You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -205,13 +205,13 @@ You use these credentials and the bootstrap server URL to connect your applicati
205
205
. Set the permissions for your service account to access the Kafka instance resources.
206
206
+
207
207
--
208
-
This example allows applications to produce and consume messages from topics starting with a specified prefix that belong to any consumer group. The service account information you input here is the 'clientID' from the previous step.
208
+
This example allows applications to produce and consume messages from topics starting with a specified prefix that belong to any consumer group. The service account information you input here is the `clientID` value from the previous step.
209
209
210
210
.Assigning access permissions to a service account
The command you entered allows applications to use the service account to produce and consume messages in the `quotes` topic. Applications can use any consumer group and producer.
322
322
323
323
. Use Role-Based Access Control (RBAC) to enable the new service account to access the {registry} instance and the artifacts (such as schemas) that it contains.
324
324
+
325
325
.Example command for granting access to {registry} instance
326
-
[source,shell]
326
+
[source,shell,subs="+quotes"]
327
327
----
328
-
$ rhoas service-registry role add --role manager --service-account srvc-acct-14295e3c-f72d-4bae-876c-3172a96eb7eb
328
+
$ rhoas service-registry role add --role manager --service-account _<client-id>_
329
329
----
330
330
331
331
. In the guides and samples repository, navigate to the directory for the producer component. Use Apache Maven to run the producer component in developer mode.
0 commit comments