Starting from version 1.9 you will be able to configure and secure your Kafka clusters from UI. To do it log in to the app and select Clusters menu item. You will see your clusters list. To add new cluster click Add new cluster
button and cluster form will be opened.
If your Kafka cluster requires any authentication you are able to configure SASL
, SSL
or AWS MSK
authentication.
Within this form you are able to add Schema Registry to your cluster.
If your Schema Registry requires any authentication you are able to configure SSL
or SSL with basic authentication
security.
WARNING
This configuration will be deprecated in version 1.9 and removed in the future. In version 1.9 this configuration will be used to preload your clusters.
Assuming your Kafka is secured and requires mTLS to connect, you need to provide a client truststore containing the CA's public certificate, and a keystore with both the client's private key and the CA-signed certificate. Then, add a kafka node to your YAML configuration with the following values:
WARNING
This configuration will be deprecated in version 1.9 and removed in the future. In version 1.9 this configuration will be used to preload your clusters.
If one of your brokers in a cluster environment requires SASL authentication, you should specify saslMechanism
, saslProtocol
and saslJassConfig
for that broker. For example:
WARNING
This configuration will be deprecated in version 1.9 and removed in the future. In version 1.9 this configuration will be used to preload your clusters.
If one of your brokers in a cluster environment is located in an Amazon MSK cluster, you should specify saslMechanism
, saslProtocol
, saslJassConfig
, and saslCallbackHandler
for this broker, like this:
The above configuration uses IAM access to the Amazon MSK cluster, and you should provide AWS_SECRET_ACCESS_KEY
and AWS_ACCESS_KEY_ID
as environment variables to Kouncil. These two values should be generated for the user with access to the Amazon MSK cluster, and their user name should be provided in awsProfileName
in the Kouncil configuration.
WARNING
This configuration will be deprecated in version 1.9 and removed in the future. In version 1.9 this configuration will be used to preload your clusters.
Assuming your SchemaRegistry is secured and requires SSL for connection, you need to provide a client truststore that contains the CA's public certificate, and a keystore that includes both the client's private key and the CA-signed certificate.
WARNING
This configuration will be deprecated in version 1.9 and removed in the future. In version 1.9 this configuration will be used to preload your clusters.
Assuming your SchemaRegistry is secured and requires both SSL and BASIC authentication for connection, you need to provide a client truststore that contains the CA's public certificate, and a keystore that includes both the client's private key and the CA-signed certificate. For BASIC authentication, you need to provide user credentials that will be used to authenticate when Kouncil connects to the SchemaRegistry.