Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

resourcedetection/eks instructions are unclear #29850

Closed
jakeforge opened this issue Dec 12, 2023 · 4 comments
Closed

resourcedetection/eks instructions are unclear #29850

jakeforge opened this issue Dec 12, 2023 · 4 comments
Labels
closed as inactive documentation Improvements or additions to documentation processor/resourcedetection Resource detection processor question Further information is requested Stale

Comments

@jakeforge
Copy link

Component(s)

processor/resourcedetection

Describe the issue you're reporting

The documentation says

Note: The kubernetes cluster name is only available when running on EC2 instances, and requires permission to run the EC2:DescribeInstances action

However, it is unclear what exactly a user needs to do in order to grant this permission to the resource detector. The same issue exists for other parts of the aws related resourcedetection components.

@jakeforge jakeforge added the needs triage New item requiring triage label Dec 12, 2023
@github-actions github-actions bot added the processor/resourcedetection Resource detection processor label Dec 12, 2023
Copy link
Contributor

Pinging code owners:

See Adding Labels via Comments if you do not have permissions to add labels yourself.

@crobert-1 crobert-1 added the documentation Improvements or additions to documentation label Dec 12, 2023
@crobert-1
Copy link
Member

Hello @jakeforge, the permissions are inherited from the user deploying the collector, I believe. So whichever permissions you have in your AWS environment, the collector (and this processor) would have as well.

In my own testing, I was using kubectl to set context to the EKS cluster, and then running kubectl apply to deploy the collector. kubectl uses kubeconfig files to list valid contexts, an example of which would be your EKS cluster. In my case, I setup a context for the EKS cluster, and included the role for my user in the args list of the execconfig. This included role was an IAM role with the permission required.

I don't have a lot of AWS experience though, so others may be able to share more information here.

@crobert-1 crobert-1 added question Further information is requested and removed needs triage New item requiring triage labels Dec 14, 2023
Copy link
Contributor

This issue has been inactive for 60 days. It will be closed in 60 days if there is no activity. To ping code owners by adding a component label, see Adding Labels via Comments, or if you are unsure of which component this issue relates to, please ping @open-telemetry/collector-contrib-triagers. If this issue is still relevant, please ping the code owners or leave a comment explaining why it is still relevant. Otherwise, please close it.

Pinging code owners:

See Adding Labels via Comments if you do not have permissions to add labels yourself.

@github-actions github-actions bot added the Stale label Feb 13, 2024
Copy link
Contributor

This issue has been closed as inactive because it has been stale for 120 days with no activity.

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Apr 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
closed as inactive documentation Improvements or additions to documentation processor/resourcedetection Resource detection processor question Further information is requested Stale
Projects
None yet
Development

No branches or pull requests

2 participants