*Awesome* explanation Rajini - thank you!

Just to confirm: the SASL/PLAIN configs would only be for the interbroker 
communication, correct? Meaning, beyond your recommended changes to 
server.properties, and the addition of the new jaas.conf file, the producers 
(Ruby clients) wouldn't need to authenticate, correct?


Thanks again for all the great help so far, you've already helped me more than 
you know!


Zac

________________________________
From: Rajini Sivaram <rajinisiva...@googlemail.com>
Sent: Monday, November 21, 2016 3:53:47 AM
To: users@kafka.apache.org
Subject: Re: Can Kafka/SSL be terminated at a load balancer?

Zac,

*advertised.listeners* is used to make client connections from
producers/consumers as well as for client-side connections for inter-broker
communication. In your scenario, setting it to *PLAINTEXT://mykafka01*
would work for inter-broker, bypassing the load balancer, but clients would
also then attempt to connect directly to *mykafka01*.  Setting it to
*SSL://mybalancer01* would work for producers/consumers, but brokers would
try to connect to *mybalancer01* using PLAINTEXT. Unfortunately neither
works for both. You need two endpoints, one for inter-broker that bypasses
*mybalancer01* and another for clients that uses *mybalancer01*. With the
current Kafka configuration, you would require two security protocols to
enable two endpoints.

You could enable SSL in Kafka (using self-signed certificates if you need)
for one of the two endpoints to overcome this limitation. But presumably
you have a secure internal network running Kafka and want to avoid the cost
of encryption in Kafka. The simplest solution I can think of is to use
SASL_PLAINTEXT using SASL/PLAIN for inter-broker as a workaround. The
configuration options in server.properties would look like:

listeners=PLAINTEXT://:9093,SASL_PLAINTEXT://:9092

advertised.listeners=PLAINTEXT://mybalancer01.example.com:9093
,SASL_PLAINTEXT://mykafka01.example.com:9092

security.inter.broker.protocol=SASL_PLAINTEXT

sasl.enabled.mechanisms=PLAIN

sasl.mechanism.inter.broker.protocol=PLAIN


You also need a JAAS configuration file configured for the broker JVM (
*KAFKA_OPTS="-Djava.security.auth.login.config=/kafka/jaas.conf"*) . See
https://kafka.apache.org/documentation#security_sasl for configuring SASL.*
jaas.conf* would look something like:

KafkaServer {

        org.apache.kafka.common.security.plain.PlainLoginModule required

        username="kafka"

        user_kafka="kafka-password"

        password="kafka-password";

};


Hope that helps.


On Fri, Nov 18, 2016 at 6:39 PM, Zac Harvey <zac.har...@welltok.com> wrote:

