These docs are for Cribl Edge 4.2 and are no longer actively maintained.
See the latest version (4.13).
Confluent Cloud
Cribl Edge supports sending data to Kafka topics on the Confluent Cloud managed Kafka platform.
Type: Streaming | TLS Support: Configurable | PQ Support: Yes
Confluent Cloud uses a binary protocol over TCP. It does not support HTTP proxies, so Cribl Edge must send events directly to receivers. You might need to adjust your firewall rules to allow this traffic.
Sending Kafka Topic Data to Confluent Cloud
From the top nav, click Manage, then select a Fleet to configure. Next, you have two options:
To configure via the graphical QuickConnect UI, click Routing > QuickConnect (Stream) or Collect (Edge). Next, click Add Destination at right. From the resulting drawer’s tiles, select Confluent Cloud. Next, click either Add Destination or (if displayed) Select Existing. The resulting drawer will provide the options below.
Or, to configure via the Routing UI, click Data > Destinations (Stream) or More > Destinations (Edge). From the resulting page’s tiles or the Destinations left nav, select Confluent Cloud. Next, click Add Destination to open a New Destination modal that provides the options below.
General Settings
Output ID: Enter a unique name to identify this Destination definition.
Brokers: List of Confluent Cloud brokers to connect to. (E.g., myAccount.confluent.cloud:9092
.)
Topic: The topic on which to publish events. Can be overwritten using event’s __topicOut
field.
Optional Settings
Acknowledgments: Select the number of required acknowledgments. Defaults to Leader
.
Record data format: Format to use to serialize events before writing to Kafka. Defaults to JSON
.
Compression: Codec to use to compress the data before sending to Kafka. Select None
, Gzip
, Snappy
, or LZ4
. Defaults to Gzip
.
Backpressure behavior: Select whether to block, drop, or queue incoming events when all receivers are exerting backpressure. Defaults to Block
.
Tags: Optionally, add tags that you can use to filter and group Destinations in Cribl Edge’s Manage Destinations page. These tags aren’t added to processed events. Use a tab or hard return between (arbitrary) tag names.
Persistent Queue Settings
This tab is displayed when the Backpressure behavior is set to Persistent Queue.
On Cribl-managed Cribl.Cloud Workers (with an Enterprise plan), this tab exposes only the Clear Persistent Queue button. A maximum queue size of 1 GB disk space is automatically allocated per Worker Process. If the queue fills up, Cribl Edge will block outbound data.
Max file size: The maximum data volume to store in each queue file before closing it. Enter a numeral with units of KB, MB, etc. Defaults to 1 MB
.
Max queue size: The maximum amount of disk space the queue is allowed to consume. Once this limit is reached, queueing is stopped and data blocking is applied. Enter a numeral with units of KB, MB, etc.
Queue file path: The location for the persistent queue files. This will be of the form: your/path/here/<worker‑id>/<output‑id>
. Defaults to: $CRIBL_HOME/state/queues
.
Compression: Codec to use to compress the persisted data, once a file is closed. Defaults to None
; Gzip
, Snappy
, and LZ4
are also available.
Cribl strongly recommends enabling compression. Doing so improves Cribl Edge’s performance, enabling faster data transfer using less bandwidth.
Queue-full behavior: Whether to block or drop events when the queue is exerting backpressure (because disk is low or at full capacity). Block is the same behavior as non-PQ blocking, corresponding to the Block option on the Backpressure behavior drop-down. Drop new data throws away incoming data, while leaving the contents of the PQ unchanged.
Clear persistent queue: Click this button if you want to flush out files that are currently queued for delivery to this Destination. A confirmation modal will appear. (Appears only after Output ID has been defined.)
Strict ordering: The default Yes
position enables FIFO (first in, first out) event forwarding. When receivers recover, Cribl Edge will send earlier queued events before forwarding newly arrived events. To instead prioritize new events before draining the queue, toggle this off. Doing so will expose this additional control:
- Drain rate limit (EPS): Optionally, set a throttling rate (in events per second) on writing from the queue to receivers. (The default
0
value disables throttling.) Throttling the queue’s drain rate can boost the throughput of new/active connections, by reserving more resources for them. You can further optimize Workers’ startup connections and CPU load at Fleet Settings > Worker Processes.
Calculating the Time PQ Will Take to Engage
PQ will not engage until Cribl Edge has exhausted all attempts to send events to the Kafka receiver. This can take several minutes if requests continue to fail or time out.
To calculate the longest possible time this can take, multiply the values of Advanced Settings > Request timeout and Max retries. For the default values (60
seconds and 5
, respectively), this would be 60
seconds times 5
retries = 300 seconds, or 5 minutes.
TLS Settings (Client Side)
Enabled When toggled to Yes
(the default):
Autofill?: This setting is experimental.
Validate server certs: Toggle to Yes
to reject certificates that are not authorized by a CA in the CA certificate path, nor by another trusted CA (e.g., the system’s CA).
Server name (SNI): Server name for the SNI (Server Name Indication) TLS extension. This must be a host name, not an IP address.
With a dedicated Confluent Cloud cluster hosted in Microsoft Azure, be sure to specify the Server name (SNI). If this is omitted, Confluent Cloud might reset the connection to Cribl Edge.
Minimum TLS version: Optionally, select the minimum TLS version to use when connecting.
Maximum TLS version: Optionally, select the maximum TLS version to use when connecting.
Certificate name: The name of the predefined certificate.
CA certificate path: Path on client containing CA certificates (in PEM format) to use to verify the server’s cert. Path can reference $ENV_VARS
.
Private key path (mutual auth): Path on client containing the private key (in PEM format) to use. Path can reference $ENV_VARS
. Use only if mutual auth is required.
