Not able to monitor consumer group lag with new consumer and kerberos

2016-06-07 Thread Pierre LABIAUSSE
Hi, 

I'm not able to use kafka-consumer-groups.sh to monitor the lag of my consumers 
when my cluster is kerberized. 

I'm using kafka version 0.9.0 installed on an hortonworks hdp 2.4.0 cluster. 

I've replicated my setup on two sandboxes, one without kerberos and one with 
kerberos. 

On the one without kerberos, I'm able to get an answer from th consumer-groups 
client with the following command: 
./kafka-consumer-groups.sh --list --new-consumer --bootstrap-server 
sandbox.hortonworks.com:6667 

On the one with kerberos activated, i've tried the same command without 
specifying the security-protocoln which fails with a java.io.EOFException when 
connecting to the broker. 
When specifying the security-protocol (PLAINTEXTSASL or SASL_PLAINTEXT), I'm 
seeing a java.io.IOException: Connection reset by peer (full stack is below). 

In both the cases with kerberos, without activating the debug logs in the 
client, it appears to hang since it is stuck in an infinite loop of retrying to 
connect with the broker (and failing) 


Am I missing something in order to use this tool in a kerberized environment ? 
As of now, I'm not seeing any other way to monitor consumer offsets, since they 
are not stored in zookeeper anymore. 

Thanks in advance, 
Pierre 


** Full stack of execution with kerberos and security-protocol specified 
** 
./kafka-consumer-groups.sh --security-protocol PLAINTEXTSASL --new-consumer 
--bootstrap-server sandbox.hortonworks.com:6667 --list 
[2016-06-07 12:42:26,951] INFO Successfully logged in. 
(org.apache.kafka.common.security.kerberos.Login) 
[2016-06-07 12:42:26,952] DEBUG It is a Kerberos ticket 
(org.apache.kafka.common.security.kerberos.Login) 
[2016-06-07 12:42:26,971] INFO TGT refresh thread started. 
(org.apache.kafka.common.security.kerberos.Login) 
[2016-06-07 12:42:26,981] DEBUG Found TGT Ticket (hex) = 
: 61 82 01 5F 30 82 01 5B A0 03 02 01 05 A1 09 1B a.._0..[ 
0010: 07 49 54 52 2E 4C 41 4E A2 1C 30 1A A0 03 02 01 .ITR.LAN..0. 
0020: 02 A1 13 30 11 1B 06 6B 72 62 74 67 74 1B 07 49 ...0...krbtgt..I 
0030: 54 52 2E 4C 41 4E A3 82 01 29 30 82 01 25 A0 03 TR.LAN...)0..%.. 
0040: 02 01 12 A1 03 02 01 01 A2 82 01 17 04 82 01 13  
0050: D9 9F 09 9C F7 96 72 D2 5F 84 20 B9 D7 5D DC 7B ..r._. ..].. 
0060: 8D 4F A0 03 DC D5 85 54 86 4D A1 A6 F1 31 5A BF .O.T.M...1Z. 
0070: F9 40 71 43 20 97 7F 84 D6 F7 2D 93 16 27 06 B2 .@qC .-..'.. 
0080: 42 45 9D DE C3 4C 61 B6 8B 9B B3 E5 F8 F7 EB 3E BE...La> 
0090: D6 53 AE 9D 5D E0 06 DA 75 E0 43 DE 28 9C DE CB .S..]...u.C.(... 
00A0: CF 72 00 5A CC 69 20 82 5F C6 4F 1D 7F D0 1F FB .r.Z.i ._.O. 
00B0: 92 55 B6 31 69 F1 E8 5B FD 2B 22 F8 15 E0 5D 84 .U.1i..[.+"...]. 
00C0: 5A 1A 2B 6D 0B 90 93 97 5B 06 EC 30 37 3C BB 71 Z.+m[..07<.q 
00D0: 0B 23 24 67 F2 70 ED 1A E2 FF 6F 3A 12 0F B2 1D .#$g.po: 
00E0: AD B9 C9 2C 24 B3 89 B3 90 22 8F 5C 1E AE 86 99 ...,$".\ 
00F0: 1A B5 B4 4A 3E 1D 6F 73 FD CB 60 D3 E3 76 71 6C ...J>.os..`..vql 
0100: 90 B5 EA 4A D3 74 87 0E 02 9E C4 6D 0E 49 A2 47 ...J.t.m.I.G 
0110: A4 2A FA CD D4 96 65 F3 FC E1 FB 9A 6F A1 0F 0E .*e.o... 
0120: AF 6F 9F 9F D5 7C 5A 29 FE BF 84 18 2E CC 7F 0C .oZ) 
0130: 07 53 D2 F9 0A 44 DA 8E 3C B6 90 C0 71 69 5C CA .S...D..<...qi\. 
0140: 9F E1 FE 23 71 C1 B7 B1 1A 7D 84 BD 33 AA ED A6 ...#q...3... 
0150: 9A CE 08 A9 9B 6E 29 54 B5 6B 06 9A 4D 4C 5F 3A .n)T.k..ML_: 
0160: CF A6 FF ... 

