This connector captures streaming data from Apache Kafka topics.
It is available for use in the Flow web application. For local development or open-source workflows,
ghcr.io/estuary/source-kafka:dev provides the latest version of the connector as a Docker image. You can also follow the link in your browser to see past image versions.
Supported data types
This connector supports Kafka messages that contain JSON data. Flow collections store data as JSON. Before deploying this connector, you should modify schema(s) of the Flow collection(s) you're creating to reflect the structure of your JSON Kafka messages.
At this time, the connector does not support other data types in Kafka messages.
Support for Avro Kafka messages will be added soon. For more information, contact the Estuary team.
- A Kafka cluster with:
- bootstrap.servers configured so that clients may connect via the desired host and port
- An authentication mechanism of choice set up (highly recommended for production environments)
- Connection security enabled with TLS (highly recommended for production environments)
Authentication and connection security
Neither authentication nor connection security are enabled by default in your Kafka cluster, but both are important considerations. Similarly, Flow's Kafka connectors do not strictly require authentication or connection security mechanisms. You may choose to omit them for local development and testing; however, both are strongly encouraged for production environments.
A wide variety of authentication methods is available in Kafka clusters. Flow supports SASL/SCRAM-SHA-256, SASL/SCRAM-SHA-512, and SASL/PLAIN. Behavior using other authentication methods is not guaranteed. When authentication details are not provided, the client connection will attempt to use PLAINTEXT (insecure) protocol.
If you don't already have authentication enabled on your cluster, Estuary recommends either of listed SASL/SCRAM methods. With SCRAM, you set up a username and password, making it analogous to the traditional authentication mechanisms you use in other applications.
For connection security, Estuary recommends that you enable TLS encryption for your SASL mechanism of choice, as well as all other components of your cluster. Note that because TLS replaced now-deprecated SSL encryption, Kafka still uses the acronym "SSL" to refer to TLS encryption. See Confluent's documentation for details.
TLS encryption is currently the only supported connection security mechanism for this connector. Other connection security methods may be enabled in the future.
You configure connectors either in the Flow web app, or by directly editing the catalog specification file. See connectors to learn more about using connectors. The values and specification sample below provide configuration details specific to the Apache Kafka source connector.
|Bootstrap servers||The initial servers in the Kafka cluster to connect to. The Kafka client will be informed of the rest of the cluster nodes by connecting to one of these nodes.||array||Required|
|TLS||TLS connection settings.||string|
|Authentication||Connection details used to authenticate a client connection to Kafka via SASL.||null, object|
|SASL Mechanism||SASL mechanism describing how to exchange and authenticate client servers.||string|
|Password||Password, if applicable for the authentication mechanism chosen.||string|
|Username||Username, if applicable for the authentication mechanism chosen.||string|
|Stream||Kafka topic name.||string||Required|
|Sync mode||Connection method. Always set to ||string||Required|
Your capture definition will likely be more complex, with additional bindings for each Kafka topic.