Skip to content

Ability to pull API key from AWS SSM Secret #160

@ajoga

Description

@ajoga

Hello,

This solution uses an AWS SSM parameter to store the token to push logs to Dynatrace:

### Step 2. Create an AWS SSM SecureString Parameter to store your Dynatrace access token to ingest logs.
Execute the following command to create an AWS SSM Parameter Store SecureString parameter to store your Dynatrace access token. The log forwarder Lambda function retrieves the access token from this parameter at runtime.
```bash
export PARAMETER_NAME="/dynatrace/s3-log-forwarder/$STACK_NAME/$DYNATRACE_TENANT_UUID/api-key"
# Configure HISTCONTROL to avoid storing on the bash history the commands containing API keys
export HISTCONTROL=ignorespace
export PARAMETER_VALUE=<your_dynatrace-access-token-here>
aws ssm put-parameter --name $PARAMETER_NAME --type SecureString --value $PARAMETER_VALUE
```

The New Cloud Platform Monitoring's Firehose Log Streams Stack we deploy when creating an AWS connection in Dynatrace populates an AWS Secret with that token.

For the deployment of the dynatrace-aws-s3-log-forwarder it would be convenient if we could pass that same SSM Secret instead of creating a new SSM Parameter. The purposes of the tokens seems very similar to me.

Metadata

Metadata

Assignees

Labels

enhancementNew feature or request

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions