0


Kafka3.0 SASL安全认证

下面主要介绍Kafka两种认证方式

kafka验证方式:

  • SASL/PLAIN:不能动态添加用户配置文件写死账号密码
  • SASL/SCRAM: 可以动态的添加用户

SASL/PLAIN方式

  1. cd /usr/local/kafka/kafka_2.12-3.0.1/bin/
  2. ## 复制一份sasl
  3. cp kafka-server-start.sh kafka-server-start-sasl.sh

在kafka-server-start-sasl.sh 末尾修改配置

  1. exec $base_dir/kafka-run-class.sh $EXTRA_ARGS -Djava.security.auth.login.config=/usr/local/kafka/kafka_2.12-3.0.1/config/kafka-server-jaas.conf kafka.Kafka "$@"

或者在环境变量vim /etc/profile末尾增加如下配置:

  1. if [ "x$KAFKA_OPTS" ]; then
  2. export KAFKA_OPTS="-Djava.security.auth.login.config=/usr/local/kafka/kafka_2.12-3.0.1/config/kafka-client-jaas.conf"
  3. fi

config目录下增加kafka_server_jaas.conf文件

  1. touch kafka-server-jaas.conf
  2. KafkaServer {
  3. org.apache.kafka.common.security.plain.PlainLoginModule required
  4. username="admin"
  5. password="admin"
  6. user_admin="admin"
  7. user_rex="123456"
  8. user_alice="123456"
  9. user_lucy="123456";
  10. };

进入config目录将server.properties 复制一份改为server-sasl.properties 并添加如下配置:

  1. listeners=SASL_PLAINTEXT://localhost:9092
  2. security.inter.broker.protocol=SASL_PLAINTEXT
  3. sasl.enabled.mechanisms=PLAIN
  4. sasl.mechanism.inter.broker.protocol=PLAIN
  5. authorizer.class.name=kafka.security.authorizer.AclAuthorizer ## 如果kafka是3.0一下的配置authorizer.class.name=kafka.security.auth.SimpleAclAuthorizer 因为kafka3.0开始已经移除了SimpleAclAuthorizer改用AclAuthorizer 如果还是配置SimpleAclAuthorizer 启动时会报ClassNotFoundException
  6. super.users=User:admin

使用sasl认证启动kafka

  1. ./bin/kafka-server-start-sasl.sh -daemon config/server-sasl.properties

SASL/SCRAM方式

创建kafka用户

  1. bin/kafka-configs.sh --zookeeper 127.0.0.1:2181/kafka --alter --add-config 'SCRAM-SHA-256=[password=admin],SCRAM-SHA-512=[password=admin]' --entity-type users --entity-name admin # 系统用户
  2. bin/kafka-configs.sh --zookeeper 127.0.0.1:2181/kafka --alter --add-config 'SCRAM-SHA-256=[password=chan_test],SCRAM-SHA-512=[password=chan_test]' --entity-type users --entity-name chan # 测试用户

可以看到在zk上已经创建了对应的用户信息,并且对密码做了加密

在kafka的config目录下创建jaas文件

  1. touch kafka_server_jaas_scram.conf
  2. vim kafka_server_jaas_scram.conf
  3. KafkaServer{
  4. org.apache.kafka.common.security.scram.ScramLoginModule required
  5. username="admin"
  6. password="admin";
  7. }
  1. # 同时启用SCRAM和PLAIN机制
  2. sasl.enabled.mechanisms=SCRAM-SHA-256,PLAIN
  3. # 为broker间通讯开启SCRAM机制,采用SCRAM-SHA-512算法
  4. sasl.mechanism.inter.broker.protocol=SCRAM-SHA-256
  5. # broker间通讯使用PLAINTEXT
  6. security.inter.broker.protocol=SASL_PLAINTEXT
  7. # 配置listeners使用SASL_PLAINTEXT
  8. listeners=SASL_PLAINTEXT://:9092
  9. # 配置advertised.listeners
  10. advertised.listeners=SASL_PLAINTEXT://127.0.0.1:9092
  11. #ACL配置
  12. allow.everyone.if.no.acl.found=false
  13. # 系统用户,多个分号隔开
  14. super.users=User:admin;
  15. authorizer.class.name=kafka.security.authorizer.AclAuthorizer

