vector: Getting "Healthcheck failed" error when use aws_cloudwatch_logs component
A note for the community
- Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
- If you are interested in working on this issue or have submitted a pull request, please leave a comment
Problem
It looks like the new release doesn’t like my CloudWatch logs sink configuration. I’m running Vector on AWS Amazon Linux 2 to push Tailscale logs to CloudWatch logs. This configuration has worked perfectly for months and this morning it broke when the system updated to the latest version of Vector.
systemd[1]: Starting Vector...
vector[4651]: √ Loaded ["/etc/vector/vector.toml"]
vector[4651]: √ Component configuration
vector[4651]: 2023-02-28T14:11:08.697192Z ERROR vector::topology::builder: msg="Healthcheck failed." error=DescribeLogGroups failed: service error component_kind="sink" component_type="aws_cloudwatch_logs" component_id=cloudwatch_logs component_name=cloudwatch_logs
vector[4651]: x Health check for "cloudwatch_logs" failed: DescribeLogGroups failed: service error
systemd[1]: vector.service: control process exited, code=exited status=78
systemd[1]: Failed to start Vector.
systemd[1]: Unit vector.service entered failed state.
systemd[1]: vector.service failed.
I’ve confirmed that I can access the CloudWatch logs from that machine using the AWS CLI, so I don’t think it’s a permissions problem. This instance has an IAM Profile assigned to it and is part of a autoscaling group that refreshes daily.
Configuration
data_dir = "/var/lib/vector"
[sources.tailscale_logs]
type = "journald"
current_boot_only = true
include_units = [ "tailscaled" ]
[sinks.cloudwatch_logs]
type = "aws_cloudwatch_logs"
inputs = [ "tailscale_logs" ]
encoding.codec = "json"
create_missing_group = false
create_missing_stream = true
group_name = "/lh/tailscale"
region = "us-east-1"
stream_name = "{{ _BOOT_ID }}"
### Version
vector 0.28.0 (aarch64-unknown-linux-gnu 971c594 2023-02-27)
### Debug Output
[root@ip-10-202-11-141 ~]# VECTOR_LOG=debug vector --config=/etc/vector/vector.toml
2023-02-28T14:23:49.130553Z INFO vector::app: Internal log rate limit configured. internal_log_rate_secs=10
2023-02-28T14:23:49.130704Z INFO vector::app: Log level is enabled. level="debug"
2023-02-28T14:23:49.130778Z INFO vector::app: Loading configs. paths=["/etc/vector/vector.toml"]
2023-02-28T14:23:49.131824Z DEBUG vector::config::loading: No secret placeholder found, skipping secret resolution.
2023-02-28T14:23:49.133168Z DEBUG vector::topology::builder: Building new source. component=tailscale_logs
2023-02-28T14:23:49.133485Z DEBUG vector::topology::builder: Building new sink. component=cloudwatch_logs
2023-02-28T14:23:49.140912Z DEBUG aws_config::fs_util: loaded home directory src="HOME"
2023-02-28T14:23:49.141088Z DEBUG load_config_file{file=Default(Config)}: aws_config::profile::parser::source: performing home directory substitution home="/root" path="~/.aws/config"
2023-02-28T14:23:49.141923Z DEBUG load_config_file{file=Default(Config)}: aws_config::profile::parser::source: home directory expanded before="~/.aws/config" after="/root/.aws/config"
2023-02-28T14:23:49.141993Z DEBUG load_config_file{file=Default(Config)}: aws_config::profile::parser::source: config file loaded path=Some("/root/.aws/config") size=29
2023-02-28T14:23:49.142028Z DEBUG load_config_file{file=Default(Credentials)}: aws_config::profile::parser::source: performing home directory substitution home="/root" path="~/.aws/credentials"
2023-02-28T14:23:49.142049Z DEBUG load_config_file{file=Default(Credentials)}: aws_config::profile::parser::source: home directory expanded before="~/.aws/credentials" after="/root/.aws/credentials"
2023-02-28T14:23:49.142764Z DEBUG load_config_file{file=Default(Credentials)}: aws_config::profile::parser::source: config file not found path=~/.aws/credentials
2023-02-28T14:23:49.142804Z DEBUG load_config_file{file=Default(Credentials)}: aws_config::profile::parser::source: config file loaded path=Some("/root/.aws/credentials") size=0
2023-02-28T14:23:49.161569Z DEBUG vector_core::tls::settings: Fetching system root certs.
2023-02-28T14:23:49.168048Z DEBUG vector_core::tls::settings: Fetching system root certs.
2023-02-28T14:23:49.184398Z DEBUG vector_core::tls::settings: Fetching system root certs.
