-
Notifications
You must be signed in to change notification settings - Fork 366
[Enhancement] S3 Client AWS Credentials Provider #2026
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
Comments
TwoOnefour
added a commit
to TwoOnefour/automq
that referenced
this issue
Mar 26, 2025
- AutoMQ#2026 Set DefaultCredentialsProvider as AwsObjectStorage fallback credentials provider
TwoOnefour
added a commit
to TwoOnefour/automq
that referenced
this issue
Mar 26, 2025
TwoOnefour
added a commit
to TwoOnefour/automq
that referenced
this issue
Mar 26, 2025
TwoOnefour
added a commit
to TwoOnefour/automq
that referenced
this issue
Apr 9, 2025
TwoOnefour
added a commit
to TwoOnefour/automq
that referenced
this issue
Apr 9, 2025
TwoOnefour
added a commit
to TwoOnefour/automq
that referenced
this issue
Apr 9, 2025
TwoOnefour
added a commit
to TwoOnefour/automq
that referenced
this issue
Apr 11, 2025
TwoOnefour
added a commit
to TwoOnefour/automq
that referenced
this issue
Apr 11, 2025
TwoOnefour
added a commit
to TwoOnefour/automq
that referenced
this issue
Apr 11, 2025
TwoOnefour
added a commit
to TwoOnefour/automq
that referenced
this issue
Apr 11, 2025
SCNieh
pushed a commit
that referenced
this issue
Apr 14, 2025
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Who is this for and what problem do they have today?
This issue affects users of AutoMQ, particularly those running the application in containerised environments such as AWS EKS. Currently, the codebase is hardcoded to use
StaticCredentialsProvider
andInstanceProfileCredentialsProvider
(Code Ref). This setup poses challenges when running AutoMQ in environments like EKS, where the use of IAM Roles for Service Accounts (IRSA) or Pod Identity is the recommended approach for managing AWS credentials.In such environments, relying on hardcoded credential providers limits flexibility and prevents the application from automatically using the credentials chain as defined by AWS. This makes it difficult for the application to seamlessly acquire credentials, impacting deployments on modern container platforms.
Why is solving this problem impactful?
Switching to the
DefaultCredentialsProvider
will allow AutoMQ to benefit from AWS’s full credentials provider chain, which automatically handles multiple scenarios, including:Additional notes
StaticCredentialsProvider
andInstanceProfileCredentialsProvider
withDefaultCredentialsProvider
, which includes both these options and more. This change will enable support for EKS IRSA and other containerized environments out of the box.The text was updated successfully, but these errors were encountered: