Dns 使用Kerberos时通过CNAMEs/负载平衡器的Kafka?

Dns 使用Kerberos时通过CNAMEs/负载平衡器的Kafka?,dns,apache-kafka,load-balancing,kerberos,Dns,Apache Kafka,Load Balancing,Kerberos,我主要在这里寻找有关卡夫卡和灾难恢复故障切换的建议。 在使用Kerberos时,是否有任何方法可以通过CNAMEs/load balancer使用Kafka 尝试时,我得到以下SPN错误。这是有道理的,我完全期待这种行为。 我能想象这种工作方式的唯一方法是在建立连接之前在Java客户端代码中包含CNAME解析器: #Using the New Consumer API #On any new connections, do the following: 1) Provide CNAME host

我主要在这里寻找有关卡夫卡和灾难恢复故障切换的建议。 在使用Kerberos时,是否有任何方法可以通过CNAMEs/load balancer使用Kafka

尝试时,我得到以下SPN错误。这是有道理的,我完全期待这种行为。 我能想象这种工作方式的唯一方法是在建立连接之前在Java客户端代码中包含CNAME解析器:

#Using the New Consumer API
#On any new connections, do the following:
1) Provide CNAME hostname in config
2) Resolve CNAME to list of A records for broker hosts
3) Pass these into the New Consumer as the bootstrap servers
这应该是可行的,但是它会涉及自定义代码

同样的概念也适用于主题的发布

有什么想法不必求助于此就能奏效吗

我将CDH 5与Cloudera托管的密钥表分发一起使用


消费者日志

代理日志


您是否有针对您的CNAME注册的SPN(如果没有,可能也是解决方案)?

您是否有针对您的CNAME注册的SPN(如果没有,可能也是解决方案)?

请重新填写您的答案。这很容易理解为一个纯粹的问题。换言之:更清楚地表明你有一个解决问题的建议。请改写你的答案。这很容易理解为一个纯粹的问题。换句话说:更清楚地表明你有一个解决问题的建议。
17/03/01 14:12:06 DEBUG consumer.KafkaConsumer: Subscribed to topic(s): build_smoke_test
17/03/01 14:12:06 DEBUG clients.NetworkClient: Initiating connection to node -1 at lb.cdh-poc-cluster.internal.cdhnetwork:9093.
17/03/01 14:12:06 DEBUG authenticator.SaslClientAuthenticator: Set SASL client state to SEND_HANDSHAKE_REQUEST
17/03/01 14:12:06 DEBUG authenticator.SaslClientAuthenticator: Creating SaslClient: client=alex@CDH-POC-CLUSTER.INTERNAL.CDHNETWORK;service=kafka;serviceHostname=lb.cdh-poc-cluster.internal.cdhnetwork;mechs=[GSSAPI]
17/03/01 14:12:06 DEBUG network.Selector: Connection with lb.cdh-poc-cluster.internal.cdhnetwork/172.3.1.10 disconnected
java.io.EOFException
    at org.apache.kafka.common.network.SslTransportLayer.read(SslTransportLayer.java:488)
    at org.apache.kafka.common.network.NetworkReceive.readFromReadableChannel(NetworkReceive.java:81)
2017-03-01 14:12:08,330 DEBUG org.apache.kafka.common.security.authenticator.SaslServerAuthenticator: Set SASL server state to HANDSHAKE_REQUEST
2017-03-01 14:12:08,330 DEBUG org.apache.kafka.common.security.authenticator.SaslServerAuthenticator: Handle Kafka request SASL_HANDSHAKE
2017-03-01 14:12:08,330 DEBUG org.apache.kafka.common.security.authenticator.SaslServerAuthenticator: Using SASL mechanism 'GSSAPI' provided by client
2017-03-01 14:12:08,331 DEBUG org.apache.kafka.common.security.authenticator.SaslServerAuthenticator: Creating SaslServer for kafka/kf0.cdh-poc-cluster.internal.cdhnetwork@CDH-POC-CLUSTER.INTERNAL.CDHNETWORK with mechanism GSSAPI
2017-03-01 14:12:08,331 DEBUG org.apache.kafka.common.security.authenticator.SaslServerAuthenticator: Set SASL server state to AUTHENTICATE
2017-03-01 14:12:08,334 DEBUG org.apache.kafka.common.security.authenticator.SaslServerAuthenticator: Set SASL server state to FAILED
2017-03-01 14:12:08,334 DEBUG org.apache.kafka.common.network.Selector: Connection with lb.cdh-poc-cluster.internal.cdhnetwork/172.3.1.10 disconnected
java.io.IOException: javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: Failure unspecified at GSS-API level (Mechanism level: Checksum failed)]
    at org.apache.kafka.common.security.authenticator.SaslServerAuthenticator.authenticate(SaslServerAuthenticator.java:243)
    at org.apache.kafka.common.network.KafkaChannel.prepare(KafkaChannel.java:64)
    at org.apache.kafka.common.network.Selector.pollSelectionKeys(Selector.java:318)
    at org.apache.kafka.common.network.Selector.poll(Selector.java:283)
    at kafka.network.Processor.poll(SocketServer.scala:472)
    at kafka.network.Processor.run(SocketServer.scala:412)
    at java.lang.Thread.run(Thread.java:745)
Caused by: javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: Failure unspecified at GSS-API level (Mechanism level: Checksum failed)]
    at com.sun.security.sasl.gsskerb.GssKrb5Server.evaluateResponse(GssKrb5Server.java:199)
    at org.apache.kafka.common.security.authenticator.SaslServerAuthenticator.authenticate(SaslServerAuthenticator.java:228)
    ... 6 more