Skip to content

Commit 5d5deed

Browse files
authored
DOC-1700 edit Redpanda Connector to Kafka Connect (#424)
* DOC-1700 edit Redpanda Connector to Kafka Connect * incorporate Andres & coderabbit suggestions * change Redpanda Console > Redpanda Cloud, similar to UI * edit for consistency
1 parent ceb62e7 commit 5d5deed

File tree

2 files changed

+19
-19
lines changed

2 files changed

+19
-19
lines changed

modules/develop/pages/managed-connectors/converters-and-serialization.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,6 @@ See also: xref:manage:schema-reg/schema-reg-overview.adoc[Redpanda Schema Regist
118118

119119
== Set property keys
120120

121-
Redpanda Connectors use a set of `<property.key>=<value>` to set up its properties.
121+
Kafka Connect connectors use a set of `<property.key>=<value>` to set up properties.
122122

123123
For example if you want to set the property `topic.creation.enable` to `true`, use `topic.creation.enable=true` in the property settings page.

modules/get-started/pages/cluster-types/byoc/gcp/vpc-byo-gcp.adoc

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ cat << EOT > redpanda-agent.role
118118
"compute.subnetworks.get",
119119
"resourcemanager.projects.get",
120120
"compute.networks.getRegionEffectiveFirewalls",
121-
"compute.networks.getEffectiveFirewalls",
121+
"compute.networks.getEffectiveFirewalls"
122122
]
123123
}
124124
EOT
@@ -286,7 +286,7 @@ cat << EOT > redpanda-cluster.role
286286
{
287287
"name": "redpanda_cluster_role",
288288
"title": "Redpanda Cluster Role",
289-
"description": "Redpanda Cluster Role",
289+
"description": "Redpanda Cluster role",
290290
"includedPermissions": [
291291
"resourcemanager.projects.get",
292292
"secretmanager.secrets.get",
@@ -323,7 +323,7 @@ cat << EOT > redpanda-operator.role
323323
{
324324
"name": "redpanda_operator_role",
325325
"title": "Redpanda Operator Role",
326-
"description": "Redpanda Operator Role",
326+
"description": "Redpanda Operator role",
327327
"includedPermissions": [
328328
"resourcemanager.projects.get",
329329
"secretmanager.secrets.get",
@@ -348,14 +348,14 @@ gcloud projects add-iam-policy-binding <service-project-id> \
348348
```bash
349349
# Account used to check for and read secrets, which are required to create Redpanda Connect pipelines.
350350
351-
gcloud iam service-accounts create redpanda-connect-api \
352-
--display-name="Redpanda Connect API Service Account"
351+
gcloud iam service-accounts create redpanda-connect-api \
352+
--display-name="Redpanda Connect API Service Account"
353353
354354
cat << EOT > redpanda-connect-api.role
355355
{
356356
"name": "redpanda_connect_api_role",
357357
"title": "Redpanda Connect API Role",
358-
"description": "Redpanda Connect API Role",
358+
"description": "Redpanda Connect API role",
359359
"includedPermissions": [
360360
"resourcemanager.projects.get",
361361
"secretmanager.secrets.get",
@@ -380,7 +380,7 @@ cat << EOT > redpanda-connect.role
380380
{
381381
"name": "redpanda_connect_role",
382382
"title": "Redpanda Connect Role",
383-
"description": "Redpanda Connect Role",
383+
"description": "Redpanda Connect role",
384384
"includedPermissions": [
385385
"resourcemanager.projects.get",
386386
"secretmanager.versions.access"
@@ -396,20 +396,20 @@ gcloud projects add-iam-policy-binding <service-project-id> \
396396
```
397397
====
398398

399-
* Redpanda Console service account
399+
* Redpanda Cloud secret manager
400400
+
401401
.Show commands
402402
[%collapsible]
403403
====
404404
```bash
405405
gcloud iam service-accounts create redpanda-console \
406-
--display-name="Redpanda Console Service Account"
406+
--display-name="Redpanda Cloud Secret Manager"
407407
408408
cat << EOT > redpanda-console.role
409409
{
410410
"name": "redpanda_console_secret_manager_role",
411-
"title": "Redpanda Console Secret Manager Writer",
412-
"description": "Redpanda Console Secret Manager Writer",
411+
"title": "Redpanda Cloud Secret Manager Writer",
412+
"description": "Redpanda Cloud Secret Manager Writer",
413413
"includedPermissions": [
414414
"secretmanager.secrets.get",
415415
"secretmanager.secrets.create",
@@ -434,20 +434,20 @@ gcloud projects add-iam-policy-binding <service-project-id> \
434434
```
435435
====
436436

437-
* Kafka Connect connectors service account
437+
* Kafka Connect service account
438438
+
439439
.Show commands
440440
[%collapsible]
441441
====
442442
```bash
443443
gcloud iam service-accounts create redpanda-connectors \
444-
--display-name="Redpanda Connectors Service Account"
444+
--display-name="Kafka Connect Service Account"
445445
446446
cat << EOT > redpanda-connectors.role
447447
{
448448
"name": "redpanda_connectors_role",
449-
"title": "Redpanda Connectors Custom Role",
450-
"description": "Redpanda Connectors Custom Role",
449+
"title": "Kafka Connect Custom Role",
450+
"description": "Kafka Connect custom role",
451451
"includedPermissions": [
452452
"resourcemanager.projects.get",
453453
"secretmanager.versions.access"
@@ -593,9 +593,9 @@ gcloud iam service-accounts add-iam-policy-binding <redpanda-cluster-gcp-sa-acco
593593
[%collapsible]
594594
====
595595
```bash
596-
gcloud iam service-accounts add-iam-policy-binding <redpanda_operator-gcp-sa-account-id>@<service-project-id>.iam.gserviceaccount.com \
596+
gcloud iam service-accounts add-iam-policy-binding <redpanda-operator-gcp-sa-account-id>@<service-project-id>.iam.gserviceaccount.com \
597597
--role roles/iam.workloadIdentityUser \
598-
--member "serviceAccount:<service-project-id>.svc.id.goog[redpanda-system/<redpanda_operator-gcp-sa-account-id>]"
598+
--member "serviceAccount:<service-project-id>.svc.id.goog[redpanda-system/<redpanda-operator-gcp-sa-account-id>]"
599599
```
600600
====
601601

@@ -628,7 +628,7 @@ gcloud iam service-accounts add-iam-policy-binding <redpanda_connect-gcp-sa-acco
628628
```
629629
====
630630

631-
* Kafka Connect connectors service account
631+
* Kafka Connect service account
632632
+
633633
.Show command
634634
[%collapsible]

0 commit comments

Comments
 (0)