Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support AWS MSK Authentication #472

Open
nonamef opened this issue Oct 25, 2022 · 2 comments
Open

Support AWS MSK Authentication #472

nonamef opened this issue Oct 25, 2022 · 2 comments
Labels
enhancement Feature request

Comments

@nonamef
Copy link

nonamef commented Oct 25, 2022

Is your feature request related to a problem? Please describe.

Currently using fluent with AWS MSK as unauthenticated with security groups to control access. Want to enable AWS IAM assume role for cross account access.

Describe the solution you'd like

Same setup as fluent-plugin-s3 for assume_role_credentials would be good.
e.g https://github.com/fluent/fluent-plugin-s3/blob/master/docs/credentials.md

Describe alternatives you've considered

Only alternative is to continue as unauthenticated.

Additional context

No response

@github-actions
Copy link

This issue has been automatically marked as stale because it has been open 90 days with no activity. Remove stale label or comment or this issue will be closed in 30 days

@github-actions github-actions bot added the stale label Jan 23, 2023
@ashie ashie removed the stale label Jan 23, 2023
@raytung
Copy link
Member

raytung commented Feb 7, 2023

Hey @nonamef We have added AWS IAM auth support with access keys and secret keys. Unfortunately, since the ruby-kafka gem is deprecated, they are not adding support for assume roles. Looks like librdkafka is also not supporting AWS IAM auth so our hands are a bit tied on this one.

@ashie ashie added the enhancement Feature request label Apr 26, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Feature request
Projects
None yet
Development

No branches or pull requests

3 participants