Known Issues in Apache Kafka

This topic describes known issues and unsupported features for using Kafka in this release of Cloudera Runtime.

Known Issues

Topics created with the kafka-topics tool are only accessible by the user who created them when the deprecated --zookeeper option is used

By default all created topics are secured. However, when topic creation and deletion is done with the kafka-topics tool using the --zookeeper option, the tool talks directly to Zookeeper. Because security is the responsibility of ZooKeeper authorization and authentication, Kafka cannot prevent users from making ZooKeeper changes. As a result, if the --zookeeper option is used, only the user who created the topic will be able to carry out administrative actions on it. In this scenario Kafka will not have permissions to perform tasks on topics created this way.

Workaround: Use kafka-topics with the --bootstrap-server option that does not require direct access to Zookeeper.
Certain Kafka command line tools require direct access to Zookeeper
The following command line tools talk directly to ZooKeeper and therefore are not secured via Kafka:
  • kafka-configs
  • kafka-reassign-partitions
Workaround:None.
The offsets.topic.replication.factor property must be less than or equal to the number of live brokers

The offsets.topic.replication.factor broker configuration is now enforced upon auto topic creation. Internal auto topic creation will fail with a GROUP_COORDINATOR_NOT_AVAILABLE error until the cluster size meets this replication factor requirement.

Workaround: None.
Requests fail when sending to a nonexistent topic with auto.create.topics.enable set to true

The first few produce requests fail when sending to a nonexistent topic with auto.create.topics.enable set to true.

Workaround: Increase the number of retries in the producer configuration setting retries.
Custom Kerberos principal names cannot be used for kerberized ZooKeeper and Kafka instances

When using ZooKeeper authentication and a custom Kerberos principal, Kerberos-enabled Kafka does not start. You must disable ZooKeeper authentication for Kafka or use the default Kerberos principals for ZooKeeper and Kafka.

Workaround: None.
Performance degradation when SSL Is enabled

In some configuration scenarios, significant performance degradation can occur when SSL is enabled. The impact varies depending on your CPU, JVM version, Kafka configuration, and message size. Consumers are typically more affected than producers.

Workaround: Configure brokers and clients with ssl.secure.random.implementation = SHA1PRNG. It often reduces this degradation drastically, but its effect is CPU and JVM dependent.
Apache JIRA: KAFKA-2561
OPSAPS-43236: Kafka garbage collection logs are written to the process directory

By default Kafka garbage collection logs are written to the agent process directory. Changing the default path for these log files is currently unsupported.

Workaround: None.
CDPD-8546: Repeated ZooKeeper client log trace in Kafka server logs
If the Enable Secure Connection to ZooKeeper property is set to true and the RANGER Service property is configured, both the Kafka Zookeeper client and Ranger Zookeeper client will be configured to connect to Zookeeper via secure channels. However, the Ranger Zookeeper client will try to establish a TLS/SSL connection to an unsecure port (2181). This results in the client repeatedly trying and failing to connect to Zookeeper, which in turn causes the org.apache.zookeeper.Login: TGT refresh thread started. log message as well as other related log messages to repeatedly appear in the Kafka logs.
Workaround:
  1. In Cloudera Manager, select the Kafka service.
  2. Select Configuration and find the Kafka Broker Advanced Configuration Snippet (Safety Valve) for ranger-kafka-audit.xml property.
  3. Add the following to the property:
    name : xasecure.audit.destination.solr.zookeepers
    value: ZOOKEEPER_HOST:SECURE_PORT/solr
    
    Replace ZOOKEEPER_HOST:SECURE_PORT with the hostname and secure port of the ZooKeeper host that Solr depends on.
  4. Enter a Reason for change, and click Save Changes to commit the changes.
  5. Restart the service.
Result: The Ranger Zookeeper client connects to the correct secure port.
RELENG-8748: Kafka command line tool alternatives unavailable
The following Kafka command line tool alternatives are currently unavailable:
  • kafka-dump-log
  • kafka-producer-perf-test
  • kafka-streams-application-reset
Workaround: Run the scripts located in /opt/cloudera/parcels/CDH/lib/kafka/bin instead. For example:
/opt/cloudera/parcels/CDH/lib/kafka/bin/kafka-producer-perf-test.sh
OPSAPS-57113: The Kafka Broker Advanced Configuration Snippet (Safety Valve) for ssl.properties does not propagate configurations correctly.

If the Kafka Broker Advanced Configuration Snippet (Safety Valve) for ssl.properties property contains configuration that has dollar signs, the configuration is not propagated to Kafka brokers correctly.

Workaround:None.
OPSAPS-59031: Kafka cannot start if configuration is added to the Kafka Broker Advanced Configuration Snippet (Safety Valve) for ssl.properties

The Kafka Broker Advanced Configuration Snippet (Safety Valve) for ssl.properties configuration snippet does not correctly override configuration. As a result, Kafka may not start if TLS/SSL related configuration overrides are added to the this configuration snippet.

Workaround: Use the Kafka Broker Advanced Configuration Snippet (Safety Valve) for kafka.properties configuration snippet instead to override SSL related properties.

Unsupported Features

The following Kafka features are not supported in Cloudera Data Platform:
  • Only Java based clients are supported. Clients developed with C, C++, Python, .NET and other languages are currently not supported.
  • Although Kafka Connect is available in the form of a Kafka service role, it is not supported at this time. NiFi is a proven solution for batch and real time data loading that complements Kafka's message broker capability. For more information, see Cloudera Flow Management.
  • The Kafka default authorizer is not supported. This includes setting ACLs and all related APIs, broker functionality, and command-line tools.