In this article

Overview

You can use the Kafka Kerberos account type to connect the Confluent Kafka Snaps with data sources that use Kafka Kerberos accounts.

Prerequisites

None.

Limitations

None.

Known Issues

None.

Account Settings

ParameterData TypeDescriptionDefault ValueExample 
LabelString

Required. Specify a unique label for the account.

N/AKafka Kerberos Account_89
Bootstrap Servers

Use this field set to configure the bootstrap servers. Click  to add a new row in this table for configuring bootstrap servers.  

This field set contains the Bootstrap Server field.

Bootstrap ServerString/ExpressionSpecify an ordered list of host:port pairs to establish the initial connection to the Kafka cluster.N/Aec2-55-334-44-55.compute-1.amazonaws.com:9000
Schema Registry URLString/ExpressionSpecify the schema registry server URL.N/Ahttp://ec2-55-334-44-88.compute-1.amazonaws.com:8000
Advanced Kafka Properties

Use this field set to specify any additional Kafka properties that are not explicitly provided in the Snaps for connecting to the Kafka server.

The Advanced Kafka Properties field enables you to define additional Kafka properties. The properties that you provide here overwrite any values defined by the Snap. All Kafka properties are automatically defined by the Snap. These properties are passed directly to the server and are not tested by SnapLogic, Inc.

This field set contains the following fields:

  • Key 
  • Value
KeyString/ExpressionSpecify the key for any Kafka parameters that are not explicitly supported by the Snaps.N/Amax.message.size
ValueString/ExpressionSpecify the value for the corresponding key that are not explicitly supported by the Snaps.N/A5MB
Security ProtocolString/Expression

Choose a security protocol that GSSAPI/Kerberos authentication supports.

The available options are:

  • SASL_SSL
  • SASL_PLAINTEXT
SASL_SSLSASL_PLAINTEXT
PrincipalString/ExpressionRequired. Specify a unique name of a user or service for authentication.
N/A

User: testuser

Service: kafka/testhost.example.com.

KeytabString/ExpressionRequired. Specify the path of the Kerberos Keytab file that includes the Principals.N/A/etc/security/keytabs/nn.service.keytab
Truststore FilepathString/Expression

Provide the location of the Truststore file that is used to authenticate the server.

Provide the location if the Security protocol is SASL_SSL and the certificate is not signed by a Certificate Authority in the system's Truststore.


N/Akafka.net.ssl.truststore
Truststore PasswordStringSpecify the password to access the Truststore file, if used.N/Atest1234


Additional Information

When connecting to a Kerberos-enabled Kafka server, you must enable the User Datagram Protocol (UDP) connections to Port 88 of the Key Distribution Center (KDC) service. To do so, follow these steps:

  1. Connect to the Snaplex node (on Windows / Linux).

  2. Navigate to the krb5.conf file.

  3. Edit the krb5.conf file using any text editor.
    Note: Before you edit, take a backup of the current file.

  4. Navigate to the [libdefaults] section.

  5. Add the following entry in the krb5.conf file under [libdefaults].

    udp_preference_limit = 1

  6. Save and close the krb5.conf file.

  7. Restart the Snaplex node.

Troubleshooting

ErrorReasonResolution
Read timed out (read timeout = 300)The Kafka Kerberos account validation fails when you do not enable the UDP connections.

Enable UDP connections by adding the following entry in the krb5.conf file under [libdefaults].

udp_preference_limit = 1

Refer to the Additional Information section for details.


Related Content