-
Hello Experts, k |
Beta Was this translation helpful? Give feedback.
Replies: 9 comments 6 replies
-
A start would be to make sure everything is properly formatted and readable. You should also make sure you share the actual resources and not some templates. |
Beta Was this translation helpful? Give feedback.
-
We are using Strimzi 0.46.0 with Kafka 4.0.0 and trying to setup MTLS between Kafka and Clients. We are using Cert-Manager to get the Certificates signed and are not using Strimzi's Internal CA. I have used kafkauser authentication as tls-external to look up for CN name as kafka user. Authentication is happening with this approach but authorization is failing. i have a user as "capstrimziuser.cvs.com" and I used ssl.principal.mapping.rules: "RULE:^CN=([^,]+),.*$/$1/,DEFAULT" in the config at cluster level but seems broker is not updating this config and still erroring out as [2025-08-11 16:35:47,112] ERROR Error when sending message to topic demo-topic with key: null, value: 1 bytes with error: (org.apache.kafka.clients.producer.internals.ErrorLoggingCallback)
|
Beta Was this translation helpful? Give feedback.
-
i have configured it under cluster config i.e.., spec.kafka.config is there any other way to configure without using custom authentication. |
Beta Was this translation helpful? Give feedback.
-
will the bootstrap server configuration comes under listenerConfig, i believe instead of brokercertandchain we need to manually mount the ca.crt file as mentioned in the document. bootstrap: |
Beta Was this translation helpful? Give feedback.
-
All right! |
Beta Was this translation helpful? Give feedback.
-
I mean broker and bootstrap load balancing information. |
Beta Was this translation helpful? Give feedback.
-
My requirement is to establish mutual authentication between the Kafka broker and the client using an external client CA. To achieve this, I disabled the Strimzi-generated client CA, created a dummy key, and provided the external client CA certificate. I used tls-external for the KafkaUser. However, because the User Operator matches the CN in the certificate instead of the KafkaUser name, topic authorization failed. I then attempted to use the custom authentication option to implement sl.principal.mapping.rules and mount the CA cert on listeners , but encountered the following error. org.apache.kafka.common.errors.InvalidConfigurationException: Failed to load PEM SSL keystore /mnt/custom-external-9443-certs/ca.crt |
Beta Was this translation helpful? Give feedback.
-
Its working when i keep the user under -superUser. Here are my observations
If i remove either username from the super user list or ssl.principal.ampping.rules. the acls are not working. |
Beta Was this translation helpful? Give feedback.
-
It worked after changing the rule to RULE:^CN=([^,]+),.*$/CN=$1/,DEFAULT |
Beta Was this translation helpful? Give feedback.
It worked after changing the rule to RULE:^CN=([^,]+),.*$/CN=$1/,DEFAULT