Client Principal = kafka/sandbox.hortonworks@itr.lan 
Server Principal = krbtgt/itr@itr.lan 
Session Key = EncryptionKey: keyType=18 keyBytes (hex dump)= 
: 8E 4E 45 F8 0D B4 33 0C ED C5 7C A2 2D E2 C2 19 .NE...3.-... 
0010: 87 CC 27 68 72 B1 5B F8 C4 7D E8 BF EC F0 E9 F4 ..'hr.[. 


Forwardable Ticket true 
Forwarded Ticket false 
Proxiable Ticket false 
Proxy Ticket false 
Postdated Ticket false 
Renewable Ticket true 
Initial Ticket true 
Auth Time = Tue Jun 07 12:36:46 UTC 2016 
Start Time = Tue Jun 07 12:36:46 UTC 2016 
End Time = Wed Jun 08 12:36:46 UTC 2016 
Renew Till = Tue Jun 07 12:36:46 UTC 2016 
Client Addresses Null . (org.apache.kafka.common.security.kerberos.Login) 
[2016-06-07 12:42:26,981] INFO TGT valid starting at: Tue Jun 07 12:36:46 UTC 
2016 (org.apache.kafka.common.security.kerberos.Login) 
[2016-06-07 12:42:26,981] INFO TGT expires: Wed Jun 08 12:36:46 UTC 2016 
(org.apache.kafka.common.security.kerberos.Login) 
[2016-06-07 12:42:26,981] INFO TGT refresh sleeping until: Tue Jun 07 14:40:41 
UTC 2016 (org.apache.kafka.common.security.kerberos.Login) 
[2016-06-07 12:42:27,036] DEBUG Updated cluster metadata version 1 to 
Cluster(nodes = [Node(-1, sandbox.hortonworks.com, 6667)], partitions = []) 
(org.apache.kafka.clients.Metadata) 
[2016-06-07 12:42:27,044] DEBUG Added sensor with name connections-closed: 
(org.apache.kafka.common.metrics.Metrics) 
[2016-06-07 12:42:27,046] DEBUG Added sensor with name connections-created: 
(org.apache.kafka.common.m

Not able to monitor consumer group lag with new consumer and kerberos

2016-06-07 Thread Pierre Labiausse
Hi,

I'm not able to use kafka-consumer-groups.sh to monitor the lag of my
consumers when my cluster is kerberized.

I'm using kafka version 0.9.0 installed on an hortonworks hdp 2.4.0 cluster.

I've replicated my setup on two sandboxes, one without kerberos and one
with kerberos.

