RabbitMQ
Available when using an authoring Data Collector version 4.1.0 or later.
To create a RabbitMQ connection, the RabbitMQ stage library,
streamsets-datacollector-rabbitmq-lib
, must be installed on the
selected authoring Data Collector.
For a description of the RabbitMQ connection properties, see RabbitMQ Connection Properties.
After you create a RabbitMQ connection, you can use the connection in the following stages:
Engine | Stages |
---|---|
Data Collector 4.1.0 or later |
|
RabbitMQ Connection Properties
RabbitMQ Property | Description |
---|---|
URI | RabbitMQ URI. Typically uses the following format:
|
Use Credentials | Enables the use of RabbitMQ credentials. |
Credentials Property | Description |
---|---|
Username | RabbitMQ user name. |
Password | Password for the account. Tip: To secure sensitive
information, you can use credential stores or runtime
resources. |
TLS Property | Description |
---|---|
Use TLS | Enables the use of TLS. |
Use Remote Keystore | Enables loading the contents of the
keystore from a remote credential store or from values entered
in the stage properties.
For more information, see Remote Keystore and Truststore. |
Private Key | Private key used in the remote keystore.
Enter a credential function that returns the key or enter the
contents of the key. For more information about credential functions, see Credential Functions. |
Certificate Chain | Each PEM certificate used in the remote
keystore. Enter a credential function that returns the
certificate or enter the contents of the certificate. Using simple or bulk edit mode, click the Add icon to add additional certificates. For more information about credential functions, see Credential Functions. |
Keystore File | Path to the local keystore file. Enter
an absolute path to the file or enter the following expression
to define the file stored in the Data Collector
resources directory:
${runtime:resourcesDirPath()}/keystore.jks By default, no keystore is used. |
Keystore Password | Password to the keystore file. A
password is optional, but recommended. Tip: To secure sensitive
information, you can use credential stores or runtime resources.
|
Keystore Key Algorithm | Algorithm to manage the
keystore.
Default is SunX509. |
Use Remote Truststore | Enables loading the contents of the
truststore from a remote credential store or from values entered
in the stage properties. For more information, see Remote Keystore and Truststore. |
Trusted Certificates | Each PEM certificate used in the remote truststore. Enter a
credential function that returns the certificate or enter the
contents of the certificate. Using simple or bulk edit mode, click the Add icon to add additional certificates. |
Truststore File | Path to the local truststore file.
Enter an absolute path to the file or enter the following
expression to define the file stored in the Data Collector
resources directory:
${runtime:resourcesDirPath()}/truststore.jks By default, no truststore is used. |
Truststore Type | Type of truststore to use. Use one of the following types:
Default is Java Keystore File (JKS). |
Truststore Password | Password to the truststore file. A
password is optional, but recommended. Tip: To secure sensitive
information, you can use credential stores or runtime resources.
|
Truststore Trust Algorithm | Algorithm to manage the truststore. Default is SunX509. |
Use Default Protocols | Uses the default TLSv1.2 transport layer security (TLS) protocol. To use a different protocol, clear this option. |
Transport Protocols | TLS protocols to use. To use a protocol other than the default
TLSv1.2, click the Add icon and enter the
protocol name. You can use simple or bulk edit mode to add
protocols. Note: Older protocols are not as secure as
TLSv1.2. |
Cipher Suites | Uses a default cipher suite for the SSL/TLS handshake. To use a different cipher suite, clear this option. |
Cipher Suites | Cipher suites to use. To use a cipher suite that is not a part of
the default set, click the Add icon and enter
the name of the cipher suite. You can use simple or bulk edit mode
to add cipher suites. Enter the Java Secure Socket Extension (JSSE) name for the additional cipher suites that you want to use. |