-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Amazon MSK multiple authentication modes and updates to TLS encryption settings #20956
Comments
Any chance this can be worked on soon? |
Have had a go at this one as it's something we need when swapping and adding PCA certs used by the cluster. I need to do some more testing but should be able to submit a PR later this week. Out of interest how are PCA resources handled in the acceptance tests? These are quite an expensive resource to create and are billed for the month when created. For my own testing I will try and test this on a free tier account. |
@james-bjss Take a look at the Update: As part of #14627 I have made |
@ewbankkit Some queries thrown up from my testing, AWS provide a valid list of combinations for updates to cluster security. Assuming this should be validated in the provider prior to calling the API, should this be done using a custom validate functions or within the update function itself? See the table here: Interpreting that table I believe it's saying:
Also
|
|
Sorry for the delay, been quite busy and only have evenings to look at this.
To Do: |
Whilst writing the tests I spotted some contradictions and extra validation in the documentation that has me confused. On the updateSecurity table it states that However this is contradicted here:
To add to the confusion we have a test cluster that has been deployed prior to the I will have raised a support ticket for clarification from the MSK team, but this suggests the UPDATE: Support confirmed that Unauthenticated must be set if SASL + TLS_PLAINTEXT is set. |
An update on my investigation (have provided this to AWS support).
I have sent this info to support as this possibly a bug.
@ewbankkit - In my PR I proposed to make the |
Hello Guys, Quick question, I'm trying to connect DMS to AWS MSK over SSL port (9094) by setting ssl_mode to verify-ca and I'm getting following error message: aws_dms_endpoint.target: InvalidParameterCombinationException: SSL settings are invalid for EngineName 'kafka' and EndpointType 'target' I know this thread is not related to DMS, but this thread is about AWS MSK SSL/TLS support, so wondering if anyone has tested using DMS to connect to AWS MSK over SSL. Any pointers/suggestions will be really helpful. I'm using following version of terraform: Terraform v0.11.15 provider.aws v2.70.0 Many Thanks |
Hi All, In September Amazon launch an update that allow update the authentication mechanism in a cluster https://aws.amazon.com/about-aws/whats-new/2021/09/amazon-msk-multiple-authentication-modes-tls-encryption-settings using the update-security API https://docs.aws.amazon.com/msk/latest/developerguide/msk-update-security.html. I tried to update my MSK cluster to enable TLS authentication, but instead of just update the security mechanism it tries to replace the whole cluster (I dont want the old cluster be deleted, just update the security mechanism) Any idea what this is happening?? Terraform CLI and Terraform AWS Provider Version Affected Resource(s) Expected Behavior Actual Behavior Steps to Reproduce
I am using the latest provider version. We need this setting to enable the authentication in a cluster already exist but does not have authentication. |
@rocioemera - This is what this change aims to resolve. I am still waiting on a response back from the AWS MSK team; however I believe I have enough information now to progress my PR. Will try to make these changes over the weekend. |
Quick update. Support got back to me yesterday saying they have made a fix. I need to check if this was simply in the console or if any change was made to the API. Either way I think I have all the info I need now to finish up the PR. Effectively If any PLAINTEXT option is set then AWS will implicitly enable the unauthenticated option, regardless of is this value is set in the API call. To remedy this I will update the validation to check it is explicitly set n the TF configuration. Re: Unauthenticated showing differing values in the console (AWS support):
|
Hi, Any advance with this topic?? I tried this weekend to update the security settings to enable TLS in my current cluster but I am still getting the destructive behaviour. Any idea when this will be solved? |
I also wanted to ask if there is any chance this could be sorted out soon. The linked pull request (#21005) hasn't have any activity in 21 days. |
One comment WRT Private CA. I had conversation with AWS support and it looks like Private CA is billed daily. Not sure if it changes much but maybe useful if someone decided to run Private CA tests weekly or monthly. Here is the fragment of the conversation:
-> Yes, in this case you will be charged for 2 days usage.
-> The granularity of PCA pro-rated billing is on a daily basis. |
How are things progressing on this issue? Looks like our business will need both SASL/IAM and TLS enabled on our clusters. |
Sorry, have been slammed with work which took me away from looking at this. Have seen a number of messages chasing, so going to take another look today. Will need to update the PR to reflect the refactoring of the codebase. I could probably use a hand with writing the tests and review. Testing this out locally is complicated due to the use of PCA (costly) and the fact it takes ~30mins to provision a cluster and a further ~25mins to perform the updates. If you would like to jump in and help please do, would be appreciated. |
Is there any ETA on resolution? |
The PR has been raised/submitted and is awaiting review by the maintainers. |
Hi all 👋 Just letting you know that this is issue is featured on this quarters roadmap. If a PR exists to close the issue a maintainer will review and either make changes directly, or work with the original author to get the contribution merged. If you have written a PR to resolve the issue please ensure the "Allow edits from maintainers" box is checked. Thanks for your patience and we are looking forward to getting this merged soon! |
Need this to merge before supporting properly hashicorp/terraform-provider-aws#20956 [master]
@breathingdust |
Any ETA on when this will be merged, Multiple Authentication and the ability to not to destroy exiting cluster if the mode i changed from unauthenticated to IAM, SASL etc |
Thanks a lot for fixing. ANy ETA on when v4.13.0 might be released ? A time frame if possible , Really need this for a lot of issues i m seeing. |
So it any particular Thursday of the month ? |
@ashevade1 put in a little effort at least - releases are done weekly, usually on thursdays - https://github.com/hashicorp/terraform-provider-aws/blob/main/CHANGELOG.md |
This functionality has been released in v4.13.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
New or Affected Resource(s)
aws_msk_cluster
Potential Terraform Configuration
References
Requires AWS SDK v1.40.39:
The text was updated successfully, but these errors were encountered: