This Processor polls Apache Kafka for data using KafkaConsumer API available with Kafka 2.6. When a message is received from Kafka, this Processor emits a FlowFile where the content of the FlowFile is the value of the Kafka message.
The Security Protocol property allows the user to specify the protocol for communicating with the Kafka broker. The following sections describe each of the protocols in further detail.
This option provides an unsecured connection to the broker, with no client authentication and no encryption. In order to use this option the broker must be configured with a listener of the form:
PLAINTEXT://host.name:port
This option provides an encrypted connection to the broker, with optional client authentication. In order to use this option the broker must be configured with a listener of the form:
SSL://host.name:portIn addition, the processor must have an SSL Context Service selected.
If the broker specifies ssl.client.auth=none, or does not specify ssl.client.auth, then the client will not be required to present a certificate. In this case, the SSL Context Service selected may specify only a truststore containing the public key of the certificate authority used to sign the broker's key.
If the broker specifies ssl.client.auth=required then the client will be required to present a certificate. In this case, the SSL Context Service must also specify a keystore containing a client key, in addition to a truststore as described above.
This option uses SASL with a PLAINTEXT transport layer to authenticate to the broker. In order to use this option the broker must be configured with a listener of the form:
SASL_PLAINTEXT://host.name:portIn addition, the Kerberos Service Name must be specified in the processor.
If the SASL mechanism is GSSAPI, then the client must provide a JAAS configuration to authenticate.
An example of the JAAS config file would be the following:
KafkaClient { com.sun.security.auth.module.Krb5LoginModule required useKeyTab=true storeKey=true keyTab="/path/to/nifi.keytab" serviceName="kafka" principal="nifi@YOURREALM.COM"; };NOTE: The serviceName in the JAAS file must match the Kerberos Service Name in the processor.
The JAAS configuration can be provided by either of below ways
java.arg.16=-Djava.security.auth.login.config=/path/to/kafka_client_jaas.conf
sasl.jaas.config : com.sun.security.auth.module.Krb5LoginModule required useKeyTab=true storeKey=true keyTab="/path/to/nifi.keytab" serviceName="kafka" principal="nifi@YOURREALM.COM";
Alternatively, the JAAS configuration when using GSSAPI can be provided by specifying the Kerberos Principal and Kerberos Keytab directly in the processor properties. This will dynamically create a JAAS configuration like above, and will take precedence over the java.security.auth.login.config system property.
If the SASL mechanism is PLAIN, then client must provide a JAAS configuration to authenticate, but the JAAS configuration must use Kafka's PlainLoginModule. An example of the JAAS config file would be the following:
KafkaClient { org.apache.kafka.common.security.plain.PlainLoginModule required username="nifi" password="nifi-password"; };The JAAS configuration can be provided by either of below ways
java.arg.16=-Djava.security.auth.login.config=/path/to/kafka_client_jaas.conf
sasl.jaas.config : org.apache.kafka.common.security.plain.PlainLoginModule required username="nifi" password="nifi-password";NOTE: The dynamic properties of this processor are not secured and as a result the password entered when utilizing sasl.jaas.config will be stored in the flow.xml.gz file in plain-text, and will be saved to NiFi Registry if using versioned flows.
NOTE: It is not recommended to use a SASL mechanism of PLAIN with SASL_PLAINTEXT, as it would transmit the username and password unencrypted.
NOTE: The Kerberos Service Name is not required for SASL mechanism of PLAIN. However, processor warns saying this attribute has to be filled with non empty string. You can choose to fill any random string, such as "null".
NOTE: Using the PlainLoginModule will cause it be registered in the JVM's static list of Providers, making it visible to components in other NARs that may access the providers. There is currently a known issue where Kafka processors using the PlainLoginModule will cause HDFS processors with Keberos to no longer work.
If the SASL mechanism is SCRAM, then client must provide a JAAS configuration to authenticate, but the JAAS configuration must use Kafka's ScramLoginModule. Ensure that you add user defined attribute 'sasl.mechanism' and assign 'SCRAM-SHA-256' or 'SCRAM-SHA-512' based on kafka broker configurations. An example of the JAAS config file would be the following:
KafkaClient { org.apache.kafka.common.security.scram.ScramLoginModule required username="nifi" password="nifi-password"; };The JAAS configuration can be provided by either of below ways
java.arg.16=-Djava.security.auth.login.config=/path/to/kafka_client_jaas.conf
sasl.jaas.config : org.apache.kafka.common.security.scram.ScramLoginModule required username="nifi" password="nifi-password";NOTE: The dynamic properties of this processor are not secured and as a result the password entered when utilizing sasl.jaas.config will be stored in the flow.xml.gz file in plain-text, and will be saved to NiFi Registry if using versioned flows.
NOTE: The Kerberos Service Name is not required for SASL mechanism of SCRAM-SHA-256 or SCRAM-SHA-512. However, processor warns saying this attribute has to be filled with non empty string. You can choose to fill any random string, such as "null".
This option uses SASL with an SSL/TLS transport layer to authenticate to the broker. In order to use this option the broker must be configured with a listener of the form:
SASL_SSL://host.name:port
See the SASL_PLAINTEXT section for a description of how to provide the proper JAAS configuration depending on the SASL mechanism (GSSAPI or PLAIN).
See the SSL section for a description of how to configure the SSL Context Service based on the ssl.client.auth property.