SRM security example
Streams Replication Manager (SRM) is capable of replicating data between CDP and non-CDP clusters that are secured. A setup like this involves configuring security for the SRM service (Driver and Service roles) and the srm-control command line tool.
Consider the following replication environment.
There are two clusters, US-West and US-East. US-West is a CDP cluster that has both Kafka
and SRM deployed on it. The Kafka service on this cluster is both Kerberos and TLS/SSL
enabled. That is, clients connecting to this cluster (including SRM) use the
SASL_SSL
protocol.
US-East has Kafka deployed on it but not SRM. Kafka on this cluster has TLS/SSL encryption enabled. More importantly, the platform that this cluster is running on is not defined. This is because this example is meant to demonstrate that SRM can connect to and replicate data to or from non-CDP clusters. As long as that cluster is running Kafka, SRM will be able to connect to it.
Data replication is unidirectional. The SRM service deployed in US-West is replicating Kafka data from US-East to US-West. From the perspective of the SRM service, US-West is its co-located Kafka cluster, while US-East is an external Kafka cluster.
The following example walks you through the steps required to set up both the SRM service
and the srm-control
tool for this replication environment.
The following steps assume that the SRM service is already installed and available on US-West. Additionally, it is also assumed that key and truststore files as well as other credentials required to establish a connection with each cluster are known and are available. The instructions do not go into detail on how you can generate or acquire these credentials.