Amazon CloudWatch Log Exporter
Tasks that send Kestra logs to Amazon CloudWatch Logs for centralized monitoring.
AWS plugin for Kestra
All tasks must be authenticated for the AWS Platform.
You can either set up the credentials in the task or let the default credentials provider chain search for credentials.
To set up the credentials in the task, you can use:
accessKeyId and secretKeyId properties for using the static credential provider,sessionToken property in conjunction with accessKeyId and secretKeyId for temporal credentials,stsRoleArn, stsRoleExternalII and stsRoleSessionName properties for STS assume role credentials.When defining credentials in the task, this is a best practice to use secrets. Check the blueprints such as this one, showing how you can reference secrets in your AWS tasks.
The default credentials provider chain is an AWS credentials provider chain that looks for credentials in this order:
aws.accessKeyId and aws.secretAccessKey.AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.~/.aws/credentials) shared by all AWS SDKs and the AWS CLI.AWS_CONTAINER_CREDENTIALS_RELATIVE_URI environment variable is set and the security manager has permission to access the variable.