Chrise,

Thanks a lot for your feedback. I will address them in order of your
questions/comments.

1. Thanks for bringing this to my attention about KIP-382. I had a closer
look at the KIP and IIUC, the KIP allows `consumer.` prefix for SourceConnector
and producer. prefix for SinkConnector since those are additional connector
properties to help resolve the Kafka cluster other than the one Connect
framework knows about. Whereas, the proposal in KIP-458 applies producer
policies for SinkConnectors and consumer policies SourceConnectors.  So,
from what I understand this new policy should work without any issues even
for Mirror Maker 2.0.
2. I have updated the KIP to use a default value of null and use that to
determine if we need to ignore overrides.
3. I would still prefer to keep the special
PrincipalConnectorClientConfigPolicy
since that is one of the most common use cases one would choose to use this
feature. If we make it a general case, that would involve users requiring
to add additional configuration and they might require well more than just
the list of configs but might also want some restriction on values. If the
concern is about users wanting principal and also other configs, it would
still be possible by means of a custom implementation. As is, I would
prefer to keep the proposal to be the same for this. Let me know your
thoughts.

Thanks,
Magesh


On Mon, Apr 22, 2019 at 3:44 PM Chris Egerton <chr...@confluent.io> wrote:

> Hi Magesh,
>
> This is an exciting KIP! I have a few questions/comments but overall I like
> the direction it's headed in and hope to see it included in the Connect
> framework soon.
>
> 1. With the proposed "consumer.", "producer.", and "admin." prefixes, how
> will this interact with connectors such as the upcoming Mirror Maker 2.0
> (KIP-382) that already support properties with those prefixes? Would it be
> possible for a user to configure MM2 with those properties without them
> being interpreted as Connect client overrides, without isolating MM2 onto
> its own cluster and using the IgnoreConnectorClientConfigPolicy policy?
> 2. Is the IgnoreConnectorClientConfigPolicy class necessary? The default
> for the connector.client.config.policy property could simply be null
> instead of a new policy that, as far as I can tell, isn't an actual policy
> in that its validate(...) method is never invoked and instead represents a
> special case to the Connect framework that says "Drop all overrides and
> never use me".
> 3. The PrincipalConnectorClientConfigPolicy seems like a specific instance
> of a more general use case: allow exactly a small set of overrides and no
> others. Why not generalize here and create a policy that accepts a list of
> allowed overrides during configuration?
>
> Thanks again for the KIP.
>
> Cheers,
>
> Chris
>
> On Fri, Apr 19, 2019 at 2:53 PM Magesh Nandakumar <mage...@confluent.io>
> wrote:
>
> > Hi all,
> >
> > I've posted "KIP-458: Connector Client Config Override Policy", which
> > allows users to override the connector client configurations based on a
> > policy defined by the administrator.
> >
> > The KIP can be found at
> >
> >
> https://cwiki.apache.org/confluence/display/KAFKA/KIP-458%3A+Connector+Client+Config+Override+Policy
> > .
> >
> > Looking forward for the discussion on the KIP and all of your thoughts &
> > feedback on this enhancement to Connect.
> >
> > Thanks,
> > Magesh
> >
>

Reply via email to