Both TLS encrypted and plaintext traffic allowed
View client information
to see the Zookeeper and Kafka Broker list.SecurityGroup
from the Cluster page, in the above demo, it's sg-01e7ab1320a77f1a9
.SecurityGroups
on left bar. Find the EKS Security group: eksctl-${PINOT_EKS_CLUSTER}-cluster/ClusterSharedNodeSecurityGroup.
sg-01e7ab1320a77f1a9
), then Click on Edit Rules
, then add above ClusterSharedNodeSecurityGroup
(sg-0402b59d7e440f8d1
) to it.ClusterSharedNodeSecurityGroup
(sg-0402b59d7e440f8d1
), add In bound Rule for MSK Security Group (sg-01e7ab1320a77f1a9
).ZOOKEEPER_CONNECT_STRING
and BROKER_LIST_STRING
(Use plaintext) from Amazon MSK client information, and replace the Variables accordingly.wget
then download Kafka binary.${ZOOKEEPER_CONNECT_STRING}
-> MSK Zookeeper String${BROKER_LIST_STRING}
-> MSK Plaintext Broker String in the deployment${GITHUB_PERSONAL_ACCESS_TOKEN}
-> A personal Github Personal Access Token generated from here, please grant all read permissions to it. Here is the source code to generate Github Events.pinot-github-events-data-into-msk-kafka
pod to execute the command.