k8s-cloudwatch-adapter
k8s-cloudwatch-adapter copied to clipboard
Let it work when no metadata is available
As per EKS security best practices, we'd like to restrict access to EC2 metadata. Serviceaccount roles allow to assume IAM roles by pods. Unless I'm missing something, there's no reason for the program to fail when there's no metadata
This adds an option to override the region using standard environment variables - AWS_DEFAULT_REGION
or AWS_REGION
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.