[ https://issues.apache.org/jira/browse/FLINK-4222?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15380586#comment-15380586 ]
ASF GitHub Bot commented on FLINK-4222: --------------------------------------- Github user chadnickbok commented on a diff in the pull request: https://github.com/apache/flink/pull/2260#discussion_r71062411 --- Diff: flink-streaming-connectors/flink-connector-kinesis/src/main/java/org/apache/flink/streaming/connectors/kinesis/config/AWSConfigConstants.java --- @@ -40,7 +40,10 @@ PROFILE, /** Simply create AWS credentials by supplying the AWS access key ID and AWS secret key in the configuration properties */ - BASIC + BASIC, + + /** Don't supply AWS credentials and rely on the AWS library auto-detecting, which supports ENV vars and AWS MetaData **/ --- End diff -- Makes sense to me. > Allow Kinesis configuration to get credentials from AWS Metadata > ---------------------------------------------------------------- > > Key: FLINK-4222 > URL: https://issues.apache.org/jira/browse/FLINK-4222 > Project: Flink > Issue Type: Improvement > Components: Streaming Connectors > Affects Versions: 1.0.3 > Reporter: Nick Chadwick > Priority: Minor > Labels: easyfix > Original Estimate: 1h > Remaining Estimate: 1h > > When deploying Flink TaskManagers in an EC2 environment, it would be nice to > be able to use the EC2 IAM Role credentials provided by the EC2 Metadata > service. > This allows for credentials to be automatically discovered by services > running on EC2 instances at runtime, and removes the need to explicitly > create and assign credentials to TaskManagers. > This should be a fairly small change to the configuration of the > flink-connector-kinesis, which will greatly improve the ease of deployment to > Amazon EC2 -- This message was sent by Atlassian JIRA (v6.3.4#6332)