Confluent Cloud Oauth 2.0 Example
New in Seldon Core 2.7.0
Seldon Core 2 can integrate with Confluent Cloud managed Kafka. In this example we use Oauth 2.0 security mechanism.
Configure Identity Provider in Confluent Cloud Console
In your Confluent Cloud Console go to Account & Access / Identity providers and register your Identity Provider.
See Confluent Cloud documentation for further details.
Configure Identity Pool
In your Confluent Cloud Console go to Account & Access / Identity providers and add new identity pool to your newly registered Identity Provider.
See Confluent Cloud documentation for further details.
Create Kubernetes Secret
Seldon Core 2 expects oauth credentials to be in form of K8s secret
You need the following information from Confluent Cloud:
Cluster ID:
Cluster Overview
→Cluster Settings
→General
→Identification
Identity Pool ID:
Accounts & access
→Identity providers
→<specific provider details>
Client ID, client secret and token endpoint url should come from identity provider, e.g. Keycloak or Azure AD.
Configure Seldon Core 2
Configure Seldon Core 2 by setting following Helm values:
Note you may need to tweak replicationFactor
and numPartitions
to your cluster configuration.
Troubleshooting
First check Confluent Cloud documentation.
Set the kafka config map debug setting to
all
. For Helm install you can setkafka.debug=all
.
Last updated