完整配置

  1. # Licensed to the Apache Software Foundation (ASF) under one or more
  2. # contributor license agreements. See the NOTICE file distributed with
  3. # this work for additional information regarding copyright ownership.
  4. # The ASF licenses this file to You under the Apache License, Version 2.0
  5. # (the "License"); you may not use this file except in compliance with
  6. # the License. You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. # see kafka.server.KafkaConfig for additional details and defaults
  16. ############################# Server Basics #############################
  17. # The id of the broker. This must be set to a unique integer for each broker.
  18. broker.id=0
  19. ############################# Socket Server Settings #############################
  20. # The address the socket server listens on. It will get the value returned from
  21. # java.net.InetAddress.getCanonicalHostName() if not configured.
  22. # FORMAT:
  23. # listeners = listener_name://host_name:port
  24. # EXAMPLE:
  25. # listeners = PLAINTEXT://your.host.name:9092
  26. #listeners=PLAINTEXT://:9092
  27. # Hostname and port the broker will advertise to producers and consumers. If not set,
  28. # it uses the value for "listeners" if configured. Otherwise, it will use the value
  29. # returned from java.net.InetAddress.getCanonicalHostName().
  30. #advertised.listeners=PLAINTEXT://your.host.name:9092
  31. # Maps listener names to security protocols, the default is for them to be the same. See the config documentation for more details
  32. #listener.security.protocol.map=PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL
  33. # The number of threads that the server uses for receiving requests from the network and sending responses to the network
  34. num.network.threads=3
  35. # The number of threads that the server uses for processing requests, which may include disk I/O
  36. num.io.threads=8
  37. # The send buffer (SO_SNDBUF) used by the socket server
  38. socket.send.buffer.bytes=102400
  39. # The receive buffer (SO_RCVBUF) used by the socket server
  40. socket.receive.buffer.bytes=102400
  41. # The maximum size of a request that the socket server will accept (protection against OOM)
  42. socket.request.max.bytes=104857600
  43. ############################# Log Basics #############################
  44. # A comma separated list of directories under which to store log files
  45. log.dirs=/usr/local/kafka/data/kafka-logs
  46. # The default number of log partitions per topic. More partitions allow greater
  47. # parallelism for consumption, but this will also result in more files across
  48. # the brokers.
  49. num.partitions=1
  50. # The number of threads per data directory to be used for log recovery at startup and flushing at shutdown.
  51. # This value is recommended to be increased for installations with data dirs located in RAID array.
  52. num.recovery.threads.per.data.dir=1
  53. ############################# Internal Topic Settings #############################
  54. # The replication factor for the group metadata internal topics "__consumer_offsets" and "__transaction_state"
  55. # For anything other than development testing, a value greater than 1 is recommended to ensure availability such as 3.
  56. offsets.topic.replication.factor=1
  57. transaction.state.log.replication.factor=1
  58. transaction.state.log.min.isr=1
  59. ############################# Log Flush Policy #############################
  60. # Messages are immediately written to the filesystem but by default we only fsync() to sync
  61. # the OS cache lazily. The following configurations control the flush of data to disk.
  62. # There are a few important trade-offs here:
  63. # 1. Durability: Unflushed data may be lost if you are not using replication.
