Skip to main content

Apache Kafka

This connector captures streaming data from Apache Kafka topics.

It is available for use in the Flow web application. For local development or open-source workflows, ghcr.io/estuary/source-kafka:dev provides the latest version of the connector as a Docker image. You can also follow the link in your browser to see past image versions.

Supported data types

This connector supports Kafka messages that contain JSON data. Flow collections store data as JSON. Before deploying this connector, you should modify schema(s) of the Flow collection(s) you're creating to reflect the structure of your JSON Kafka messages.

At this time, the connector does not support other data types in Kafka messages.

Beta

Support for Avro Kafka messages will be added soon. For more information, contact the Estuary team.

Prerequisites

  • A Kafka cluster with:
    • bootstrap.servers configured so that clients may connect via the desired host and port
    • An authentication mechanism of choice set up (highly recommended for production environments)
    • Connection security enabled with TLS (highly recommended for production environments)

Authentication and connection security

Neither authentication nor connection security are enabled by default in your Kafka cluster, but both are important considerations. Similarly, Flow's Kafka connectors do not strictly require authentication or connection security mechanisms. You may choose to omit them for local development and testing; however, both are strongly encouraged for production environments.

A wide variety of authentication methods is available in Kafka clusters. Flow supports SASL/SCRAM-SHA-256, SASL/SCRAM-SHA-512, and SASL/PLAIN. Behavior using other authentication methods is not guaranteed. When authentication details are not provided, the client connection will attempt to use PLAINTEXT (insecure) protocol.

If you don't already have authentication enabled on your cluster, Estuary recommends either of listed SASL/SCRAM methods. With SCRAM, you set up a username and password, making it analogous to the traditional authentication mechanisms you use in other applications.

For connection security, Estuary recommends that you enable TLS encryption for your SASL mechanism of choice, as well as all other components of your cluster. Note that because TLS replaced now-deprecated SSL encryption, Kafka still uses the acronym "SSL" to refer to TLS encryption. See Confluent's documentation for details.

Beta

TLS encryption is currently the only supported connection security mechanism for this connector. Other connection security methods may be enabled in the future.

AWS Managed Streaming Kafka (MSK)

If using AWS Managed Streaming for Apache Kafka (MSK), you can use IAM authentication with our connector. Read more about IAM authentication with MSK in AWS docs: IAM access control.

Additionally, you want to make sure that your VPC configuration allows inbound and outbound requests to Estuary's IP address: 34.121.207.128

Configuration

You configure connectors either in the Flow web app, or by directly editing the catalog specification file. See connectors to learn more about using connectors. The values and specification sample below provide configuration details specific to the Apache Kafka source connector.

Properties

Endpoint

PropertyTitleDescriptionTypeRequired/Default
/bootstrap_serversBootstrap serversThe initial servers in the Kafka cluster to connect to, separated by commas. The Kafka client will be informed of the rest of the cluster nodes by connecting to one of these nodes.stringRequired
/tlsTLSTLS connection settings.string"system_certificates"
/credentialsCredentialsConnection details used to authenticate a client connection to Kafka via SASL.null, object
/credentials/auth_typeAuthentication typeOne of UserPassword for SASL or AWS for IAM authenticationstring
/credentials/mechanismSASL MechanismSASL mechanism describing how to exchange and authenticate client servers.string
/credentials/passwordPasswordPassword, if applicable for the authentication mechanism chosen.string
/credentials/usernameUsernameUsername, if applicable for the authentication mechanism chosen.string
/credentials/aws_access_key_idAWS Access Key IDSupply if using auth_type: AWSstring
/credentials/aws_secret_access_keyAWS Secret Access KeySupply if using auth_type: AWSstring
/credentials/regionAWS RegionSupply if using auth_type: AWSstring

Bindings

PropertyTitleDescriptionTypeRequired/Default
/streamStreamKafka topic name.stringRequired
/syncModeSync modeConnection method. Always set to incrementalstringRequired

Sample

User and password authentication (SASL):

captures:
${PREFIX}/${CAPTURE_NAME}:
endpoint:
connector:
image: ghcr.io/estuary/source-kafka:dev
config:
bootstrap_servers: localhost:9093
tls: system_certificates
credentials:
auth_type: UserPassword
mechanism: SCRAM-SHA-512
username: bruce.wayne
password: definitely-not-batman
bindings:
- resource:
stream: ${TOPIC_NAME}
syncMode: incremental
target: ${PREFIX}/${COLLECTION_NAME}

AWS IAM authentication:

captures:
${PREFIX}/${CAPTURE_NAME}:
endpoint:
connector:
image: ghcr.io/estuary/source-kafka:dev
config:
bootstrap_servers: localhost:9093
tls: system_certificates
credentials:
auth_type: AWS
aws_access_key_id: AK...
aws_secret_access_key: secret
region: us-east-1
bindings:
- resource:
stream: ${TOPIC_NAME}
syncMode: incremental
target: ${PREFIX}/${COLLECTION_NAME}

Your capture definition will likely be more complex, with additional bindings for each Kafka topic.

Learn more about capture definitions..