Certificate path (mutual auth): Path on client containing certificates in (PEM format) to use. Path can reference $ENV_VARS
. Use only if mutual auth is required.
Passphrase: Passphrase to use to decrypt private key.
Authentication
This section documents the SASL (Simple Authentication and Security Layer) authentication settings to use when connecting to brokers. Using TLS is highly recommended.
Enabled: Defaults to No
. When toggled to Yes
:
- SASL mechanism: Select the SASL (Simple Authentication and Security Layer) authentication mechanism to use. Defaults to
PLAIN
.SCRAM‑SHA‑256
andSCRAM‑SHA‑512
are also available.
PLAIN, SCRAM-256, or SCRAM-512
With any of these SASL mechanisms, select one of the following buttons:
Manual: Displays Username and Password fields to enter your Kafka credentials directly.
Secret: This option exposes a Credentials secret drop-down in which you can select a stored text secret that references your Kafka credentials. A Create link is available to store a new, reusable secret.
GSSAPI/Kerberos
Selecting Kerberos as the authentication mechanism displays the following options:
Keytab location: Enter the location of the keytab file for the authentication principal.
Principal: Enter the authentication principal, e.g.: kafka_user@example.com
.
Broker service class: Enter the Kerberos service class for Kafka brokers, e.g.: kafka
.
You will also need to set up your environment and configure the Cribl Stream host for use with Kerberos. See Kafka Authentication with Kerberos for further detail.
Schema Registry
This section governs Kafka Schema Registry Authentication for Avro-encoded data with a schema stored in the Confluent Schema Registry.
Enabled: Defaults to No
. When toggled to Yes
, displays the following controls:
Schema registry URL: URL for access to the Confluent Schema Registry. (E.g., http://localhost:8081
.)
Default key schema ID: Used when __keySchemaIdOut
is not present to transform key values. Leave blank if key transformation is not required by default.
Default value schema ID: Used when __valueSchemaIdOut
not present to transform _raw
. Leave blank if value transformation is not required by default.
TLS enabled: defaults to No
. When toggled to Yes,
displays the following TLS settings for the Schema Registry (in the same format as the TLS Settings (Client Side) above):
Validate server certs: Require client to reject any connection that is not authorized by a CA in the CA certificate path, or by another trusted CA (e.g., the system’s CA). Defaults to No.
Server name (SNI): Server name for the SNI (Server Name Indication) TLS extension. This must be a host name, not an IP address.
With a dedicated Confluent Cloud cluster hosted in Microsoft Azure, be sure to specify the Server name (SNI). If this is omitted, Confluent Cloud might reset the connection to Cribl Edge.
Minimum TLS version: Optionally, select the minimum TLS version to use when connecting.
Maximum TLS version: Optionally, select the maximum TLS version to use when connecting.
Certificate name: The name of the predefined certificate.
CA certificate path: Path on client containing CA certificates (in PEM format) to use to verify the server’s cert. Path can reference
$ENV_VARS
.Private key path (mutual auth): Path on client containing the private key (in PEM format) to use. Path can reference
$ENV_VARS
. Use only if mutual auth is required.Certificate path (mutual auth): Path on client containing certificates in (PEM format) to use. Path can reference
$ENV_VARS
. Use only if mutual auth is required.Passphrase: Passphrase to use to decrypt private key.
Processing Settings
Post‑Processing
In this section’s Pipeline drop-down list, you can select a single existing Pipeline to process data before it is sent through this output.
System fields: A list of fields to automatically add to events that use this output. By default, includes cribl_pipe
(identifying the Cribl Edge Pipeline that processed the event). Supports wildcards. Other options include:
cribl_host
– Cribl Edge Node that processed the event.cribl_input
– Cribl Edge Source that processed the event.cribl_output
– Cribl Edge Destination that processed the event.cribl_route
– Cribl Edge Route (or QuickConnect) that processed the event.cribl_wp
– Cribl Edge Worker Process that processed the event.
Advanced Settings
Max record size (KB, uncompressed): Maximum size (KB) of each record batch before compression. Setting should be < message.max.bytes settings
in Kafka brokers. Defaults to 768
.
Max events per batch: Maximum number of events in a batch before forcing a flush. Defaults to 1000
.
Flush period (sec): Maximum time between requests. Low values could cause the payload size to be smaller than its configured maximum. Defaults to 1
.
Connection timeout (ms): Maximum time to wait for a successful connection. Defaults to 10000
ms (10 seconds). Valid range is 1000
to 3600000
ms (1 second to 1 hour).
Request timeout (ms): Maximum time to wait for a successful request. Defaults to 60000
ms (1 minute).
Max retries: Maximum number of times to retry a failed request before the message fails. Defaults to 5
; enter 0
to not retry at all.
Authentication timeout (ms): Maximum time to wait for Kafka to respond to an authentication request. Defaults to 1000
(1 second).
Reauthentication threshold (ms): If the broker requires periodic reauthentication, this setting defines how long before the reauthentication timeout Cribl Edge initiates the reauthentication. Defaults to 10000
(10 seconds).
A small value for this setting, combined with high network latency, might prevent the Destination from reauthenticating before the Kafka broker closes the connection.
A large value might cause the Destination to send reauthentication messages too soon, wasting bandwidth.
The Kafka setting connections.max.reauth.ms
controls the reuthentication threshold on the Kafka side.
Environment: If you’re using GitOps, optionally use this field to specify a single Git branch on which to enable this configuration. If empty, the config will be enabled everywhere.
Internal Fields
Cribl Edge uses a set of internal fields to assist in forwarding data to a Destination.
Fields for this Destination:
__topicOut
__key
__headers
__keySchemaIdOut
__valueSchemaIdOut