diff --git a/docs/guides/kafka/concepts/connectcluster.md b/docs/guides/kafka/concepts/connectcluster.md index 855f60e50a..36bfe2d6db 100644 --- a/docs/guides/kafka/concepts/connectcluster.md +++ b/docs/guides/kafka/concepts/connectcluster.md @@ -73,7 +73,7 @@ spec: annotations: passMe: ToPetSet labels: - thisLabel: willGoToSts + thisLabel: willGoToPetSet monitor: agent: prometheus.io/operator prometheus: @@ -105,7 +105,7 @@ KubeDB uses `PodDisruptionBudget` to ensure that majority of these replicas are ### spec.disableSecurity -`spec.disableSecurity` is an optional field that specifies whether to disable all kind of security features like basic authentication and tls. The default value of this field is `false`. +`spec.disableSecurity` is an optional field that specifies whether to disable all kind of security features like basic authentication and tls. The default value of this field is `false`. ### spec.connectorPlugins diff --git a/docs/guides/kafka/concepts/kafka.md b/docs/guides/kafka/concepts/kafka.md index 048a28b612..d921481d44 100644 --- a/docs/guides/kafka/concepts/kafka.md +++ b/docs/guides/kafka/concepts/kafka.md @@ -29,6 +29,7 @@ metadata: name: kafka namespace: demo spec: + disableSecurity: false authSecret: name: kafka-admin-cred configSecret: @@ -127,6 +128,10 @@ If `spec.topology` is set, then `spec.replicas` needs to be empty. Instead use ` KubeDB uses `PodDisruptionBudget` to ensure that majority of these replicas are available during [voluntary disruptions](https://kubernetes.io/docs/concepts/workloads/pods/disruptions/#voluntary-and-involuntary-disruptions) so that quorum is maintained. +### spec.disableSecurity + +`spec.disableSecurity` is an optional field that specifies whether to disable security for Kafka cluster which means no authentication and authorization will be enabled. All the Kafka Brokers and controllers will be set to spin up with `security.protocol=PLAINTEXT` configuration. The default value of this field is `false`. + ### spec.authSecret `spec.authSecret` is an optional field that points to a Secret used to hold credentials for `kafka` admin user. If not set, KubeDB operator creates a new Secret `{kafka-object-name}-auth` for storing the password for `admin` user for each Kafka object.