githubEdit

Confluent Cloud Oauth 2.0 Example

New in Seldon Core 2.7.0

Seldon Core 2 can integrate with Confluent Cloud managed Kafka. In this example we use Oauth 2.0 security mechanismarrow-up-right.

Configure Identity Provider in Confluent Cloud Console

In your Confluent Cloud Console go to Account & Access / Identity providersarrow-up-right and register your Identity Provider.

See Confluent Cloud documentationarrow-up-right for further details.

Configure Identity Pool

In your Confluent Cloud Console go to Account & Access / Identity providersarrow-up-right and add new identity pool to your newly registered Identity Provider.

See Confluent Cloud documentationarrow-up-right for further details.

Create Kubernetes Secret

Seldon Core 2 expects oauth credentials to be in form of K8s secret

apiVersion: v1
kind: Secret
metadata:
  name: confluent-kafka-oauth
  namespace: seldon-mesh
type: Opaque
stringData:
  method: OIDC
  client_id: <client id>
  client_secret: <client secret>
  token_endpoint_url: <token endpoint url>
  extensions: logicalCluster=<cluster id>,identityPoolId=<identity pool id>
  scope: ""

You will need following information from Confluent Cloud:

  • Cluster ID: Cluster OverviewCluster SettingsGeneralIdentification

  • Identity Pool ID: Accounts & accessIdentity providers<specific provider details>

Client ID, client secret and token endpoint url should come from identity provider, e.g. Keycloak or Azure AD.

Configure Seldon Core 2

Configure Seldon Core 2 by setting following Helm values:

Note you may need to tweak replicationFactor and numPartitions to your cluster configuration.

Troubleshooting

  • First check Confluent Cloud documentationarrow-up-right.

  • Set the kafka config map debug setting to all. For Helm install you can set kafka.debug=all.

Last updated

Was this helpful?