Channel Revision Published Runs on
3/stable 156 27 Feb 2024
Ubuntu 22.04
3/candidate 156 27 Feb 2024
Ubuntu 22.04
3/beta 156 27 Feb 2024
Ubuntu 22.04
3/edge 177 19 Jul 2024
Ubuntu 22.04
juju deploy kafka --channel 3/stable
Show information



How to manage related applications

Relations to new applications are supported via the “kafka_client” interface.

Within juju via kafka_client interface

If the charm supports the kafka_client interface, just create a relation between the two charms:

juju relate kafka application

To remove a relation:

juju remove-relation kafka application

Outside juju or for charms not implementing kafka_client

The kafka_client interface is used with the data-integrator charm. This charm allows to automatically create and manage product credentials needed to authenticate with different kinds of data platform charmed products:

Deploy the data-integrator charm with the desired topic-name and user roles:

juju deploy data-integrator --channel edge
juju config data-integrator topic-name=test-topic extra-user-roles=producer,consumer

Relate the two applications with:

juju relate data-integrator kafka

To retrieve information, enter:

juju run data-integrator/leader get-credentials

This should output something like:

  consumer-group-prefix: relation-27-
  password: ejMp4SblzxkMCF0yUXjaspneflXqcyXK
  tls: disabled
  username: relation-27
ok: "True"

Password rotation

External clients

With client application downtime

The easiest way to rotate user credentials of client applications is by removing and then re-relating the application (either a charm supporting the kafka-client interface or a data-integrator) with the kafka charm

juju remove-relation kafka <charm-or-data-integrator>
# wait for the relation to be torn down 
juju relate kafka <charm-or-data-integrator>

The successful credential rotation can be confirmed by retrieving the new password with the action get-credentials.

Without client application downtime

In some use-cases credentials should be rotated with no or limited application downtime. If credentials should be rotated with no or limited downtine, you can deploy a new charm with the same permissions and resource definition, e.g.

juju deploy data-integrator rotated-user --channel stable \
  --config topic-name=test-topic --config extra-user-roles=admin

The data-integrator charm can then be related to the kafka charm to create a new user

juju relate kafka rotated-user

At this point, we effectively have two overlapping users, therefore allowing applications to swap the password from one to another. If the applications consist of fleets of independent producers and consumers, user credentials can be rotated progressively across fleets, such that no effective downtime is achieved.

Once all applications have rotated their credentials, it is then safe to remove data first data-integrator charm

juju remove-application data-integrator

Internal Password rotation

The operator user is used internally by the Charmed Kafka Operator, the set-password action can be used to rotate its password.

# to set a specific password for the operator user
juju run kafka/leader set-password password=<password>

# to randomly generate a password for the operator user
juju run kafka/leader set-password

Help improve this document in the forum (guidelines). Last updated 4 months ago.