> On 21 Oct 2015, at 17:47, Todd Palino <tpal...@gmail.com> wrote: > > There seems to be a bit of detail lacking in the KIP. Specifically, I'd > like to understand: > > 1) What znodes are the brokers going to secure? Is this configurable? How?
Currently it is securing all paths here except the consumers one: https://github.com/apache/kafka/blob/trunk/core/src/main/scala/kafka/utils/ZkUtils.scala#L56 <https://github.com/apache/kafka/blob/trunk/core/src/main/scala/kafka/utils/ZkUtils.scala#L56> This isn't configurable at the moment. > 2) What ACL is the broker going to apply? Is this configurable? The default is CREATOR_ALL_ACL + READ_ACL_UNSAFE, which means that an authenticated client can manipulate secured znodes and everyone can read znodes. The API of ZkUtils accommodates other ACLs, but the current code is using the default. > 3) How will the admin tools (such as preferred replica election and > partition reassignment) interact with this? > Currently, you need to set a system property passing the login config file to be able to authenticate the client and perform writes to ZK. -Flavio > -Todd > > > On Wed, Oct 21, 2015 at 9:16 AM, Ismael Juma <ism...@juma.me.uk> wrote: > >> On Wed, Oct 21, 2015 at 5:04 PM, Flavio Junqueira <f...@apache.org> wrote: >> >>> Bringing the points Grant brought to this thread: >>> >>>> Is it worth mentioning the follow up steps that were discussed in the >> KIP >>>> call in this KIP document? Some of them were: >>>> >>>> - Adding SSL support for Zookeeper >>>> - Removing the "world readable" assumption >>>> >>> >>> Grant, how would you do it? I see three options: >>> >>> 1- Add to the existing KIP, but then the functionality we should be >>> checking in soon won't include it, so the KIP will remain incomplete >>> >> >> A "Future work" section would make sense to me, but I don't know how this >> is normally handled. >> >> Ismael >>