Project 'infra/sysadm-environment' was moved to 'swh/infra/sysadm-environment'. Please update any links and bookmarks that may still have the old path.
Find a way to properly open the kafka brokers to the internet
A new Kafka cluster has been spun up on azure virtual machines, with 6 machines each with 8TB of storage available.
A Kafka Mirror Maker has been setup by hand on getty to pull the data from the cluster in Rocquencourt to the cluster on Azure (only on the content topic for now).
My working theory for now is to use the Rocquencourt cluster as a low-latency buffer in front of the Azure cluster.
The next step is to lock this cluster down with SASL authentication, and to give it public ip addresses and TLS setup so it can be opened to the internet.
We've updated settings of the azure kafka cluster to:
enable TLS
enable SASL authentication
open the TLS port to the world
Latest commit in puppet: rSPSITE250ea3a376cc
Latest commit in terraform: rSPRE1acb92757799
With the current deployment, the inter-broker, internal communication still happens in plaintext; clients local to the swh infra can still access the cluster without authentication or encryption. However, an internal port has been opened for TLS communication (port 9094 on all brokers).
Adding a new user and credentials is done with the following command:
(I'll have puppet generate wrapper scripts for this mess).
Running a client on my laptop at Inria pointed at the public IP addresses, using the following SASL config, works properly:
c = confluent_kafka.Consumer({ 'group.id': 'olasd-test-sasl-1', 'bootstrap.servers': ','.join('kafka%02d.euwest.azure.softwareheritage.org:9093' % i for i in range(1,7)), 'security.protocol': 'SASL_SSL', 'sasl.mechanisms': 'SCRAM-SHA-512', 'sasl.username': '<username>', 'sasl.password': '<password>', 'debug': 'consumer',})
Unfortunately, port 9093 is firewalled between our infra at SESI and the outside world. For now, the consumer on uffizi has been re-configured to use port 9094 (internal tls) and a standalone credential.
c = swh.journal.client.JournalClient(**{ 'group_id': 'olasd-test-sasl-1', 'brokers': ['kafka%02d.euwest.azure.softwareheritage.org:9093' % i for i in range(1,7)], 'security.protocol': 'SASL_SSL', 'sasl.mechanisms': 'SCRAM-SHA-512', 'sasl.username': '<username>', 'sasl.password': '<password>', 'debug': 'consumer',})
(yes, passing dotted config parameters in kwargs is... not the cleanest)
The new cluster in rocquencourt is using the built-in Kafka ACLs now (9993a81ffc7a1c8bd519b33ae63ac1145105f624).
Connections to the internal plaintext port are mapped to a built-in ANONYMOUS user. To keep the status quo, this user has been configured as superuser (e1a942059f0081cfb1e69baeab9defb5d93d3776), until we've configured producers and consumers not to need that.
User management
Usernames follow the pattern : <namespace>-<username>. For instance: swh-olasd is a user for @olasd in the swh namespace.
To set a user as superuser (allowing it to create topics and perform other management tasks), create it with the previous command, and add it to the kafka configuration in puppet (swh-site/data/common/kafka.yaml). The cluster needs to be restarted for the config change to apply.
Kafka command configuration
To use the Kafka CLI utilities, the following settings need to be configured in a kafka.properties file, passed to the various command line utilities (either as --command-config or --consumer.config, depending on the command line utility):