[jira] [Commented] (HADOOP-17188) Support for AWS STSAssumeRoleWithWebIdentitySessionCredentialsProvider based credential provider to support use of IRSA on deployments on AWS EKS Cluster

2020-09-02 Thread Arun Ravi M V (Jira)


[ 
https://issues.apache.org/jira/browse/HADOOP-17188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17189791#comment-17189791
 ] 

Arun Ravi M V commented on HADOOP-17188:


Here is the Jira ticket and pull request.

https://issues.apache.org/jira/browse/SPARK-27872

[https://github.com/apache/spark/pull/24748]

> Support for AWS STSAssumeRoleWithWebIdentitySessionCredentialsProvider based 
> credential provider to support use of IRSA on deployments on AWS EKS Cluster
> -
>
> Key: HADOOP-17188
> URL: https://issues.apache.org/jira/browse/HADOOP-17188
> Project: Hadoop Common
>  Issue Type: Improvement
>  Components: fs/s3
>Affects Versions: 3.3.0
>Reporter: Arun Ravi M V
>Priority: Minor
>
> The latest version of AWS SDK has support to use IRSA for providing 
> credentials to Kubernetes pods which can potentially replace the use of 
> Kube2IAM. For our Apache Spark on Kubernetes use cases, this feature will be 
> useful. The current Hadoop AWS component does support adding custom 
> credential provider but I think if we could add 
> STSAssumeRoleWithWebIdentitySessionCredentialsProvider support to (using 
> roleArn, role session name, web Identity Token File) to the hadoop-aws 
> library, it will be useful for the community as such who use AWS EKS.
> [https://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/com/amazonaws/auth/STSAssumeRoleWithWebIdentitySessionCredentialsProvider.html]
> [https://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/com/amazonaws/auth/STSAssumeRoleWithWebIdentitySessionCredentialsProvider.Builder.html
> ] 
> [https://aws.amazon.com/blogs/opensource/introducing-fine-grained-iam-roles-service-accounts/]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: common-issues-h...@hadoop.apache.org



[jira] [Commented] (HADOOP-17188) Support for AWS STSAssumeRoleWithWebIdentitySessionCredentialsProvider based credential provider to support use of IRSA on deployments on AWS EKS Cluster

2020-09-02 Thread Steve Loughran (Jira)


[ 
https://issues.apache.org/jira/browse/HADOOP-17188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17189283#comment-17189283
 ] 

Steve Loughran commented on HADOOP-17188:
-

ok, so it was some spark setup change? Is there a SPARK- JIRA to link to?

> Support for AWS STSAssumeRoleWithWebIdentitySessionCredentialsProvider based 
> credential provider to support use of IRSA on deployments on AWS EKS Cluster
> -
>
> Key: HADOOP-17188
> URL: https://issues.apache.org/jira/browse/HADOOP-17188
> Project: Hadoop Common
>  Issue Type: Improvement
>  Components: fs/s3
>Affects Versions: 3.3.0
>Reporter: Arun Ravi M V
>Priority: Minor
>
> The latest version of AWS SDK has support to use IRSA for providing 
> credentials to Kubernetes pods which can potentially replace the use of 
> Kube2IAM. For our Apache Spark on Kubernetes use cases, this feature will be 
> useful. The current Hadoop AWS component does support adding custom 
> credential provider but I think if we could add 
> STSAssumeRoleWithWebIdentitySessionCredentialsProvider support to (using 
> roleArn, role session name, web Identity Token File) to the hadoop-aws 
> library, it will be useful for the community as such who use AWS EKS.
> [https://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/com/amazonaws/auth/STSAssumeRoleWithWebIdentitySessionCredentialsProvider.html]
> [https://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/com/amazonaws/auth/STSAssumeRoleWithWebIdentitySessionCredentialsProvider.Builder.html
> ] 
> [https://aws.amazon.com/blogs/opensource/introducing-fine-grained-iam-roles-service-accounts/]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: common-issues-h...@hadoop.apache.org



[jira] [Commented] (HADOOP-17188) Support for AWS STSAssumeRoleWithWebIdentitySessionCredentialsProvider based credential provider to support use of IRSA on deployments on AWS EKS Cluster

2020-09-01 Thread Arun Ravi M V (Jira)


[ 
https://issues.apache.org/jira/browse/HADOOP-17188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17188527#comment-17188527
 ] 

Arun Ravi M V commented on HADOOP-17188:


We fixed this issue by patching Apache Spark and using 
com.amazonaws.auth.WebIdentityTokenCredentialsProvider.

