-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[s3exporter] 405 returned when using the S3 exporter cross AWS accounts #33457
Comments
Pinging code owners for exporter/awss3: @atoulme @pdelewski. See Adding Labels via Comments if you do not have permissions to add labels yourself. |
This issue has been inactive for 60 days. It will be closed in 60 days if there is no activity. To ping code owners by adding a component label, see Adding Labels via Comments, or if you are unsure of which component this issue relates to, please ping Pinging code owners:
See Adding Labels via Comments if you do not have permissions to add labels yourself. |
Thanks for the report. Any precise reproduction steps are appreciated. We will move to aws SDK v2 for sure. |
This issue has been inactive for 60 days. It will be closed in 60 days if there is no activity. To ping code owners by adding a component label, see Adding Labels via Comments, or if you are unsure of which component this issue relates to, please ping Pinging code owners:
See Adding Labels via Comments if you do not have permissions to add labels yourself. |
Component(s)
S3 exporter
What happened?
Description
We're noticing errors in the
opentelemetry-collector
pod logs when trying to use the S3 exporter cross AWS accounts. e.g. when trying to collect logs from pods running in an EKS cluster in a given AWS account and send those to an S3 bucket located in a different AWS account. The error:In AWS, when with S3 access logging, we can see the below error:
Yet I've double checked my AWS IAM role, policy and trust relationship, and they look correct (actually using a similar role and policy does work when we're in the same AWS account).
Steps to Reproduce
Use the below config:
Expected Result
No 405 response, and logs should appear in the S3 bucket.
Actual Result
405 response, no logs in the bucket
Additional information
Considering the AWS Go SDK v1 deprecation next year, it might be worth switching to v2 if possible. Related discussion.
Collector version
opentelemetry-collector-contrib:0.97.0
Environment information
Environment
EKS
OpenTelemetry Collector configuration
Log output
See above.
Additional context
None
The text was updated successfully, but these errors were encountered: