


Learn to use common Kafka commands and flexibly respond to various scenarios.
Essentials for learning Kafka: master common commands and easily cope with various scenarios
1. Create a Topic
bin/kafka-topics.sh --create --topic my-topic --partitions 3 --replication-factor 2
2. List Topic
bin/kafka-topics.sh --list
3. View Topic details
bin/kafka-topics.sh --describe --topic my-topic
4. Production message
bin/kafka-console-producer.sh --topic my-topic --message "Hello, Kafka!"
5. Consume messages
bin/kafka-console-consumer.sh --topic my-topic --from-beginning
6. Change the number of partitions
bin/kafka-topics.sh --alter --topic my-topic --partitions 5
7. Change Number of copies
bin/kafka-topics.sh --alter --topic my-topic --replication-factor 3
8. Delete Topic
bin/kafka-topics.sh --delete --topic my-topic
9. Create consumer group
bin/kafka-consumer-groups.sh --create --group my-group
10. List consumer groups
bin/kafka-consumer-groups.sh --list
11. View consumer group details
bin/kafka-consumer-groups.sh --describe --group my-group
12. Add consumers to consumers Group
bin/kafka-consumer-groups.sh --join --group my-group --topic my-topic
13. Remove the consumer from the consumer group
bin/kafka-consumer-groups.sh --leave --group my-group --topic my-topic
14. Delete the consumer group
bin/kafka-consumer-groups.sh --delete --group my-group
15. Get the offset of Topic
bin/kafka-run-class kafka.tools.GetOffsetShell --topic my-topic --group my-group
16. Set the offset of Topic
bin/kafka-run-class kafka.tools.OffsetResetTool --topic my-topic --group my-group --to-earliest
17. Monitor the Kafka cluster
bin/kafka-server-start.sh --daemon --console
18. Shut down the Kafka cluster
bin/kafka-server-stop.sh
19. Diagnose the Kafka cluster
bin/kafka-run-class kafka.tools.JmxTool --query "kafka.server:type=*,name=*,clientId=*"
20. Export the configuration of the Kafka cluster
bin/kafka-run-class kafka.tools.DumpLogSegments --print-data --source /tmp/kafka-logs
21. Import the configuration of the Kafka cluster
bin/kafka-run-class kafka.tools.LoadLogSegments --source /tmp/kafka-logs
22. Upgrade the Kafka cluster
bin/kafka-upgrade-kafka.sh --target-version 3.0.0
23. Downgrade the Kafka cluster
bin/kafka-downgrade-kafka.sh --target-version 2.8.0
The above is the detailed content of Learn to use common Kafka commands and flexibly respond to various scenarios.. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



The sudo command allows users to run commands in elevated privilege mode without switching to superuser mode. This article will introduce how to simulate functions similar to sudo commands in Windows systems. What is the Shudao Command? Sudo (short for "superuser do") is a command-line tool that allows users of Unix-based operating systems such as Linux and MacOS to execute commands with elevated privileges typically held by administrators. Running SUDO commands in Windows 11/10 However, with the launch of the latest Windows 11 Insider preview version, Windows users can now experience this feature. This new feature enables users to

Yesterday during the interview, I was asked whether I had done any long-tail related questions, so I thought I would give a brief summary. The long-tail problem of autonomous driving refers to edge cases in autonomous vehicles, that is, possible scenarios with a low probability of occurrence. The perceived long-tail problem is one of the main reasons currently limiting the operational design domain of single-vehicle intelligent autonomous vehicles. The underlying architecture and most technical issues of autonomous driving have been solved, and the remaining 5% of long-tail problems have gradually become the key to restricting the development of autonomous driving. These problems include a variety of fragmented scenarios, extreme situations, and unpredictable human behavior. The "long tail" of edge scenarios in autonomous driving refers to edge cases in autonomous vehicles (AVs). Edge cases are possible scenarios with a low probability of occurrence. these rare events

This article will introduce readers to how to use the command prompt (CommandPrompt) to find the physical address (MAC address) of the network adapter in Win11 system. A MAC address is a unique identifier for a network interface card (NIC), which plays an important role in network communications. Through the command prompt, users can easily obtain the MAC address information of all network adapters on the current computer, which is very helpful for network troubleshooting, configuring network settings and other tasks. Method 1: Use "Command Prompt" 1. Press the [Win+X] key combination, or [right-click] click the [Windows logo] on the taskbar, and in the menu item that opens, select [Run]; 2. Run the window , enter the [cmd] command, and then

1. Overview The sar command displays system usage reports through data collected from system activities. These reports are made up of different sections, each containing the type of data and when the data was collected. The default mode of the sar command displays the CPU usage at different time increments for various resources accessing the CPU (such as users, systems, I/O schedulers, etc.). Additionally, it displays the percentage of idle CPU for a given time period. The average value for each data point is listed at the bottom of the report. sar reports collected data every 10 minutes by default, but you can use various options to filter and adjust these reports. Similar to the uptime command, the sar command can also help you monitor the CPU load. Through sar, you can understand the occurrence of excessive load

In Win11 system, you can enable or disable Hyper-V enhanced session mode through commands. This article will introduce how to use commands to operate and help users better manage and control Hyper-V functions in the system. Hyper-V is a virtualization technology provided by Microsoft. It is built into Windows Server and Windows 10 and 11 (except Home Edition), allowing users to run virtual operating systems in Windows systems. Although virtual machines are isolated from the host operating system, they can still use the host's resources, such as sound cards and storage devices, through settings. One of the key settings is to enable Enhanced Session Mode. Enhanced session mode is Hyper

What is the correct way to restart a service in Linux? When using a Linux system, we often encounter situations where we need to restart a certain service, but sometimes we may encounter some problems when restarting the service, such as the service not actually stopping or starting. Therefore, it is very important to master the correct way to restart services. In Linux, you can usually use the systemctl command to manage system services. The systemctl command is part of the systemd system manager

Linux is a powerful operating system that provides many efficient inter-process communication mechanisms, such as pipes, signals, message queues, shared memory, etc. But is there a simpler, more flexible, and more efficient way to communicate? The answer is yes, that is eventfd. eventfd is a system call introduced in Linux version 2.6. It can be used to implement event notification, that is, to deliver events through a file descriptor. eventfd contains a 64-bit unsigned integer counter maintained by the kernel. The process can read/change the counter value by reading/writing this file descriptor to achieve inter-process communication. What are the advantages of eventfd? It has the following features

LSOF (ListOpenFiles) is a command line tool mainly used to monitor system resources similar to Linux/Unix operating systems. Through the LSOF command, users can get detailed information about the active files in the system and the processes that are accessing these files. LSOF can help users identify the processes currently occupying file resources, thereby better managing system resources and troubleshooting possible problems. LSOF is powerful and flexible, and can help system administrators quickly locate file-related problems, such as file leaks, unclosed file descriptors, etc. Via LSOF Command The LSOF command line tool allows system administrators and developers to: Determine which processes are currently using a specific file or port, in the event of a port conflict
