[Question] How to get SASL_SSL with SCRAM on Kafka Connect
See original GitHub issueI’ve followed the documentation on how to setup from SCRAM but the security protocol get’s set to SASL_PLAINTEXT
security.protocol = SASL_PLAINTEXT
Is there anyway to get it to be SASL_SSL?
For some context I’m trying to integrate with MSK using SASL SCRAM. https://docs.aws.amazon.com/msk/latest/developerguide/msk-password.html
security.protocol=SASL_SSL
sasl.mechanism=SCRAM-SHA-512
sasl.jaas.config=org.apache.kafka.common.security.scram.ScramLoginModule required username="username" password="password";
Issue Analytics
- State:
- Created 3 years ago
- Reactions:1
- Comments:6 (3 by maintainers)
Top Results From Across the Web
Configuring SCRAM | Confluent Documentation
Configure all brokers in the Kafka cluster to accept secure connections from clients. Any configuration changes made to the broker will require a...
Read more >Unable to connect to Kafka with SASL_SSL + SCRAM - Airbyte
I would suggest you take a look at how the connector builds the Kafka producer and identify what is missing for you there....
Read more >How to Secure Confluent Kafka with SSL and SASL/SCRAM
First of all, I'll go with securing the connection using SSL protocol. Each machine in cluster has public-private key and certificate as an ......
Read more >Mule 4 Kafka connector with SASL-SSL-security-protocol ...
SASL/GSSAPI support was added in the Kafka connector version 4.2.0. It is recommended to use the last release though.
Read more >Kafka Strimzi SASL_SSL with SCRAM-SHA-512.authMech
kubectl get secret kafka-cluster-name-cluster-ca-cert -o jsonpath='{.data.ca\.crt}' | base64 --decode > ca.crt kubectl get secret ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
To add from tomorrow … this example is using
SASL_SSL
: https://github.com/strimzi/strimzi-kafka-operator/blob/02edfdd9b0b78c1e5ffbc4c052da24c8c1bbf3f4/examples/security/scram-sha-512-auth/connect.yaml#L102But MSK normally uses signed certificates so you do not need to provide the trusted certificate and can do just something like this:
Yeah. You just configure TLS in .spec.tls and SASL auth in .spec.auth … and when they are both set, it enables SASL_SSL. Not at my desk right now, but I can provide docs links and examples tomorrow.
On Thu 1. 10. 2020 at 1:13, Paulo Casaes notifications@github.com wrote: