Interface AdminClientConfigFields<T extends AdminClientConfigFields<T>>
- All Known Implementing Classes:
AdminClientConfigBuilder,BaseAdminClientConfigBuilder
-
Method Summary
Modifier and TypeMethodDescriptionbootstrapServers(String value) bootstrap.serversbootstrapServers(List<String> value) bootstrap.serversclientDnsLookup(String value) client.dns.lookupclient.idconnectionsMaxIdleMs(Long value) connections.max.idle.msdefaultApiTimeoutMs(Integer value) default.api.timeout.msmetadataMaxAgeMs(Long value) metadata.max.age.msmetricReporters(String value) metric.reportersmetricReporters(List<String> value) metric.reportersmetricsNumSamples(Integer value) metrics.num.samplesmetricsRecordingLevel(String value) metrics.recording.levelmetricsSampleWindowMs(Long value) metrics.sample.window.msreceiveBufferBytes(Integer value) receive.buffer.bytesreconnectBackoffMaxMs(Long value) reconnect.backoff.max.msreconnectBackoffMs(Long value) reconnect.backoff.msrequestTimeoutMs(Integer value) request.timeout.msretriesretryBackoffMs(Long value) retry.backoff.mssasl.client.callback.handler.classsaslJaasConfig(String value) sasl.jaas.configsaslJaasConfig(org.apache.kafka.common.config.types.Password value) sasl.jaas.configsaslKerberosKinitCmd(String value) sasl.kerberos.kinit.cmdsasl.kerberos.min.time.before.reloginsaslKerberosServiceName(String value) sasl.kerberos.service.namesasl.kerberos.ticket.renew.jittersasl.kerberos.ticket.renew.window.factorsasl.login.callback.handler.classsaslLoginClass(Class value) sasl.login.classsaslLoginConnectTimeoutMs(Integer value) sasl.login.connect.timeout.mssaslLoginReadTimeoutMs(Integer value) sasl.login.read.timeout.mssasl.login.refresh.buffer.secondssasl.login.refresh.min.period.secondssasl.login.refresh.window.factorsasl.login.refresh.window.jittersaslLoginRetryBackoffMaxMs(Long value) sasl.login.retry.backoff.max.mssaslLoginRetryBackoffMs(Long value) sasl.login.retry.backoff.mssaslMechanism(String value) sasl.mechanismsasl.oauthbearer.clock.skew.secondssasl.oauthbearer.expected.audiencesasl.oauthbearer.expected.audiencesasl.oauthbearer.expected.issuersasl.oauthbearer.jwks.endpoint.refresh.mssasl.oauthbearer.jwks.endpoint.retry.backoff.max.mssasl.oauthbearer.jwks.endpoint.retry.backoff.mssasl.oauthbearer.jwks.endpoint.urlsasl.oauthbearer.scope.claim.namesasl.oauthbearer.sub.claim.namesasl.oauthbearer.token.endpoint.urlsecurityProtocol(String value) security.protocolsecurityProviders(String value) security.providersdefault Tself()sendBufferBytes(Integer value) send.buffer.bytessocket.connection.setup.timeout.max.mssocket.connection.setup.timeout.mssslCipherSuites(String value) ssl.cipher.suitessslCipherSuites(List<String> value) ssl.cipher.suitessslEnabledProtocols(String value) ssl.enabled.protocolssslEnabledProtocols(List<String> value) ssl.enabled.protocolsssl.endpoint.identification.algorithmsslEngineFactoryClass(Class value) ssl.engine.factory.classsslKeymanagerAlgorithm(String value) ssl.keymanager.algorithmsslKeyPassword(String value) ssl.key.passwordsslKeyPassword(org.apache.kafka.common.config.types.Password value) ssl.key.passwordssl.keystore.certificate.chainsslKeystoreCertificateChain(org.apache.kafka.common.config.types.Password value) ssl.keystore.certificate.chainsslKeystoreKey(String value) ssl.keystore.keysslKeystoreKey(org.apache.kafka.common.config.types.Password value) ssl.keystore.keysslKeystoreLocation(String value) ssl.keystore.locationsslKeystorePassword(String value) ssl.keystore.passwordsslKeystorePassword(org.apache.kafka.common.config.types.Password value) ssl.keystore.passwordsslKeystoreType(String value) ssl.keystore.typesslProtocol(String value) ssl.protocolsslProvider(String value) ssl.providerssl.secure.random.implementationsslTrustmanagerAlgorithm(String value) ssl.trustmanager.algorithmsslTruststoreCertificates(String value) ssl.truststore.certificatessslTruststoreCertificates(org.apache.kafka.common.config.types.Password value) ssl.truststore.certificatessslTruststoreLocation(String value) ssl.truststore.locationsslTruststorePassword(String value) ssl.truststore.passwordsslTruststorePassword(org.apache.kafka.common.config.types.Password value) ssl.truststore.passwordsslTruststoreType(String value) ssl.truststore.type
-
Method Details
-
bootstrapServers
bootstrap.servers
A list of host/port pairs to use for establishing the initial connection to the Kafka cluster.
The client will make use of all servers irrespective of which servers are specified here for bootstrapping—this list only impacts the initial hosts used to discover the full set of servers.
This list should be in the formhost1:port1,host2:port2,....
Since these servers are just used for the initial connection to discover the full cluster membership (which may change dynamically), this list need not contain the full set of servers (you may want more than one, though, in case a server is down).Default:
Valid Values:
Importance: high
-
bootstrapServers
bootstrap.servers
A list of host/port pairs to use for establishing the initial connection to the Kafka cluster.
The client will make use of all servers irrespective of which servers are specified here for bootstrapping—this list only impacts the initial hosts used to discover the full set of servers.
This list should be in the formhost1:port1,host2:port2,....
Since these servers are just used for the initial connection to discover the full cluster membership (which may change dynamically), this list need not contain the full set of servers (you may want more than one, though, in case a server is down).Default:
Valid Values:
Importance: high
-
clientId
client.id
An id string to pass to the server when making requests.
The purpose of this is to be able to track the source of requests beyond just ip/port by allowing a logical application name to be included in server-side request logging.Default: ""
Valid Values:
Importance: medium
-
metadataMaxAgeMs
metadata.max.age.ms
The period of time in milliseconds after which we force a refresh of metadata even if we haven't seen any partition leadership changes to proactively discover any new brokers or partitions.Default: 300000 (5 minutes)
Valid Values: [0,...]
Importance: low
-
sendBufferBytes
send.buffer.bytes
The size of the TCP send buffer (SO_SNDBUF) to use when sending data.
If the value is -1, the OS default will be used.Default: 131072 (128 kibibytes)
Valid Values: [-1,...]
Importance: medium
-
receiveBufferBytes
receive.buffer.bytes
The size of the TCP receive buffer (SO_RCVBUF) to use when reading data.
If the value is -1, the OS default will be used.Default: 65536 (64 kibibytes)
Valid Values: [-1,...]
Importance: medium
-
reconnectBackoffMs
reconnect.backoff.ms
The base amount of time to wait before attempting to reconnect to a given host.
This avoids repeatedly connecting to a host in a tight loop.
This backoff applies to all connection attempts by the client to a broker.Default: 50
Valid Values: [0,...]
Importance: low
-
reconnectBackoffMaxMs
reconnect.backoff.max.ms
The maximum amount of time in milliseconds to wait when reconnecting to a broker that has repeatedly failed to connect.
If provided, the backoff per host will increase exponentially for each consecutive connection failure, up to this maximum.
After calculating the backoff increase, 20% random jitter is added to avoid connection storms.Default: 1000 (1 second)
Valid Values: [0,...]
Importance: low
-
retryBackoffMs
retry.backoff.ms
The amount of time to wait before attempting to retry a failed request.
This avoids repeatedly sending requests in a tight loop under some failure scenarios.Default: 100
Valid Values: [0,...]
Importance: low
-
requestTimeoutMs
request.timeout.ms
The configuration controls the maximum amount of time the client will wait for the response of a request.
If the response is not received before the timeout elapses the client will resend the request if necessary or fail the request if retries are exhausted.Default: 30000 (30 seconds)
Valid Values: [0,...]
Importance: medium
-
socketConnectionSetupTimeoutMs
socket.connection.setup.timeout.ms
The amount of time the client will wait for the socket connection to be established.
If the connection is not built before the timeout elapses, clients will close the socket channel.Default: 10000 (10 seconds)
Valid Values:
Importance: medium
-
socketConnectionSetupTimeoutMaxMs
socket.connection.setup.timeout.max.ms
The maximum amount of time the client will wait for the socket connection to be established.
The connection setup timeout will increase exponentially for each consecutive connection failure up to this maximum.
To avoid connection storms, a randomization factor of 0.2 will be applied to the timeout resulting in a random range between 20% below and 20% above the computed value.Default: 30000 (30 seconds)
Valid Values:
Importance: medium
-
connectionsMaxIdleMs
connections.max.idle.ms
Close idle connections after the number of milliseconds specified by this config.Default: 300000 (5 minutes)
Valid Values:
Importance: medium
-
retries
retries
Setting a value greater than zero will cause the client to resend any request that fails with a potentially transient error.
It is recommended to set the value to either zero or `MAX_VALUE` and use corresponding timeout parameters to control how long a client should retry a request.Default: 2147483647
Valid Values: [0,...,2147483647]
Importance: low
-
defaultApiTimeoutMs
default.api.timeout.ms
Specifies the timeout (in milliseconds) for client APIs.
This configuration is used as the default timeout for all client operations that do not specify atimeoutparameter.Default: 60000 (1 minute)
Valid Values: [0,...]
Importance: medium
-
metricsSampleWindowMs
metrics.sample.window.ms
The window of time a metrics sample is computed over.Default: 30000 (30 seconds)
Valid Values: [0,...]
Importance: low
-
metricsNumSamples
metrics.num.samples
The number of samples maintained to compute metrics.Default: 2
Valid Values: [1,...]
Importance: low
-
metricReporters
metric.reporters
A list of classes to use as metrics reporters.
Implementing theorg.apache.kafka.common.metrics.MetricsReporterinterface allows plugging in classes that will be notified of new metric creation.
The JmxReporter is always included to register JMX statistics.Default: ""
Valid Values:
Importance: low
-
metricReporters
metric.reporters
A list of classes to use as metrics reporters.
Implementing theorg.apache.kafka.common.metrics.MetricsReporterinterface allows plugging in classes that will be notified of new metric creation.
The JmxReporter is always included to register JMX statistics.Default: ""
Valid Values:
Importance: low
-
metricsRecordingLevel
metrics.recording.level
The highest recording level for metrics.Default: INFO
Valid Values: [INFO, DEBUG, TRACE]
Importance: low
-
clientDnsLookup
client.dns.lookup
Controls how the client uses DNS lookups.
If set touse_all_dns_ips, connect to each returned IP address in sequence until a successful connection is established.
After a disconnection, the next IP is used.
Once all IPs have been used once, the client resolves the IP(s) from the hostname again (both the JVM and the OS cache DNS name lookups, however).
If set toresolve_canonical_bootstrap_servers_only, resolve each bootstrap address into a list of canonical names.
After the bootstrap phase, this behaves the same asuse_all_dns_ips.Default: use_all_dns_ips
Valid Values: [use_all_dns_ips, resolve_canonical_bootstrap_servers_only]
Importance: medium
-
securityProviders
security.providers
A list of configurable creator classes each returning a provider implementing security algorithms.
These classes should implement theorg.apache.kafka.common.security.auth.SecurityProviderCreatorinterface.Default: null
Valid Values:
Importance: low
-
securityProtocol
security.protocol
Protocol used to communicate with brokers.