> Thanks again Rajini!
>
>
> One last followup question, if you don't mind. You said that my
> server.properties file should look something like this:
>
>
> listeners=SSL://:9093
> advertised.listeners=SSL://mybalancer01.example.com:9093
> security.inter.broker.protocol=SSL
>
> However, please remember that I'm looking for the load balancer to
> terminate SSL, meaning that (my desired) communication between the load
> balancer and Kafka would be over plaintext (not SSL).  In other words:
>
> Ruby Producers/Clients <----SSL:9093----> Load Balancer <----
> Plaintext:9092 ----> Kafka
>
> So producers/client connect to the load balancer over SSL and port 9093,
> but then the load balancer communicates with Kafka over plaintext and port
> 9092.
>
> I also don't need inter broker communication to be SSL; it can be
> plaintext.
>
> If this is the case, do I still need to change server.properties, or can I
> leave it like so:
>
> listeners=plaintext://:9092
> advertised.listeners=plaintext://mybalancer01.example.com:9092
>
> Or could it just be:
>
> listeners=plaintext://:9092
> advertised.listeners=plaintext://mykafka01.example.com:9092
>
> Thanks again!
> Zac
>
>
>
>
>
> ________________________________
> From: Rajini Sivaram <rajinisiva...@googlemail.com>
> Sent: Friday, November 18, 2016 9:57:22 AM
> To: users@kafka.apache.org
> Subject: Re: Can Kafka/SSL be terminated at a load balancer?
>
> You should set advertised.listeners rather than the older
> advertised.host.name property in server.properties:
>
>
>    - listeners=SSL://:9093
>    - advertised.listeners=SSL://mybalancer01.example.com:9093
>    - security.inter.broker.protocol=SSL
>
>
> If your listeners are on particular interfaces, you can set address in the
> 'listeners' property too.
>
>
> If you want inter-broker communication to bypass the SSL proxy, you would
> need another security protocol that can be used for inter-broker
> communication (PLAINTEXT in the example below).
>
>
>
>    - listeners=SSL://:9093,PLAINTEXT://:9092
>    - advertised.listeners=SSL://mybalancer01.example.com:9093,PLAINTEXT://
>    mykafka01.example.com:9092
>    - security.inter.broker.protocol=PLAINTEXT
>
>  I haven't used the Ruby clients, so I am not sure about client
> configuration. With Java clients, if you don't specify truststore, the
> default trust stores are used, so with trusted CA-signed certificates, no
> additional client configuration is required. You can test your installation
> using the console producer and consumer that are shipped with Kafka to make
> sure it is working before you run with Ruby clients.
>
>
>
> On Fri, Nov 18, 2016 at 1:23 PM, Zac Harvey <zac.har...@welltok.com>
> wrote:
>
> >
> > Thanks Rajini,
> >
> >
> > So currently one of our Kafka nodes is 'mykafka01.example.com', and in
> > its server.properties file, I have advertised.host.name=mykafka01
> > .example.com. Our load balancer lives at mybalancer01.example.com, and
> > this what producers will connect to (over SSL) to send messages to Kafka.
> >
> >
> > It sounds like you're saying I need to change my Kafka node's
> > server.properties to have advertised.host.name=mybalancer01.example.com,
> > yes? If not, can you perhaps provide a quick snippet of the changes I
> would
> > need to make to server.properties?
> >
> >
> > Again, the cert served by the balancer will be a highly-trusted (root
> > CA-signed) certificate that all clients will natively trust.
> Interestingly
> > enough, most (if not all) the Kafka producers/clients will be written in
> > Ruby (using the zendesk Kafka-Ruby gem<https://github.com/
> > zendesk/ruby-kafka>), so there wont be any JKS configuration options
> > available for those Ruby clients.
> >
> >
> > Besides making the change to server.properties that I mentioned above,
> are
> > there any other client-side configs that will need to be made for the
> Ruby
> > clients to connect over SSL?
> >
> >
> > Thank you enormously here!
> >
> >
> > Best,
> >
> > Zac
> >
> >
> > ________________________________
> > From: Rajini Sivaram <rajinisiva...@googlemail.com>
> > Sent: Friday, November 18, 2016 5:15:13 AM
> > To: users@kafka.apache.org
> > Subject: Re: Can Kafka/SSL be terminated at a load balancer?
> >
> > Zac,
> >
> > Kafka has its own built-in load-balancing mechanism based on partition
> > assignment. Requests are processed by partition leaders, distributing
> load
> > across the brokers in the cluster. If you want to put a proxy like
> HAProxy
> > with SSL termination in front of your brokers for added security, you can
> > do that. You can have completely independent trust chain between
> > clients->proxy and proxy->broker. You need to configure Kafka brokers
> with
> > the proxy host as the host in the advertised listeners for the security
> > protocol used by clients.
> >
> > On Thu, Nov 17, 2016 at 9:44 PM, Zac Harvey <zac.har...@welltok.com>
> > wrote:
> >
> > > We have two Kafka nodes and for reasons outside of this question, would
> > > like to set up a load balancer to terminate SSL with producers
> (clients).
> > > The SSL cert hosted by the load balancer will be signed by trusted/root
> > CA
> > > that clients should natively trust.
> > >
> > >
> > > Is this possible to do, or does Kafka somehow require SSL to be setup
> > > directly on the Kafka servers themselves?
> > >
> > >
> > > Thanks!
> > >
> >
> >
> >
> > --
> > Regards,
> >
> > Rajini
> >
>
>
>
> --
> Regards,
>
> Rajini
>



--
Regards,

Rajini

Reply via email to