Integrating with Apache Kafka
To send BMC AMI OpsA events and alerts to Apache Kafka, complete the steps in Configuring CRA to connect to Apache Kafka secured with SSL or SSL_SASL. To configure BiiZ and create a GME connection with Apache Kafka. complete the following.
Edit BBPARM member AAOGME00 and specify values for the following parameters:
Parameter | Value to specify |
---|---|
TGTIP | Connection name |
TGTBIMCF | BBPARM member IIMRSTxx, which is the configuration member for the REST API |
TGTTYPE | RESTAPI value |
Edit BBPARM member IMRSTxx and specify values for the following parameters:
Parameter | Value to specify | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Server_event_url | (Required) Server URL including the HTTP/HTTPS part of the address This is used as the URL displayed only when issuing the .D GME command. You must set the actual URL in IIMDICKF. | ||||||||||||||||||||||
Curl_path | (Required) Full path name, including the cURL command to be used to send the events For example, /usr/bin/curl. | ||||||||||||||||||||||
Curl_parms | (Optional) Specify the cURL parameters The default value is --insecure --connect-timeout 10 --use-ascii. | ||||||||||||||||||||||
Dictionary | (Required) The dictionary file that can rename key and slot names, and set environmental variables such as user ID and password Enter the value DD:BBIPARM(IIMDICFK). Copy this member from BBPARM to UBBPARM and specify the following parameters:
To override these variables in a BMC AMI OpsA Rule or EXEC, you can specify IIMDIC_<variableName> in one of the event or ALERT slots. For example: | ||||||||||||||||||||||
Format | (Required) Specify the format file that can re-format the REST API request sent by this connection Enter the value DD:BBIPARM(IIMFRMFK). Copy this member from BBPARM to UBBPARM. |
Configuring CRA to connect to Apache Kafka secured with SSL or SSL_SASL
To send BMC AMI OpsA events to Apache Kafka that is secured with Secure Sockets Layer (SSL) or Simple Authentication and Security Layer (SASL_SSL), set the following properties in your CRA environment file. The location of this file is specified in the job that starts the CRA. For more information, see Setting up CRA to work as a stand-alone server.
Apache Kafka property | Required for Kafka with SSL or SASL_SSL | Description |
---|---|---|
kafka.security.protocol=[SSL | SASL_SSL] | SSL and SASL_SSL | Specify whether the CRA will use SSL or SASL_SSL parameters If your connection to Kafka is not secured, leave all the values in this table blank. |
kafka.ssl.protocol=[TLSv1.2,TLSv1.1,TLSv1] | SSL and SASL_SSL | Specify the SSL protocol version You can specify more than one separated by commas. |
kafka.ssl.producer.truststore.location=[yourSSLProducerTruststoreFileLocationFullPathName] | SSL and SASL_SSL | Specify the full path name of your producer truststore file |
kafka.ssl.producer.truststore.password=[yourSSLProducerTruststorePassword] | SSL and SASL_SSL | Specify your producer truststore password |
kafka.ssl.producer.keystore.location=[yourSSLProducerKeystoreFileLocationFullPathName] | SSL and SASL_SSL | Specify the full path name of your producer keystore file |
kafka.ssl.producer.keystore.password=[yourSSLProducerKeystorePassword] | SSL and SASL_SSL | Specify your producer keystore password |
kafka.ssl.producer.key.password=[yourSSLProducerKeyPassword] | SSL and SASL_SSL | Specify your producer key password |
kafka.sasl.producer.user.name=[yourSASLProducerUserName] | SASL_SSL | If your Kafka is using SASL_SSL mode, specify a producer user that will produce events |
kafka.sasl.producer.password=[yourSASLProducerPassword] | SASL_SSL | If your Kafka is using SASL_SSL mode, specify the producer user password |
kafka.sasl.mechanism=[SCRAM-SHA-512 | SCRAM-SHA-256] | SASL_SSL | If your Kafka is using SASL_SSL mode, specify the mechanism mode The common mechanism modes are SCRAM-SHA-512 or SCRAM-SHA-256. |