-
Notifications
You must be signed in to change notification settings - Fork 365
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
iam configuration not working #419
Comments
What's the log messages / error you see? Please also enable debug logging and post them here. |
state: |
@amitca71 I assume you tried to deploy Console/Kowl with Helm? Could you please provide more information about what commands you executed? I recently added a new Helm chart, but I wasn't expecting someone to use it by now because it's fairly hidden. Thus I'm wondering what chart you are trying to use. |
@wecco I do use helm charts... the new chart was not working.... i set it to older version: btw, when i put fake value for kafka-sasl-password in the secret, the container is being created, and the error is regular error for failure: |
@amitca71 I don't plan to make any changes to the existing chart anymore, but I'll make sure that the new chart will be compatible with it. Thanks for filing the issue! |
thanks alot!! |
@amitca71 Here: https://github.com/redpanda-data/console/tree/master/helm . Please let me know if you still have issues, then I'm happy to fix this :) |
@weeco Hi, took me some time, but i got back to it. it looks like that authentication passes now, but there is an issue with authorization. its probably not related to helm, as i get the same issue with docker-compose. {"level":"info","ts":"2022-10-18T07:19:49.222Z","msg":"connecting to Kafka seed brokers, trying to fetch cluster metadata"} i use the following example (with the resource change to my..): i can see that according to AWS documentation, there are two more parameters expected, that dont apear on kowl- red pand console code: |
Any updates on this ! I'm trying to configure MSK authentication using helm as here but no luck , how can I specify the iam role ?
|
Guys please .. any ideas on this ! documentation in redpanda helm chart is not very clear , I'm using IRSA :
I'm getting error like this :
|
Is this option ever worked with IAM role?we are using serviceaccount that has an IAM role for argocd applications , deploying it with helm seems to
Keeps failing to connect to MSK with the following error When using SCRAM-SHA-12 with Secretsmanager secret it works , using awsMSKiam does not seem to work too |
Hi,
|
Hey, I'm struggling to understand weather {
"level": "warn",
"ts": "2023-06-30T15:24:08.505Z",
"msg": "read from broker errored, killing connection after 0 successful responses (is SASL missing?)",
"source": "kafka_client",
"addr": "<broker-addr>:9098",
"broker": "seed 0",
"err": "EOF"
} Thanks in advance for any response. |
Hey did you find any solution? |
We have a separate issue for env refresh, not sure what's going on in this issue. |
(note #275 mentioned above) |
No, this is the configuration I end up using. I could not use IAM auth with MSK and I end up use SASL username and password and store those in AWS Secret manager. "environment": [
{
"value": "${aws-region}",
"name": "AWS_REGION"
},
{
"value": "${endpoints}",
"name": "KAFKA_BROKERS"
},
{
"value": "true",
"name": "KAFKA_TLS_ENABLED"
},
{
"value": "SCRAM-SHA-512",
"name": "KAFKA_SASL_MECHANISM"
},
{
"value": "true",
"name": "KAFKA_SASL_ENABLED"
},
{
"value": "true",
"name": "KAFKA_TLS_INSECURESKIPTLSVERIFY"
}
],
"secrets": [
{
"valueFrom": "${pass}:password::",
"name": "KAFKA_SASL_PASSWORD"
},
{
"valueFrom": "${user}:username::",
"name": "KAFKA_SASL_USERNAME"
}
], (Sorry for the late reply) |
i use kowl successfully with msk on kubernets (helm) using SCRAM-SHA-512 with the following configuration:
kowl:
config:
kafka:
brokers:
- ${broker1}
- ${broker2}
- ${broker3}
tls:
enabled: true
insecureSkipTlsVerify: true
sasl:
enabled: true
username: ${kafka_username}
mechanism: SCRAM-SHA-512
When i try to use awsMskIam, the container is not being created on the kubernetes cluster with CreateContainerConfigError.
The following is the configuration i use, and the accessKey and secretKey are valid keys with appropriate authorization (works for other clients)
kowl:
config:
kafka:
brokers:
- ${broker1}
- ${broker2}
- ${broker3}
tls:
enabled: true
insecureSkipTlsVerify: true
sasl:
enabled: true
mechanism: AWS_MSK_IAM
awsMskIam:
accessKey: XXXXXXXX
secretKey: XXXXXXXXXXXXX
any hint?
thanks,
Amit
The text was updated successfully, but these errors were encountered: