Streams Replication Manager security example
Streams Replication Manager is capable of replicating data between Cloudera and non-Cloudera clusters that are secured. A setup like this involves configuring security for the Streams Replication Manager service (Driver and Service roles) and the srm-control command line tool.
Consider the following replication environment.
There are two clusters, US-West and US-East. US-West is a Cloudera cluster that has both Kafka and Streams Replication Manager deployed on it. The Kafka service on this cluster is both
Kerberos and TLS/SSL enabled. That is, clients connecting to this cluster (including Streams Replication Manager) use the SASL_SSL
protocol.
US-East has Kafka deployed on it but not Streams Replication Manager. Kafka on this cluster has TLS/SSL encryption enabled. More importantly, the platform that this cluster is running on is not defined. This is because this example is meant to demonstrate that Streams Replication Manager can connect to and replicate data to or from non-Cloudera clusters. As long as that cluster is running Kafka, Streams Replication Manager will be able to connect to it.
Data replication is unidirectional. The Streams Replication Manager service deployed in US-West is replicating Kafka data from US-East to US-West. From the perspective of the Streams Replication Manager service, US-West is its co-located Kafka cluster, while US-East is an external Kafka cluster.
The following example walks you through the steps required to set up both the Streams Replication Manager service and the srm-control
tool for this
replication environment.
The following steps assume that the Streams Replication Manager service is already installed and available on US-West. Additionally, it is also assumed that key and truststore files as well as other credentials required to establish a connection with each cluster are known and are available. The instructions do not go into detail on how you can generate or acquire these credentials.