-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[aws]Add support for access point in aws integration #41494
Comments
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
Transferred to Beats repo as the fix is entirely attempted to be in the input side. Already opened a draft PR with the proposed fix: #41495. Although I am still working on an issue with the bucket region when reading from the bucket:
After fixing it and adding tests, it should be ready. The current solution uses the current On the other hand, introducing Update It has been finally decided to include it as a new setting so users are more aware of the possibility of using Access Points, and makes the options easier to understand. A new issue has been opened at the integrations repo to add this new options to the affected integrations once it gets merged: elastic/integrations#11737 |
Trying to use an access point as the bucket ARN in the S3 integration triggers the following permission issue:
expected: arn:aws:s3:::some-name-here
Access Point: arn:aws:s3:us-east-....[REDACTED]/[REDACTED]
Input 'aws-s3' failed with: failed to initialize s3 poller: failed to get AWS region for bucket: operation error S3: GetBucketLocation, https response error StatusCode: 403, RequestID: [REDACTED], HostID: [REDACTED], api error SignatureDoesNotMatch: The request signature we calculated does not match the signature you provided. Check your key and signing method.
The aws integration does not expect the Access Point (https://aws.amazon.com/s3/features/access-points/) format in the bucket ARN parameter atm.
The text was updated successfully, but these errors were encountered: