You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Keda version: keda:2.14.0
ghcr.io/kedacore/keda:2.14.0
Goal : Configure Keda KAfka Trigger for scaling our service. But to authenticate with Kafka the client needs api-key, api-secret. So used TriggerAuthentication with awsSecretManager resource as shown below.
Note:
TriggerAuth, ScaledObject are deployed within my-microservice-namespace namespace.
KEda operator has been deployed within **keda** namespace.
STEP-3
Deployed the resources and then keda operator logs are shown below:
2024-09-26T20:27:13Z ERROR **scale_handler error trying to read secret from Aws Secret Manager**
{
"type": "ScaledObject",
"namespace": "my-microservice-namespace",
"name": "my-microservice",
"triggerAuthRef.Name": "test-triggerauth",
"secret.Name": "service/test-svc/svc-api-key-path",
"secret.Version": "",
"secret.VersionStage": "",
"error": "operation error Secrets Manager: GetSecretValue,
https response error StatusCode: 400,
RequestID: 4314b83a-0192-4bf1-9a7f-2e7f7950abe0,
api error AccessDeniedException:
User: **arn:aws:sts::<awsAccountId>:assumed-role/keda-operator-role/123456**
is not authorized to perform:
secretsmanager:GetSecretValue on resource: service/test-svc/svc-api-key-path
because no identity-based policy allows the secretsmanager:GetSecretValue action"
}
Expected Behavior
The expected behavior was the keda operator should have assumed the IAM role which TriggerAuth had been configured with arn:aws:iam::<accountId>:test-role/<test-role-ID> (bolded below) and not it's own IAM role (arn:aws:sts:::assumed-role/keda-operator-role/123456).
Note:
TriggerAuth, ScaledObject are deployed within my-microservice-namespace namespace.
KEda operator has been deployed within **keda** namespace.
Keda operator assumes wrong IAM role while trying to Get Secret from AWS SecretsManager service.
Note: Keda operator had been deployed within keda namespace.
2024-09-26T20:27:13Z ERROR **scale_handler error trying to read secret from Aws Secret Manager**
{
"type": "ScaledObject",
"namespace": "my-microservice-namespace",
"name": "my-microservice",
"triggerAuthRef.Name": "test-triggerauth",
"secret.Name": "service/test-svc/svc-api-key-path",
"secret.Version": "",
"secret.VersionStage": "",
"error": "operation error Secrets Manager: GetSecretValue,
https response error StatusCode: 400,
RequestID: 4314b83a-0192-4bf1-9a7f-2e7f7950abe0,
api error AccessDeniedException:
User: **arn:aws:sts::<awsAccountId>:assumed-role/keda-operator-role/123456**
is not authorized to perform:
secretsmanager:GetSecretValue on resource: service/test-svc/svc-api-key-path
because no identity-based policy allows the secretsmanager:GetSecretValue action"
}
Steps to Reproduce the Problem
Keda version: keda:2.14.0
ghcr.io/kedacore/keda:2.14.0
Goal : Configure Keda KAfka Trigger for scaling our service. But to authenticate with Kafka the client needs api-key, api-secret. So used TriggerAuthentication with awsSecretManager resource as shown below.
Note:
TriggerAuth, ScaledObject are deployed within my-microservice-namespace namespace.
KEda operator has been deployed within **keda** namespace.
Report
Keda version: keda:2.14.0
ghcr.io/kedacore/keda:2.14.0
Goal : Configure Keda KAfka Trigger for scaling our service. But to authenticate with Kafka the client needs api-key, api-secret. So used TriggerAuthentication with awsSecretManager resource as shown below.
Note:
**keda**
namespace.STEP-1
TriggerAuth.yaml
STEp-2
ScaledObject.yaml
STEP-3
Deployed the resources and then keda operator logs are shown below:
Expected Behavior
The expected behavior was the keda operator should have assumed the IAM role which TriggerAuth had been configured with
arn:aws:iam::<accountId>:test-role/<test-role-ID>
(bolded below) and not it's own IAM role (arn:aws:sts:::assumed-role/keda-operator-role/123456).Note:
**keda**
namespace.TriggerAuth.yaml
Actual Behavior
Keda operator assumes wrong IAM role while trying to Get Secret from AWS SecretsManager service.
Note: Keda operator had been deployed within
keda
namespace.Steps to Reproduce the Problem
Keda version: keda:2.14.0
ghcr.io/kedacore/keda:2.14.0
Goal : Configure Keda KAfka Trigger for scaling our service. But to authenticate with Kafka the client needs api-key, api-secret. So used TriggerAuthentication with awsSecretManager resource as shown below.
Note:
**keda**
namespace.STEP-1
TriggerAuth.yaml
STEp-2
ScaledObject.yaml
STEP-3
Deployed the resources and then keda operator logs are shown below:
Logs from KEDA operator
keda operator log:
KEDA Version
2.14.0
Kubernetes Version
1.29
Platform
Amazon Web Services
Scaler Details
kafka
Anything else?
No response
The text was updated successfully, but these errors were encountered: