Skip to content

Commit

Permalink
Add .spec.disableSecurity field to kafka concepts.
Browse files Browse the repository at this point in the history
Signed-off-by: obaydullahmhs <[email protected]>
  • Loading branch information
obaydullahmhs committed Nov 25, 2024
1 parent 8048b81 commit 2e86d4f
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 2 deletions.
4 changes: 2 additions & 2 deletions docs/guides/kafka/concepts/connectcluster.md
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ spec:
annotations:
passMe: ToPetSet
labels:
thisLabel: willGoToSts
thisLabel: willGoToPetSet
monitor:
agent: prometheus.io/operator
prometheus:
Expand Down Expand Up @@ -105,7 +105,7 @@ KubeDB uses `PodDisruptionBudget` to ensure that majority of these replicas are

### spec.disableSecurity

`spec.disableSecurity` is an optional field that specifies whether to disable all kind of security features like basic authentication and tls. The default value of this field is `false`.
`spec.disableSecurity` is an optional field that specifies whether to disable all kind of security features like basic authentication and tls. The default value of this field is `false`.

### spec.connectorPlugins

Expand Down
5 changes: 5 additions & 0 deletions docs/guides/kafka/concepts/kafka.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ metadata:
name: kafka
namespace: demo
spec:
disableSecurity: false
authSecret:
name: kafka-admin-cred
configSecret:
Expand Down Expand Up @@ -127,6 +128,10 @@ If `spec.topology` is set, then `spec.replicas` needs to be empty. Instead use `

KubeDB uses `PodDisruptionBudget` to ensure that majority of these replicas are available during [voluntary disruptions](https://kubernetes.io/docs/concepts/workloads/pods/disruptions/#voluntary-and-involuntary-disruptions) so that quorum is maintained.

### spec.disableSecurity

`spec.disableSecurity` is an optional field that specifies whether to disable security for Kafka cluster which means no authentication and authorization will be enabled. All the Kafka Brokers and controllers will be set to spin up with `security.protocol=PLAINTEXT` configuration. The default value of this field is `false`.

### spec.authSecret

`spec.authSecret` is an optional field that points to a Secret used to hold credentials for `kafka` admin user. If not set, KubeDB operator creates a new Secret `{kafka-object-name}-auth` for storing the password for `admin` user for each Kafka object.
Expand Down

0 comments on commit 2e86d4f

Please sign in to comment.