-
Notifications
You must be signed in to change notification settings - Fork 321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EKS] [eks-pod-identity] [bug]: Setting the STS Session name in eks-pod-identity-agent #2362
Comments
IIUC, you are manually calling the Trying to understand if these credentials ever work from inside a Pod when an application is trying to reach Kafka and fail when using these credentials manual with aws cli? or they never work with Kafka? |
Yeah. basically, I was doing what the SDK does manually just to validate. The credentials given by the pod-identity work perfectly w/ Kafka until they reach their expiration. When the SDK goes back to the pod-identity-agent near the expiration, the agent refreshes the tokens for it. The issue though is it refreshes it with a new sessionName. And the MSK IAM auth scheme hates that. It considers the session-name change to be a change in principal, and screams important parts in there is the change here
That sessionName of pod-name-uuid is generated by the eks-pod-identity-agent. Ideally, we could configure the agent to just use the pod-name and not include the uuid, and we'd be golden. |
fyi code is here now - https://github.com/aws/eks-pod-identity-agent - can we please move this to an issue there? 🙏🏾 |
I've opened feature request asking for support of Custom Session Tags and Custom Session Names in the above repo: |
following updates to this issue |
I think this is probably more of a bug report, but I cannot find the proper channels.
Version Info:
EKS: 1.29
Eks Pod ID agent: v1.2.0-eksbuild.1
We are using eks-pod-identity. It's been working great till we started using IAM based kafka.
I directly hit the eks-pod-identity pod inside a container agent via
I took the resulting AccessKey, SecertKey, and Token, and used them to do a
aws sts get-caller-identity
The SessionName is non static, and I can't find any way to force set it. The issue comes from the MSK IAM usage. MSK doesn't allow "reauthentication". We get this error when the session name changes
Most services we've used IAM for to date don't care. The solution normally would be to set
AWS_ROLE_SESSION_NAME
when calling STS:AssumeRole. But we're not calling that, the eks-pod-identity pod is. The ContainerCredentialProvider in the SDK is just calling theAWS_CONTAINER_CREDENTIALS_FULL_URI
URL with the contents ofAWS_CONTAINER_AUTHORIZATION_TOKEN_FILE
as the Authorization header. There is no option as far as I've found to have that include a constant session name to satisfy MSK.Thanks!
The text was updated successfully, but these errors were encountered: