-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support sasl auth properties options to kafka connector #6439
Comments
Is this duplicate of #1184? Or do you mean different SASL mechanisms? |
I meant SASL Plaintext mechanism. Those mentioned issues relate to Kerbereos or SSL mechanisms... I guess all of them are relevant for production usage and should be taken for consideration in the end. |
Hi @klDen , Is this still in active development ? We also had this requirement for SASL_SSL configurations . I have also raised a ticket for the same with expected couple of configs :
#8197 |
Hello @ashishmgofficial , I was planning on working on this, but according to @lukasz-walkiewicz , a security team member at Starburst will be taking care of this :-)! |
@lukasz-walkiewicz Can you share any info on this ? Wanted to know the expected time this feature would be available to Trino and Starburst |
One of the ideas would be to implement |
Hello @kokosing , does this idea means Trino won't be validating all configurations explicitely? |
Yes. However Trino might override them. For example if you configure SSL in such file and SSL specific properties then they can be overriden. |
Great. If this is the chosen solution, I'd be happy to help out on this. |
Please do. |
@kokosing would you be able to point to an implementation snippet of kafka.config.resources usage with Trino. Our kafka cluster is configured with SASL_SSL at the moment. |
It was an idea how this could be implemented. It is not yet implemented. |
I'll start implementing this feature this weekend! |
hi guys. I would like to follow up a discussion. |
Hey @gsvlad , I have been busy on my end lately and didn't spend more time on this feature implementation. |
This is much appreciated. I confirm the need as currently SASL authentication is the only supported by Confluent. Thank you! |
Hi everyone, I would also be interested in that feature, seems to be part of Starburst already? https://docs.starburst.io/latest/connector/starburst-kafka.html#sasl-authentication |
Hey @klDen, are there any updates? We are planning our further activities and some are related to this functionality. I would appreciate if you share your plans about it. Thank you |
Hey @gsvlad , I'll resume my work here this week! |
@klDen, @kokosing, thanks for taking care of this feature! Just wanted to point out that we also are waiting for it (being able to either propagate our own security configuration for the Kafka connection or being able to specify And I can confirm that in my experience most Kafka clusters in Productive environments used Also, Schema Registry connection usually requires SSL and authentication in prod envs, so, as @ashishmgofficial proposed, having configuration properties like these ones is also necessary (or an ability to provide them as a separate Schema Registry config file):
Looks like both things are already available in Starburst:
Thanks again! |
Someone posted in 2019 the ability to do this in the slack. (that and dynamically pull over topics). Would still enjoy this functionality as well. Thanks! |
@matt12eagles, you mean, this should be already possible to propagate custom security configuration to kafka connector (for both brokers and schema registry connections)? Would you be able to elaborate on it probably? |
I had read in slack that someone had got it working w/ a custom fork.. but I dont believe he/she had shared the code :( |
Please share the link to this fork, if you happen to find it here on GitHub.. This would be useful probably also for @klDen to simplify the effort. |
I don't have a link available, but any update if this is working or if anyone is working on this? May be able to take a shot at it if no one is working on this at the moment |
Hey! Please try building from my PR branch. Im only missing product test in the PR, but it should be working and allow users to provide more custom Kafka configs. I'll work on the product tests very soon |
Greetings in the new year, @klDen! Any updates on including this enhancement in the official build probably? |
Hello! I'll be resolving the comments this weekend! :) |
@klDen, any good/bad news probably? Sorry for bothering you.. |
Hey! There's no news ATM. I'm waiting for the maintainers to review my PR. |
I don't have the permission to link the PR here. People can refer to your comment and see the PR though 👍 |
I added link. |
@klDen hooray, the review was done! :) |
Hey! I'll work on this end of next week. I'm currently AFK 😄 |
Most of the production deployments of kafka clusters are using sasl authentication mechanism.
it would be nice to add this properties to the connector for production usage.
The properties should contain the mechanism usage, username and password etc for both the Client, Producer and Conumer.
Thanks.
The text was updated successfully, but these errors were encountered: