Top
Enterprise Postgres 18 for Kubernetes User's Guide

E.4.1 Create AWS credentials Secret

To allow Prometheus to scrape metrics from Fluent Bit, you need to create a Service in OpenShift.

Create a secret which include the config and credentials keys to export the environment variables as local variables for authentication to fep-logging-fluent-bit container, such as AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.

Name of secret that contains the credential to AWS service. The credential is stored in Shared Configuration File and Credentials File.

The name of the Shared Configuration File must be "config" and the name of the Credentials File must be "credentials"

Sample template to create a config file

[default]  # Section for default AWS CLI settings that apply globally
region = <aws_region>  # The AWS region to be used for requests
output = json  # Format for the output of AWS CLI commands (e.g., json, text, table)
max_attempts = 1  # Maximum number of retry attempts for AWS CLI commands in case of failure

[profile svc-fep-tdedev0]  # Section for specific profile settings for svc-fep-tdedev0
region = ap-northeast-1  # The AWS region to be used for this specific profile
output = json  # Output format for commands executed under this profile (e.g., json)

Sample template to create a credentials file

[default]  # Section for the default profile
aws_access_key_id =  < aws_access_key_id > # Your AWS Access Key ID (to be filled in)
aws_secret_access_key = < aws_secret_access_key > # Your AWS Secret Access Key (to be filled in)

[svc-fep-tdedev0]  # Section for the svc-fep-tdedev0 profile
aws_access_key_id = < aws_access_key_id >  # Your AWS Access Key ID for this profile (to be filled in)