Skip to content

Commit 853382a

Browse files
docs(bindings/aws.kinesis): document new metadata for custom endpoint support e.g. LocalStack (see components-contrib#3931)
Signed-off-by: swatimodi-scout <[email protected]>
1 parent f2194ac commit 853382a

File tree

1 file changed

+2
-0
lines changed
  • daprdocs/content/en/reference/components-reference/supported-bindings

1 file changed

+2
-0
lines changed

daprdocs/content/en/reference/components-reference/supported-bindings/kinesis.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,8 @@ The above example uses secrets as plain strings. It is recommended to use a secr
5555
| `secretKey` | Y | Output | The AWS Secret Access Key to access this resource | `"secretAccessKey"` |
5656
| `sessionToken` | N | Output | The AWS session token to use | `"sessionToken"` |
5757
| `direction` | N | Input/Output | The direction of the binding | `"input"`, `"output"`, `"input, output"` |
58+
| `endpoint` | N | Input | Custom endpoint for Kinesis and DynamoDB (e.g., for LocalStack support) | `"http://localhost:4566"` |
59+
5860

5961
{{% alert title="Important" color="warning" %}}
6062
When running the Dapr sidecar (daprd) with your application on EKS (AWS Kubernetes), if you're using a node/pod that has already been attached to an IAM policy defining access to AWS resources, you **must not** provide AWS access-key, secret-key, and tokens in the definition of the component spec you're using.

0 commit comments

Comments
 (0)