Details: 
[https://medium.com/@tunguyen9889/how-to-perform-a-spark-submit-to-amazon-eks-cluster-with-irsa-50af9b26cae]

I am marking this issue as will not do as the problem was being propagated from 
Apache Spark.

> Support for AWS STSAssumeRoleWithWebIdentitySessionCredentialsProvider based 
> credential provider to support use of IRSA on deployments on AWS EKS Cluster
> -
>
> Key: HADOOP-17188
> URL: https://issues.apache.org/jira/browse/HADOOP-17188
> Project: Hadoop Common
>  Issue Type: Improvement
>  Components: fs/s3
>Affects Versions: 3.3.0
>Reporter: Arun Ravi M V
>Priority: Minor
>
> The latest version of AWS SDK has support to use IRSA for providing 
> credentials to Kubernetes pods which can potentially replace the use of 
> Kube2IAM. For our Apache Spark on Kubernetes use cases, this feature will be 
> useful. The current Hadoop AWS component does support adding custom 
> credential provider but I think if we could add 
> STSAssumeRoleWithWebIdentitySessionCredentialsProvider support to (using 
> roleArn, role session name, web Identity Token File) to the hadoop-aws 
> library, it will be useful for the community as such who use AWS EKS.
> [https://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/com/amazonaws/auth/STSAssumeRoleWithWebIdentitySessionCredentialsProvider.html]
> [https://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/com/amazonaws/auth/STSAssumeRoleWithWebIdentitySessionCredentialsProvider.Builder.html
> ] 
> [https://aws.amazon.com/blogs/opensource/introducing-fine-grained-iam-roles-service-accounts/]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: common-issues-h...@hadoop.apache.org



[jira] [Commented] (HADOOP-17188) Support for AWS STSAssumeRoleWithWebIdentitySessionCredentialsProvider based credential provider to support use of IRSA on deployments on AWS EKS Cluster

2020-08-07 Thread Steve Loughran (Jira)


[ 
https://issues.apache.org/jira/browse/HADOOP-17188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17173027#comment-17173027
 ] 

Steve Loughran commented on HADOOP-17188:
-

If its in the aws SDK JAR we ship -a matter of just listing it on the 
fs.s3a.credential.provider option

* Do this, let us know how it works, and supply docs
* we haven't updated the AWS SDK for a while, if that is needed, create a JIRA 
for that and have a go following the runbook in testing.md 
* if there are specific changes needed (per-bucket setting of different 
options..), then yes, a new provider is welcome. Ideally one we can test

> Support for AWS STSAssumeRoleWithWebIdentitySessionCredentialsProvider based 
> credential provider to support use of IRSA on deployments on AWS EKS Cluster
> -
>
> Key: HADOOP-17188
> URL: https://issues.apache.org/jira/browse/HADOOP-17188
> Project: Hadoop Common
>  Issue Type: Improvement
>  Components: fs/s3
>Affects Versions: 3.3.0
>Reporter: Arun Ravi M V
>Priority: Minor
>
> The latest version of AWS SDK has support to use IRSA for providing 
> credentials to Kubernetes pods which can potentially replace the use of 
> Kube2IAM. For our Apache Spark on Kubernetes use cases, this feature will be 
> useful. The current Hadoop AWS component does support adding custom 
> credential provider but I think if we could add 
> STSAssumeRoleWithWebIdentitySessionCredentialsProvider support to (using 
> roleArn, role session name, web Identity Token File) to the hadoop-aws 
> library, it will be useful for the community as such who use AWS EKS.
> [https://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/com/amazonaws/auth/STSAssumeRoleWithWebIdentitySessionCredentialsProvider.html]
> [https://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/com/amazonaws/auth/STSAssumeRoleWithWebIdentitySessionCredentialsProvider.Builder.html
> ] 
> [https://aws.amazon.com/blogs/opensource/introducing-fine-grained-iam-roles-service-accounts/]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: common-issues-h...@hadoop.apache.org