Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade from 8.7.1 -> 8.8.2 No longer getting RDS instances. #36648

Open
m-standfuss opened this issue Sep 21, 2023 · 2 comments
Open

Upgrade from 8.7.1 -> 8.8.2 No longer getting RDS instances. #36648

m-standfuss opened this issue Sep 21, 2023 · 2 comments
Labels
needs_team Indicates that the issue/PR needs a Team:* label Stalled

Comments

@m-standfuss
Copy link

Community forum post
https://discuss.elastic.co/t/lost-aws-module-rds-metricset-metrics-after-upgrade-from-7-17-8-8-2/343388/4

8.8.2 Debug logs
8_8_2_logs.csv

8.7.1 Debug logs
image

Configuration

  • Running in Elasticsearch Cloud
  • AWS RDS (postgres if that matters) instances
  • metricbeats is running in EKS cluster

metricbeat.yml

    metricbeat.config.modules:
      path: ${path.config}/modules.d/*.yml
      reload.enabled: true
    processors:
      - add_cloud_metadata:
      - add_kubernetes_metadata:
      - add_fields:
          target: orchestrator.cluster
          fields:
            name: ${CLUSTER}
    cloud.id: ${ELASTIC_CLOUD_ID}
    cloud.auth: ${ELASTIC_CLOUD_AUTH}
    output.elasticsearch:
      hosts: ['${ELASTICSEARCH_HOST:elasticsearch}:${ELASTICSEARCH_PORT:9200}']
      username: ${ELASTICSEARCH_USERNAME}
      password: ${ELASTICSEARCH_PASSWORD}
    setup.dashboards.enabled: false

aws_rds.yml

    module: aws
      period: 60s
      metricsets:
        - rds

Using a k8s service account to auth back into AWS

apiVersion: v1
kind: ServiceAccount
metadata:
  annotations:
    eks.amazonaws.com/role-arn: "arn:aws:iam::729154041854:role/terraform-20220317204940606500000001"
  name: metricbeat
  namespace: kube-system
  labels:
    k8s-app: metricbeat

IAM Permissions tied to that role match the permissions needed in the documentation for the aws module.

We have more configs in our production yaml but I confirmed its an issue with this basic one and just flipping the image version on the deployment back and forth

For confirmed bugs, please report:

@botelastic botelastic bot added the needs_team Indicates that the issue/PR needs a Team:* label label Sep 21, 2023
@botelastic
Copy link

botelastic bot commented Sep 21, 2023

This issue doesn't have a Team:<team> label.

@botelastic
Copy link

botelastic bot commented Sep 20, 2024

Hi!
We just realized that we haven't looked into this issue in a while. We're sorry!

We're labeling this issue as Stale to make it hit our filters and make sure we get back to it as soon as possible. In the meantime, it'd be extremely helpful if you could take a look at it as well and confirm its relevance. A simple comment with a nice emoji will be enough :+1.
Thank you for your contribution!

@botelastic botelastic bot added the Stalled label Sep 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
needs_team Indicates that the issue/PR needs a Team:* label Stalled
Projects
None yet
Development

No branches or pull requests

1 participant