When creating this type of connector, you need to define values for the following settings:
Basic settings tab:
Name (required)—a unique name for this type of resource. Must contain 1 to 128 Unicode characters.
Tenant (required)—name of the tenant that owns the resource.
Type (required)—connector type, kafka.
URL—URL that you need to connect to. Available formats: hostname:port, IPv4:port, IPv6:port.
Topic—subject of Kafka messages. Must contain from 1 to 255 of the following characters: a–z, A–Z, 0–9, ".", "_", "-".
Authorization—requirement for Agents to complete authorization when connecting to the connector:
disabled (by default).
PFX.
When this option is selected, a certificate must be generated with a private key in PKCS#12 container format in an external Certificate Authority. Then the certificate must be exported from the key store and uploaded to the KUMA Console as a PFX secret.
In the User and Password fields, enter the credentials of the user account that the Agent will use to connect to the connector.
If necessary, enter a description of the secret in the Description field.
Click the Create button.
The secret is added and displayed in the Secret drop-down list.
GroupID—the GroupID parameter for Kafka messages. Must contain from 1 to 255 of the following characters: a–z, A–Z, 0–9, ".", "_", "-".
Description—resource description: up to 4,000 Unicode characters.
Advanced settings tab:
Size of message to fetch—should be specified in bytes. The default value is 16 MB.
Maximum fetch wait time—timeout for a message of the defined size. The default value is 5 seconds.
Character encoding setting specifies character encoding. The default value is UTF-8.
TLS mode specifies whether TLS encryption is used:
Disabled (default)—do not use TLS encryption.
Enabled—use encryption without certificate verification.
With verification—use encryption with verification that the certificate was signed with the KUMA root certificate. The root certificate and key of KUMA are created automatically during program installation and are stored on the KUMA Core server in the folder /opt/kaspersky/kuma/core/certificates/.
Custom CA—use encryption with verification that the certificate was signed by a Certificate Authority. The secret containing the certificate is selected from the Custom CA drop-down list, which is displayed when this option is selected.
You can create a CA-signed certificate on the KUMA Core server (the following command examples use OpenSSL).
To create a certificate signed by a Certificate Authority:
Generate a key to be used by the Certificate Authority, for example:
openssl genrsa -out ca.key 2048
Create a certificate for the generated key, for example:
openssl req -new -x509 -days 365 -key ca.key -subj "/CN=<common host name of Certificate Authority>" -out ca.crt
Create a private key and a request to have it signed by the Certificate Authority, for example:
openssl req -newkey rsa:2048 -nodes -keyout server.key -subj "/CN=<common host name of KUMA server>" -out server.csr
Create the certificate signed by the Certificate Authority. You need to include the domain names or IP addresses of the server for which you are creating the certificate in the subjectAltName variable, for example:
Upload the created server.crt certificate in the KUMA Console to a secret of the certificate type, then in the Custom CA drop-down list, select the secret of the certificate type.
When using TLS, it is impossible to specify an IP address as a URL.
To use KUMA certificates on third-party devices, you must change the certificate file extension from CERT to CRT. Otherwise, error x509: certificate signed by unknown authority may be returned.
Debug—a toggle switch that lets you specify whether resource logging must be enabled. By default, this toggle switch is in the Disabled position.