On the one without kerberos, I'm able to get an answer from the
consumer-groups client with the following command:
./kafka-consumer-groups.sh --list --new-consumer --bootstrap-server
sandbox.hortonworks.com:6667

On the one with kerberos activated, i've tried the same command without
specifying the security-protocoln which fails with a java.io.EOFException
when connecting to the broker.
When specifying the security-protocol (PLAINTEXTSASL or SASL_PLAINTEXT),
I'm seeing a java.io.IOException: Connection reset by peer (full log is
below).

In both the cases with kerberos, without activating the debug logs in the
client, it appears to hang since it is stuck in an infinite loop of
retrying to connect with the broker (and failing)


Am I missing something in order to use this tool in a kerberized
environment ? As of now, I'm not seeing any other way to monitor consumer
offsets, since they are not stored in zookeeper anymore.

Thanks in advance,
Pierre


** Full stack of execution with kerberos and security-protocol
specified **
./kafka-consumer-groups.sh --security-protocol PLAINTEXTSASL --new-consumer
--bootstrap-server sandbox.hortonworks.com:6667 --list
[2016-06-07 12 :42:26,951] INFO Successfully logged
in. (org.apache.kafka.common.security.kerberos.Login)
[2016-06-07 12 :42:26,952] DEBUG It is a Kerberos
ticket (org.apache.kafka.common.security.kerberos.Login)
[2016-06-07 12 :42:26,971] INFO TGT refresh thread
started. (org.apache.kafka.common.security.kerberos.Login)
[2016-06-07 12 :42:26,981] DEBUG Found TGT Ticket
(hex) =
: 61 82 01 5F 30 82 01 5B A0 03 02 01 05 A1 09 1B a.._0..[
0010: 07 49 54 52 2E 4C 41 4E A2 1C 30 1A A0 03 02 01 .ITR.LAN..0.
0020: 02 A1 13 30 11 1B 06 6B 72 62 74 67 74 
1B 07 49 ...0...krbtgt..I
0030: 54 52 2E 4C 41 4E A3 82 01 29 30 82 01 25
 A0 03 TR.LAN...)0..%..
0040: 02 01 12 A1 03 02 01 01 A2 82 01 17 04 82 01 13
 
0050: D9 9F 09 9C F7 96 72 D2 5F 84 20 B9 D7 5D DC 7B ..r._. ..]..
0060: 8D 4F A0 03 DC D5 85 54 86 4D A1 A6 F1 31 5A BF .O.T.M...1Z.
0070: F9 40 71 43 20 97  7F 84 D6 F7 2D 93
16 27 06 B2 .@qC .-..'..
0080: 42 45 9D DE C3 4C 61 B6 8B 9B B3 E5 F8 F7 EB 3E BE...La>
0090: D6 53 AE 9D 5D E0 06 DA 75 E0 43 DE 28 9C DE CB .S..]...u.C.(...
00A0: CF 72 00 5A CC 69 20 82 5F C6 4F 1D 7F D0 1F FB .r.Z.i ._.O.
00B0: 92 55 B6 31 69 F1 E8 5B FD 2B 22 F8 15 E0 5D 84 .U.1i..[.+"...].
00C0: 5A 1A 2B 6D 0B 90 93 97 5B 06 EC 30 37 3C BB 71 Z.+m[..07<.q
00D0: 0B 23 24 67 F2 70 ED 1A E2 FF 6F 3A 12 0F B2 1D .#$g.po:
00E0: AD B9 C9 2C 24 B3 89 B3 90 22 8F 5C 1E AE 86 99 ...,$".\
00F0: 1A B5 B4 4A 3E 1D 6F 73 FD CB 60 D3 E3 76 71 6C ...J>.os..`..vql
0100: 90 B5 EA 4A D3 74 87 0E 02 9E C4 6D 0E 49 A2 47 ...J.t.m.I.G
0110: A4 2A FA CD D4 96 65 F3 FC E1 FB 9A 6F A1 0F 0E .*e.o...
0120: AF 6F 9F 9F D5 7C 5A 29 FE BF 84 18 2E CC 7F 0C .oZ)
0130: 07 53 D2 F9 0A 44 DA 8E 3C B6 90 C0 71 69 5C CA .S...D..<...qi\.
0140: 9F E1 FE 23 71 C1 B7 B1 1A 7D 84 BD 33 AA ED A6 ...#q...3...
0150: 9A CE 08 A9 9B 6E 29 54 B5 6B 06 9A 4D 4C 5F 3A .n)T.k..ML_:
0160: CF A6 FF ...

