Skip to content

Latest commit

 

History

History
72 lines (56 loc) · 3.76 KB

mop-configuration.md

File metadata and controls

72 lines (56 loc) · 3.76 KB

MoP available configurations

Common

Property Default value Comment
messagingProtocols mqtt available values [mqtt, kafka, amqp]
protocolHandlerDirectory ./protocols Protocol handler directory
mqttListeners MoP listener address. available listener prefix: [mqtt, mqtt+ssl, mqtt+ssl+psk]
advertisedAddress Keep the same as Pulsar broker's advertisedAddress
mqttAuthenticationEnabled false Enable mqtt authentication
mqttAuthenticationMethods null Mqtt authentication methods, available values [basic, token]
defaultTenant public Default Pulsar tenant that the MQTT server used
defaultNamespace default Default Pulsar namespace that the MQTT server used
defaultTopicDomain persistent Default Pulsar topic domain that the MQTT server used
mqttMessageMaxLength 8092 Max length for per message.

MoP Proxy

Property Default value Comment
mqttProxyEnabled false Enable MoP proxy
mqttProxyPort 5682 Default MoP proxy port
mqttProxyTlsEnabled false Enable MoP proxy TLS or not
mqttProxyTlsPort 5683 Default mqtt TLS port
mqttProxyTlsPskPort 5684 Default mqtt proxy tls psk port

TLS

Property Default value Comment
tlsEnabled false Enabled tls
tlsCertRefreshCheckDurationSec 300 Tls cert refresh duration in seconds (set 0 to check on every new connection)
tlsCertificateFilePath The path of TLS certificate path
tlsKeyFilePath null The path of TLS key file
tlsTrustCertsFilePath Path for the trusted TLS certificate file
tlsProtocols TLS protocols, available values [TLSv1.3, TLSv1.2, TlSv1.1, TLSv1]
tlsCiphers Specify the tls cipher the proxy will use to negotiate during TLS Handshake (a comma-separated list of ciphers). Examples:- [TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256]
tlsAllowInsecureConnection false Accept untrusted TLS certificate from client. If true, a client with a cert which cannot be verified with the tlsTrustCertsFilePath" cert will be allowed to connect to the server, though the cert will not be used for client authentication
tlsRequireTrustedClientCertOnConnect false Whether client certificates are required for TLS. Connections are rejected if the client certificate isn't trusted
tlsEnabledWithKeyStore false Enable TLS with KeyStore type configuration for proxy
tlsProvider TLS Provider
tlsKeyStoreType JKS TLS KeyStore type configuration for proxy: JKS, PKCS12
tlsKeyStore TLS KeyStore path for proxy
tlsKeyStorePassword TLS KeyStore password for proxy
tlsTrustStoreType JKS TLS TrustStore type configuration for proxy: JKS, PKCS12
tlsTrustStore TLS TrustStore path for proxy
tlsTrustStorePassword TLS TrustStore password for proxy

TLS-PSK

Property Default value Comment
tlsPskIdentityFile When you want identities in a single file with many pairs, you can config this. Identities will load from both tlsPskIdentity and tlsPskIdentityFile
tlsPskEnabled false Enable tls psk
tlsPskIdentityHint Any string can be specified
tlsPskIdentity Identity is semicolon list of string with identity:secret format

Socket

Property Default value Comment
maxNoOfChannels 64 The maximum number of channels which can exist concurrently on a connection
maxFrameSize 4 * 1024 * 1024 The maximum frame size on a connection
mqttProxyNumAcceptorThreads 1 Number of threads to use for Netty Acceptor. Default is set to 1
mqttProxyNumIOThreads Runtime.getRuntime().availableProcessors() Number of threads to use for Netty IO