- Newest
- Most votes
- Most comments
To address your questions about configuring SSL client authentication with keystores and custom truststores for MSK Connect:
Unfortunately, MSK Connect does not currently support providing custom keystores or truststores for Kafka connections that require mTLS/SSL authentication. The "ssl." properties that you're trying to use in your connector configuration are not supported within the MSK Connect worker configuration.
Amazon MSK itself uses AWS Certificate Manager (ACM) certificates for its broker authentication, and any truststore that trusts Amazon Trust Services should also trust MSK brokers. However, when connecting to external Kafka clusters that require client certificate authentication, MSK Connect has limitations.
For Amazon MSK clusters, client authentication can be enabled using mutual TLS, which requires an AWS Private CA. The client would need to present a certificate signed by this CA during the TLS handshake. However, this is for clients connecting to MSK clusters, not for MSK Connect acting as a client to external clusters.
The error you're experiencing with the SSL handshake exception is likely because MSK Connect cannot use the custom keystore and truststore configurations you're trying to provide.
As an alternative approach, you might need to:
- Consider using a different solution for connecting to your external Kafka cluster that requires mTLS, such as setting up a self-managed Kafka Connect cluster on EC2 where you have full control over the SSL configuration.
- If possible, modify the authentication requirements of your external Kafka cluster to support other authentication methods that are compatible with MSK Connect.
Unfortunately, there isn't currently a way to override the truststore location or provide custom keystores for MSK Connect when connecting to external Kafka clusters requiring mTLS.
Sources
Mutual TLS client authentication for Amazon MSK - Amazon Managed Streaming for Apache Kafka
Configuring MSK Connect worker to pass SSL certs | AWS re:Post
Relevant content
- asked 3 years ago
- asked 4 years ago