Client Principal = kafka/sandbox.hortonworks@itr.lan
Server Principal = krbtgt/itr@itr.lan
Session Key = EncryptionKey: keyType=18 keyBytes (hex dump)=
: 8E 4E 45 F8 0D B4 33 0C ED C5 7C A2 2D E2 C2 19 .NE...3.-...
0010: 87 CC 27 68 72 B1 5B F8 C4 7D E8 BF EC F0 E9 F4 ..'hr.[.


Forwardable Ticket true
Forwarded Ticket false
Proxiable Ticket false
Proxy Ticket false
Postdated Ticket false
Renewable Ticket true
Initial Ticket true
Auth Time = Tue Jun 07 12:36:46 UTC 2016
Start Time = Tue Jun 07 12:36:46 UTC 2016
End Time = Wed Jun 08 12:36:46 UTC 2016
Renew Till = Tue Jun 07 12:36:46 UTC 2016
Client Addresses Null . (org.apache.kafka.common.security.kerberos.Login)
[2016-06-07 12 :42:26,981] INFO TGT valid starting
at: Tue Jun 07 12:36:46 UTC 2016
(org.apache.kafka.common.security.kerberos.Login)
[2016-06-07 12 :42:26,981] INFO TGT expires: Wed
Jun 08 12:36:46 UTC 2016 (org.apache.kafka.common.security.kerberos.Login)
[2016-06-07 12 :42:26,981] INFO TGT refresh
sleeping until: Tue Jun 07 14:40:41 UTC 2016
(org.apache.kafka.common.security.kerberos.Login)
[2016-06-07 12 :42:27,036] DEBUG Updated cluster
metadata version 1 to Cluster(nodes = [Node(-1, sandbox.hortonworks.com,
6667)], partitions = []) (org.apache.kafka.clients.Metadata)
[2016-06-07 12 :42:27,044] DEBUG Added sensor with
name connections-closed: (org.apache.kafka.common.metrics.Metrics)
[2016-06-07 12 :42:27,046] DEBUG Added sensor with
name connections-created: (org.apache.kafka.common.metrics.Metrics)
[2016-06-07 12 :42:27,047] DEBUG Added sensor with
name b

Re: Not able to monitor consumer group lag with new consumer and kerberos

2016-06-08 Thread Pierre Labiausse
Hello again,

I've tried to use the command line tool again without success, but I'm not
seing the IOException anymore in the error stack, only an EOFException.
Nothing is logged server-side, as if the request is not even received.

Ewen, I've tried using the command-config flag as you suggested, but I am
not sure what additional configuration the client would need. I don't need
additional configuration files when using the console producer and consumer
(just setting the security-protocol is okay), and when using the java
consumer, I only need to provide a JAAS file to either use the kerberos
ticket cache or a keytab to authenticate.

I've found a consumer.properties file in kafka configuration folder, which
I'll paste below, but I don't think it contains relevant information.

I will create a thread on hortonworks community forum, and will add the
link here when it goes through their validation process.

