1+ apiVersion : platform.confluent.io/v1beta1
2+ # Confluent Replicator is built as a connector, and so will use the `Connect` CRD.
3+ kind : Connect
4+ metadata :
5+ name : replicator
6+ spec :
7+ replicas : 1
8+ # Configure to have TLS encryption, and use auto-generated server certs
9+ tls :
10+ secretRef : tls-group1
11+ authorization :
12+ type : rbac
13+ image :
14+ # Use the `cp-enterprise-replicator-operator` Docker image, that contains the Replicator jars
15+ application : confluentinc/cp-enterprise-replicator-operator:6.1.1.0
16+ init : confluentinc/cp-init-container-operator:6.1.1.0
17+ podTemplate :
18+ resources :
19+ requests :
20+ cpu : 1
21+ memory : 2Gi
22+ envVars :
23+ # The Confluent Replicator Monitoring Extension allows for detailed metrics from Replicator tasks to be
24+ # collected using an exposed REST API.
25+ # You'll need to update the version string in replicate-test-extension-<version>.jar based on what
26+ # CP version you are using
27+ - name : CLASSPATH
28+ value : /usr/share/java/kafka-connect-replicator/replicator-rest-extension-6.1.1.jar
29+ configOverrides :
30+ # When the Connect distributed cluster hosting Replicator has a REST endpoint with SSL encryption
31+ # enabled, you must configure security properties for the SSL keystore and truststore used by the
32+ # Replicator monitoring extension to communicate with other Connect nodes in the cluster.
33+ # `/mnt/sslcerts/truststore.jks` is the truststore location when auto-genarated certs are used.
34+ jvm :
35+ # - -Djavax.net.debug=all
36+ - -Djavax.net.ssl.trustStore=/mnt/sslcerts/truststore.p12
37+ - -Djavax.net.ssl.trustStorePassword=mystorepassword
38+ server :
39+ - connector.class=io.confluent.connect.replicator.ReplicatorSourceConnector
40+ # To activate the monitoring extension, configure this property
41+ - rest.extension.classes=io.confluent.connect.replicator.monitoring.ReplicatorMonitoringExtension,io.confluent.connect.security.ConnectSecurityExtension
42+ - admin.sasl.jaas.config=org.apache.kafka.common.security.oauthbearer.OAuthBearerLoginModule required metadataServerUrls="https://kafka.destination.svc.cluster.local:8090" username="connect" password="connect-secret";
43+ - consumer.sasl.jaas.config=org.apache.kafka.common.security.oauthbearer.OAuthBearerLoginModule required metadataServerUrls="https://kafka.destination.svc.cluster.local:8090" username="connect" password="connect-secret";
44+ - producer.sasl.jaas.config=org.apache.kafka.common.security.oauthbearer.OAuthBearerLoginModule required metadataServerUrls="https://kafka.destination.svc.cluster.local:8090" username="connect" password="connect-secret";
45+ - sasl.jaas.config=org.apache.kafka.common.security.oauthbearer.OAuthBearerLoginModule required metadataServerUrls="https://kafka.destination.svc.cluster.local:8090" username="connect" password="connect-secret";
46+ - confluent.metadata.basic.auth.user.info=connect:connect-secret
47+ dependencies :
48+ kafka :
49+ bootstrapEndpoint : kafka.destination.svc.cluster.local:9071
50+ authentication :
51+ type : plain
52+ jaasConfig :
53+ secretRef : mds-client-connect
54+ tls :
55+ enabled : true
56+ mds :
57+ endpoint : https://kafka.destination.svc.cluster.local:8090
58+ tokenKeyPair :
59+ secretRef : mds-public
60+ authentication :
61+ type : bearer
62+ bearer :
63+ secretRef : mds-client-connect
64+ tls :
65+ enabled : true
66+ interceptor :
67+ enabled : true
0 commit comments