Skip to content

Commit ad5978e

Browse files
committed
[SRVCOM-1832] Update abstracts for Jupiter readiness
1 parent 2038f28 commit ad5978e

15 files changed

+77
-131
lines changed

_topic_maps/_topic_map.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Topics:
7676
- Name: Installation and update
7777
Distros: openshift-enterprise,openshift-origin
7878
File: architecture-installation
79-
- Name: Red Hat OpenShift Cluster Manager
79+
- Name: Red Hat OpenShift Cluster Manager
8080
Distros: openshift-enterprise
8181
File: ocm-overview-ocp
8282
- Name: Control plane architecture
@@ -3506,8 +3506,6 @@ Topics:
35063506
File: serverless-custom-domains
35073507
- Name: Using a custom TLS certificate for domain mapping
35083508
File: serverless-custom-tls-cert-domain-mapping
3509-
- Name: Security configuration for Knative Kafka
3510-
File: serverless-kafka-security
35113509
# Functions
35123510
- Name: Functions
35133511
Dir: functions

_topic_maps/_topic_map_osd.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -313,8 +313,6 @@ Topics:
313313
File: serverless-custom-domains
314314
- Name: Using a custom TLS certificate for domain mapping
315315
File: serverless-custom-tls-cert-domain-mapping
316-
- Name: Security configuration for Knative Kafka
317-
File: serverless-kafka-security
318316
- Name: Functions
319317
Dir: functions
320318
Topics:

_topic_maps/_topic_map_rosa.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -386,14 +386,14 @@ Topics:
386386
File: serverless-using-brokers
387387
- Name: Triggers
388388
File: serverless-triggers
389-
- Name: Knative Kafka
389+
- Name: Using Knative Kafka
390390
File: serverless-kafka-developer
391391
- Name: Administer
392392
Dir: admin_guide
393393
Topics:
394394
- Name: Global configuration
395395
File: serverless-configuration
396-
- Name: Knative Kafka
396+
- Name: Configuring Knative Kafka
397397
File: serverless-kafka-admin
398398
- Name: Serverless components in the Administrator perspective
399399
File: serverless-admin-perspective
@@ -424,8 +424,6 @@ Topics:
424424
File: serverless-custom-domains
425425
- Name: Using a custom TLS certificate for domain mapping
426426
File: serverless-custom-tls-cert-domain-mapping
427-
- Name: Security configuration for Knative Kafka
428-
File: serverless-kafka-security
429427
- Name: Functions
430428
Dir: functions
431429
Topics:

modules/serverless-getting-support.adoc

Lines changed: 0 additions & 15 deletions
This file was deleted.

modules/serverless-kafka-broker-sasl-default-config.adoc

Lines changed: 11 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -6,33 +6,18 @@
66
[id="serverless-kafka-broker-sasl-default-config_{context}"]
77
= Configuring SASL authentication for Kafka brokers
88

9-
_Simple Authentication and Security Layer_ (SASL) is used by Apache Kafka for authentication. If you use SASL authentication on your cluster, users must provide credentials to Knative for communicating with the Kafka cluster, otherwise events cannot be produced or consumed. You can set up SASL for Kafka brokers by modifying the `KnativeKafka` custom resource (CR).
9+
_Simple Authentication and Security Layer_ (SASL) is used by Apache Kafka for authentication. If you use SASL authentication on your cluster, users must provide credentials to Knative for communicating with the Kafka cluster, otherwise events cannot be produced or consumed.
1010

1111
.Prerequisites
1212

13-
// OCP
14-
ifdef::openshift-enterprise[]
15-
* You have cluster administrator permissions on {product-title}.
16-
endif::[]
17-
18-
// OSD and ROSA
19-
ifdef::openshift-dedicated,openshift-rosa[]
2013
* You have cluster or dedicated administrator permissions on {product-title}.
21-
endif::[]
22-
23-
// universal
2414
* The {ServerlessOperatorName}, Knative Eventing, and the `KnativeKafka` CR are installed on your {product-title} cluster.
2515
* You have created a project or have access to a project with the appropriate roles and permissions to create applications and other workloads in {product-title}.
2616
* You have a username and password for a Kafka cluster.
2717
* You have chosen the SASL mechanism to use, for example `PLAIN`, `SCRAM-SHA-256`, or `SCRAM-SHA-512`.
2818
* If TLS is enabled, you also need the `ca.crt` certificate file for the Kafka cluster.
2919
* Install the OpenShift CLI (`oc`).
3020
31-
[NOTE]
32-
====
33-
It is recommended to enable TLS in addition to SASL.
34-
====
35-
3621
.Procedure
3722

3823
. Create the certificate files as a secret in the `knative-eventing` namespace:
@@ -46,11 +31,17 @@ $ oc create secret -n knative-eventing generic <secret_name> \
4631
--from-literal=password="SecretPassword" \
4732
--from-literal=user="my-sasl-user"
4833
----
34+
** Use the key names `ca.crt`, `password`, and `sasl.mechanism`. Do not change them.
35+
** If you want to use SASL with public CA certificates, you must use the `tls.enabled=true` flag, rather than the `ca.crt` argument, when creating the secret. For example:
4936
+
50-
[IMPORTANT]
51-
====
52-
Use the key names `ca.crt`, `password`, and `sasl.mechanism`. Do not change them.
53-
====
37+
[source,terminal]
38+
----
39+
$ oc create secret -n <namespace> generic <kafka_auth_secret> \
40+
--from-literal=tls.enabled=true \
41+
--from-literal=password="SecretPassword" \
42+
--from-literal=saslType="SCRAM-SHA-512" \
43+
--from-literal=user="my-sasl-user"
44+
----
5445

5546
. Edit the `KnativeKafka` CR and add a reference to your secret in the `broker` spec:
5647
+

modules/serverless-kafka-broker-tls-default-config.adoc

Lines changed: 1 addition & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,21 +6,11 @@
66
[id="serverless-kafka-broker-tls-default-config_{context}"]
77
= Configuring TLS authentication for Kafka brokers
88

9-
_Transport Layer Security_ (TLS) is used by Apache Kafka clients and servers to encrypt traffic between Knative and Kafka, as well as for authentication. You can set up TLS for Kafka brokers by modifying the `KnativeKafka` custom resource (CR).
9+
_Transport Layer Security_ (TLS) is used by Apache Kafka clients and servers to encrypt traffic between Knative and Kafka, as well as for authentication. TLS is the only supported method of traffic encryption for Knative Kafka.
1010

1111
.Prerequisites
1212

13-
// OCP
14-
ifdef::openshift-enterprise[]
15-
* You have cluster administrator permissions on {product-title}.
16-
endif::[]
17-
18-
// OSD and ROSA
19-
ifdef::openshift-dedicated,openshift-rosa[]
2013
* You have cluster or dedicated administrator permissions on {product-title}.
21-
endif::[]
22-
23-
// universal
2414
* The {ServerlessOperatorName}, Knative Eventing, and the `KnativeKafka` CR are installed on your {product-title} cluster.
2515
* You have created a project or have access to a project with the appropriate roles and permissions to create applications and other workloads in {product-title}.
2616
* You have a Kafka cluster CA certificate stored as a `.pem` file.

modules/serverless-kafka-sasl.adoc renamed to modules/serverless-kafka-sasl-channels.adoc

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,46 @@
11
// Module included in the following assemblies:
22
//
3-
// * serverless/security/serverless-kafka-security.adoc
3+
// * serverless/admin_guide/serverless-kafka-admin.adoc
44

55
:_content-type: PROCEDURE
6-
[id="serverless-kafka-sasl_{context}"]
7-
= Configuring SASL authentication
6+
[id="serverless-kafka-sasl-channels_{context}"]
7+
= Configuring SASL authentication for Kafka channels
88

9-
You can use the following procedure to configure SASL authentication for a Kafka channel.
9+
_Simple Authentication and Security Layer_ (SASL) is used by Apache Kafka for authentication. If you use SASL authentication on your cluster, users must provide credentials to Knative for communicating with the Kafka cluster, otherwise events cannot be produced or consumed.
1010

