaml]
----
metricbeat.modules:
- module: aws
period: 300s
metricsets:
- ec2
role_arn: arn:aws:iam::123456789012:role/test-mb
----

* Use shared AWS credentials file
+
[source,yaml]
Expand Down
18 changes: 18 additions & 0 deletions x-pack/filebeat/filebeat.reference.yml
Original file line number Diff line number Diff line change
Expand Up @@ -127,6 +127,9 @@ filebeat.modules:
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

cloudwatch:
enabled: false

Expand Down Expand Up @@ -158,6 +161,9 @@ filebeat.modules:
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

ec2:
enabled: false

Expand Down Expand Up @@ -189,6 +195,9 @@ filebeat.modules:
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

elb:
enabled: false

Expand Down Expand Up @@ -220,6 +229,9 @@ filebeat.modules:
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

s3access:
enabled: false

Expand Down Expand Up @@ -251,6 +263,9 @@ filebeat.modules:
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

vpcflow:
enabled: false

Expand Down Expand Up @@ -282,6 +297,9 @@ filebeat.modules:
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

#-------------------------------- Azure Module --------------------------------
- module: azure
# All logs
Expand Down
18 changes: 18 additions & 0 deletions x-pack/filebeat/module/aws/_meta/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,9 @@
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

cloudwatch:
enabled: false

Expand Down Expand Up @@ -61,6 +64,9 @@
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

ec2:
enabled: false

Expand Down Expand Up @@ -92,6 +98,9 @@
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

elb:
enabled: false

Expand Down Expand Up @@ -123,6 +132,9 @@
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

s3access:
enabled: false

Expand Down Expand Up @@ -154,6 +166,9 @@
# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

vpcflow:
enabled: false

Expand Down Expand Up @@ -184,3 +199,6 @@

# Custom endpoint used to access AWS APIs
#var.endpoint: amazonaws.com

# AWS IAM Role to assume
#var.role_arn: arn:aws:iam::123456789012:role/test-mb
12 changes: 11 additions & 1 deletion x-pack/filebeat/module/aws/_meta/docs.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,8 @@ that represent actions taken by a user, role or AWS service.

The `aws` module requires AWS credentials configuration in order to make AWS API calls.
Users can either use `access_key_id`, `secret_access_key` and/or
`session_token`, or use shared AWS credentials file.
`session_token`, or use `role_arn` AWS IAM role, or use shared AWS credentials file.

Please see <<aws-credentials-options,AWS credentials options>> for more details.

include::../include/gs-link.asciidoc[]
Expand All @@ -46,6 +47,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

cloudwatch:
enabled: false
Expand All @@ -58,6 +60,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

ec2:
enabled: false
Expand All @@ -70,6 +73,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

elb:
enabled: false
Expand All @@ -82,6 +86,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

s3access:
enabled: false
Expand All @@ -94,6 +99,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb

vpcflow:
enabled: false
Expand All @@ -106,6 +112,7 @@ Example config:
#var.visibility_timeout: 300s
#var.api_timeout: 120s
#var.endpoint: amazonaws.com
#var.role_arn: arn:aws:iam::123456789012:role/test-mb
----

*`var.queue_url`*::
Expand Down Expand Up @@ -142,6 +149,9 @@ Second part of access key.
*`var.session_token`*::
Required when using temporary security credentials.

*`var.role_arn`*::
AWS IAM Role to assume.

[float]
=== cloudtrail fileset

Expand Down
4 changes: 4 additions & 0 deletions x-pack/filebeat/module/aws/cloudtrail/config/s3.yml
Original file line number Diff line number Diff line change
Expand Up @@ -33,3 +33,7 @@ secret_access_key: {{ .secret_access_key }}
{{ if .session_token }}
session_token: {{ .session_token }}
{{ end }}

{{ if .role_arn }}
role_arn: {{ .role_arn }}
{{ end }}
1 change: 1 addition & 0 deletions x-pack/filebeat/module/aws/cloudtrail/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ var:
- name: access_key_id
- name: secret_access_key
- name: session_token
- name: role_arn

ingest_pipeline: ingest/pipeline.yml
input: config/{{.input}}.yml
4 changes: 4 additions & 0 deletions x-pack/filebeat/module/aws/cloudwatch/config/s3.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,3 +32,7 @@ secret_access_key: {{ .secret_access_key }}
{{ if .session_token }}
session_token: {{ .session_token }}
{{ end }}

{{ if .role_arn }}
role_arn: {{ .role_arn }}
{{ end }}
1 change: 1 addition & 0 deletions x-pack/filebeat/module/aws/cloudwatch/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ var:
- name: access_key_id
- name: secret_access_key
- name: session_token
- name: role_arn

ingest_pipeline: ingest/pipeline.yml
input: config/{{.input}}.yml
4 changes: 4 additions & 0 deletions x-pack/filebeat/module/aws/ec2/config/s3.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,3 +32,7 @@ secret_access_key: {{ .secret_access_key }}
{{ if .session_token }}
session_token: {{ .session_token }}
{{ end }}

{{ if .role_arn }}
role_arn: {{ .role_arn }}
{{ end }}
1 change: 1 addition & 0 deletions x-pack/filebeat/module/aws/ec2/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ var:
- name: access_key_id
- name: secret_access_key
- name: session_token
- name: role_arn

ingest_pipeline: ingest/pipeline.yml
input: config/{{.input}}.yml
4 changes: 4 additions & 0 deletions x-pack/filebeat/module/aws/elb/config/s3.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,3 +32,7 @@ secret_access_key: {{ .secret_access_key }}
{{ if .session_token }}
session_token: {{ .session_token }}
{{ end }}

{{ if .role_arn }}
role_arn: {{ .role_arn }}
{{ end }}
1 change: 1 addition & 0 deletions x-pack/filebeat/module/aws/elb/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ var:
- name: access_key_id
- name: secret_access_key
- name: session_token
- name: role_arn

ingest_pipeline: ingest/pipeline.yml
input: config/{{.input}}.yml
Expand Down
4 changes: 4 additions & 0 deletions x-pack/filebeat/module/aws/s3access/config/s3.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,3 +32,7 @@ secret_access_key: {{ .secret_access_key }}
{{ if .session_token }}
session_token: {{ .session_token }}
{{ end }}

{{ if .role_arn }}
role_arn: {{ .role_arn }}
{{ end }}
1 change: 1 addition & 0 deletions x-pack/filebeat/module/aws/s3access/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ var:
- name: access_key_id
- name: secret_access_key
- name: session_token
- name: role_arn

ingest_pipeline: ingest/pipeline.yml
input: config/{{.input}}.yml
4 changes: 4 additions & 0 deletions x-pack/filebeat/module/aws/vpcflow/config/input.yml
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,10 @@ secret_access_key: {{ .secret_access_key }}
session_token: {{ .session_token }}
{{ end }}

{{ if .role_arn }}
role_arn: {{ .role_arn }}
{{ end }}

{{ else if eq .input "file" }}

type: log
Expand Down
1 change: 1 addition & 0 deletions x-pack/filebeat/module/aws/vpcflow/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ var:
- name: access_key_id
- name: secret_access_key
- name: session_token
- name: role_arn

ingest_pipeline: ingest/pipeline.yml
input: config/input.yml
Loading