This is an automated email from the ASF dual-hosted git repository.
victoria pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/druid.git
The following commit(s) were added to refs/heads/master by this push:
new bff8f9e12e Update kinesis docs (#14768)
bff8f9e12e is described below
commit bff8f9e12ee0353381650419b9ca43c79f29826a
Author: Abhishek Radhakrishnan <[email protected]>
AuthorDate: Mon Aug 7 17:08:34 2023 -0700
Update kinesis docs (#14768)
Co-authored-by: Katya Macedo <[email protected]>
Co-authored-by: Katya Macedo <[email protected]>
---
.../extensions-core/kinesis-ingestion.md | 22 +++++++++++++++++-----
1 file changed, 17 insertions(+), 5 deletions(-)
diff --git a/docs/development/extensions-core/kinesis-ingestion.md
b/docs/development/extensions-core/kinesis-ingestion.md
index 547333317f..0350bfeab8 100644
--- a/docs/development/extensions-core/kinesis-ingestion.md
+++ b/docs/development/extensions-core/kinesis-ingestion.md
@@ -34,7 +34,7 @@ Review the [Kinesis known issues](#kinesis-known-issues)
before deploying the `d
## Supervisor spec
-The following table outlines the high-level configuration options for the
Kinesis supervisor object.
+The following table outlines the high-level configuration options for the
Kinesis supervisor object.
See [Supervisor API](../../api-reference/supervisor-api.md) for more
information.
|Property|Type|Description|Required|
@@ -428,14 +428,26 @@ This section describes how to use the [Supervisor
API](../../api-reference/super
### AWS authentication
-To authenticate with AWS, you must provide your AWS access key and AWS secret
key using `runtime.properties`, for example:
+Druid uses AWS access and secret keys to authenticate Kinesis API requests.
There are a few ways to provide this information to Druid:
-```text
+1. Using roles or short-term credentials:
+
+ Druid looks for credentials set in [environment
variables](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-envvars.html),
+via [Web Identity
Token](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html),
in the
+default [profile configuration
file](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html),
and from the
+EC2 instance profile provider (in this order).
+
+2. Using long-term security credentials:
+
+ You can directly provide your AWS access key and AWS secret key in the
`common.runtime.properties` file as shown in the example below:
+
+```properties
druid.kinesis.accessKey=AKIAWxxxxxxxxxx4NCKS
druid.kinesis.secretKey=Jbytxxxxxxxxxxx2+555
```
-Druid uses the AWS access key and AWS secret key to authenticate Kinesis API
requests. If not provided, the service looks for credentials set in environment
variables, via [Web Identity
Token](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html),
in the default profile configuration file, and from the EC2 instance profile
provider (in this order).
+> Note: AWS does not recommend providing long-term security credentials in
configuration files since it might pose a security risk.
+If you use this approach, it takes precedence over all other methods of
providing credentials.
To ingest data from Kinesis, ensure that the policy attached to your IAM role
contains the necessary permissions.
The required permissions depend on the value of `useListShards`.
@@ -482,7 +494,7 @@ The following is an example policy:
},
{
"Effect": "Allow",
- "Action": ["kinesis:DescribeStreams"],
+ "Action": ["kinesis:DescribeStream"],
"Resource": ["*"]
},
{
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]