Skip to content

Commit c9b80b5

Browse files
committed
Update kafka connect capabilities guide
1 parent af50f93 commit c9b80b5

File tree

15 files changed

+75
-75
lines changed

15 files changed

+75
-75
lines changed

pages/public_cloud/public_cloud_databases/kafkaconnect_01_capabilities/guide.de-de.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Kafka Connect - Capabilities and Limitations
33
excerpt: Discover the capabilities and limitations of Public Cloud Databases for Kafka Connect
4-
updated: 2025-07-31
4+
updated: 2025-08-04
55
---
66

77
## Objective
@@ -34,7 +34,7 @@ The following Kafka Connect versions are supported:
3434
- Kafka Connect 3.8
3535
- Kafka Connect 3.9
3636

37-
Please refer to the [DBMS lifecycle policy guide](/pages/public_cloud/public_cloud_databases/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
37+
Please refer to the [Analytics lifecycle policy guide](/pages/public_cloud/data_analytics/analytics/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
3838

3939
### Plans
4040

@@ -75,14 +75,14 @@ Public as well as private networking (vRack) can be used for all the offers.
7575

7676
Ingress and Egress traffic are included in the service plans and unmetered.
7777

78-
The database service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
78+
The analytics service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
7979

8080
##### Private network considerations
8181

8282
Here are some considerations to take into account when using private network:
8383

84-
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the Public Cloud Databases services first.
85-
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the Database service. The customer is responsible for any other custom network setup.
84+
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the analytics services first.
85+
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the analytics service. The customer is responsible for any other custom network setup.
8686
- Subnet sizing should include considerations for service nodes, other co-located services within the same subnet, and an allocation of additional available IP addresses for maintenance purposes. Failure to adequately size subnets could result in operational challenges and the malfunctioning of services.
8787
- OpenStack subnets routes announcement will not be applied to your services.
8888
- You can only create private network services if you are the original owner of the network. You can not create private network services on a shared network.

pages/public_cloud/public_cloud_databases/kafkaconnect_01_capabilities/guide.en-asia.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Kafka Connect - Capabilities and Limitations
33
excerpt: Discover the capabilities and limitations of Public Cloud Databases for Kafka Connect
4-
updated: 2025-07-31
4+
updated: 2025-08-04
55
---
66

77
## Objective
@@ -34,7 +34,7 @@ The following Kafka Connect versions are supported:
3434
- Kafka Connect 3.8
3535
- Kafka Connect 3.9
3636

37-
Please refer to the [DBMS lifecycle policy guide](/pages/public_cloud/public_cloud_databases/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
37+
Please refer to the [Analytics lifecycle policy guide](/pages/public_cloud/data_analytics/analytics/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
3838

3939
### Plans
4040

@@ -75,14 +75,14 @@ Public as well as private networking (vRack) can be used for all the offers.
7575

7676
Ingress and Egress traffic are included in the service plans and unmetered.
7777

78-
The database service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
78+
The analytics service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
7979

8080
##### Private network considerations
8181

8282
Here are some considerations to take into account when using private network:
8383

84-
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the Public Cloud Databases services first.
85-
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the Database service. The customer is responsible for any other custom network setup.
84+
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the analytics services first.
85+
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the analytics service. The customer is responsible for any other custom network setup.
8686
- Subnet sizing should include considerations for service nodes, other co-located services within the same subnet, and an allocation of additional available IP addresses for maintenance purposes. Failure to adequately size subnets could result in operational challenges and the malfunctioning of services.
8787
- OpenStack subnets routes announcement will not be applied to your services.
8888
- You can only create private network services if you are the original owner of the network. You can not create private network services on a shared network.

pages/public_cloud/public_cloud_databases/kafkaconnect_01_capabilities/guide.en-au.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Kafka Connect - Capabilities and Limitations
33
excerpt: Discover the capabilities and limitations of Public Cloud Databases for Kafka Connect
4-
updated: 2025-07-31
4+
updated: 2025-08-04
55
---
66

77
## Objective
@@ -34,7 +34,7 @@ The following Kafka Connect versions are supported:
3434
- Kafka Connect 3.8
3535
- Kafka Connect 3.9
3636

37-
Please refer to the [DBMS lifecycle policy guide](/pages/public_cloud/public_cloud_databases/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
37+
Please refer to the [Analytics lifecycle policy guide](/pages/public_cloud/data_analytics/analytics/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
3838

3939
### Plans
4040

@@ -75,14 +75,14 @@ Public as well as private networking (vRack) can be used for all the offers.
7575

7676
Ingress and Egress traffic are included in the service plans and unmetered.
7777

78-
The database service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
78+
The analytics service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
7979

8080
##### Private network considerations
8181

8282
Here are some considerations to take into account when using private network:
8383

84-
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the Public Cloud Databases services first.
85-
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the Database service. The customer is responsible for any other custom network setup.
84+
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the analytics services first.
85+
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the analytics service. The customer is responsible for any other custom network setup.
8686
- Subnet sizing should include considerations for service nodes, other co-located services within the same subnet, and an allocation of additional available IP addresses for maintenance purposes. Failure to adequately size subnets could result in operational challenges and the malfunctioning of services.
8787
- OpenStack subnets routes announcement will not be applied to your services.
8888
- You can only create private network services if you are the original owner of the network. You can not create private network services on a shared network.

