You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/manage/pages/kubernetes/k-manage-topics.adoc
+7-28Lines changed: 7 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -119,6 +119,7 @@ The Redpanda Operator automatically configures the Topic controller to connect t
119
119
120
120
The `clusterRef` method automatically discovers connection details from the referenced Redpanda resource:
121
121
122
+
.`topic.yaml`
122
123
[,yaml]
123
124
----
124
125
apiVersion: cluster.redpanda.com/v1alpha2
@@ -138,6 +139,7 @@ spec:
138
139
139
140
The `staticConfiguration` method requires manually specifying all connection details:
140
141
142
+
.`topic.yaml`
141
143
[,yaml]
142
144
----
143
145
apiVersion: cluster.redpanda.com/v1alpha2
@@ -220,6 +222,7 @@ In addition to the general prerequisites for managing topics, you must have the
220
222
221
223
To create an Iceberg topic, set the `redpanda.iceberg.mode` configuration in the `additionalConfig` property of the `Topic` resource.
222
224
225
+
.`iceberg-topic.yaml`
223
226
[source,yaml]
224
227
----
225
228
apiVersion: cluster.redpanda.com/v1alpha2
@@ -326,21 +329,9 @@ With `write_caching` enabled at the cluster level, Redpanda fsyncs to disk accor
326
329
To override the cluster-level setting at the topic level, set the topic-level property xref:reference:topic-properties.adoc#writecaching[`write.caching`]:
With `write.caching` enabled at the topic level, Redpanda fsyncs to disk according to xref:reference:topic-properties.adoc#flushms[`flush.ms`] and xref:reference:topic-properties.adoc#flushbytes[`flush.bytes`], whichever is reached first.
@@ -627,21 +618,9 @@ CAUTION: Do not use `rpk` or any other Kafka clients to edit topics that you cre
627
618
The following example changes the cleanup policy for a topic:
Copy file name to clipboardExpand all lines: modules/manage/pages/kubernetes/security/authentication/k-schema-registry-acls.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,14 +57,14 @@ In this example, a RedpandaRole called `read-only-role` is created in the cluste
57
57
58
58
The Group resource supports Schema Registry ACLs for OIDC groups.
59
59
60
+
In this example, ACLs are created for an OIDC group called `engineering` in the cluster called `sasl`. The authorization rules grant `Read` and `Describe` access to all topics with names starting with `team-` using a `prefixed` pattern type, and the same `Read` and `Describe` access to Schema Registry subjects matching the same prefix.
In this example, ACLs are created for an OIDC group called `engineering` in the cluster called `sasl`. The authorization rules grant `Read` and `Describe` access to all topics with names starting with `team-` using a `prefixed` pattern type, and the same `Read` and `Describe` access to Schema Registry subjects matching the same prefix.
67
-
68
68
== Common use cases
69
69
70
70
The following examples show common patterns for configuring Schema Registry ACLs using the User resource.
0 commit comments