-
Notifications
You must be signed in to change notification settings - Fork 2.8k
AWS SSM provider for configuration #37877
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@atoulme would you be able to sponser this issue? |
@jpkrohling would you be able to sponser this issue? I have added #37798 |
Sorry, probably not me as I have no working knowledge of SSM. An AWS expert is a better choice. |
This issue has been inactive for 60 days. It will be closed in 60 days if there is no activity. To ping code owners by adding a component label, see Adding Labels via Comments, or if you are unsure of which component this issue relates to, please ping |
Uh oh!
There was an error while loading. Please reload this page.
Component(s)
No response
Describe the issue you're reporting
otel collector running on AWS ( ECS or K8s ) would benefit from directly reading the secrets from SSM, instead of fetching them before start up. This will greatly simplify the implementation. This is similar to the existing aws secretsmanager provider.
example configuration:
The text was updated successfully, but these errors were encountered: