Property | Description |
---|---|
Runtime Environment | Name of the runtime environment where you want to run tasks. Specify a Secure Agent or a serverless runtime environment for a mapping that runs on the advanced cluster. |
Kafka Broker List | Comma-separated list of the Kafka brokers. To list a Kafka broker, use the following format: <HostName>:<PortNumber> Note: When you connect to a Kafka broker over SSL, you must specify the fully qualified domain name for the host name. Otherwise, the test connection fails with SSL handshake error. |
Retry Timeout | Optional. Number of seconds after which the Secure Agent attempts to reconnect to the Kafka broker to read or write data. Default is 180 seconds. |
Kafka Broker Version | Kafka message broker version. The only valid value is Apache 0.10.1.1 and above. |
Additional Connection Properties | Optional. Comma-separated list of additional configuration properties of the Kafka producer or consumer. For a streaming ingestion and replication task, ensure that you set the <kerberos name> property if you configure <Security Protocol> as SASL_PLAINTEXT or SASL_SSL. For a database ingestion and replication task, if you want to specify a security protocol and properties, specify them here instead of in the Additional Security Properties property. For example: security.protocol=SSL,ssl.truststore.location=/opt/kafka/config/kafka.truststore.jks,ssl.truststore.password=<trustore_password>. |
Property | Description |
---|---|
Schema Registry URL | Specify a URL to access the schema registry. The URL syntax is http://host1:port1. |
Confluent Cloud API Key | An API key to manage access and authentication to Confluent Cloud. |
Confluent Cloud API Secret | An API secret for the Confluent Cloud API key. |
Confluent Cloud Schema Registry API Key | An API key to interact with schema registry in Confluent Cloud. |
Confluent Cloud Schema Registry API Secret | An API secret for the Confluent Cloud schema registry API key. |
Parameter | Description |
---|---|
Polling Strategy | Select one of the following polling strategies for sampling messages:
|