Below are my notes from today’s KIP hangout. Please feel free to add/
correct the content.
Kafka KIP Discussion (May 5) KIP-4 (admin commands): any remaining issues

   - Only issue left is how to handle multiple instructions for one topic.
   Suggestion here was to silently ignore duplicate instructions, use map with
   topic as key and execute the last one.
   - Andrii will update the KIP

KIP-11 (authorization): any remaining issues

   - Parth added the diagrams asked by Joe
   - Does curent KIP prevents us from adding SAML? SAML can be added as
   another port for authentication. Getting roles and groups for SAML will
   require SAML specific authentication implementation. Session object can be
   used to capture required information.
   - Is current interface, authorizer, bound with ACLs? Based on
   discussion, it does not look like. If some implementation decides not to
   use ACLs at all, it can ignore all other methods and implement just the
   authorize method. ACLs is in the interface as acls cli is a requirement for
   KAFKA community.
   - Authorizer interface does not have to change for different
   implementations, session implementation, using session builder, should take
   care of what goes into session.
   - Harsha is right now picking up authorized id, a string, based on
   client’s principal name in SASL implementation and get peer principal in
   ssl session for authentication, can add subject as part of the session.
   However one can use session builder to add whatever information to session
   and use it for authentication. Just get principal in ssl session is not
   enough for Linkedin. Harsh will add comment to the code to make it a clear.
   - Joel had some concerns on deny taking precedence in authorization.
   - If no authorizer is not configured, security code path won’t be
   exercised at all. If authorizer is configured, by default topics without
   acls will be disallowed for every user except for superusers. Admin will
   have to set a config parameter to change the default behaviour and allow
   anyone to be able to access topics that do not have any acls on them.

KIP-21 (configuration management)

   - To have the dynamic configuration mechanism to pick changes, do we
   need multiple backends, like configs in ZK, config file, configs in topic,
   etc? This might lead to multiple sources of truth, usually not a good thing
   to have.
   - If multiple backends are required, do they need to be active at the
   same time.
   - People in general were concerned that existing tools like puppet, etc.
   might not work if we move to zk based backend for configs.
   - One suggestion was to have users/admins update the current config file
   and support a reloadConfig command that would make broker to re-read the
   configs file.
   - Plan is to have more discussions around this on the discuss mail chain.

​

On Mon, May 4, 2015 at 7:19 AM, Jun Rao <j...@confluent.io> wrote:

> Hi, Everyone,
>
> We will have a KIP hangout at 11 PST on May 5. The following is the agenda.
> If you want to attend and is not on the invite, please let me know.
>
> Agenda:
> KIP-4 (admin commands): any remaining issues
> KIP-11 (authorization): any remaining issues
> KIP-21 (configuration management)
>
> Thanks,
>
> Jun
>



-- 

Regards,
Ashish

Reply via email to