Maybe it's clearer to to say protocol_listener_name?  The proposed config
allows you to name each listener and refer to their names in various places.



On Wed, Jan 4, 2017 at 4:34 AM, Ismael Juma <ism...@juma.me.uk> wrote:

> Hi Colin,
>
> Thanks for the feedback. It's a good question regarding the name `protocol
> label`. It was an easy starting name given that the security protocol was
> replaced by a label in the listener string. However, I agree that it's
> perhaps not as clear as it could be. Maybe `listener key` would be a better
> name? It makes it clear that it should be unique in a listeners list and
> that it's used to associate a listener to something else (like a security
> protocol). Thoughts?
>
> Ismael
>
> On Wed, Jan 4, 2017 at 12:29 AM, Colin McCabe <cmcc...@apache.org> wrote:
>
> > Good idea.  It would be really nice to be able to constrain replication
> > traffic to a specific interface or use different security settings.
> >
> > I'm having a little trouble understanding the "protocol label" concept.
> > Clearly protocol labels map to protocols, but they also seem to identify
> > particular types of traffic.  Would it be more appropriate to call these
> > "traffic types" or "endpoint types"?  Or am I misunderstanding the
> > proposal?
> >
> > cheers,
> > Colin
> >
> >
> > On Thu, Dec 22, 2016, at 08:00, Ismael Juma wrote:
> > > I've updated the KIP to:
> > >
> > > 1. Include the ability to set different security configs depending on
> the
> > > protocol label.
> > > 2. Include the mapping from protocol label to security protocol in ZK
> and
> > > UpdateMetadataRequest.
> > > 3. More items in the "Rejected Alternatives" section.
> > > 4. Take into account old ZooKeeper-based consumers.
> > >
> > > Feedback is appreciated as always.
> > >
> > > I'm particularly interested in people's opinions on the config format
> as
> > > I
> > > am still unsure when it comes to the proposed format versus the first
> > > rejected alternative.
> > >
> > > Ismael
> > >
> > > On Wed, Dec 21, 2016 at 11:37 PM, Ismael Juma <ism...@juma.me.uk>
> wrote:
> > >
> > > > Thanks Rajini.
> > > >
> > > > I agree that it's worth thinking about what a fully configurable
> label
> > > > would look like. I'll update the KIP.
> > > >
> > > > Ismael
> > > >
> > > > On 21 Dec 2016 10:53 pm, "Rajini Sivaram" <rajinisiva...@gmail.com>
> > wrote:
> > > >
> > > > Hi Ismael,
> > > >
> > > > Thank you for the KIP. This is a very useful change.
> > > >
> > > > Once you allow multiple interfaces with the same security protocol,
> you
> > > > will soon also need to be able to configure protocol-specific
> > properties
> > > > for each of the interfaces. To use SSL on internal and external
> > networks,
> > > > you would almost definitely want different keystores with different
> > > > hostname/IP addresses. Similarly for SASL, you might want to enable
> > > > different mechanisms, use a different authentication server etc. This
> > is
> > > > listed under future work.But it may be worth thinking about what a
> > fully
> > > > configurable 'label' looks like. Would every property now become a
> > list/map
> > > > like listeners - you would then end up with maps of lists for some
> > > > properties. It will good if all properties corresponding to a  label
> > > > including listener and advertised.listener are configured
> consistently
> > - if
> > > > that is possible,
> > > >
> > > >
> > > > On Wed, Dec 21, 2016 at 8:56 PM, Ismael Juma <ism...@juma.me.uk>
> > wrote:
> > > >
> > > > > Hi all,
> > > > >
> > > > > We've posted "KIP-103: Separation of Internal and External traffic"
> > for
> > > > > discussion:
> > > > >
> > > > > *https://cwiki.apache.org/confluence/display/KAFKA/KIP-
> > > > > 103%3A+Separation+of+Internal+and+External+traffic
> > > > > <https://cwiki.apache.org/confluence/display/KAFKA/KIP-
> > > > > 103%3A+Separation+of+Internal+and+External+traffic>*
> > > > >
> > > > > Please take a look. Your feedback is appreciated.
> > > > >
> > > > > Thanks,
> > > > > Ismael
> > > > >
> > > >
> > > >
> > > >
> >
>

Reply via email to