Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@Dawnflash
Copy link
Contributor

@Dawnflash Dawnflash commented Mar 11, 2024

AWS_MSK_IAM is an OAUTHBEARER-based SASL mechanism for accessing AWS MSK clusters using AWS IAM.
The OAUTH token is supplied by AWS APIs so it fits nicely into the already written OAUTH token provider.

Uses https://github.com/aws/aws-msk-iam-sasl-signer-go with the region inferred by the AWS SDK. I decided not to add explicit region configuration to the config to keep it cleaner but that would be an easy addition as well.

Resolves #198.

Copy link
Owner

@birdayz birdayz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nice and clean. thank you!

@birdayz birdayz merged commit fde2262 into birdayz:master Mar 12, 2024
@yermulnik
Copy link

@birdayz Is this going to be wrapped into a new kaf release please?

@yermulnik
Copy link

@Dawnflash I've just wanted to try and use kaf to connect to MSK using IAM Auth, though I couldn't figure out how to use AWS CLI profile for authentication. Could you please assist? Thanks in advance.

@Dawnflash
Copy link
Contributor Author

Dawnflash commented Oct 10, 2024

@yermulnik try this

SASL:
  username: ""
  mechanism: AWS_MSK_IAM
TLS: null
security-protocol: SASL_SSL

To use a profile just export the AWS_PROFILE envvar.

@yermulnik
Copy link

@Dawnflash That worked! Thanks a lot.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Support for IAM + AWS Managed Kafka (MSK)

3 participants