generated from dynatrace-oss/template-project
-
Notifications
You must be signed in to change notification settings - Fork 8
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Hello,
This solution uses an AWS SSM parameter to store the token to push logs to Dynatrace:
dynatrace-aws-s3-log-forwarder/docs/deployment_guide.md
Lines 39 to 49 in 4f00665
| ### Step 2. Create an AWS SSM SecureString Parameter to store your Dynatrace access token to ingest logs. | |
| Execute the following command to create an AWS SSM Parameter Store SecureString parameter to store your Dynatrace access token. The log forwarder Lambda function retrieves the access token from this parameter at runtime. | |
| ```bash | |
| export PARAMETER_NAME="/dynatrace/s3-log-forwarder/$STACK_NAME/$DYNATRACE_TENANT_UUID/api-key" | |
| # Configure HISTCONTROL to avoid storing on the bash history the commands containing API keys | |
| export HISTCONTROL=ignorespace | |
| export PARAMETER_VALUE=<your_dynatrace-access-token-here> | |
| aws ssm put-parameter --name $PARAMETER_NAME --type SecureString --value $PARAMETER_VALUE | |
| ``` |
The New Cloud Platform Monitoring's Firehose Log Streams Stack we deploy when creating an AWS connection in Dynatrace populates an AWS Secret with that token.
For the deployment of the dynatrace-aws-s3-log-forwarder it would be convenient if we could pass that same SSM Secret instead of creating a new SSM Parameter. The purposes of the tokens seems very similar to me.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request