-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
Logging 5.8, Logging 5.7, Logging 5.9
-
None
-
False
-
-
False
-
-
-
Important
URL and Section
Creating a secret for AWS CloudWatch with an existing AWS role
Description
As per https://issues.redhat.com/browse/LOG-5539 is not supported to use multiple "role" secrets in a single clusterLogForwarder when authenticating to CloudWatch via STS as only the first defined is being taken into consideration log forwarding the logs to a single role.
Then, a sentence should exists in the documentation highlighting this.
- is related to
-
LOG-5539 When log forwarding to cloudWatch using different AWS Role, all logs arrives to the first
-
- Closed
-
- links to