Valid values are: PLAINTEXT, SSL, SASL_PLAINTEXT, SASL_SSL.Default: PLAINTEXT
Valid Values: [PLAINTEXT, SSL, SASL_PLAINTEXT, SASL_SSL]
Importance: medium
-
sslProtocol
ssl.protocol
The SSL protocol used to generate the SSLContext.
The default is 'TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise.
This value should be fine for most use cases.
Allowed values in recent JVMs are 'TLSv1.2' and 'TLSv1.3'.
'TLS', 'TLSv1.1', 'SSL', 'SSLv2' and 'SSLv3' may be supported in older JVMs, but their usage is discouraged due to known security vulnerabilities.
With the default value for this config and 'ssl.enabled.protocols', clients will downgrade to 'TLSv1.2' if the server does not support 'TLSv1.3'.
If this config is set to 'TLSv1.2', clients will not use 'TLSv1.3' even if it is one of the values in ssl.enabled.protocols and the server only supports 'TLSv1.3'.Default: TLSv1.3
Valid Values:
Importance: medium
-
sslProvider
ssl.provider
The name of the security provider used for SSL connections.
Default value is the default security provider of the JVM.Default: null
Valid Values:
Importance: medium
-
sslCipherSuites
ssl.cipher.suites
A list of cipher suites.
This is a named combination of authentication, encryption, MAC and key exchange algorithm used to negotiate the security settings for a network connection using TLS or SSL network protocol.
By default all the available cipher suites are supported.Default: null
Valid Values:
Importance: low
-
sslCipherSuites
ssl.cipher.suites
A list of cipher suites.
This is a named combination of authentication, encryption, MAC and key exchange algorithm used to negotiate the security settings for a network connection using TLS or SSL network protocol.
By default all the available cipher suites are supported.Default: null
Valid Values:
Importance: low
-
sslEnabledProtocols
ssl.enabled.protocols
The list of protocols enabled for SSL connections.
The default is 'TLSv1.2,TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise.
With the default value for Java 11, clients and servers will prefer TLSv1.3 if both support it and fallback to TLSv1.2 otherwise (assuming both support at least TLSv1.2).
This default should be fine for most cases.
Also see the config documentation for `ssl.protocol`.Default: TLSv1.2,TLSv1.3
Valid Values:
Importance: medium
-
sslEnabledProtocols
ssl.enabled.protocols
The list of protocols enabled for SSL connections.
The default is 'TLSv1.2,TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise.
With the default value for Java 11, clients and servers will prefer TLSv1.3 if both support it and fallback to TLSv1.2 otherwise (assuming both support at least TLSv1.2).
This default should be fine for most cases.
Also see the config documentation for `ssl.protocol`.Default: TLSv1.2,TLSv1.3
Valid Values:
Importance: medium
-
sslKeystoreType
ssl.keystore.type
The file format of the key store file.
This is optional for client.
The values currently supported by the default `ssl.engine.factory.class` are [JKS, PKCS12, PEM].Default: JKS
Valid Values:
Importance: medium
-
sslKeystoreLocation
ssl.keystore.location
The location of the key store file.
This is optional for client and can be used for two-way authentication for client.Default: null
Valid Values:
Importance: high
-
sslKeystorePassword
ssl.keystore.password
The store password for the key store file.
This is optional for client and only needed if 'ssl.keystore.location' is configured.
Key store password is not supported for PEM format.Default: null
Valid Values:
Importance: high
-
sslKeystorePassword
ssl.keystore.password
The store password for the key store file.
This is optional for client and only needed if 'ssl.keystore.location' is configured.
Key store password is not supported for PEM format.Default: null
Valid Values:
Importance: high
-
sslKeyPassword
ssl.key.password
The password of the private key in the key store file or the PEM key specified in `ssl.keystore.key'.Default: null
Valid Values:
Importance: high
-
sslKeyPassword
ssl.key.password
The password of the private key in the key store file or the PEM key specified in `ssl.keystore.key'.Default: null
Valid Values:
Importance: high
-
sslKeystoreKey
ssl.keystore.key
Private key in the format specified by 'ssl.keystore.type'.
Default SSL engine factory supports only PEM format with PKCS#8 keys.
If the key is encrypted, key password must be specified using 'ssl.key.password'Default: null
Valid Values:
Importance: high
-
sslKeystoreKey
ssl.keystore.key
Private key in the format specified by 'ssl.keystore.type'.
Default SSL engine factory supports only PEM format with PKCS#8 keys.
If the key is encrypted, key password must be specified using 'ssl.key.password'Default: null
Valid Values:
Importance: high
-
sslKeystoreCertificateChain
ssl.keystore.certificate.chain
Certificate chain in the format specified by 'ssl.keystore.type'.
Default SSL engine factory supports only PEM format with a list of X.509 certificatesDefault: null
Valid Values:
Importance: high
-
sslKeystoreCertificateChain
ssl.keystore.certificate.chain
Certificate chain in the format specified by 'ssl.keystore.type'.
Default SSL engine factory supports only PEM format with a list of X.509 certificatesDefault: null
Valid Values:
Importance: high
-
sslTruststoreCertificates
ssl.truststore.certificates
Trusted certificates in the format specified by 'ssl.truststore.type'.
Default SSL engine factory supports only PEM format with X.509 certificates.Default: null
Valid Values:
Importance: high
-
sslTruststoreCertificates
ssl.truststore.certificates
Trusted certificates in the format specified by 'ssl.truststore.type'.
Default SSL engine factory supports only PEM format with X.509 certificates.Default: null
Valid Values:
Importance: high
-
sslTruststoreType
ssl.truststore.type
The file format of the trust store file.
The values currently supported by the default `ssl.engine.factory.class` are [JKS, PKCS12, PEM].Default: JKS
Valid Values:
Importance: medium
-
sslTruststoreLocation
ssl.truststore.location
The location of the trust store file.Default: null
Valid Values:
Importance: high
-
sslTruststorePassword
ssl.truststore.password
The password for the trust store file.
If a password is not set, trust store file configured will still be used, but integrity checking is disabled.
Trust store password is not supported for PEM format.Default: null
Valid Values:
Importance: high
-
sslTruststorePassword
ssl.truststore.password
The password for the trust store file.
If a password is not set, trust store file configured will still be used, but integrity checking is disabled.
Trust store password is not supported for PEM format.Default: null
Valid Values:
Importance: high
-
sslKeymanagerAlgorithm
ssl.keymanager.algorithm
The algorithm used by key manager factory for SSL connections.
Default value is the key manager factory algorithm configured for the Java Virtual Machine.Default: SunX509
Valid Values:
Importance: low
-
sslTrustmanagerAlgorithm
ssl.trustmanager.algorithm
The algorithm used by trust manager factory for SSL connections.
Default value is the trust manager factory algorithm configured for the Java Virtual Machine.Default: PKIX
Valid Values:
Importance: low
-
sslEndpointIdentificationAlgorithm
ssl.endpoint.identification.algorithm
The endpoint identification algorithm to validate server hostname using server certificate.
Default: https
Valid Values:
Importance: low
-
sslSecureRandomImplementation
ssl.secure.random.implementation
The SecureRandom PRNG implementation to use for SSL cryptography operations.
Default: null
Valid Values:
Importance: low
-
sslEngineFactoryClass
ssl.engine.factory.class
The class of type org.apache.kafka.common.security.auth.SslEngineFactory to provide SSLEngine objects.
Default value is org.apache.kafka.common.security.ssl.DefaultSslEngineFactoryDefault: null
Valid Values:
Importance: low
-
saslKerberosServiceName
sasl.kerberos.service.name
The Kerberos principal name that Kafka runs as.
This can be defined either in Kafka's JAAS config or in Kafka's config.Default: null
Valid Values:
Importance: medium
-
saslKerberosKinitCmd
sasl.kerberos.kinit.cmd
Kerberos kinit command path.Default: /usr/bin/kinit
Valid Values:
Importance: low
-
saslKerberosTicketRenewWindowFactor
sasl.kerberos.ticket.renew.window.factor
Login thread will sleep until the specified window factor of time from last refresh to ticket's expiry has been reached, at which time it will try to renew the ticket.Default: 0.8
Valid Values:
Importance: low
-
saslKerberosTicketRenewJitter
sasl.kerberos.ticket.renew.jitter
Percentage of random jitter added to the renewal time.Default: 0.05
Valid Values:
Importance: low
-
saslKerberosMinTimeBeforeRelogin
sasl.kerberos.min.time.before.relogin
Login thread sleep time between refresh attempts.Default: 60000
Valid Values:
Importance: low
-
saslLoginRefreshWindowFactor
sasl.login.refresh.window.factor
Login refresh thread will sleep until the specified window factor relative to the credential's lifetime has been reached, at which time it will try to refresh the credential.
Legal values are between 0.5 (50%) and 1.0 (100%) inclusive; a default value of 0.8 (80%) is used if no value is specified.
Currently applies only to OAUTHBEARER.Default: 0.8
Valid Values: [0.5,...,1.0]
Importance: low
-
saslLoginRefreshWindowJitter
sasl.login.refresh.window.jitter
The maximum amount of random jitter relative to the credential's lifetime that is added to the login refresh thread's sleep time.
Legal values are between 0 and 0.25 (25%) inclusive; a default value of 0.05 (5%) is used if no value is specified.
Currently applies only to OAUTHBEARER.Default: 0.05
Valid Values: [0.0,...,0.25]
Importance: low
-
saslLoginRefreshMinPeriodSeconds
sasl.login.refresh.min.period.seconds
The desired minimum time for the login refresh thread to wait before refreshing a credential, in seconds.
Legal values are between 0 and 900 (15 minutes); a default value of 60 (1 minute) is used if no value is specified.
This value and sasl.login.refresh.buffer.seconds are both ignored if their sum exceeds the remaining lifetime of a credential.
Currently applies only to OAUTHBEARER.Default: 60
Valid Values: [0,...,900]
Importance: low
-
saslLoginRefreshBufferSeconds
sasl.login.refresh.buffer.seconds
The amount of buffer time before credential expiration to maintain when refreshing a credential, in seconds.
If a refresh would otherwise occur closer to expiration than the number of buffer seconds then the refresh will be moved up to maintain as much of the buffer time as possible.
Legal values are between 0 and 3600 (1 hour); a default value of 300 (5 minutes) is used if no value is specified.
This value and sasl.login.refresh.min.period.seconds are both ignored if their sum exceeds the remaining lifetime of a credential.
Currently applies only to OAUTHBEARER.Default: 300
Valid Values: [0,...,3600]
Importance: low
-
saslMechanism
sasl.mechanism
SASL mechanism used for client connections.
This may be any mechanism for which a security provider is available.
GSSAPI is the default mechanism.Default: GSSAPI
Valid Values:
Importance: medium
-
saslJaasConfig
sasl.jaas.config
JAAS login context parameters for SASL connections in the format used by JAAS configuration files.
JAAS configuration file format is described here.
The format for the value is:loginModuleClass controlFlag (optionName=optionValue)*;.
For brokers, the config must be prefixed with listener prefix and SASL mechanism name in lower-case.
For example, listener.name.sasl_ssl.scram-sha-256.sasl.jaas.config=com.example.ScramLoginModule required;Default: null
Valid Values:
Importance: medium
-
saslJaasConfig
sasl.jaas.config
JAAS login context parameters for SASL connections in the format used by JAAS configuration files.
JAAS configuration file format is described here.
The format for the value is:loginModuleClass controlFlag (optionName=optionValue)*;.
For brokers, the config must be prefixed with listener prefix and SASL mechanism name in lower-case.
For example, listener.name.sasl_ssl.scram-sha-256.sasl.jaas.config=com.example.ScramLoginModule required;Default: null
Valid Values:
Importance: medium
-
saslClientCallbackHandlerClass
sasl.client.callback.handler.class
The fully qualified name of a SASL client callback handler class that implements the AuthenticateCallbackHandler interface.Default: null
Valid Values:
Importance: medium
-
saslLoginCallbackHandlerClass
sasl.login.callback.handler.class
The fully qualified name of a SASL login callback handler class that implements the AuthenticateCallbackHandler interface.
For brokers, login callback handler config must be prefixed with listener prefix and SASL mechanism name in lower-case.
For example, listener.name.sasl_ssl.scram-sha-256.sasl.login.callback.handler.class=com.example.CustomScramLoginCallbackHandlerDefault: null
Valid Values:
Importance: medium
-
saslLoginClass
sasl.login.class
The fully qualified name of a class that implements the Login interface.
For brokers, login config must be prefixed with listener prefix and SASL mechanism name in lower-case.
For example, listener.name.sasl_ssl.scram-sha-256.sasl.login.class=com.example.CustomScramLoginDefault: null
Valid Values:
Importance: medium
-
saslLoginConnectTimeoutMs
sasl.login.connect.timeout.ms
The (optional) value in milliseconds for the external authentication provider connection timeout.
Currently applies only to OAUTHBEARER.Default: null
Valid Values:
Importance: low
-
saslLoginReadTimeoutMs
sasl.login.read.timeout.ms
The (optional) value in milliseconds for the external authentication provider read timeout.
Currently applies only to OAUTHBEARER.Default: null
Valid Values:
Importance: low
-
saslLoginRetryBackoffMaxMs
sasl.login.retry.backoff.max.ms
The (optional) value in milliseconds for the maximum wait between login attempts to the external authentication provider.
Login uses an exponential backoff algorithm with an initial wait based on the sasl.login.retry.backoff.ms setting and will double in wait length between attempts up to a maximum wait length specified by the sasl.login.retry.backoff.max.ms setting.
Currently applies only to OAUTHBEARER.Default: 10000 (10 seconds)
Valid Values:
Importance: low
-
saslLoginRetryBackoffMs
sasl.login.retry.backoff.ms
The (optional) value in milliseconds for the initial wait between login attempts to the external authentication provider.
Login uses an exponential backoff algorithm with an initial wait based on the sasl.login.retry.backoff.ms setting and will double in wait length between attempts up to a maximum wait length specified by the sasl.login.retry.backoff.max.ms setting.
Currently applies only to OAUTHBEARER.Default: 100
Valid Values:
Importance: low
-
saslOauthbearerScopeClaimName
sasl.oauthbearer.scope.claim.name
The OAuth claim for the scope is often named "scope", but this (optional) setting can provide a different name to use for the scope included in the JWT payload's claims if the OAuth/OIDC provider uses a different name for that claim.Default: scope
Valid Values:
Importance: low
-
saslOauthbearerSubClaimName
sasl.oauthbearer.sub.claim.name
The OAuth claim for the subject is often named "sub", but this (optional) setting can provide a different name to use for the subject included in the JWT payload's claims if the OAuth/OIDC provider uses a different name for that claim.Default: sub
Valid Values:
Importance: low
-
saslOauthbearerTokenEndpointUrl
sasl.oauthbearer.token.endpoint.url
The URL for the OAuth/OIDC identity provider.
If the URL is HTTP(S)-based, it is the issuer's token endpoint URL to which requests will be made to login based on the configuration in sasl.jaas.config.
If the URL is file-based, it specifies a file containing an access token (in JWT serialized form) issued by the OAuth/OIDC identity provider to use for authorization.Default: null
Valid Values:
Importance: medium
-
saslOauthbearerJwksEndpointUrl
sasl.oauthbearer.jwks.endpoint.url
The OAuth/OIDC provider URL from which the provider's JWKS (JSON Web Key Set) can be retrieved.
