Managing ACLs via KafkaUser with an external PKI #4829
LCaparelli
started this conversation in
General
Replies: 1 comment 10 replies
-
When you leave out the |
Beta Was this translation helpful? Give feedback.
10 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hey folks, thanks a lot for your work!
Our Kafka cluster is an AWS MSK instance and we were looking to use the Entity Operator to handle topics and ACLs. We're using mTLS for authentication and use Hashicorp Vault's PKI engine to manage our PKI.
In a nutshell: we want
KafkaUser
's authorization stuff, but not the authentication stuff.We're facing an issue when attempting to use the
KafkaUser
CR to manage the ACLs. Since all TLS/authentication stuff is handled by the Vault we leave.spec.authentication
unspecified, preventing the Operator from making any certificate management procedure. However, since we're using mTLS auth, the ACL's user must be specified as the client's cert subject (e.g., "CN=blabla,OU=foo,O=bar,L=etc,ST=etc,C=**
").We believe that because we left
.spec.authentication
unspecified the Operator is creating the ACL with a principal that is simply the CR's name, when we need it to be the client cert's subject.Now, we thought of working around this by simply naming the
KafkaUser
CR as the cert's subject, but unfortunately they don't produce a valid DNS name and get rejected by the API server. Is there a way to accomplish what we want without any changes to the existing code?And if not, I believe a simple
.spec.username
overriding auth-based methods to define the username/principal would do the trick, but I'm not sure if that's something which you would like to support or if there's a better way to accomplish this. Any thoughts?Thanks in advance for your attention and assistance. :-D
Beta Was this translation helpful? Give feedback.
All reactions