Details
-
Improvement
-
Status: Resolved
-
Minor
-
Resolution: Won't Fix
-
0.9.4
-
None
Description
If you assign an IAM role to an EC2 instance, then AWS exposes role credentials through the metadata interface. These credentials are temporary credentials that AWS rolls periodically. When making calls to AWS with temporary credentials, you have to use a token in addition to the access ID and secret key. Flume would impress if it would default to the EC2 role credentials when using an S3 sink with no credentials configuration required. Flume would either refresh the credentials from the metadata with every call to S3 or when it detects that the credentials have expired. Users could still override the use of role credentials with user credentials via the current configuration method (fs.s3.awsAccessKeyId, fs.s3.awsSecretAccessKey, fs.s3n.awsAccessKeyId, fs.s3n.awsSecretAccessKey).
Attachments
Issue Links
- requires
-
HADOOP-9384 Update S3 native fs implementation to use AWS SDK to support authorization through roles
- Closed