kafka-connect-dynamodb icon indicating copy to clipboard operation
kafka-connect-dynamodb copied to clipboard

Add Assumed Role ARN as a config option

Open breecoffey-fetch opened this issue 3 years ago • 4 comments

Currently, the only implemented options for cross account AWS access are using an IAM User w access key and secret id. We want to avoid that for security reasons. We should be able to specify a role ARN in the connector config that the DynamoDb connector will use.

Proposed changes: Create an optional field in the config that is a role ARN to pass to getCredentials. If that condition is met, return an STS assume role credentials provider instead of the default credentials provider.

breecoffey-fetch avatar May 12 '22 21:05 breecoffey-fetch

Currently, the only implemented options for cross account AWS access are using an IAM User w access key and secret id. We want to avoid that for security reasons. We should be able to specify a role ARN in the connector config that the DynamoDb connector will use.

Proposed changes: Create an optional field in the config that is a role ARN to pass to getCredentials. If that condition is met, return an STS assume role credentials provider instead of the default credentials provider.

I am in a similar situation and would love to see this change added. We are currently using this source connector and the Confluent sink connector. The sink connector allows roles to be used, or the AWS credentials can be assumed using environment variables - https://docs.confluent.io/kafka-connect-aws-dynamodb/current/overview.html#using-trusted-account-credentials. This would be much more useful for us for security reasons and would really appreciate some movement on this PR. Cheers 👍

Gadam8 avatar Jun 28 '22 13:06 Gadam8

Any progress on the pull request? I am in a similar situation and would love to see this change added.

bomwo avatar Nov 28 '22 02:11 bomwo

I've tested this PR in AWS and proved it works. Please merge it to benefit others facing similar requirements.

baganokodo2022 avatar Apr 06 '23 20:04 baganokodo2022

What is the current state of this PR, is there any plan to merge this?

gfiehler avatar Oct 09 '24 17:10 gfiehler