2023-02-28T14:23:49.190595Z DEBUG vector_core::tls::settings: Fetching system root certs.
2023-02-28T14:23:49.198227Z INFO vector::topology::running: Running healthchecks.
2023-02-28T14:23:49.198266Z DEBUG vector::topology::running: Connecting changed/added component(s).
2023-02-28T14:23:49.198328Z DEBUG vector::topology::running: Configuring outputs for source. component=tailscale_logs
2023-02-28T14:23:49.199130Z DEBUG vector::topology::running: Configuring output for component. component=tailscale_logs output_id=None
2023-02-28T14:23:49.199860Z DEBUG vector::topology::running: Connecting inputs for sink. component=cloudwatch_logs
2023-02-28T14:23:49.199885Z DEBUG vector::topology::running: Adding component input to fanout. component=cloudwatch_logs fanout_id=tailscale_logs
2023-02-28T14:23:49.199913Z DEBUG vector::topology::running: Spawning new source. key=tailscale_logs
2023-02-28T14:23:49.199943Z DEBUG vector::topology::running: Registered new allocation group. component_kind="source" component_type="journald" component_id="tailscale_logs" group_id="2"
2023-02-28T14:23:49.199981Z DEBUG vector::topology::running: Registered new allocation group. component_kind="sink" component_type="aws_cloudwatch_logs" component_id="cloudwatch_logs" group_id="3"
2023-02-28T14:23:49.200065Z INFO vector: Vector has started. debug="false" version="0.28.0" arch="aarch64" revision="971c594 2023-02-27"
2023-02-28T14:23:49.200438Z INFO vector::app: API is disabled, enable by setting `api.enabled` to `true` and use commands like `vector top`.
2023-02-28T14:23:49.200472Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}: aws_config::meta::credentials::chain: provider in chain did not provide credentials provider=Environment context=the credential provider was not enabled: environment variable not set (CredentialsNotLoaded(CredentialsNotLoaded { source: "environment variable not set" }))
2023-02-28T14:23:49.200532Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Profile}: aws_config::fs_util: loaded home directory src="HOME"
2023-02-28T14:23:49.200558Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Profile}:load_config_file{file=Default(Config)}: aws_config::profile::parser::source: performing home directory substitution home="/root" path="~/.aws/config"
2023-02-28T14:23:49.200581Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Profile}:load_config_file{file=Default(Config)}: aws_config::profile::parser::source: home directory expanded before="~/.aws/config" after="/root/.aws/config"
2023-02-28T14:23:49.200652Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Profile}:load_config_file{file=Default(Config)}: aws_config::profile::parser::source: config file loaded path=Some("/root/.aws/config") size=29
2023-02-28T14:23:49.200685Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Profile}:load_config_file{file=Default(Credentials)}: aws_config::profile::parser::source: performing home directory substitution home="/root" path="~/.aws/credentials"
2023-02-28T14:23:49.200705Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Profile}:load_config_file{file=Default(Credentials)}: aws_config::profile::parser::source: home directory expanded before="~/.aws/credentials" after="/root/.aws/credentials"
2023-02-28T14:23:49.200730Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Profile}:load_config_file{file=Default(Credentials)}: aws_config::profile::parser::source: config file not found path=~/.aws/credentials
2023-02-28T14:23:49.200750Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Profile}:load_config_file{file=Default(Credentials)}: aws_config::profile::parser::source: config file loaded path=Some("/root/.aws/credentials") size=0
2023-02-28T14:23:49.200788Z DEBUG source{component_kind="source" component_id=tailscale_logs component_type=journald component_name=tailscale_logs}: vector::topology::builder: Source pump supervisor starting.
2023-02-28T14:23:49.200812Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}: aws_config::meta::credentials::chain: provider in chain did not provide credentials provider=Profile context=the credential provider was not enabled: profile `default` did not contain credential information (CredentialsNotLoaded(CredentialsNotLoaded { source: ProfileDidNotContainCredentials { profile: "default" } }))
2023-02-28T14:23:49.200837Z DEBUG source{component_kind="source" component_id=tailscale_logs component_type=journald component_name=tailscale_logs}: vector::topology::builder: Source pump starting.
2023-02-28T14:23:49.200967Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}: aws_config::meta::credentials::chain: provider in chain did not provide credentials provider=WebIdentityToken context=the credential provider was not enabled: $AWS_WEB_IDENTITY_TOKEN_FILE was not set (CredentialsNotLoaded(CredentialsNotLoaded { source: "$AWS_WEB_IDENTITY_TOKEN_FILE was not set" }))
2023-02-28T14:23:49.201004Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}: aws_config::meta::credentials::chain: provider in chain did not provide credentials provider=EcsContainer context=the credential provider was not enabled: ECS provider not configured (CredentialsNotLoaded(CredentialsNotLoaded { source: "ECS provider not configured" }))
2023-02-28T14:23:49.201033Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Ec2InstanceMetadata}: aws_config::imds::credentials: loading credentials from IMDS
2023-02-28T14:23:49.201203Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Ec2InstanceMetadata}:send_operation{operation="get" service="imds"}:async_map_request{name="attach_imds_token"}:send_operation{operation="get-token" service="imds"}:dispatch: hyper::client::connect::http: connecting to 169.254.169.254:80
2023-02-28T14:23:49.201342Z DEBUG source{component_kind="source" component_id=tailscale_logs component_type=journald component_name=tailscale_logs}: vector::topology::builder: Source starting.
2023-02-28T14:23:49.201438Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::topology::builder: Sink starting.
2023-02-28T14:23:49.203055Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Ec2InstanceMetadata}:send_operation{operation="get" service="imds"}:async_map_request{name="attach_imds_token"}:send_operation{operation="get-token" service="imds"}:dispatch: hyper::client::connect::http: connected to 169.254.169.254:80
2023-02-28T14:23:49.203198Z DEBUG hyper::proto::h1::io: flushed 242 bytes
2023-02-28T14:23:49.202590Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.9762016462284366
2023-02-28T14:23:49.203401Z INFO source{component_kind="source" component_id=tailscale_logs component_type=journald component_name=tailscale_logs}: vector::sources::journald: Starting journalctl.
2023-02-28T14:23:49.203766Z DEBUG hyper::proto::h1::io: parsed 6 headers
2023-02-28T14:23:49.203780Z DEBUG hyper::proto::h1::conn: incoming body is content-length (56 bytes)
2023-02-28T14:23:49.204628Z DEBUG hyper::proto::h1::conn: incoming body completed
2023-02-28T14:23:49.204796Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Ec2InstanceMetadata}:send_operation{operation="get" service="imds"}:dispatch: hyper::client::connect::http: connecting to 169.254.169.254:80
2023-02-28T14:23:49.205252Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Ec2InstanceMetadata}:send_operation{operation="get" service="imds"}:dispatch: hyper::client::connect::http: connected to 169.254.169.254:80
2023-02-28T14:23:49.205377Z DEBUG hyper::proto::h1::io: flushed 307 bytes
2023-02-28T14:23:49.205772Z DEBUG hyper::proto::h1::io: parsed 8 headers
2023-02-28T14:23:49.205794Z DEBUG hyper::proto::h1::conn: incoming body is content-length (49 bytes)
2023-02-28T14:23:49.205807Z DEBUG hyper::proto::h1::conn: incoming body completed
2023-02-28T14:23:49.205895Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Ec2InstanceMetadata}: aws_config::imds::credentials: loaded profile profile=tailscale-account-iamrTailscaleRole-1UHIDHJGVOPRZ
2023-02-28T14:23:49.205997Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Ec2InstanceMetadata}:send_operation{operation="get" service="imds"}:dispatch: hyper::client::connect::http: connecting to 169.254.169.254:80
2023-02-28T14:23:49.209084Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}:load_credentials{provider=Ec2InstanceMetadata}:send_operation{operation="get" service="imds"}:dispatch: hyper::client::connect::http: connected to 169.254.169.254:80
2023-02-28T14:23:49.209276Z DEBUG hyper::proto::h1::io: flushed 356 bytes
2023-02-28T14:23:49.209870Z DEBUG hyper::proto::h1::io: parsed 8 headers
2023-02-28T14:23:49.209893Z DEBUG hyper::proto::h1::conn: incoming body is content-length (1582 bytes)
2023-02-28T14:23:49.209912Z DEBUG hyper::proto::h1::conn: incoming body completed
2023-02-28T14:23:49.210075Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}:lazy_load_credentials:provide_credentials{provider=default_chain}: aws_config::meta::credentials::chain: loaded credentials provider=Ec2InstanceMetadata
2023-02-28T14:23:49.210118Z INFO send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:async_map_request{name="retrieve_credentials"}: aws_credential_types::cache::lazy_caching: credentials cache miss occurred; retrieved new AWS credentials (took 11.473896ms)
2023-02-28T14:23:49.210572Z DEBUG hyper::client::connect::dns: resolving host="logs.us-east-1.amazonaws.com"
2023-02-28T14:23:49.213207Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:dispatch: hyper::client::connect::http: connecting to 3.236.94.151:443
2023-02-28T14:23:49.215510Z DEBUG send_operation{operation="DescribeLogGroups" service="cloudwatchlogs"}:dispatch: hyper::client::connect::http: connected to 3.236.94.151:443
