Hello, > can you provide any existing implementations for reference? You can check the `FileConfigProvider` in clients/src/main/java/org/apache/kafka/common/config/provider/FileConfigProvider.java. Or check the repo: https://github.com/jcustenborder/kafka-config-provider-vault
Hope this helps. Thank you, Luke On Thu, Nov 18, 2021 at 7:08 PM sai chandra mouli <tsaimouli1...@gmail.com> wrote: > Okay. Thank you very much for the information. If it's not too much > trouble can you provide any existing implementations for reference? > > Also, I would like to ask about the LDAP implementation of kafka. Is it > true that we have to write our own ldaphandler in order to use LDAP with > apache kafka? Or is there any apache version of ldaphandler jar available > with kafka? I read that only the confluent enterprise version comes with > required classes for ldap implementation. > Thank you. > > Regards, > Sai chandra mouli > > On 2021/11/18 09:57:51 Rajini Sivaram wrote: > > You can add a Vault provider for externalized configs by implementing a ` > > org.apache.kafka.common.config.provider.ConfigProvider`.Details are in > > > > https://cwiki.apache.org/confluence/display/KAFKA/KIP-297%3A+Externalizing+Secrets+for+Connect+Configurations > > and > > > https://cwiki.apache.org/confluence/pages/viewpage.action?pageId=100829515 > . > > > > Regards, > > > > Rajini > > > > On Thu, Nov 18, 2021 at 9:26 AM sai chandra mouli <ts...@gmail.com> > > wrote: > > > > > Hello, > > > > > > I have a use case where I am using a vault like ansible vault to > encrypt > > > and store my SSL related files (certs and Keys) for other existing > > > applications. And I would like to know if it's possible to use the same > > > vault with Kafka SSL without creating jks, pkcs12 or pem files outside > the > > > vault or additionally in the server. > > > > > > Does the KIP 519 and related provide any help in this case? > > > If not, any suggestions on how I can achieve this? > > > > > > Thank you for your time. > > > > > > Regards, > > > Sai chandra mouli > > > > > >