Regards,
Pierre


*** consumer.properties file ***
# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements.  See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License.  You may obtain a copy of the License at
#
#http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# see kafka.consumer.ConsumerConfig for more details

# Zookeeper connection string
# comma separated host:port pairs, each corresponding to a zk
# server. e.g. "127.0.0.1:3000,127.0.0.1:3001,127.0.0.1:3002"
zookeeper.connect=127.0.0.1:2181

# timeout in ms for connecting to zookeeper
zookeeper.connection.timeout.ms=6000

#consumer group id
group.id=test-consumer-group

#consumer timeout
#consumer.timeout.ms=5000


2016-06-08 1:24 GMT+02:00 Ewen Cheslack-Postava :

> Pierre,
>
> I think you'll need the rest of the security-related configs you'd use for
> a normal client as well. You can use the --command-config flag to include
> additional settings stored in a property file.
>
> -Ewen
>
> On Tue, Jun 7, 2016 at 8:57 AM, Pierre LABIAUSSE  >
> wrote:
>
> > Hi,
> >
> > I'm not able to use kafka-consumer-groups.sh to monitor the lag of my
> > consumers when my cluster is kerberized.
> >
> > I'm using kafka version 0.9.0 installed on an hortonworks hdp 2.4.0
> > cluster.
> >
> > I've replicated my setup on two sandboxes, one without kerberos and one
> > with kerberos.
> >
> > On the one without kerberos, I'm able to get an answer from th
> > consumer-groups client with the following command:
> > ./kafka-consumer-groups.sh --list --new-consumer --bootstrap-server
> > sandbox.hortonworks.com:6667
> >
> > On the one with kerberos activated, i've tried the same command without
> > specifying the security-protocoln which fails with a java.io.EOFException
> > when connecting to the broker.
> > When specifying the security-protocol (PLAINTEXTSASL or SASL_PLAINTEXT),
> > I'm seeing a java.io.IOException: Connection reset by peer (full stack is
> > below).
> >
> > In both the cases with kerberos, without activating the debug logs in the
> > client, it appears to hang since it is stuck in an infinite loop of
> > retrying to connect with the broker (and failing)
> >
> >
> > Am I missing something in order to use this tool in a kerberized
> > environment ? As of now, I'm not seeing any other way to monitor consumer
> > offsets, since they are not stored in zookeeper anymore.
> >
> > Thanks in advance,
> > Pierre
> >
> >
> > ** Full stack of execution with kerberos and security-protocol
> > specified **
> > ./kafka-consumer-groups.sh --security-protocol PLAINTEXTSASL
> > --new-consumer --bootstrap-server sandbox.hortonworks.com:6667 --list
> > [2016-06-07 12:42:26,951] INFO Successfully logged in.
> > (org.apache.kafka.common.security.kerberos.Login)
> > [2016-06-07 12:42:26,952] DEBUG It is a Kerberos ticket
> > (org.apache.kafka.common.security.kerberos.Login)
> > [2016-06-07 12:42:26,971] INFO TGT refresh thread started.
> > (org.apache.kafka.common.security.kerberos.Login)
> > [2016-06-07 12:42:26,981] DEBUG Found TGT Ticket (hex) =
> > : 61 82 01 5F 30 82 01 5B A0 

Re: Not able to monitor consumer group lag with new consumer and kerberos

2016-06-08 Thread Pierre Labiausse
The thread on the hortonworks community forum is there ->
https://community.hortonworks.com/questions/38409/not-able-to-monitor-consumer-group-lag-with-new-co.html

2016-06-08 9:59 GMT+02:00 Pierre Labiausse :

