Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This seems problematic to me. The whole tutorial is to configure MSK to use SASL/SCRAM, so we can't simply change it here.
Besides, to use IAM, we have to give RisingWave the IAM role with permission to access the MSK, and there's no username and password.
This also means that IAM can only be used for on-prem/BYOC, but not cloud. So perhaps we should keep SCRAM in the doc. Maybe add another section for IAM.
cc @yuhao-su to confirm my understanding.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
True, it is a glitch indeed.
For IAM, RW loads credentials from EC2 and does not require explicit AK/SK, and yes, for on-perm only.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
BTW, for SASL/SCRAM, it also seems not possible for cloud, because we need to turn on public access for MSK, which will then require ACL, and we can't add RW cloud to the ACL.
Is it even possible to connect to MSK on cloud? 🤔
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, the brokers are still available when with the help of private link.
why we need a public access? Or, why assume role cannot work.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh, indeed private link may help.
This comment was marked as resolved.
Sorry, something went wrong.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's a service account that assumes role, and we use that account's AKSK to connect
(We also didn't mention that detail in the doc btw