-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Regression in AWS authentication assume role configuration parsing around external_id
#18340
Comments
Working on it. |
Thanks @ankitLu ! I wasn't expecting such a quick response 😅 I was just digging into it myself, but I'll let you take a look first 😄 |
external_id
Is there a timeline for when this will be fixed? currently it's blocking deployment of Vector for some internal projects of ours. I'm getting the same when trying to use assume_role with the aws_s3 type. |
This field is optional. Closes: #18340 Signed-off-by: Jesse Szwedko <jesse.szwedko@datadoghq.com>
This field is optional. Closes: #18340 Signed-off-by: Jesse Szwedko <jesse.szwedko@datadoghq.com>
Thanks for the bump! I opened #18452 to fix this (cc/ @lg-d). For now, as a workaround, you should be able to run the previous minor version: v0.31.0. |
This field is optional. Closes: #18340 Signed-off-by: Jesse Szwedko <jesse.szwedko@datadoghq.com>
This field is optional. Closes: #18340 Signed-off-by: Jesse Szwedko <jesse.szwedko@datadoghq.com>
A note for the community
Problem
there seems to be a regression after #17743. on some (but not all nodes) in our eks cluster vector segfaults with
full backtrace below.
we do use an assume_role scenario with the elasticsearch sink. the weird part is that it happens only on 4 out of 32 nodes.
Configuration
Version
0.32.0
Debug Output
Example Data
n/a
Additional Context
No response
References
external_id
whenassume_role
is used in AWS sources/sinks #17739external_id
in AWS assume role #17743The text was updated successfully, but these errors were encountered: