Hi zw,

As you yourself wrote in the rejected alternatives section, the existing 
listener-specific connection limit already lets administrators limit the number 
of SSL connections (assuming that one listener is SSL and another is not).

I don't understand the objection to just using that capability. You mention 
that "the protocol of the listener may change dynamically, and the limit of the 
listener also needs to be modified." But the connection limit is also dynamic, 
so that doesn't seem to be a problem. I didn't understand the objection that a 
per-listener limit doesn't allow you to "limit the ssl connections precisely" 
-- can you explain more?

Just as a general comment, I think the biggest use-case for mixed clusters that 
support both PLAINTEXT and SSL is when you have replication using PLAINTEXT and 
external connections using SSL. In that case, it's hardly worth having a 
separate limit for SSL, since the number of plaintext connections is bounded, 
and low. But perhaps your use-case is different. Do you really think you'll 
have both a lot of PLAINTEXT and a lot of SSL connections?

cheers,
Colin


On Sat, Jan 6, 2024, at 23:17, zw wrote:
> Hi all,
> I'd like to begin discussion on KIP-1015 which proposes to add new 
> configuration max.ssl.connections to limit number of ssl connections in 
> brokers.
> KIP linkļ¼š
> https://cwiki.apache.org/confluence/display/KAFKA/KIP-1015%3A+Limit+number+of+ssl+connections+in+brokers
>
>
> Best,
> Jimmy Wang

Reply via email to