> Hello again,
>
> I've tried to use the command line tool again without success, but I'm not
> seing the IOException anymore in the error stack, only an EOFException.
> Nothing is logged server-side, as if the request is not even received.
>
> Ewen, I've tried using the command-config flag as you suggested, but I am
> not sure what additional configuration the client would need. I don't need
> additional configuration files when using the console producer and consumer
> (just setting the security-protocol is okay), and when using the java
> consumer, I only need to provide a JAAS file to either use the kerberos
> ticket cache or a keytab to authenticate.
>
> I've found a consumer.properties file in kafka configuration folder, which
> I'll paste below, but I don't think it contains relevant information.
>
> I will create a thread on hortonworks community forum, and will add the
> link here when it goes through their validation process.
>
> Regards,
> Pierre
>
>
> *** consumer.properties file ***
> # Licensed to the Apache Software Foundation (ASF) under one or more
> # contributor license agreements.  See the NOTICE file distributed with
> # this work for additional information regarding copyright ownership.
> # The ASF licenses this file to You under the Apache License, Version 2.0
> # (the "License"); you may not use this file except in compliance with
> # the License.  You may obtain a copy of the License at
> #
> #http://www.apache.org/licenses/LICENSE-2.0
> #
> # Unless required by applicable law or agreed to in writing, software
> # distributed under the License is distributed on an "AS IS" BASIS,
> # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
> # See the License for the specific language governing permissions and
> # limitations under the License.
> # see kafka.consumer.ConsumerConfig for more details
>
> # Zookeeper connection string
> # comma separated host:port pairs, each corresponding to a zk
> # server. e.g. "127.0.0.1:3000,127.0.0.1:3001,127.0.0.1:3002"
> zookeeper.connect=127.0.0.1:2181
>
> # timeout in ms for connecting to zookeeper
> zookeeper.connection.timeout.ms=6000
>
> #consumer group id
> group.id=test-consumer-group
>
> #consumer timeout
> #consumer.timeout.ms=5000
>
>
> 2016-06-08 1:24 GMT+02:00 Ewen Cheslack-Postava :
>
>> Pierre,
>>
>> I think you'll need the rest of the security-related configs you'd use for
>> a normal client as well. You can use the --command-config flag to include
>> additional settings stored in a property file.
>>
>> -Ewen
>>
>> On Tue, Jun 7, 2016 at 8:57 AM, Pierre LABIAUSSE <
>> plabiau...@i-tracing.com>
>> wrote:
>>
>> > Hi,
>> >
>> > I'm not able to use kafka-consumer-groups.sh to monitor the lag of my
>> > consumers when my cluster is kerberized.
>> >
>> > I'm using kafka version 0.9.0 installed on an hortonworks hdp 2.4.0
>> > cluster.
>> >
>> > I've replicated my setup on two sandboxes, one without kerberos and one
>> > with kerberos.
>> >
>> > On the one without kerberos, I'm able to get an answer from th
>> > consumer-groups client with the following command:
>> > ./kafka-consumer-groups.sh --list --new-consumer --bootstrap-server
>> > sandbox.hortonworks.com:6667
>> >
>> > On the one with kerberos activated, i've tried the same command without
>> > specifying the security-protocoln which fails with a
>> java.io.EOFException
>> > when connecting to the broker.
>> > When specifying the security-protocol (PLAINTEXTSASL or SASL_PLAINTEXT),
>> > I'm seeing a java.io.IOException: Connection reset by peer (full stack
>> is
>> > below).
>> >
>> > In both the cases with kerberos, without activating the debug logs in
>> the
>> > client, it appears to hang since it is stuck in an infinite loop of
>> > retrying to connect with the broker (and failing)
>> >
>> >
>> > Am I missing something in order to use this tool in a kerberized
>> > environment ? As of now, I'm not seeing any other way to monitor
>> consumer
>> > offsets, since they are not stored in zookeeper anymore.
>> >
>> > Thanks in advance,
>> > Pierre
>> >
>> &g

Re: Not able to monitor consumer group lag with new consumer and kerberos

2016-06-08 Thread Pierre Labiausse
Hi all,

I've finally managed to use the tool with the --command-config flag and a
consumer.properties file containing the line
"security.protocol=SASL_PLAINTEXT" (the security-protocol flag of the
command line tool does not seem to have any effect for this particular
tool).

