-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs(security): updates content for securing kafka access #10071
Conversation
Signed-off-by: prmellor <[email protected]>
documentation/assemblies/security/assembly-securing-access.adoc
Outdated
Show resolved
Hide resolved
documentation/assemblies/security/assembly-securing-kafka-clients.adoc
Outdated
Show resolved
Hide resolved
documentation/modules/deploying/proc-deploy-setup-external-clients.adoc
Outdated
Show resolved
Hide resolved
documentation/modules/deploying/proc-deploy-setup-external-clients.adoc
Outdated
Show resolved
Hide resolved
Authorization options for Kafka brokers include `simple`, `OAuth`, `OPA`, or `custom`. | ||
When enabled, authorization is applied to all enabled listeners. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As mentioned -> these are the server sides only. Not the supported types in the KAfkaUSer. We should make it clear.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think changing the order resolves this now.
However, you can customize this configuration using the `useServiceDnsDomain` property. | ||
Consider using a `cluster-ip` type listener if routing through the headless service isn't feasible or if you require a custom access mechanism, such as when integrating with specific Ingress controllers or the Kubernetes Gateway API. | ||
|
||
External listeners:: Use external listener types to connect clients outside a Kubernetes cluster. | ||
+ | ||
* `nodeport` to use ports on Kubernetes nodes | ||
* `loadbalancer` to use loadbalancer services | ||
* `ingress` to use Kubernetes `Ingress` and the {NginxIngressController} (Kubernetes only) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Strictly speaking, you can install the Nginx Ingress controller for example on oPenShift as well. So I think the focus should be on the controller rather on Kubernetes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We say "(Kubernernetes only)" in a few places when referring to listener types as we don't include the ingress procedure downstream.
documentation/modules/overview/con-configuration-points-listeners.adoc
Outdated
Show resolved
Hide resolved
documentation/modules/security/con-configuring-client-quotas.adoc
Outdated
Show resolved
Hide resolved
documentation/modules/security/con-securing-client-authentication.adoc
Outdated
Show resolved
Hide resolved
documentation/modules/security/con-securing-kafka-authentication.adoc
Outdated
Show resolved
Hide resolved
Signed-off-by: prmellor <[email protected]>
Thanks for the review @scholzj . I addressed all the comments, but this one: #10071 (comment) As mentioned in the reply, we use the "(Kubernetes only)" in a few places because of downstream doc where the ingress procedure is left out. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
Documentation
Updates from review and edit of the content related to security to make it easier to understand and find the relevant information.
NOTE: OAUth content is subject to a separate review
Checklist
Please go through this checklist and make sure all applicable tasks have been done