|
3 | 3 |
|
4 | 4 | Property | C/P | Range | Default | Importance | Description |
5 | 5 | -----------------------------------------|-----|-----------------|--------------:|------------| -------------------------- |
6 | | -builtin.features | * | | gzip, snappy, ssl, sasl, regex, lz4, sasl_gssapi, sasl_plain, sasl_scram, plugins, zstd, sasl_oauthbearer, http, oidc | low | Indicates the builtin features for this build of librdkafka. An application can either query this value or attempt to set it with its list of required features to check for library support. <br>*Type: CSV flags* |
| 6 | +builtin.features | * | | gzip, snappy, ssl, sasl, regex, lz4, sasl_gssapi, sasl_plain, sasl_scram, plugins, zstd, sasl_oauthbearer, http, oidc, sasl_aws_msk_iam | low | Indicates the builtin features for this build of librdkafka. An application can either query this value or attempt to set it with its list of required features to check for library support. <br>*Type: CSV flags* |
7 | 7 | client.id | * | | rdkafka | low | Client identifier. <br>*Type: string* |
8 | 8 | metadata.broker.list | * | | | high | Initial list of brokers as a CSV list of broker host or host:port. The application may also use `rd_kafka_brokers_add()` to add brokers during runtime. <br>*Type: string* |
9 | 9 | bootstrap.servers | * | | | high | Alias for `metadata.broker.list`: Initial list of brokers as a CSV list of broker host or host:port. The application may also use `rd_kafka_brokers_add()` to add brokers during runtime. <br>*Type: string* |
@@ -81,15 +81,23 @@ ssl_engine_callback_data | * | | |
81 | 81 | enable.ssl.certificate.verification | * | true, false | true | low | Enable OpenSSL's builtin broker (server) certificate verification. This verification can be extended by the application by implementing a certificate_verify_cb. <br>*Type: boolean* |
82 | 82 | ssl.endpoint.identification.algorithm | * | none, https | none | low | Endpoint identification algorithm to validate broker hostname using broker certificate. https - Server (broker) hostname verification as specified in RFC2818. none - No endpoint verification. OpenSSL >= 1.0.2 required. <br>*Type: enum value* |
83 | 83 | ssl.certificate.verify_cb | * | | | low | Callback to verify the broker certificate chain. <br>*Type: see dedicated API* |
84 | | -sasl.mechanisms | * | | GSSAPI | high | SASL mechanism to use for authentication. Supported: GSSAPI, PLAIN, SCRAM-SHA-256, SCRAM-SHA-512, OAUTHBEARER. **NOTE**: Despite the name only one mechanism must be configured. <br>*Type: string* |
85 | | -sasl.mechanism | * | | GSSAPI | high | Alias for `sasl.mechanisms`: SASL mechanism to use for authentication. Supported: GSSAPI, PLAIN, SCRAM-SHA-256, SCRAM-SHA-512, OAUTHBEARER. **NOTE**: Despite the name only one mechanism must be configured. <br>*Type: string* |
| 84 | +sasl.mechanisms | * | | GSSAPI | high | SASL mechanism to use for authentication. Supported: GSSAPI, PLAIN, SCRAM-SHA-256, SCRAM-SHA-512, OAUTHBEARER, AWS_MSK_IAM. **NOTE**: Despite the name only one mechanism must be configured. <br>*Type: string* |
| 85 | +sasl.mechanism | * | | GSSAPI | high | Alias for `sasl.mechanisms`: SASL mechanism to use for authentication. Supported: GSSAPI, PLAIN, SCRAM-SHA-256, SCRAM-SHA-512, OAUTHBEARER, AWS_MSK_IAM. **NOTE**: Despite the name only one mechanism must be configured. <br>*Type: string* |
86 | 86 | sasl.kerberos.service.name | * | | kafka | low | Kerberos principal name that Kafka runs as, not including /hostname@REALM <br>*Type: string* |
87 | 87 | sasl.kerberos.principal | * | | kafkaclient | low | This client's Kerberos principal name. (Not supported on Windows, will use the logon user's principal). <br>*Type: string* |
88 | 88 | sasl.kerberos.kinit.cmd | * | | kinit -R -t "%{sasl.kerberos.keytab}" -k %{sasl.kerberos.principal} \|\| kinit -t "%{sasl.kerberos.keytab}" -k %{sasl.kerberos.principal} | low | Shell command to refresh or acquire the client's Kerberos ticket. This command is executed on client creation and every sasl.kerberos.min.time.before.relogin (0=disable). %{config.prop.name} is replaced by corresponding config object value. <br>*Type: string* |
89 | 89 | sasl.kerberos.keytab | * | | | low | Path to Kerberos keytab file. This configuration property is only used as a variable in `sasl.kerberos.kinit.cmd` as ` ... -t "%{sasl.kerberos.keytab}"`. <br>*Type: string* |
90 | 90 | sasl.kerberos.min.time.before.relogin | * | 0 .. 86400000 | 60000 | low | Minimum time in milliseconds between key refresh attempts. Disable automatic key refresh by setting this property to 0. <br>*Type: integer* |
91 | 91 | sasl.username | * | | | high | SASL username for use with the PLAIN and SASL-SCRAM-.. mechanisms <br>*Type: string* |
92 | 92 | sasl.password | * | | | high | SASL password for use with the PLAIN and SASL-SCRAM-.. mechanism <br>*Type: string* |
| 93 | +sasl.aws_access_key_id | * | | | high | SASL AWS access key id for use with the AWS_MSK_IAM mechanism. Default to $AWS_ACCESS_KEY_ID. <br>*Type: string* |
| 94 | +sasl.aws_secret_access_key | * | | | high | SASL AWS secret access key for use with the AWS_MSK_IAM mechanism. . Default to $AWS_SECRET_ACCESS_KEY. <br>*Type: string* |
| 95 | +sasl.aws_region | * | | | high | SASL AWS region for use with the AWS_MSK_IAM mechanism. Default to $AWS_DEFAULT_REGION. <br>*Type: string* |
| 96 | +sasl.aws_security_token | * | | | high | SASL AWS security for use with the AWS_MSK_IAM mechanism. Default to $AWS_SECURITY_TOKEN. <br>*Type: string* |
| 97 | +sasl.aws.role_arn | * | | | high | AWS RoleARN to use for calling STS. Default to $AWS_ROLE_ARN. <br>*Type: string* |
| 98 | +sasl.aws.web_identity_token_file. | * | | | high | AWS Web Identity token file to use for calling STS. Default to $AWS_WEB_IDENTITY_TOKEN_FILE. <br>*Type: string* |
| 99 | +sasl.aws.role.session.name | * | | | high | Session name to use for STS AssumeRole. Default to librdkafka. <br>*Type: string* |
| 100 | +sasl.aws.duration.sec | * | 900 .. 43200 | 900 | low | The duration, in seconds, of the role session. Minimum is 900 seconds (15 minutes) and max is 12 hours. This will default to 900 seconds if not set. <br>*Type: integer* |
93 | 101 | sasl.oauthbearer.config | * | | | low | SASL/OAUTHBEARER configuration. The format is implementation-dependent and must be parsed accordingly. The default unsecured token implementation (see https://tools.ietf.org/html/rfc7515#appendix-A.5) recognizes space-separated name=value pairs with valid names including principalClaimName, principal, scopeClaimName, scope, and lifeSeconds. The default value for principalClaimName is "sub", the default value for scopeClaimName is "scope", and the default value for lifeSeconds is 3600. The scope value is CSV format with the default value being no/empty scope. For example: `principalClaimName=azp principal=admin scopeClaimName=roles scope=role1,role2 lifeSeconds=600`. In addition, SASL extensions can be communicated to the broker via `extension_NAME=value`. For example: `principal=admin extension_traceId=123` <br>*Type: string* |
94 | 102 | enable.sasl.oauthbearer.unsecure.jwt | * | true, false | false | low | Enable the builtin unsecure JWT OAUTHBEARER token handler if no oauthbearer_refresh_cb has been set. This builtin handler should only be used for development or testing, and not in production. <br>*Type: boolean* |
95 | 103 | oauthbearer_token_refresh_cb | * | | | low | SASL/OAUTHBEARER token refresh callback (set with rd_kafka_conf_set_oauthbearer_token_refresh_cb(), triggered by rd_kafka_poll(), et.al. This callback will be triggered when it is time to refresh the client's OAUTHBEARER token. Also see `rd_kafka_conf_enable_sasl_queue()`. <br>*Type: see dedicated API* |
|
0 commit comments