2023-02-28T14:23:49.220306Z DEBUG hyper::proto::h1::io: flushed 2032 bytes
2023-02-28T14:23:49.224205Z DEBUG hyper::proto::h1::io: parsed 5 headers
2023-02-28T14:23:49.224228Z DEBUG hyper::proto::h1::conn: incoming body is content-length (229 bytes)
2023-02-28T14:23:49.224258Z DEBUG hyper::proto::h1::conn: incoming body completed
2023-02-28T14:23:49.227942Z ERROR vector::topology::builder: msg="Healthcheck failed." error=DescribeLogGroups failed: service error component_kind="sink" component_type="aws_cloudwatch_logs" component_id=cloudwatch_logs component_name=cloudwatch_logs
2023-02-28T14:23:54.202597Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.09762018982282575
2023-02-28T14:23:59.203123Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.00976204399965035
2023-02-28T14:24:04.202488Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.0009762294231395672
2023-02-28T14:24:09.202878Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.00009764796036618658
2023-02-28T14:24:14.203254Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.000009789994142420584
2023-02-28T14:24:19.202522Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.0000010040230752853468
2023-02-28T14:24:24.203802Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.00000012541590831919227
2023-02-28T14:24:29.202319Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.00000003756900807056255
2023-02-28T14:24:34.202474Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.000000027336171243225506
2023-02-28T14:24:39.202878Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.000000029191482223128206
2023-02-28T14:24:44.203012Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.00000002811847175015975
2023-02-28T14:24:49.202853Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.000000027832640512231938
2023-02-28T14:24:54.203120Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.00000003230169365186219
2023-02-28T14:24:59.202423Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.00000002825365734690971
2023-02-28T14:25:04.203705Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.0000000440347986008093
2023-02-28T14:25:09.203114Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.00000003104662335151475
2023-02-28T14:25:14.203267Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::utilization: utilization=0.000000031183804446599386
^C2023-02-28T14:25:16.864748Z WARN source{component_kind="source" component_id=tailscale_logs component_type=journald component_name=tailscale_logs}: vector::sources::journald: Journalctl process stopped.
2023-02-28T14:25:16.865830Z INFO vector: Vector has stopped.
2023-02-28T14:25:16.867016Z INFO vector::topology::running: Shutting down... Waiting on running components. remaining_components="cloudwatch_logs, tailscale_logs" time_remaining="59 seconds left"
2023-02-28T14:25:16.868251Z DEBUG source{component_kind="source" component_id=tailscale_logs component_type=journald component_name=tailscale_logs}: vector::topology::builder: Source finished normally.
2023-02-28T14:25:16.868287Z DEBUG source{component_kind="source" component_id=tailscale_logs component_type=journald component_name=tailscale_logs}: vector::topology::builder: Source pump finished normally.
2023-02-28T14:25:16.869797Z DEBUG source{component_kind="source" component_id=tailscale_logs component_type=journald component_name=tailscale_logs}: vector::topology::builder: Source pump supervisor task finished normally.
2023-02-28T14:25:16.875074Z DEBUG sink{component_kind="sink" component_id=cloudwatch_logs component_type=aws_cloudwatch_logs component_name=cloudwatch_logs}: vector::topology::builder: Sink finished normally.
Example Data
No response
Additional Context
No response
References
No response
About this issue
- Original URL
- State: closed
- Created a year ago
- Reactions: 3
- Comments: 17 (7 by maintainers)
We were able to track the issue down. Unfortunately it affects all AWS components. We aim to fix it and release it as part of 0.28.1 shortly. For now, I’d recommend using 0.27.1.
We also saw this on a different service:
I can open a separate ticket if you like, but it seems very similar to this.
Update! It was actually the upgrade to
0.53, hoping to have a fix by the end of the day.Well, I apparently didn’t run it with the correct flags or something. Running
RUST_LOG=aws_smithy_http=trace vectorgives me this, which does include theInvalidSignatureExceptionerror that @samidalouche is seeing on v0.28.Thanks for checking! I’ll be looking at this today, appreciate the thorough reports.
Here are the logs from my successful run using v0.27.1:
I have encountered the same error (https://github.com/vectordotdev/vector/discussions/16627)
I reverted to this version, and the problem went away.
@rnhurt could you try v0.27.1 as well? We think this may be a regression in v0.28.0.
It looks like some sort of credentials issue, so I removed the
~/.awsdirectory to see if it was getting confused somewhere. The error is still present and there was no change in behaviour.Possibly related, https://github.com/vectordotdev/vector/discussions/16627