Add a Kafka Consumer

1. Go to Listener > Kafka Consumer then click the Add (+) button located in the upper right corner.

2. You will get the fields as follows.

Refer to the following table to understand the fields in the above screen.

FieldsDescription

Name

This field only appears when enabled Advanced Settings is active.

A label or name that is assigned to a listener.

Trigger

This field only appears when enabled Advanced Settings is active.

You may want to assign the servers to a custom Trigger if target server is in an Isolated network or if you want to setup a scalable infrastructure. You will only see available Triggers in this field.

IP Address

The numerical label assigned to each device connected to a computer network is called an "IP address." An IP address is typically represented in the format XXX.XXX.XXX.XX, where each "XXX" is a number ranging from 0 to 255, and the "XX" is a similar two-digit number. IP addresses are used to uniquely identify and locate devices on a network.

Port Number

A specific endpoint for data exchange between two devices or applications within a network.

Credential Type

Select a proper credential type and credential.

· None

· Basic: Selecting this option provides you with another Field called Credential from where you can select an appropriate option.

Username

Username for login redis

Partition

A Kafka partition is a portion of a topic's log, serving as the unit of parallelism and enabling distributed data storage and processing across multiple consumers within a consumer group.

Topic

A Kafka topic is a logical channel or category where messages are published by producers and consumed by subscribers, organizing related streams of data.

Algorithm

Choose appropriate Algorithm.

· SHA256: SHA256 is a cryptographic hash function that generates a 256-bit (32-byte) hash value, widely used in security applications to ensure data integrity and verification.

· SHA512: SHA512 is a cryptographic hash function that produces a 512-bit (64-byte) hash value, offering a higher level of security and resistance against brute-force attacks compared to shorter hash functions like SHA256.

Log Interval

The interval for fetching data.

· Realtime

· 1 Minute

· 3 Minutes

· 5 Minutes

Status

To choose a server status such as:

· Active: Enables monitoring for server

· Maintenance: Enables maintenance mode for server and disables all notifications

· Reconnect: Restarts all collectors for server

· Disabled: Disables monitoring for server

Debug

To choose debug such as:

· Off

· On: Collects debug logs for Inventory and Monitoring Collector

3. After entering all the required info, click the button SUBMIT.

Last updated