Add a Kafka Consumer
Last updated
Last updated
1. Go to Listener > Kafka Consumer then click the Add (+) button located in the upper right corner.
2. You will get the fields as follows.
Refer to the following table to understand the fields in the above screen.
Fields | Description |
---|---|
Name | This field only appears when enabled Advanced Settings is active. A label or name that is assigned to a listener. |
Trigger | This field only appears when enabled Advanced Settings is active. You may want to assign the servers to a custom Trigger if target server is in an Isolated network or if you want to setup a scalable infrastructure. You will only see available Triggers in this field. |
IP Address | The numerical label assigned to each device connected to a computer network is called an "IP address." An IP address is typically represented in the format XXX.XXX.XXX.XX, where each "XXX" is a number ranging from 0 to 255, and the "XX" is a similar two-digit number. IP addresses are used to uniquely identify and locate devices on a network. |
Port Number | A specific endpoint for data exchange between two devices or applications within a network. |
Credential Type | Select a proper credential type and credential. · None · Basic: Selecting this option provides you with another Field called Credential from where you can select an appropriate option. |
Username | Username for login redis |
Partition | A Kafka partition is a portion of a topic's log, serving as the unit of parallelism and enabling distributed data storage and processing across multiple consumers within a consumer group. |
Topic | A Kafka topic is a logical channel or category where messages are published by producers and consumed by subscribers, organizing related streams of data. |
Algorithm | Choose appropriate Algorithm. · SHA256: SHA256 is a cryptographic hash function that generates a 256-bit (32-byte) hash value, widely used in security applications to ensure data integrity and verification. · SHA512: SHA512 is a cryptographic hash function that produces a 512-bit (64-byte) hash value, offering a higher level of security and resistance against brute-force attacks compared to shorter hash functions like SHA256. |
Log Interval | The interval for fetching data. · Realtime · 1 Minute · 3 Minutes · 5 Minutes |
Status | To choose a server status such as: · Active: Enables monitoring for server · Maintenance: Enables maintenance mode for server and disables all notifications · Reconnect: Restarts all collectors for server · Disabled: Disables monitoring for server |
Debug | To choose debug such as: · Off · On: Collects debug logs for Inventory and Monitoring Collector |
3. After entering all the required info, click the button SUBMIT.