-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[kafka/internal, kafkaexporter, kafkareceiver] Add SASL mechanism "AWS_MSK_IAM_OAUTHBEARER" to kafkaexporter #32500
[kafka/internal, kafkaexporter, kafkareceiver] Add SASL mechanism "AWS_MSK_IAM_OAUTHBEARER" to kafkaexporter #32500
Conversation
|
This PR was marked stale due to lack of activity. It will be closed in 14 days. |
@donald-cheung Thanks for your contribution! We need to you to sign the CLA in order to be able to accept your contribution |
@mx-psi |
This PR was marked stale due to lack of activity. It will be closed in 14 days. |
Closed as inactive. Feel free to reopen if this PR is still being worked on. |
Hey, this would be awesome to have. What's going on? |
Sorry, we are in the process of getting approval from the upper organization. This will take some time. Thank you. |
We will have a meeting and update the progress next week. |
@donald-cheung Let me know when you have approval from your org and want to reopen the PR and I can do it for you :) |
@mx-psi Thanks. The meeting is rescheduled to next week so I will update you later. |
Hi @donald-cheung, could you please keep posted on the result? This MR is useful for us. |
Sorry for the late reply. The feedback from the upper organization is good. The upper organization will start their procedures to approve. |
Hello @mx-psi @pavolloffay @MovieStoreGuy, do you have any schedule to merge this PR? Thank you. |
Waiting so long for on this PR. Can we get some traction here ? @jpkrohling |
This PR was marked stale due to lack of activity. It will be closed in 14 days. |
Hello @mx-psi @pavolloffay @MovieStoreGuy, can I get some updates on the schedule to merge this PR? Thank you. |
+1 for merging. waiting this functionnality |
Waiting for merging, need this functionality |
I have a few environment questions for you @donald-cheung , How was the performance of using the new auth provider? Did it cause any additional resource usage on the kafka cluster? |
Hello, can you provide more details on your test? We are trying to see if the increase on load also happens on our side. |
…S_MSK_IAM_OAUTHBEARER" to kafkaexporter (open-telemetry#32500) **Description:** This PR added the SASL mechanism "AWS_MSK_IAM_OAUTHBEARER" to kafkaexporter and kafkareceiver. This mechanism use the AWS MSK IAM SASL Signer for Go /~https://github.com/aws/aws-msk-iam-sasl-signer-go. This mechanism is added because the "AWS_MSK_IAM" is not working in our cluster and also in this [issue](open-telemetry#19747). We added an new mechanism instead of replace the existing one because we want to keep the backward compatibility just in case someone is using "AWS_MSK_IAM". <!--Ex. Fixing a bug - Describe the bug and how this fixes the issue. Ex. Adding a feature - Explain what this achieves.--> **Link to tracking Issue:** [19747](open-telemetry#19747) **Testing:** We built the images and tested the SASL mechanism in our team. We added related unit tests. **Documentation:** We updated the kafkaexporter and kafakreciever README on the SASL mechanism. --------- Co-authored-by: Sean Marciniak <30928402+MovieStoreGuy@users.noreply.github.com>
…S_MSK_IAM_OAUTHBEARER" to kafkaexporter (open-telemetry#32500) **Description:** This PR added the SASL mechanism "AWS_MSK_IAM_OAUTHBEARER" to kafkaexporter and kafkareceiver. This mechanism use the AWS MSK IAM SASL Signer for Go /~https://github.com/aws/aws-msk-iam-sasl-signer-go. This mechanism is added because the "AWS_MSK_IAM" is not working in our cluster and also in this [issue](open-telemetry#19747). We added an new mechanism instead of replace the existing one because we want to keep the backward compatibility just in case someone is using "AWS_MSK_IAM". <!--Ex. Fixing a bug - Describe the bug and how this fixes the issue. Ex. Adding a feature - Explain what this achieves.--> **Link to tracking Issue:** [19747](open-telemetry#19747) **Testing:** We built the images and tested the SASL mechanism in our team. We added related unit tests. **Documentation:** We updated the kafkaexporter and kafakreciever README on the SASL mechanism. --------- Co-authored-by: Sean Marciniak <30928402+MovieStoreGuy@users.noreply.github.com>
…S_MSK_IAM_OAUTHBEARER" to kafkaexporter (open-telemetry#32500) **Description:** This PR added the SASL mechanism "AWS_MSK_IAM_OAUTHBEARER" to kafkaexporter and kafkareceiver. This mechanism use the AWS MSK IAM SASL Signer for Go /~https://github.com/aws/aws-msk-iam-sasl-signer-go. This mechanism is added because the "AWS_MSK_IAM" is not working in our cluster and also in this [issue](open-telemetry#19747). We added an new mechanism instead of replace the existing one because we want to keep the backward compatibility just in case someone is using "AWS_MSK_IAM". <!--Ex. Fixing a bug - Describe the bug and how this fixes the issue. Ex. Adding a feature - Explain what this achieves.--> **Link to tracking Issue:** [19747](open-telemetry#19747) **Testing:** We built the images and tested the SASL mechanism in our team. We added related unit tests. **Documentation:** We updated the kafkaexporter and kafakreciever README on the SASL mechanism. --------- Co-authored-by: Sean Marciniak <30928402+MovieStoreGuy@users.noreply.github.com>
…S_MSK_IAM_OAUTHBEARER" to kafkaexporter (open-telemetry#32500) **Description:** This PR added the SASL mechanism "AWS_MSK_IAM_OAUTHBEARER" to kafkaexporter and kafkareceiver. This mechanism use the AWS MSK IAM SASL Signer for Go /~https://github.com/aws/aws-msk-iam-sasl-signer-go. This mechanism is added because the "AWS_MSK_IAM" is not working in our cluster and also in this [issue](open-telemetry#19747). We added an new mechanism instead of replace the existing one because we want to keep the backward compatibility just in case someone is using "AWS_MSK_IAM". <!--Ex. Fixing a bug - Describe the bug and how this fixes the issue. Ex. Adding a feature - Explain what this achieves.--> **Link to tracking Issue:** [19747](open-telemetry#19747) **Testing:** We built the images and tested the SASL mechanism in our team. We added related unit tests. **Documentation:** We updated the kafkaexporter and kafakreciever README on the SASL mechanism. --------- Co-authored-by: Sean Marciniak <30928402+MovieStoreGuy@users.noreply.github.com>
Description:
This PR added the SASL mechanism "AWS_MSK_IAM_OAUTHBEARER" to kafkaexporter and kafkareceiver. This mechanism use the AWS MSK IAM SASL Signer for Go /~https://github.com/aws/aws-msk-iam-sasl-signer-go. This mechanism is added because the "AWS_MSK_IAM" is not working in our cluster and also in this issue. We added an new mechanism instead of replace the existing one because we want to keep the backward compatibility just in case someone is using "AWS_MSK_IAM".
Link to tracking Issue:
19747
Testing:
We built the images and tested the SASL mechanism in our team.
We added related unit tests.
Documentation:
We updated the kafkaexporter and kafakreciever README on the SASL mechanism.