fluent-plugin-kinesis 2.0.1 → 2.1.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 3b0377336aca16e998f29f478eaf04265dd8b771
4
- data.tar.gz: ec110cd43b0f3dd16f6a9f4bbadf236c97fc46e7
3
+ metadata.gz: 54ee01dd34cc86ac7c3ce7d16c7604a87123d7bf
4
+ data.tar.gz: 5f08f21e856c2bbbe6210e9aa52b8a4deae1fd1b
5
5
  SHA512:
6
- metadata.gz: af17bc14e59b32a101cd0f774ae29df5213dd2b333b9af1c8c2697fc847ecbd86d8f35a6f4a4690602eb07c4184d71fa00c332002312a63ed52f81d55824e2cb
7
- data.tar.gz: f6e7c4ff10c85ddc8da01456f58d8c41e1b0062d89ab102a5f5f8848cc945852dbb0b274f2402c687fa5a32ffeee3cc29e564297a8ea2e611023639e3678c40d
6
+ metadata.gz: 431060565257614267e8859ac87d8b97c63c883a8c2907e121c9c497c5eafc084e00bf10c8ad1349a7368561b0adff83097ed7861586130f781dec40f38bba50
7
+ data.tar.gz: 261dc9269325687f9dd675d592d00855c051a2023ea04fbc163a9e80ec5668ebe569d01b8000cba61f624ae0c56a3bfae6f239d4ce6f135cde0b5bbe1d6ae8d6
@@ -1,5 +1,9 @@
1
1
  # CHANGELOG
2
2
 
3
+ ## 2.1.0
4
+
5
+ - Feature - Added sts_http_proxy parameter to assume_role_credentials configuration [#136](https://github.com/awslabs/aws-fluent-plugin-kinesis/pull/136)
6
+
3
7
  ## 2.0.1
4
8
 
5
9
  - Bug - Fix AWS SDK conflict with s3 plugin [#131](https://github.com/awslabs/aws-fluent-plugin-kinesis/pull/131)
data/README.md CHANGED
@@ -104,10 +104,10 @@ For more detail, see [Configuration: kinesis_streams_aggregated](#configuration-
104
104
  Add configuration like below:
105
105
 
106
106
  flush_interval 1
107
- buffer_chunk_limit 1m
108
- try_flush_interval 0.1
109
- queued_chunk_flush_interval 0.01
110
- num_threads 15
107
+ chunk_limit_size 1m
108
+ flush_thread_interval 0.1
109
+ flush_thread_burst_interval 0.01
110
+ flush_thread_count 15
111
111
 
112
112
  Note: Each value should be adjusted to your system by yourself.
113
113
 
@@ -175,6 +175,13 @@ is set to 3600 seconds.
175
175
  A unique identifier that is used by third parties when assuming roles in
176
176
  their customers' accounts.
177
177
 
178
+ **sts_http_proxy**
179
+
180
+ Proxy url for proxying requests to amazon sts service api. This needs to be set up independently from global http_proxy parameter
181
+ for the use case in which requests to kinesis api are going via kinesis vpc endpoint but requests to sts api have to go via http proxy.
182
+ It should be added to assume_role_credentials configuration stanza in the next format:
183
+ sts_http_proxy http://[username:password]@hostname:port
184
+
178
185
  ### instance_profile_credentials
179
186
 
180
187
  Retrieve temporary security credentials via HTTP request. This is useful on
@@ -38,6 +38,8 @@ module Fluent
38
38
  config_param :duration_seconds, :integer, default: nil
39
39
  desc "A unique identifier that is used by third parties when assuming roles in their customers' accounts."
40
40
  config_param :external_id, :string, default: nil, secret: true
41
+ desc "A http proxy url for requests to aws sts service"
42
+ config_param :sts_http_proxy, :string, default: nil, secret: true
41
43
  end
42
44
  config_section :instance_profile_credentials, multi: false do
43
45
  desc "Number of times to retry when retrieving credentials"
@@ -129,8 +131,12 @@ module Fluent
129
131
  credentials_options[:policy] = c.policy if c.policy
130
132
  credentials_options[:duration_seconds] = c.duration_seconds if c.duration_seconds
131
133
  credentials_options[:external_id] = c.external_id if c.external_id
132
- if @region
133
- credentials_options[:client] = Aws::STS::Client.new(region: @region)
134
+ if c.sts_http_proxy and @region
135
+ credentials_options[:client] = Aws::STS::Client.new(region: @region, http_proxy: c.sts_http_proxy)
136
+ elsif @region
137
+ credentials_options[:client] = Aws::STS::Client.new(region: @region)
138
+ elsif c.sts_http_proxy
139
+ credentials_options[:client] = Aws::STS::Client.new(http_proxy: c.sts_http_proxy)
134
140
  end
135
141
  options[:credentials] = Aws::AssumeRoleCredentials.new(credentials_options)
136
142
  when @instance_profile_credentials
@@ -13,5 +13,5 @@
13
13
  # language governing permissions and limitations under the License.
14
14
 
15
15
  module FluentPluginKinesis
16
- VERSION = '2.0.1'
16
+ VERSION = '2.1.0'
17
17
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: fluent-plugin-kinesis
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.1
4
+ version: 2.1.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2017-10-10 00:00:00.000000000 Z
11
+ date: 2017-12-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: fluentd
@@ -265,7 +265,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
265
265
  version: '0'
266
266
  requirements: []
267
267
  rubyforge_project:
268
- rubygems_version: 2.6.13
268
+ rubygems_version: 2.6.14
269
269
  signing_key:
270
270
  specification_version: 4
271
271
  summary: Fluentd output plugin that sends events to Amazon Kinesis.