You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/deploy/pages/deployment-option/self-hosted/manual/production/production-deployment.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -192,7 +192,7 @@ endpoint to protect credentials in flight.
192
192
193
193
=== Configure the seed servers
194
194
195
-
Seed servers help new brokers join a cluster by directing requests from newly-started brokers to an existing cluster. The xref:reference:node-properties.adoc#seed_servers[seed_servers] broker configuration property controls how Redpanda finds its peers when initially forming a cluster. It is dependent on the xref:reference:node-properties.adoc#empty_seed_starts_cluster[empty_seed_starts_cluster] broker configuration property.
195
+
Seed servers help new brokers join a cluster by directing requests from newly-started brokers to an existing cluster. The xref:reference:properties/broker-properties.adoc#seed_servers[`seed_servers`] broker property controls how Redpanda finds its peers when initially forming a cluster. It is dependent on the xref:reference:properties/broker-properties.adoc#empty_seed_starts_cluster[`empty_seed_starts_cluster`] broker property.
196
196
197
197
Starting with Redpanda version 22.3, you should explicitly set `empty_seed_starts_cluster` to `false` on every broker, and every broker in the cluster should have the same value set for `seed_servers`. With this set of configurations, Redpanda clusters form with these guidelines:
Copy file name to clipboardExpand all lines: modules/deploy/pages/deployment-option/self-hosted/manual/production/production-readiness.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -402,7 +402,7 @@ LATENCY P50 P90 P99 P999 MAX
402
402
[[hostnames-interfaces]]
403
403
=== Advertised hostnames use correct interfaces
404
404
405
-
Check that the advertised hostnames are operating on the correct network interfaces. For clusters with multiple interfaces (for example, a public and private IP address), set `advertised_kafka_api` to the public interface and set `advertised_rpc_api` to the private interface. These should be hostnames, not IP addresses.
405
+
Check that the advertised hostnames are operating on the correct network interfaces. For clusters with multiple interfaces (for example, a public and private IP address), set xref:reference:properties/broker-properties.adoc#advertised_kafka_api[`advertised_kafka_api`] to the public interface and set xref:reference:properties/broker-properties.adoc#advertised_rpc_api[`advertised_rpc_api`] to the private interface. These should be hostnames, not IP addresses.
If the Redpanda HTTP Proxy is configured to use SASL, you can provide the SCRAM username and password as part of the Basic Authentication header in your request. For example, to list topics as an authenticated user:
856
+
HTTP Proxy supports authentication using SCRAM credentials or OIDC tokens. The authentication method depends on the xref:reference:properties/broker-properties.adoc#http_proxy_auth_method[`authentication_method`] broker property configuration and the cluster's xref:reference:properties/cluster-properties.adoc#http_authentication[`http_authentication`] settings.
857
+
858
+
=== SCRAM Authentication
859
+
860
+
If HTTP Proxy is configured to support SASL, you can provide the SCRAM username and password as part of the Basic Authentication header in your request. For example, to list topics as an authenticated user:
857
861
858
862
[tabs]
859
863
=====
@@ -878,7 +882,7 @@ let options = {
878
882
axios
879
883
.get(`${base_uri}/topics`, options)
880
884
.then(response => console.log(response.data))
881
-
.catch(error => console.log);
885
+
.catch(error => console.error(error));
882
886
----
883
887
884
888
--
@@ -895,6 +899,52 @@ pretty(res)
895
899
--
896
900
=====
897
901
902
+
=== OIDC Authentication
903
+
904
+
If HTTP Proxy is configured to support OIDC, you can provide an OIDC token in the Authorization header. For example:
res = requests.get(f"{base_uri}/topics", headers=headers).json()
940
+
pretty(res)
941
+
----
942
+
943
+
--
944
+
=====
945
+
946
+
For details about configuring OIDC authentication, see xref:manage:security/authentication.adoc#oidc-http[OIDC Authentication].
947
+
898
948
== Use Swagger with HTTP Proxy
899
949
900
950
You can use Swagger UI to test and interact with Redpanda HTTP Proxy endpoints.
@@ -919,4 +969,4 @@ Verify that the Docker container has been added and is running:
919
969
920
970
In a browser, enter `<host-address>` in the address bar to open the Swagger console.
921
971
922
-
Change the URL to `http://<host-address>:8082/v1`, and click `Explore` to update the page with Redpanda HTTP Proxy endpoints. You can call the endpoints in any application and language that supports web interactions. The following examples show how to call the endpoints using curl, NodeJS, and Python.
972
+
Change the URL to `http://<host-address>:8082/v1`, and click `Explore` to update the page with Redpanda HTTP Proxy endpoints. You can call the endpoints in any application and language that supports web interactions. The following examples show how to call the endpoints using curl, NodeJS, and Python.
HTTP Proxy previously used automatically-generated ephemeral credentials to authenticate with the Kafka API when the HTTP Proxy listeners specified `authentication_method: none`. To improve security and simplify the authentication model, ephemeral credentials are no longer available.
