Cloud Credentials¶
Amazon Web Services¶
There are many components within Benthos that utilize AWS services. You will find that each of these components contains a configuration section under the field credentials
of the format:
This section contains many fields and it isn't immediately clear which of them are compulsory and which aren't. This document aims to make it clear what each field is responsible for and how it might be used.
None of these fields are compulsory¶
The first thing to make clear is that all of these fields are optional. When all fields are left blank, Benthos will attempt to load credentials from a shared credentials file (~/.aws/credentials
). The profile loaded will be the default
unless the AWS_PROFILE
environment variable is set.
Explicit Credentials¶
By explicitly setting the credentials you are using at the component level, it's possible to connect to components using different accounts within the same Benthos process.
Selecting a Profile¶
If you are using your shared credentials file but wish to explicitly select a profile set the profile
field:
Manual¶
If you are using long-term credentials for your account, you only need to set the fields id
and secret
:
If you are using short-term credentials then you will also need to set the field token
:
credentials:
id: foo # aws_access_key_id
secret: bar # aws_secret_access_key
token: baz # aws_session_token
Assuming a Role¶
It's also possible to configure Benthos to assume a role using your credentials by setting the field role
to your target role ARN.
This does NOT require explicit credentials, but it's possible to use both.
If you need to assume a role owned by another organisation they might require you to provide an external ID, in which case, place it in the field role_external_id
:
Google Cloud Platform¶
There are many components within Benthos that utilize Google Cloud Platform (GCP) services. You will find that each of these components requires valid credentials.
When running Benthos inside a Google Cloud environment that has a default service account, it can automatically retrieve the service account credentials to call Google Cloud APIs through a library called Application Default Credentials (ADC).
Otherwise, if your application runs outside Google Cloud environments that provide a default service account, you need to manually create one. Once you have a service account set up which has the required permissions, you can create a new Service Account Key and download it as a JSON file. Then all you need to do set the path to this JSON file in the GOOGLE_APPLICATION_CREDENTIALS
environment variable.
Please refer to this document for details.