However, I'm still at square one as the current offset and lag of my
consumer is reported as "unknown"...
GROUP, TOPIC, PARTITION, CURRENT OFFSET, LOG END OFFSET, LAG, OWNER
test, winserver, 0, unknown, 1046852790, unknown, consumer-1_/172.29.129.71


I've recompiled a version with the consumer manually committing the offset
after each poll, and it continuously consumes message from the topic.

Any idea ?

Thanks,
Pierre

2016-06-08 11:19 GMT+02:00 Pierre Labiausse :

> The thread on the hortonworks community forum is there ->
> https://community.hortonworks.com/questions/38409/not-able-to-monitor-consumer-group-lag-with-new-co.html
>
> 2016-06-08 9:59 GMT+02:00 Pierre Labiausse :
>
>> Hello again,
>>
>> I've tried to use the command line tool again without success, but I'm
>> not seing the IOException anymore in the error stack, only an EOFException.
>> Nothing is logged server-side, as if the request is not even received.
>>
>> Ewen, I've tried using the command-config flag as you suggested, but I am
>> not sure what additional configuration the client would need. I don't need
>> additional configuration files when using the console producer and consumer
>> (just setting the security-protocol is okay), and when using the java
>> consumer, I only need to provide a JAAS file to either use the kerberos
>> ticket cache or a keytab to authenticate.
>>
>> I've found a consumer.properties file in kafka configuration folder,
>> which I'll paste below, but I don't think it contains relevant information.
>>
>> I will create a thread on hortonworks community forum, and will add the
>> link here when it goes through their validation process.
>>
>> Regards,
>> Pierre
>>
>>
>> *** consumer.properties file ***
>> # Licensed to the Apache Software Foundation (ASF) under one or more
>> # contributor license agreements.  See the NOTICE file distributed with
>> # this work for additional information regarding copyright ownership.
>> # The ASF licenses this file to You under the Apache License, Version 2.0
>> # (the "License"); you may not use this file except in compliance with
>> # the License.  You may obtain a copy of the License at
>> #
>> #http://www.apache.org/licenses/LICENSE-2.0
>> #
>> # Unless required by applicable law or agreed to in writing, software
>> # distributed under the License is distributed on an "AS IS" BASIS,
>> # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
>> # See the License for the specific language governing permissions and
>> # limitations under the License.
>> # see kafka.consumer.ConsumerConfig for more details
>>
>> # Zookeeper connection string
>> # comma separated host:port pairs, each corresponding to a zk
>> # server. e.g. "127.0.0.1:3000,127.0.0.1:3001,127.0.0.1:3002"
>> zookeeper.connect=127.0.0.1:2181
>>
>> # timeout in ms for connecting to zookeeper
>> zookeeper.connection.timeout.ms=6000
>>
>> #consumer group id
>> group.id=test-consumer-group
>>
>> #consumer timeout
>> #consumer.timeout.ms=5000
>>
>>
>> 2016-06-08 1:24 GMT+02:00 Ewen Cheslack-Postava :
>>
>>> Pierre,
>>>
>>> I think you'll need the rest of the security-related configs you'd use
>>> for
>>> a normal client as well. You can use the --command-config flag to include
>>> additional settings stored in a property file.
>>>
>>> -Ewen
>>>
>>> On Tue, Jun 7, 2016 at 8:57 AM, Pierre LABIAUSSE <
>>> plabiau...@i-tracing.com>
>>> wrote:
>>>
>>> > Hi,
>>> >
>>> > I'm not able to use kafka-consumer-groups.sh to monitor the lag of my
>>> > consumers when my cluster is kerberized.
>>> >
>>> > I'm using kafka version 0.9.0 installed on an hortonworks hdp 2.4.0
>>> > cluster.
>>> >
>>> > I've replicated my setup on two sandboxes, one without kerberos and one
>>> > with kerberos.
>>> >
>>> > On the one without kerberos, I'm able to get an answer from th
>>> > consumer-groups client with the following command:
>>> > ./kafka-consumer-groups.sh --list --new-consu