Secure Kafka at Salesforce.com
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Secure Kafka at Salesforce.com

  • 863 views
Uploaded on

Presented at Kafka meetup 2014

Presented at Kafka meetup 2014

More in: Engineering , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • Anand, you may also want to try Joe Stein's https://github.com/stealthly/dropwizard-kafka-http.
    Are you sure you want to
    Your message goes here
  • Hi Rajasekar. Thank you for sharing this slide deck. Do you have any plans of open sourcing the REST interface to publish data to Kafka brokers. Does the rest interface work with Kafka version 0.8.1 and above.
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
863
On Slideshare
852
From Embeds
11
Number of Embeds
2

Actions

Shares
Downloads
15
Comments
2
Likes
1

Embeds 11

http://www.slideee.com 10
http://www.slidesearchengine.com 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Secure Kafka at Salesforce.com Rajasekar Elango - Lead Developer
  • 2. What I do? Work for Monitoring and Management Team We build tools for monitoring health and performance of salesforce.com infrastructure. Tools are used by Site Reliability and R&D development for troubleshooting, performance analysis, etc.
  • 3. Why Kafka? We have application servers grouped into multiple clusters and distributed across multiple datacenters. Build scalable, near real time monitoring framework that collects data from all production datacenters and pushes it to secure DMZ datacenter for aggregation and reporting. Monitoring data we ship are JMX Metrics, System metrics (cpu, load, memory) from application servers, custom database metrics from database nodes.
  • 4. Architecture App Servers Cluster Prod DC App Servers App Servers Graphite DMZ Kafka Cluster Cluster MM Kafka MM Kafka Kafka Kafka MM Kafka Prod DC Prod DC
  • 5. Architecture Zookeeper x 3 Broker x 5 Rest Interfa ce Graphite Consumer Graphite JMX Metrics Producer System Metrics Producer DB Metrics Producer Mirror maker x2 Production DMZ Zookeeper x 3 Broker x 5
  • 6. Components Rest Interface for abstracting producers. AVRO for data format specification and serialization. Producers - JMX Metric producer, collectd for system metrics, database metric producers. Consumers - Graphite Consumer. MirrorMaker - for cross datacenter replication.
  • 7. Secure Kafka Implementation We wanted to secure traffic across datacenter to prevent malicious client eavesdropping data Implemented SSL/TLS MutualAuth between broker and producer/ consumer to add encryption and authentication SSL Based socket channel based on JSSE doc Secure mode can be toggled on/off by secure=true|false property in server.properties. Broker registers secure property in zookeeper.
  • 8. Secure Kafka Configuration server.properties secure=true security.config.file=config/server.security.properties producer.properties & consumer.properties security.config.file=config/client.security.properties
  • 9. Secure Kafka Configuration server.security.properties want.client.auth=true need.client.auth=true # Keystore file keystore=<path to server keystore> keystorePwd=<keystore password> keyPwd=<key password> # Truststore file truststore=<path to server truststore> truststorePwd=<truststore password>
  • 10. Secure Kafka Configuration client.security.properties # Keystore file keystore=<path to client keystore file> keystorePwd=<keystore password> keyPwd=<key password> # Truststore file truststore=<path to client truststore file> truststorePwd=<trust store password>
  • 11. Scripts Producer bin/kafka-console-producer.sh --broker-list localhost:9092:true -- security.config.file config/client.security.properties --topic test Consumer bin/kafka-console-consumer.sh --topic test --zookeeper localhost: 2181 --from-beginning --security.config.file config/ client.security.properties
  • 12. Limitations Doesn’t provide authorization. Doesn’t use secure communication with Zookeeper. We implemented secure features branched off from older snapshot version of kafka 0.8 release.
  • 13. Demo bin/zookeeper-server-start.sh config/zookeeper.properties bin/kafka-server-start.sh config/server.properties bin/kafka-console-producer.sh --broker-list relango-ltmr.home: 9092:true --topic test < messages.txt bin/kafka-console-consumer.sh --topic test --zookeeper localhost:2181 --from-beginning