  64. # 2. Latency: Very large flush intervals may lead to latency spikes when the flush does occur as there will be a lot of data to flush.
  65. # 3. Throughput: The flush is generally the most expensive operation, and a small flush interval may lead to excessive seeks.
  66. # The settings below allow one to configure the flush policy to flush data after a period of time or
  67. # every N messages (or both). This can be done globally and overridden on a per-topic basis.
  68. # The number of messages to accept before forcing a flush of data to disk
  69. #log.flush.interval.messages=10000
  70. # The maximum amount of time a message can sit in a log before we force a flush
  71. #log.flush.interval.ms=1000
  72. ############################# Log Retention Policy #############################
  73. # The following configurations control the disposal of log segments. The policy can
  74. # be set to delete segments after a period of time, or after a given size has accumulated.
  75. # A segment will be deleted whenever *either* of these criteria are met. Deletion always happens
  76. # from the end of the log.
  77. # The minimum age of a log file to be eligible for deletion due to age
  78. log.retention.hours=168
  79. # A size-based retention policy for logs. Segments are pruned from the log unless the remaining
  80. # segments drop below log.retention.bytes. Functions independently of log.retention.hours.
  81. #log.retention.bytes=1073741824
  82. # The maximum size of a log segment file. When this size is reached a new log segment will be created.
  83. log.segment.bytes=1073741824
  84. # The interval at which log segments are checked to see if they can be deleted according
  85. # to the retention policies
  86. log.retention.check.interval.ms=300000
  87. ############################# Zookeeper #############################
  88. # Zookeeper connection string (see zookeeper docs for details).
  89. # This is a comma separated host:port pairs, each corresponding to a zk
  90. # server. e.g. "127.0.0.1:3000,127.0.0.1:3001,127.0.0.1:3002".
  91. # You can also append an optional chroot string to the urls to specify the
  92. # root directory for all kafka znodes.
  93. zookeeper.connect=127.0.0.1:2181/kafka
  94. # Timeout in ms for connecting to zookeeper
  95. zookeeper.connection.timeout.ms=18000
  96. ############################# Group Coordinator Settings #############################
  97. # The following configuration specifies the time, in milliseconds, that the GroupCoordinator will delay the initial consumer rebalance.
  98. # The rebalance will be further delayed by the value of group.initial.rebalance.delay.ms as new members join the group, up to a maximum of max.poll.interval.ms.
  99. # The default value for this is 3 seconds.
  100. # We override this to 0 here as it makes for a better out-of-the-box experience for development and testing.
  101. # However, in production environments the default value of 3 seconds is more suitable as this will help to avoid unnecessary, and potentially expensive, rebalances during application startup.
  102. group.initial.rebalance.delay.ms=0
  103. # 同时启用SCRAM和PLAIN机制
  104. sasl.enabled.mechanisms=SCRAM-SHA-256,PLAIN
  105. # 为broker间通讯开启SCRAM机制,采用SCRAM-SHA-512算法
  106. sasl.mechanism.inter.broker.protocol=SCRAM-SHA-256
  107. # broker间通讯使用PLAINTEXT
  108. security.inter.broker.protocol=SASL_PLAINTEXT
  109. # 配置listeners使用SASL_PLAINTEXT
  110. listeners=SASL_PLAINTEXT://:9092
  111. # 配置advertised.listeners
  112. advertised.listeners=SASL_PLAINTEXT://127.0.0.1:9092
  113. #ACL配置
  114. allow.everyone.if.no.acl.found=false
  115. # 系统用户,多个分号隔开
  116. super.users=User:admin;
  117. # 如果kafka小于3.x版本的 这边配置需要改成kafka.security.auth.SimpleAclAuthorizer
  118. authorizer.class.name=kafka.security.authorizer.AclAuthorizer

拷贝一份启动脚本重命名为:kafka-server-start-scram.sh 修改kafka启动脚本 注释最后一行并添加如下配置

  1. #exec $base_dir/kafka-run-class.sh $EXTRA_ARGS kafka.Kafka "$@"
  2. exec $base_dir/kafka-run-class.sh $EXTRA_ARGS -Djava.security.auth.login.config=/usr/local/kafka/kafka_2.12-3.0.1/config/kafka_server_jaas_scram.conf kafka.Kafka "$@"

启动kafka

  1. ./kafka-server-start-scram.sh -daemon ../config/server-scram.properties

注意:kafka连接的zk地址需要跟创建用户的zk节点一样,否则启动kafka会报认证失败

比如:server.properties 配置连接的zk是zookeeper.connect=127.0.0.1:2181/kafka ,这时创建用户的zk地址要bin/kafka-configs.sh --zookeeper 127.0.0.1:2181/kafka才可以 如果zk没有kafka节点 需要自己到zk上新建一个。

启动生产者和消费者

由于broker使用安全认证的方式启动,所以开启生产者和消费者也需要经过客户端认证。

  • 在config目录下新建 producer.conf并添加以下配置
  1. security.protocol=SASL_PLAINTEXT
  2. sasl.mechanism=SCRAM-SHA-256
  3. sasl.jaas.config=org.apache.kafka.common.security.scram.ScramLoginModule required username="admin" password="admin";

使用配置启动生产者

  1. [root@hub kafka_2.12-3.0.1]# bin/kafka-console-producer.sh --bootstrap-server 127.0.0.1:9092 --topic test --producer.config config/producer.conf
  2. >1
  3. >2
  4. >3
  5. >

使用chan用户开启生产者

在config目录新建producer-chan.conf并添加以下配置

  1. security.protocol=SASL_PLAINTEXT
  2. sasl.mechanism=SCRAM-SHA-256
  3. sasl.jaas.config=org.apache.kafka.common.security.scram.ScramLoginModule required username="chan" password="chan_test";

使用chan开启生产者,可以看到test这个topic是没有对chan这个用户做认证的,所以chan对这个用户没办法进行生产消息,这时候就需要进行授权。

  1. [root@hub kafka_2.12-3.0.1]# bin/kafka-console-producer.sh --bootstrap-server 192.168.67.142:9092 --topic test --producer.config config/producer-chan.conf
  2. >1
  3. [2022-04-13 20:32:43,651] WARN [Producer clientId=console-producer] Error while fetching metadata with correlation id 4 : {test=TOPIC_AUTHORIZATION_FAILED} (org.apache.kafka.clients.NetworkClient)
  4. [2022-04-13 20:32:43,654] ERROR [Producer clientId=console-producer] Topic authorization failed for topics [test] (org.apache.kafka.clients.Metadata)
  5. [2022-04-13 20:32:43,657] ERROR Error when sending message to topic test with key: null, value: 1 bytes with error: (org.apache.kafka.clients.producer.internals.ErrorLoggingCallback)
  6. org.apache.kafka.common.errors.TopicAuthorizationException: Not authorized to access topics: [test]

开启消费者

  1. [root@hub config]# cat consumer.conf
  2. security.protocol=SASL_PLAINTEXT
  3. sasl.mechanism=SCRAM-SHA-256
  4. sasl.jaas.config=org.apache.kafka.common.security.scram.ScramLoginModule required username="admin" password="admin";
  1. bin/kafka-console-consumer.sh --bootstrap-server 192.168.67.142:9092 --topic test --group 'test_group' --from-beginning --consumer.config config/consumer.conf

ACL授权

给chan这个用户授权,对test这个topic可以进行写操作

  1. [root@hub kafka_2.12-3.0.1]# bin/kafka-acls.sh --authorizer-properties zookeeper.connect=127.0.0.1:2181/kafka --add --allow-principal User:chan --operation Write --topic 'test'
  2. Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=test, patternType=LITERAL)`:
  3. (principal=User:chan, host=*, operation=WRITE, permissionType=ALLOW)
  4. Current ACLs for resource `ResourcePattern(resourceType=TOPIC, name=test, patternType=LITERAL)`:
  5. (principal=User:chan, host=*, operation=WRITE, permissionType=ALLOW)
  6. [root@hub kafka_2.12-3.0.1]# bin/kafka-console-producer.sh --bootstrap-server 192.168.67.142:9092 --topic test --producer.config config/producer-chan.conf
  7. >1
  8. >2
  9. >3
  10. >

可以看到chan这个用户就可以往这个topic写数据了。

标签: kafka

本文转载自: https://blog.csdn.net/binter12138/article/details/124288445
版权归原作者 CHAN-1 所有, 如有侵权,请联系我们删除。

“Kafka3.0 SASL安全认证”的评论:

还没有评论