Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GSSAPI sasl mechanism for Kafka scaler #857

Closed
alexakr opened this issue May 24, 2020 · 9 comments
Closed

GSSAPI sasl mechanism for Kafka scaler #857

alexakr opened this issue May 24, 2020 · 9 comments
Labels
feature-request All issues for new features that have not been committed to Hacktoberfest needs-discussion stale All issues that are marked as stale due to inactivity

Comments

@alexakr
Copy link

alexakr commented May 24, 2020

Adding "GSSAPI" SASL mechanism for Kafka scaler.

Use-Case

I would like to be able to work with Kafka that configured with Kerberos principals using keytab, jass.conf and krb5.conf

Specification

  • kind: secret
data:
  saslMechanism: GSSAPI  # or PLAIN for user/password, relevant only when authMode is "sasl_plaintext" or "sasl_ssl"
  keytab: <your keytab>
  jaas: <your jaas.conf>
  krb5: <your krb.conf>
  • kind: TriggerAuthentication
spec:
  secretTargetRef:
  - parameter: saslMechanism
    name: keda-kafka-secrets
    key: saslMechanism
  - parameter: keytab
    name: keda-kafka-secrets
    key: keytab
  - parameter: jaas
    name: keda-kafka-secrets
    key: jaas
  - parameter: krb5
    name: keda-kafka-secrets
    key: krb5
@alexakr alexakr added feature-request All issues for new features that have not been committed to needs-discussion labels May 24, 2020
@zroubalik
Copy link
Member

Related: #1043

@q26646
Copy link

q26646 commented Jan 18, 2021

is there an update on this feature request? my guess is a lot of people running in Azure w/ HDInsight have a similar problem

@stale
Copy link

stale bot commented Oct 14, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale All issues that are marked as stale due to inactivity label Oct 14, 2021
@stale
Copy link

stale bot commented Oct 21, 2021

This issue has been automatically closed due to inactivity.

@stale stale bot closed this as completed Oct 21, 2021
@andrewbrown248
Copy link

Any update on this? This would still be nice to be able to use GSSAPI SASL mechanism.

@zroubalik
Copy link
Member

Nobody has yet picked this up, we are open to contributions though @andrewbrown248

@zroubalik zroubalik reopened this Feb 2, 2022
@stale stale bot removed the stale All issues that are marked as stale due to inactivity label Feb 2, 2022
@tomkerkhove tomkerkhove moved this to Backlog in Roadmap - KEDA Core Feb 10, 2022
@tomkerkhove tomkerkhove moved this from To Do to Proposed in Roadmap - KEDA Core Feb 14, 2022
@stale
Copy link

stale bot commented Apr 3, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale All issues that are marked as stale due to inactivity label Apr 3, 2022
@stale
Copy link

stale bot commented Apr 10, 2022

This issue has been automatically closed due to inactivity.

@stale stale bot closed this as completed Apr 10, 2022
Repository owner moved this from Proposed to Ready To Ship in Roadmap - KEDA Core Apr 10, 2022
@tomkerkhove tomkerkhove moved this from Ready To Ship to Done in Roadmap - KEDA Core Aug 3, 2022
@novicr
Copy link
Contributor

novicr commented Jul 29, 2023

Can this be reopened? Seems like a useful feature. I would volunteer to contribute.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-request All issues for new features that have not been committed to Hacktoberfest needs-discussion stale All issues that are marked as stale due to inactivity
Projects
Archived in project
Development

No branches or pull requests

5 participants