Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Terraform kafka provider does not support AWS_MSK_IAM for sasl_mechanism #278

Open
leenapatranbs opened this issue Jul 22, 2022 · 9 comments

Comments

@leenapatranbs
Copy link

As per the link https://github.com/aws/aws-msk-iam-auth#details
AWS_MSK_IAM can be used as one of sasl_mechanism for create topic using IAM role. However as per the terraform documentation for Kafka provider it does not support this value.

@taliv-upstream
Copy link

@leenapatranbs and if the MSK is also configured to enable Unauthenticated access in addition to enabling IAM? The module will work?

@jovv
Copy link

jovv commented Aug 24, 2022

@taliv-upstream According to the AWS docs here that isn't possible, IAM/SASL requires TLS for client-broker and encrypted broker-broker communication.

@TFiroozian
Copy link

Hi, Are there any plans to add support for IAM authentication?

@jovv
Copy link

jovv commented Dec 8, 2022

@TFiroozian There's been a PR #242 open for a while, but it looks like it could use some love.

@buddhike
Copy link

buddhike commented Jul 12, 2023

@Mongey Thank you for sharing this amazing utility ❤️. Is there any chance we can get IAM support proposed in #242 to main line 🙏🏾 🎉

@awsmasudur
Copy link

@TFiroozian is there any chance we can get IAM support proposed in #242 to main line 🙏🏾 🎉

+1 to that.

@gabegorelick
Copy link

Also reported in #218.

@gabegorelick
Copy link

I think this can be closed since #372 has been released. Although the docs haven't been updated yet.

@sappusaketh
Copy link
Contributor

#372 doesn't seem to use IAM role we need to export AWS_CREDS to use SASL_IAM

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

8 participants