The URL can be HTTP(S)-based or file-based.
If the URL is HTTP(S)-based, the JWKS data will be retrieved from the OAuth/OIDC provider via the configured URL on broker startup.
All then-current keys will be cached on the broker for incoming requests.
If an authentication request is received for a JWT that includes a "kid" header claim value that isn't yet in the cache, the JWKS endpoint will be queried again on demand.
However, the broker polls the URL every sasl.oauthbearer.jwks.endpoint.refresh.ms milliseconds to refresh the cache with any forthcoming keys before any JWT requests that include them are received.
If the URL is file-based, the broker will load the JWKS file from a configured location on startup.
In the event that the JWT includes a "kid" header value that isn't in the JWKS file, the broker will reject the JWT and authentication will fail.Default: null
Valid Values:
Importance: medium
-
saslOauthbearerJwksEndpointRefreshMs
sasl.oauthbearer.jwks.endpoint.refresh.ms
The (optional) value in milliseconds for the broker to wait between refreshing its JWKS (JSON Web Key Set) cache that contains the keys to verify the signature of the JWT.Default: 3600000 (1 hour)
Valid Values:
Importance: low
-
saslOauthbearerJwksEndpointRetryBackoffMaxMs
sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms
The (optional) value in milliseconds for the maximum wait between attempts to retrieve the JWKS (JSON Web Key Set) from the external authentication provider.
JWKS retrieval uses an exponential backoff algorithm with an initial wait based on the sasl.oauthbearer.jwks.endpoint.retry.backoff.ms setting and will double in wait length between attempts up to a maximum wait length specified by the sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms setting.Default: 10000 (10 seconds)
Valid Values:
Importance: low
-
saslOauthbearerJwksEndpointRetryBackoffMs
sasl.oauthbearer.jwks.endpoint.retry.backoff.ms
The (optional) value in milliseconds for the initial wait between JWKS (JSON Web Key Set) retrieval attempts from the external authentication provider.
JWKS retrieval uses an exponential backoff algorithm with an initial wait based on the sasl.oauthbearer.jwks.endpoint.retry.backoff.ms setting and will double in wait length between attempts up to a maximum wait length specified by the sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms setting.Default: 100
Valid Values:
Importance: low
-
saslOauthbearerClockSkewSeconds
sasl.oauthbearer.clock.skew.seconds
The (optional) value in seconds to allow for differences between the time of the OAuth/OIDC identity provider and the broker.Default: 30
Valid Values:
Importance: low
-
saslOauthbearerExpectedAudience
sasl.oauthbearer.expected.audience
The (optional) comma-delimited setting for the broker to use to verify that the JWT was issued for one of the expected audiences.
The JWT will be inspected for the standard OAuth "aud" claim and if this value is set, the broker will match the value from JWT's "aud" claim to see if there is an exact match.
If there is no match, the broker will reject the JWT and authentication will fail.Default: null
Valid Values:
Importance: low
-
saslOauthbearerExpectedAudience
sasl.oauthbearer.expected.audience
The (optional) comma-delimited setting for the broker to use to verify that the JWT was issued for one of the expected audiences.
The JWT will be inspected for the standard OAuth "aud" claim and if this value is set, the broker will match the value from JWT's "aud" claim to see if there is an exact match.
If there is no match, the broker will reject the JWT and authentication will fail.Default: null
Valid Values:
Importance: low
-
saslOauthbearerExpectedIssuer
sasl.oauthbearer.expected.issuer
The (optional) setting for the broker to use to verify that the JWT was created by the expected issuer.
The JWT will be inspected for the standard OAuth "iss" claim and if this value is set, the broker will match it exactly against what is in the JWT's "iss" claim.
If there is no match, the broker will reject the JWT and authentication will fail.Default: null
Valid Values:
Importance: low
-
self
-