
Product
Introducing Pull Request Stories to Help Security Teams Track Supply Chain Risks
Socket’s new Pull Request Stories give security teams clear visibility into dependency risks and outcomes across scanned pull requests.
github.com/open-telemetry/opentelemetry-collector-contrib/extension/sigv4authextension
Status | |
---|---|
Stability | beta |
Distributions | contrib |
Issues | |
Code coverage | |
Code Owners | @Aneurysm9, @erichsueh3 |
This extension provides Sigv4 authentication for making requests to AWS services. You can read about the Sigv4 process.
The configuration fields are as follows:
assume_role
: Optional. Specifies the configuration needed to assume a role
arn
: The Amazon Resource Name (ARN) of a role to assumesession_name
: Optional. The name of a role sessionweb_identity_token_file
: The path to the file containing the JWT token to be exchangedsts_region
: The AWS region where STS is used to assumed the configured role
sts_region
is not provided, then sts_region
will default to the value for region
if region
is providedregion
: Optional. The AWS region for the service you are exporting to for AWS Sigv4. This is differentiated from sts_region
to handle cross region authentication
service
: Optional. The AWS service for AWS Sigv4
extensions:
sigv4auth:
assume_role:
arn: "arn:aws:iam::123456789012:role/aws-service-role/access"
sts_region: "us-east-1"
receivers:
hostmetrics:
scrapers:
memory:
exporters:
prometheusremotewrite:
endpoint: "https://aps-workspaces.us-west-2.amazonaws.com/workspaces/ws-XXX/api/v1/remote_write"
auth:
authenticator: sigv4auth
service:
extensions: [sigv4auth]
pipelines:
metrics:
receivers: [hostmetrics]
processors: []
exporters: [prometheusremotewrite]
Configuring web_identity_token_file
will cause the sigv4auth extension to exchange the token in the specified web_identity_token_file
for AWS credentials. This is especially useful for authenticating from on-prem systems or other cloud providers via OIDC to publish telemetry to an AWS destination (e.g. Amazon Managed Prometheus).
To utilize Assume Role with Web Identity with the sigv4 extension, an AWS IAM role must be setup to be able to be assumed via OIDC. Once established, a configuration like below can be used to assume that role and interact with AWS services. In kubernetes, the service account token is typically stored in /var/run/secrets/kubernetes.io/serviceaccount/token
. Before implementing, ensure that the audience is included in the AWS OIDC provider, and the claims match any conditions in the IAM role trust policy.
extensions:
sigv4auth:
assume_role:
arn: "arn:aws:iam::123456789012:role/aws-service-role/access"
web_identity_token_file: "/var/run/secrets/kubernetes.io/serviceaccount/token"
receivers:
hostmetrics:
scrapers:
memory:
exporters:
prometheusremotewrite:
endpoint: "https://aps-workspaces.us-west-2.amazonaws.com/workspaces/ws-XXX/api/v1/remote_write"
auth:
authenticator: sigv4auth
service:
extensions: [sigv4auth]
pipelines:
metrics:
receivers: [hostmetrics]
processors: []
exporters: [prometheusremotewrite]
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket’s new Pull Request Stories give security teams clear visibility into dependency risks and outcomes across scanned pull requests.
Research
/Security News
npm author Qix’s account was compromised, with malicious versions of popular packages like chalk-template, color-convert, and strip-ansi published.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.