pages/public_cloud/public_cloud_databases/kafkaconnect_01_capabilities/guide.en-ca.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Kafka Connect - Capabilities and Limitations
33
excerpt: Discover the capabilities and limitations of Public Cloud Databases for Kafka Connect
4-
updated: 2025-07-31
4+
updated: 2025-08-04
55
---
66

77
## Objective
@@ -34,7 +34,7 @@ The following Kafka Connect versions are supported:
3434
- Kafka Connect 3.8
3535
- Kafka Connect 3.9
3636

37-
Please refer to the [DBMS lifecycle policy guide](/pages/public_cloud/public_cloud_databases/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
37+
Please refer to the [Analytics lifecycle policy guide](/pages/public_cloud/data_analytics/analytics/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
3838

3939
### Plans
4040

@@ -75,14 +75,14 @@ Public as well as private networking (vRack) can be used for all the offers.
7575

7676
Ingress and Egress traffic are included in the service plans and unmetered.
7777

78-
The database service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
78+
The analytics service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
7979

8080
##### Private network considerations
8181

8282
Here are some considerations to take into account when using private network:
8383

84-
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the Public Cloud Databases services first.
85-
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the Database service. The customer is responsible for any other custom network setup.
84+
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the analytics services first.
85+
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the analytics service. The customer is responsible for any other custom network setup.
8686
- Subnet sizing should include considerations for service nodes, other co-located services within the same subnet, and an allocation of additional available IP addresses for maintenance purposes. Failure to adequately size subnets could result in operational challenges and the malfunctioning of services.
8787
- OpenStack subnets routes announcement will not be applied to your services.
8888
- You can only create private network services if you are the original owner of the network. You can not create private network services on a shared network.

pages/public_cloud/public_cloud_databases/kafkaconnect_01_capabilities/guide.en-gb.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Kafka Connect - Capabilities and Limitations
33
excerpt: Discover the capabilities and limitations of Public Cloud Databases for Kafka Connect
4-
updated: 2025-07-31
4+
updated: 2025-08-04
55
---
66

77
## Objective
@@ -34,7 +34,7 @@ The following Kafka Connect versions are supported:
3434
- Kafka Connect 3.8
3535
- Kafka Connect 3.9
3636

37-
Please refer to the [DBMS lifecycle policy guide](/pages/public_cloud/public_cloud_databases/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
37+
Please refer to the [Analytics lifecycle policy guide](/pages/public_cloud/data_analytics/analytics/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
3838

3939
### Plans
4040

@@ -75,14 +75,14 @@ Public as well as private networking (vRack) can be used for all the offers.
7575

7676
Ingress and Egress traffic are included in the service plans and unmetered.
7777

78-
The database service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
78+
The analytics service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
7979

8080
##### Private network considerations
8181

8282
Here are some considerations to take into account when using private network:
8383

84-
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the Public Cloud Databases services first.
85-
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the Database service. The customer is responsible for any other custom network setup.
84+
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the analytics services first.
85+
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the analytics service. The customer is responsible for any other custom network setup.
8686
- Subnet sizing should include considerations for service nodes, other co-located services within the same subnet, and an allocation of additional available IP addresses for maintenance purposes. Failure to adequately size subnets could result in operational challenges and the malfunctioning of services.
8787
- OpenStack subnets routes announcement will not be applied to your services.
8888
- You can only create private network services if you are the original owner of the network. You can not create private network services on a shared network.

pages/public_cloud/public_cloud_databases/kafkaconnect_01_capabilities/guide.en-ie.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Kafka Connect - Capabilities and Limitations
33
excerpt: Discover the capabilities and limitations of Public Cloud Databases for Kafka Connect
4-
updated: 2025-07-31
4+
updated: 2025-08-04
55
---
66

77
## Objective
@@ -34,7 +34,7 @@ The following Kafka Connect versions are supported:
3434
- Kafka Connect 3.8
3535
- Kafka Connect 3.9
3636

37-
Please refer to the [DBMS lifecycle policy guide](/pages/public_cloud/public_cloud_databases/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
37+
Please refer to the [Analytics lifecycle policy guide](/pages/public_cloud/data_analytics/analytics/information_02_lifecycle_policy) for recommendations on version upgrades and end of life announcements of major versions.
3838

3939
### Plans
4040

@@ -75,14 +75,14 @@ Public as well as private networking (vRack) can be used for all the offers.
7575

7676
Ingress and Egress traffic are included in the service plans and unmetered.
7777

78-
The database service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
78+
The analytics service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
7979

8080
##### Private network considerations
8181

8282
Here are some considerations to take into account when using private network:
8383

84-
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the Public Cloud Databases services first.
85-
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the Database service. The customer is responsible for any other custom network setup.
84+
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the analytics services first.
85+
- When connecting from an outside subnet, the Openstack IP gateway must be enabled in the subnet used for the analytics service. The customer is responsible for any other custom network setup.
8686
- Subnet sizing should include considerations for service nodes, other co-located services within the same subnet, and an allocation of additional available IP addresses for maintenance purposes. Failure to adequately size subnets could result in operational challenges and the malfunctioning of services.
8787
- OpenStack subnets routes announcement will not be applied to your services.
8888
- You can only create private network services if you are the original owner of the network. You can not create private network services on a shared network.

0 commit comments

Comments
 (0)