-
-
Notifications
You must be signed in to change notification settings - Fork 206
Closed
kafbat/ui-docs
#61Labels
area/wizardUI configuration wizard issuesUI configuration wizard issuesgood first issueUp for grabsUp for grabsscope/frontendRelated to frontend changesRelated to frontend changesstatus/triage/completedAutomatic triage completedAutomatic triage completedtype/enhancementEn enhancement/improvement to an already existing featureEn enhancement/improvement to an already existing feature
Description
Issue submitter TODO list
- I've searched for an already existing issues here
- I'm running a supported version of the application which is listed here and the feature is not present there
Is your proposal related to a problem?
In the current scenario IAM connectivity to MSK only supports awsProfileName. As per MSK IAM Auth library, awsRoleArn is supported.
kafka:
clusters:
- name: local
bootstrapServers: <KAFKA_URL>
properties:
security.protocol: SASL_SSL
sasl.mechanism: AWS_MSK_IAM
sasl.client.callback.handler.class: software.amazon.msk.auth.iam.IAMClientCallbackHandler
sasl.jaas.config: software.amazon.msk.auth.iam.IAMLoginModule required awsProfileName="<PROFILE_NAME>";
In the documentation, it does not mention use of IAM Role.
Describe the feature you're interested in
Allow support for awsRoleArn similar to awsProfileName thus allowing to automatically trust Role ARN.
Describe alternatives you've considered
No response
Version you're running
1.0.0
Additional context
No response
kijekk
Metadata
Metadata
Assignees
Labels
area/wizardUI configuration wizard issuesUI configuration wizard issuesgood first issueUp for grabsUp for grabsscope/frontendRelated to frontend changesRelated to frontend changesstatus/triage/completedAutomatic triage completedAutomatic triage completedtype/enhancementEn enhancement/improvement to an already existing featureEn enhancement/improvement to an already existing feature
Projects
Status
Done