56
51
57
52
If you need to maintain the current HTTP Proxy functionality while transitioning to authenticated clients, configure the following HTTP Proxy client properties in your `redpanda.yaml` configuration:
When you install Redpanda, a `redpanda.yaml` file is installed on each broker in `/etc/redpanda`. This file contains broker configuration properties. A broker property is one that can be set differently from broker to broker, such as `data_directory` or `node_id` (when specified). See xref:reference:node-properties.adoc[Broker Configuration Properties] for a list of broker properties, their descriptions, and their default values.
6
+
When you install Redpanda, a `redpanda.yaml` file is installed on each broker in `/etc/redpanda`. This file contains broker configuration properties. A broker property is one that can be set differently from broker to broker, such as xref:reference:properties/broker-properties.adoc#data_directory[`data_directory`] or xref:reference:properties/broker-properties.adoc#node_id[`node_id`] (when specified). See xref:reference:properties/broker-properties.adoc[Broker Configuration Properties] for a list of broker properties, their descriptions, and their default values.
7
7
8
8
The default `redpanda.yaml` file groups broker properties into categories:
Copy file name to clipboardExpand all lines: modules/manage/pages/rack-awareness.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ rack: "A"
40
40
. Log in to the remaining brokers and edit their `redpanda.yaml` files. For broker 2, set `rack` to `A`. For brokers 3 and 4, set `rack` to `B`. For brokers 5 and 6, set `rack` to `C`.
41
41
. Restart each broker in the cluster for the rack assignments to take effect.
42
42
43
-
TIP: For high availability, Redpanda recommends adding one or more brokers from each zone to the `seed_servers` configuration.
43
+
TIP: For high availability, Redpanda recommends adding one or more brokers from each zone to the xref:reference:properties/broker-properties.adoc#seed_servers[`seed_servers`] configuration.
Copy file name to clipboardExpand all lines: modules/manage/pages/security/encryption.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -421,9 +421,9 @@ redpanda:
421
421
[NOTE]
422
422
====
423
423
* Remember to replace placeholders in brackets.
424
-
* `kafka_api` is the listener declaration. This `name` can have any value.
425
-
* `advertised_kafka_api` is the advertised listener. This `name` should match the name of a declared listener. This `address` is the host name clients use to connect to the broker.
426
-
* `kafka_api_tls` is the listener's TLS configuration. This `name` must match the corresponding listener's name.
424
+
* xref:reference:properties/broker-properties.adoc#kafka_api[`kafka_api`] is the listener declaration. This `name` can have any value.
425
+
* xref:reference:properties/broker-properties.adoc#advertised_kafka_api[`advertised_kafka_api`] is the advertised listener. This `name` should match the name of a declared listener. This `address` is the host name clients use to connect to the broker.
426
+
* xref:reference:properties/broker-properties.adoc#kafka_api_tls[`kafka_api_tls`] is the listener's TLS configuration. This `name` must match the corresponding listener's name.
427
427
====
428
428
429
429
See also: xref:./listener-configuration.adoc[Configure Listeners]
Copy file name to clipboardExpand all lines: modules/manage/pages/security/listener-configuration.adoc
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,9 @@ redpanda:
51
51
52
52
== Multiple listeners
53
53
54
-
You can define multiple Kafka API listeners to support different interfaces, ports, or authentication methods. Each listener must have a unique `name` property, and the same `name` property must be used in the corresponding `advertised_kafka_api` stanza.
54
+
You can define multiple Kafka API listeners to support different interfaces, ports, or authentication methods. Each listener must have a unique `name` property, and the same `name` property must be used in the corresponding xref:reference:properties/broker-properties.adoc#advertised_kafka_api[`advertised_kafka_api`] listener definition.
55
+
56
+
For details about authentication methods, see the xref:reference:properties/broker-properties.adoc#kafka_api_auth_method[`authentication_method`] broker property.
55
57
56
58
[source,yaml]
57
59
----
@@ -77,7 +79,7 @@ redpanda:
77
79
78
80
== TLS listeners and DNS hostnames
79
81
80
-
For encrypted connections, you typically advertise a DNS name matching your TLS certificate. Always include a `name` property for the TLS listener and use it in both `kafka_api` and `advertised_kafka_api`.
82
+
For encrypted connections, you typically advertise a DNS name matching your TLS certificate. Always include a `name` property for the TLS listener and use it in both xref:reference:properties/broker-properties.adoc#kafka_api[`kafka_api`] and xref:reference:properties/broker-properties.adoc#advertised_kafka_api[`advertised_kafka_api`].
81
83
82
84
[source,yaml]
83
85
----
@@ -106,7 +108,7 @@ Ensure `kafka.example.com` matches the SAN in `broker.crt` and that clients trus
106
108
107
109
== Mixed-mode authentication with multiple listeners
108
110
109
-
Redpanda supports running multiple authentication schemes concurrently. Each listener can specify its method, and must define a `name` property.
111
+
Redpanda supports running multiple authentication schemes concurrently. Each listener can specify its xref:reference:properties/broker-properties.adoc#kafka_api_auth_method[`authentication_method`], and must define a `name` property.
0 commit comments