Skip to main content

Security

Files are re-assembled at the sink connector as-is: the streamed files in the sink-connector "merged" directory are identical to the files in the source-connector files.dir directory. The files selected for upload can be of any format (including any binary format): for example they can be compressed (.gz, .zip etc) or encrypted. Topic messages (file chunks) may be optionally encrypted by setting SSL/TLS based configuration for the source and sink connectors. Authentication and Encryption properties (using security.protocol & sasl.mechanism) must be identical for the Kafka Connect servers hosting the source and sink connectors.

The File Chunk Connectors support all Kafka Connect communication protocols, including communication with secure Kafka over TLS/SSL as well as TLS/SSL or SASL for authentication.

Security Goalusing this encryptionand this authconfigure this security.protocoland this sasl.mechanismComments
no encryption or authnonenoneunsetunsetUse for dev only
username/password, no encryptionPlaintextSASLSASL_PLAINTEXTunsetNot recommended (insecure)
username/password, traffic encryptedTLS/SSLSASLSASL_SSLPLAINUse for Confluent Cloud
Kerberos (GSSAPI)TLS/SSLKerberosSASL_SSLGSSAPI
SASL SCRAMTLS/SSLSCRAMSASL_SSLSCRAM-SHA-256

To connect to Confluent Cloud, the file chunk connectors must use SASL_SSL & PLAIN. Although Confluent Cloud also supports OAUTH authorisation (CP 7.2.1 or later), OAUTH is not yet supported for self-managed Kafka Connect clusters.