Configure Pulse to Access Kafka with SCRAM and SSL

This page describes how to configure Pulse to securely access and collect metrics from a Kafka cluster that uses SCRAM authentication and SSL encryption.

Pulse supports Kafka clusters secured with SCRAM and SSL only in ODP-managed or standalone deployments.

Configure Pulse for Kafka on the ODP cluster

To allow Pulse to securely connect to Kafka that uses Scram and SSL on an ODP cluster, follow these steps:

  1. Run the cluster configuration command: accelo config cluster.
  2. If Kafka is using SCRAM authentication, you will be prompted with the following question. Select Y and provide the full path to your SCRAM config file.

Note Copy the kafka_jass.conf file to the Pulse node and provide its location when prompted during Pulse installation.

Bash
Copy
  1. If Kafka is using TLS/SSL, you will be prompted with the following question. Select Y and provide the full path to your certificates.

Note Copy the cacerts and jssecacert certificates to the Pulse node and provide its location when prompted during Pulse installation.

Bash
Copy

These prompts appear in the Accelo CLI only when Kafka in the ODP cluster is configured for SCRAM-based authentication and using TLS/SSL. Specifically, the sasl_enabled_mechanism parameter must be set to either SCRAM-SHA-256 or SCRAM-SHA-512.

To verify or configure this setting in ODP (Ambari):

  1. Open the Ambari UI.
  2. Navigate to Kafka > Configs > Advanced Kafka-broker.
  3. Locate the parameter sasl_enabled_mechanism.
  4. Ensure the value is set to either SCRAM-SHA-256 or SCRAM-SHA-512.

Configure Pulse for Standalone Kafka Cluster

To allow Pulse to securely connect to Kafka that uses Scram and SSL on a standalone cluster, follow these steps:

  1. Run the cluster configuration command: accelo config cluster.
  2. If Kafka is using SCRAM authentication, you are prompted to select the SCRAM security type.

Note Copy the kafka_jass.conf file to the Pulse node and provide its location when prompted during Pulse installation.

Bash
Copy
  1. If Kafka is using TLS/SSL, you will be prompted with the following question. Select Y and provide the full path to your certificates.

Note Copy the cacerts and jssecacert certificates to the Pulse node and provide its location when prompted during Pulse installation.

Bash
Copy

Update Kafka Connector Configuration

  1. Edit the file: $AcceloHome/config/docker/addons/ad-kafka-connector.yml.
  2. Set the following parameters.
Bash
Copy

Push the Configuration

Apply the updated configuration to the database.

Bash
Copy

Troubleshooting

If you encounter the following error while configuring Kafka with SCRAM and SSL, update the ad-kafka-connector file with the specified parameters.

Error Message
Copy

To resolve the issue, update the following fields in the ad-kafka-connector file:

  • Environment Variable
Bash
Copy
  • Volume Mount
Bash
Copy

After adding the environment variable and volume mount details, the ad-kafka-connector configuration file appears as follows.

Bash
Copy
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard