-
Notifications
You must be signed in to change notification settings - Fork 117
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support AWS MSK's IAM authentication via SASL_OAUTHBEARER #3514
Comments
This issue is stale because it has been open for 90 days with no |
Regarding the above lifecycle bot comment - should feature requests be closed just because they haven't been prioritized? |
@brianV thanks for the request, our concern is that we will not be able to test the integration with AWS MSK and the library is AWS specific. Is there any way to implement the integration with a generic oauth library that would work with components like Strimzi + IDP (like keycloak) so that we can test and verify it works and doesn't break in future releases? /remove-lifecycle stale |
I'm not sure if the approach suggested here would work with AWS identities IBM/sarama#1320 (comment) |
Greetings 👋 I am currently implementing MSK IAM authentication for Keda at kedacore/keda#5692 and based on that experience I would be open also to contributing it to Knative. I understand the worries about not being able to try out the integration with a real cluster. It is possible to implement SASL_OAUTBEARER similar to Keda:
Speaking of Keda, I know that the source can be scaled up and down with it, I suppose that once merged, this would also work with MSK brokers. Does that sound alright? |
This issue is stale because it has been open for 90 days with no |
Problem
AWS MSK is AWS's managed Kafka service. It offers an
IAM
access mode that restricts access based on IAM policies. They have a Serverless option, which only supports IAM access control.You can authenticate this way by using the
SASL_OAUTHBEARER
mechanism as described here: https://docs.aws.amazon.com/msk/latest/developerguide/iam-access-control.html#configure-clients-for-iam-access-controlThe underlying Signer library for Go generates an OAuth token from AWS credentials in the current AWS credential provider chain. The README shows an example using Sarama here: https://github.com/aws/aws-msk-iam-sasl-signer-go/tree/main
Persona:
Which persona is this feature for? Event producers and consumers
Exit Criteria
Users can specify configuration options for a Kafka Broker that will allow it to authenticate using SASL_OATHBEARER and a token provider that generates tokens from the user's default IAM credential provider chain.
Time Estimate (optional):
How many developer-days do you think this may take to resolve?
Additional context (optional)
Add any other context about the feature request here.
The text was updated successfully, but these errors were encountered: