You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi team,
My request is pretty straightforward and I believe you must have already though about it. I need to use IAM Role for Service Account to be able to access my AWS Elasticsearch, and Minio (AWS S3 Bucket) also AmazonMQ if required
The current Reporting Portal helm chart configuration does not allow this feature as of now. Having AWS access keys in the code would raise security concerns no matter how safely I store it also it needs to be rotated frequently.
My painpoint is
Need to use iam roles instead of AWS access keys for S3 bucket, ES and everything possible
Below would be the initial steps to get started with this issue -
Add a capability to specify annotations for service account which would be used by ReportingPortal to access AWS Elasticsearch, S3 bucket via Minio
Use a compatible AWS SDK to allow IAM Role for Service Accounts.
This could be the only reason folks on AWS are thinking twice before using this portal. Any help would be appreciated
The text was updated successfully, but these errors were encountered:
Hi team,
My request is pretty straightforward and I believe you must have already though about it. I need to use IAM Role for Service Account to be able to access my
AWS Elasticsearch
, andMinio (AWS S3 Bucket)
alsoAmazonMQ
if requiredThe current Reporting Portal helm chart configuration does not allow this feature as of now. Having AWS access keys in the code would raise security concerns no matter how safely I store it also it needs to be rotated frequently.
My painpoint is
Below would be the initial steps to get started with this issue -
This could be the only reason folks on AWS are thinking twice before using this portal. Any help would be appreciated
The text was updated successfully, but these errors were encountered: