-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide support for using SAS token in Service Bus scaler #2920
Comments
Working on this. |
@tomkerkhove quick doubt - SAS authentication is currently handled if it's provided through the connection string. Are we looking at a provision to use SAS token other than through connection string? |
If that's the case then we can close it, I thought we didn't support that yet. Thanks for checking! |
@tomkerkhove @SushmithaVReddy I try to setup scaledObject with trigger "azure-servicebus" that uses SAS token(trigger authentication ---> k8s secret). At the current moment KEDA 2.6 doesn't support this feature. When I deploy the scaledObject with SAS token, I get ' "Endpoint" must not be empty' error message. Could you try to use new lib for Azure Service Bus where you can send SAS token as connection parameter? |
@SushmithaVReddy Can you verify this please? |
Hi @zzhakhin , are you using a key value pair like "connectionString" : " Endpoint=sb://.servicebus.windows.net;SharedAccessSignature=SharedAccessSignature sr=.servicebus.windows.net&sig=&se=&skn=" in your trigger auth CRD referred in scaled object? |
Hi @SushmithaVReddy. These are my setup
And I create secret with key:value
|
@zzhakhin thanks for sharing the yaml content. You are getting the Endpoint can't be null error because the connection string you are providing in your secret doesn't have endpoint information. For eg: Connection string can be defined in two ways
I understand you want to use the 2nd way of pointing connection string. If that's the case, yes, keda doesn't support it yet.(tag: @tomkerkhove ) |
We use the older Service Bus sdk . It only supports connection strings of the first type -
and not
In fact, if I recall correctly, service bus is not the only place we use the older Azure SDKs. We should ideally be migrating to the newer versions for all of the Azure scalers. |
@tomkerkhove should we work on migrating to the sdk that seems to be maintained - https://github.com/Azure/azure-sdk-for-go |
The goal of the issue was actually to support this scenario which I thought we were supporting but I've misread. Can you work on this please @SushmithaVReddy? |
@tomkerkhove quick pointer - https://github.com/Azure/azure-sdk-for-go/blob/main/README.md requires go1.18+ and keda supports go1.17+ , so we'll have to modify this Line 3 in ac86c94
|
Let's do a seperate PR to bump to go 1.18 unless @kedacore/keda-maintainers don't agree? But we might want to hold this off until KEDA 2.7 is shipped on thursday. |
I don't have any strong opinion about that, but I'm really interested on @zroubalik opinion here |
@tomkerkhove if we have to do this separately we'll have to 1st migrate KEDA to 1.18 and only then push fix for #2920. |
@zroubalik Any reason why we didn't go to 1.18 in #3019? |
@tomkerkhove 1.18 is relatively new. I want to wait a couple of micro release for it. And also majority of libs that we depend on (k8s) aren't build on top of 1.18. It might bring problems with code generators etc. |
Let's put this on hold then @SushmithaVReddy! |
Even though the docs mention |
Then we should revise this, unless the limitation is just for Azure Service Bus. |
They migrated to |
Honestly, it's confusing as to how this repo works to me. It's a monorepo with all of SDKs for multiple Azure offerings. Some of them have individual It's a bit of a headache. |
Proposal
Provide support for using SAS token in Service Bus scaler.
Use-Case
Different scenario for authentication, similar to #2705
Anything else?
No response
The text was updated successfully, but these errors were encountered: