Skip to content

Apache Kafka Channel Example

You can install and configure the Apache Kafka Channel as the default Channel configuration for Knative Eventing.

Prerequisites

  • A Kubernetes cluster with Knative Eventing, as well as the optional Broker and Kafka Channel components.

Creating a Kafka Channel

  1. Create a Kafka Channel that contains the following YAML:

    apiVersion: messaging.knative.dev/v1beta1
    kind: KafkaChannel
    metadata:
      name: my-kafka-channel
      spec:
        numPartitions: 3
        replicationFactor: 1
    
  2. Apply the YAML file by running the command:

    kubectl apply -f <filename>.yaml
    
    Where <filename> is the name of the file you created in the previous step.

Specifying Kafka as the default Channel implementation

  1. To configure Kafka Channel as the default channel configuration, modify the default-ch-webhook ConfigMap so that it contains the following YAML:

    apiVersion: v1
    kind: ConfigMap
    metadata:
      name: default-ch-webhook
      namespace: knative-eventing
    data:
      # Configuration for defaulting channels that do not specify CRD implementations.
      default-ch-config: |
        clusterDefault:
          apiVersion: messaging.knative.dev/v1beta1
          kind: KafkaChannel
          spec:
            numPartitions: 3
            replicationFactor: 1
    
  2. Apply the YAML file by running the command:

    kubectl apply -f <filename>.yaml
    

    Where <filename> is the name of the file you created in the previous step.

Creating an Apache Kafka channel

  1. After KafkaChannel is set as the default Channel type, you can create a Kafka Channel by creating a generic Channel object that contains the following YAML:

    apiVersion: messaging.knative.dev/v1
    kind: Channel
    metadata:
      name: testchannel-one
    
  2. Apply the YAML file by running the command:

    kubectl apply -f <filename>.yaml
    

    Where <filename> is the name of the file you created in the previous step.

  3. Verify that the Channel was created properly by checking that your Kafka cluster has a testchannel-one Topic. If you are using Strimzi, you can run the command:

    kubectl -n kafka exec -it my-cluster-kafka-0 -- bin/kafka-topics.sh --bootstrap-server my-cluster-kafka-bootstrap:9092 --list
    

    The output looks similar to the following:

    ...
    __consumer_offsets
    knative-messaging-kafka.default.my-kafka-channel
    knative-messaging-kafka.default.testchannel-one
    ...
    

    The Kafka Topic that is created by the Channel contains the name of the namespace, default in this example, followed by the name of the Channel. In the consolidated Channel implementation, it is also prefixed with knative-messaging-kafka to indicate that it is a Kafka Channel from Knative.

    Note

    The topic of a Kafka Channel is an implementation detail and records from it should not be consumed from different applications.

Creating a Service and Trigger that use the Apache Kafka Broker

The following example uses a ApiServerSource to publish events to an existing Broker, and a Trigger that routes those events to a Knative Service.

  1. Create a Knative Service:

    apiVersion: serving.knative.dev/v1
    kind: Service
    metadata:
      name: broker-kafka-display
    spec:
      template:
        spec:
          containers:
          - image: gcr.io/knative-releases/knative.dev/eventing/cmd/event_display
    
  2. Apply the YAML file by running the command:

    kubectl apply -f <filename>.yaml
    

    Where <filename> is the name of the file you created in the previous step.

  3. Create a ServiceAccount, ClusterRole, and ClusterRoleBinding for the ApiServerSource:

    apiVersion: v1
    kind: ServiceAccount
    metadata:
      name: events-sa
      namespace: default
    
    ---
    
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: event-watcher
    rules:
    - apiGroups:
      - ""
      resources:
      - events
      verbs:
      - get
      - list
      - watch
    
    ---
    
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: k8s-ra-event-watcher
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: event-watcher
    subjects:
    - kind: ServiceAccount
      name: events-sa
      namespace: default
    
  4. Apply the YAML file by running the command:

    kubectl apply -f <filename>.yaml
    

    Where <filename> is the name of the file you created in the previous step.

  5. Create an ApiServerSource that sends events to the default Broker:

    apiVersion: sources.knative.dev/v1
    kind: ApiServerSource
    metadata:
      name: testevents-kafka-03
      namespace: default
    spec:
      serviceAccountName: events-sa
      mode: Resource
      resources:
      - apiVersion: v1
        kind: Event
      sink:
        ref:
          apiVersion: eventing.knative.dev/v1
          kind: Broker
          name: default
    
  6. Apply the YAML file by running the command:

    kubectl apply -f <filename>.yaml
    

    Where <filename> is the name of the file you created in the previous step.

  7. Create a Trigger that filters events from the Broker to the Service:

    apiVersion: eventing.knative.dev/v1
    kind: Trigger
    metadata:
      name: testevents-trigger
      namespace: default
    spec:
      broker: default
      subscriber:
        ref:
          apiVersion: serving.knative.dev/v1
          kind: Service
          name: broker-kafka-display
    
  8. Apply the YAML file by running the command:

    kubectl apply -f <filename>.yaml
    

    Where <filename> is the name of the file you created in the previous step.

  9. Verifying the Kafka Channel is working, by observing events in the log of the Service, by running the command:

    kubectl logs --selector='serving.knative.dev/service=broker-kafka-display' -c user-container
    

Authentication against an Apache Kafka cluster

In production environments it is common that the Apache Kafka cluster is secured using TLS or SASL. This section shows how to configure a Kafka Channel to work against a protected Apache Kafka cluster, with the two supported TLS and SASL authentication methods.

Note

Kafka Channels require certificates to be in .pem format. If your files are in a different format, you must convert them to .pem.

TLS authentication

  1. Edit the config-kafka ConfigMap:

    kubectl -n knative-eventing edit configmap config-kafka
    
  2. Set the TLS.Enable field to true:

    ...
    data:
      sarama: |
        config: |
          Net:
            TLS:
              Enable: true
    ...
    
  3. Optional: If you are using a custom CA certificate, add your certificate data to the ConfigMap in the data.sarama.config.Net.TLS.Config.RootPEMs field:

    ...
    data:
      sarama: |
        config: |
          Net:
            TLS:
              Config:
                RootPEMs: # Array of Root Certificate PEM Files (Use '|-' Syntax To Preserve Linefeeds & Avoiding Terminating \n)
                - |-
                  -----BEGIN CERTIFICATE-----
                  MIIGDzCCA/egAwIBAgIUWq6j7u/25wPQiNMPZqL6Vy0rkvQwDQYJKoZIhvcNAQEL
                  ...
                  771uezZAFqd1GLLL8ZYRmCsAMg==
                  -----END CERTIFICATE-----
    ...
    

SASL authentication

To use SASL authentication, you will need the following information:

  • A username and password.
  • The type of SASL mechanism you wish to use. For example; PLAIN, SCRAM-SHA-256 or SCRAM-SHA-512.

Note

It is recommended to also enable TLS as described in the previous section.

  1. Edit the config-kafka ConfigMap:

    kubectl -n knative-eventing edit configmap config-kafka
    
  2. Set the SASL.Enable field to true:

    ...
    data:
      sarama: |
        config: |
          Net:
            SASL:
              Enable: true
    ...
    
  3. Create a secret that uses the username, password, and SASL mechanism:

    kubectl create secret --namespace <namespace> generic <kafka-auth-secret> \
        --from-literal=password="SecretPassword" \
        --from-literal=saslType="PLAIN" \
        --from-literal=username="my-sasl-user"
    

All authentication methods

  1. If you have created a secret for your desired authentication method by using the previous steps, reference the secret and the namespace of the secret in the config-kafka ConfigMap:

    ...
    data:
       eventing-kafka: |
        kafka:
         authSecretName: <kafka-auth-secret>
         authSecretNamespace: <namespace>
    ...
    

    Note

    The default secret name and namespace are kafka-cluster and knative-eventing respectively. If you reference a secret in a different namespace, make sure you configure your roles and bindings so that the knative-eventing Pods can access it.

Channel configuration

The config-kafka ConfigMap allows for a variety of Channel options such as:

  • CPU and Memory requests and limits for the dispatcher (and receiver for the distributed Channel type) deployments created by the controller

  • Kafka Topic default values (number of partitions, replication factor, and retention time)

  • Maximum idle connections/connections per host for Knative cloudevents

  • The brokers string for your Kafka connection

  • The name and namespace of your TLS/SASL authentication secret

  • The Kafka admin type (distributed channel only)

  • Nearly all the settings exposed in a Sarama Config Struct

  • Sarama debugging assistance (via sarama.enableLogging)

For detailed information (particularly for the distributed channel), see the Distributed Channel README

Back to top

We use analytics and cookies to understand site traffic. Information about your use of our site is shared with Google for that purpose. Learn more.

× OK