You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@flume.apache.org by rg...@apache.org on 2022/10/08 19:43:21 UTC
[flume-site] branch asf-staging updated: Add info about Kafka headers and timestamp
This is an automated email from the ASF dual-hosted git repository.
rgoers pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/flume-site.git
The following commit(s) were added to refs/heads/asf-staging by this push:
new 4ae3fb36 Add info about Kafka headers and timestamp
4ae3fb36 is described below
commit 4ae3fb36c00b5e0b19dc0ca67c6160c0676a31ba
Author: Ralph Goers <rg...@apache.org>
AuthorDate: Sat Oct 8 12:43:13 2022 -0700
Add info about Kafka headers and timestamp
---
source/sphinx/FlumeUserGuide.rst | 8 ++++++++
source/sphinx/security.rst | 2 +-
2 files changed, 9 insertions(+), 1 deletion(-)
diff --git a/source/sphinx/FlumeUserGuide.rst b/source/sphinx/FlumeUserGuide.rst
index b0dcf928..45632aa0 100644
--- a/source/sphinx/FlumeUserGuide.rst
+++ b/source/sphinx/FlumeUserGuide.rst
@@ -1814,6 +1814,10 @@ topicHeader topic Defines the name of the header
from, if the ``setTopicHeader`` property is set to ``true``. Care should be taken if combining
with the Kafka Sink ``topicHeader`` property so as to avoid sending the message back to the same
topic in a loop.
+timestampHeader -- If present the Kafka message timestamp value will be copied into the specified Flume header name.
+header.NAME -- Used to identify which headers from the Kafka message should be added as a FLume header. The value
+ of NAME should match the Flume header name and the value should be the name of the header to be used
+ as the Kafka header name.
kafka.consumer.security.protocol PLAINTEXT Set to SASL_PLAINTEXT, SASL_SSL or SSL if writing to Kafka using some level of security. See below for additional info on secure setup.
*more consumer security props* If using SASL_PLAINTEXT, SASL_SSL or SSL refer to `Kafka security <http://kafka.apache.org/documentation.html#security>`_ for additional
properties that need to be set on consumer.
@@ -3441,6 +3445,10 @@ partitionIdHeader -- When set, the sink will
allowTopicOverride true When set, the sink will allow a message to be produced into a topic specified by the ``topicHeader`` property (if provided).
topicHeader topic When set in conjunction with ``allowTopicOverride`` will produce a message into the value of the header named using the value of this property.
Care should be taken when using in conjunction with the Kafka Source ``topicHeader`` property to avoid creating a loopback.
+timestampHeader -- The header containing the caller provided timestamp value to use. If not provided the current time will
+ be used.
+header.NAME -- Used to identify which headers from the Flume Event should be passed to Kafka. The value of NAME should match
+ the Flume header name and the value should be the name of the header to be used as the Kafka header name.
kafka.producer.security.protocol PLAINTEXT Set to SASL_PLAINTEXT, SASL_SSL or SSL if writing to Kafka using some level of security. See below for additional info on secure setup.
*more producer security props* If using SASL_PLAINTEXT, SASL_SSL or SSL refer to `Kafka security <http://kafka.apache.org/documentation.html#security>`_ for additional
properties that need to be set on producer.
diff --git a/source/sphinx/security.rst b/source/sphinx/security.rst
index ee4ca840..be6fae26 100644
--- a/source/sphinx/security.rst
+++ b/source/sphinx/security.rst
@@ -15,7 +15,7 @@ If you have encountered an unlisted security vulnerability or other unexpected b
`CVE-2022-34916 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916>`__: Apache Flume vulnerable to a JNDI RCE in JMSMessageConsumer.
+------------------------------------------------------------------------------------+--------------------------------------------------------------------------+
-| `CVE-2022-25167 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916>`__ | Deserialization of Untrusted Data |
+| `CVE-2022-34916 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916>`__ | Deserialization of Untrusted Data |
+====================================================================================+==========================================================================+
| Severity | Moderate |
+------------------------------------------------------------------------------------+--------------------------------------------------------------------------+