1111
.Prerequisites
1212

13-
* You have a username and password for the Kafka cluster.
13+
* You have cluster or dedicated administrator permissions on {product-title}.
14+
* The {ServerlessOperatorName}, Knative Eventing, and the `KnativeKafka` CR are installed on your {product-title} cluster.
15+
* You have created a project or have access to a project with the appropriate roles and permissions to create applications and other workloads in {product-title}.
16+
* You have a username and password for a Kafka cluster.
1417
* You have chosen the SASL mechanism to use, for example `PLAIN`, `SCRAM-SHA-256`, or `SCRAM-SHA-512`.
1518
* If TLS is enabled, you also need the `ca.crt` certificate file for the Kafka cluster.
1619
* Install the OpenShift CLI (`oc`).
1720
18-
[NOTE]
19-
====
20-
Red Hat recommends to enable TLS in addition to SASL.
21-
====
22-
2321
.Procedure
2422

2523
. Create the certificate files as secrets in your chosen namespace:
2624
+
2725
[source,terminal]
2826
----
29-
$ oc create secret --namespace <namespace> generic <kafka_auth_secret> \
27+
$ oc create secret -n <namespace> generic <kafka_auth_secret> \
3028
--from-file=ca.crt=caroot.pem \
3129
--from-literal=password="SecretPassword" \
3230
--from-literal=saslType="SCRAM-SHA-512" \
3331
--from-literal=user="my-sasl-user"
3432
----
33+
** Use the key names `ca.crt`, `password`, and `sasl.mechanism`. Do not change them.
34+
** If you want to use SASL with public CA certificates, you must use the `tls.enabled=true` flag, rather than the `ca.crt` argument, when creating the secret. For example:
3535
+
36-
[IMPORTANT]
37-
====
38-
Use the key names `ca.crt`, `password`, and `saslType`. Do not change them.
39-
====
36+
[source,terminal]
37+
----
38+
$ oc create secret -n <namespace> generic <kafka_auth_secret> \
39+
--from-literal=tls.enabled=true \
40+
--from-literal=password="SecretPassword" \
41+
--from-literal=saslType="SCRAM-SHA-512" \
42+
--from-literal=user="my-sasl-user"
43+
----
4044

4145
. Start editing the `KnativeKafka` custom resource:
4246
+

modules/serverless-kafka-sasl-public-certs.adoc

Lines changed: 0 additions & 18 deletions
This file was deleted.

modules/serverless-kafka-tls.adoc renamed to modules/serverless-kafka-tls-channels.adoc

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,21 @@
11
// Module included in the following assemblies:
22
//
3-
// * serverless/security/serverless-kafka-security.adoc
3+
// * serverless/admin_guide/serverless-kafka-admin.adoc
44

55
:_content-type: PROCEDURE
6-
[id="serverless-configuring-tls-authentication-against-an-apache-kafka_{context}"]
7-
= Configuring TLS authentication
6+
[id="serverless-kafka-tls-channels_{context}"]
7+
= Configuring TLS authentication for Kafka channels
88

9-
You can use the following procedure to configure TLS authentication for a Kafka channel.
9+
_Transport Layer Security_ (TLS) is used by Apache Kafka clients and servers to encrypt traffic between Knative and Kafka, as well as for authentication. TLS is the only supported method of traffic encryption for Knative Kafka.
1010

1111
.Prerequisites
1212

13+
* You have cluster or dedicated administrator permissions on {product-title}.
14+
* The {ServerlessOperatorName}, Knative Eventing, and the `KnativeKafka` CR are installed on your {product-title} cluster.
15+
* You have created a project or have access to a project with the appropriate roles and permissions to create applications and other workloads in {product-title}.
1316
* You have a Kafka cluster CA certificate stored as a `.pem` file.
1417
* You have a Kafka cluster client certificate and a key stored as `.pem` files.
15-
* Install the OpenShift CLI (`oc`).
18+
* Install the OpenShift (`oc`) CLI.
1619
1720
.Procedure
1821

modules/support-knowledgebase-about.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
// * support/getting-support.adoc
44
// * support/index.adoc
55
// * service_mesh/v2x/ossm-troubleshooting-istio.adoc
6+
// * serverless/serverless-support.adoc
67

78
:_content-type: CONCEPT
89
[id="support-knowledgebase-about_{context}"]

0 commit comments

Comments
 (0)