Jump To Close Expand all Collapse all Table of contents Using AMQ Streams on OpenShift 1. Overview of AMQ Streams Expand section "1. Overview of AMQ Streams" Collapse section "1. Overview of AMQ Streams" 1.1. Kafka capabilities 1.2. Kafka use cases 1.3. How AMQ Streams supports Kafka 1.4. Operators 1.5. AMQ Streams installation methods 1.6. Document Conventions 2. Getting started with AMQ Streams Expand section "2. Getting started with AMQ Streams" Collapse section "2. Getting started with AMQ Streams" 2.1. Installing AMQ Streams and deploying components 2.2. Custom resources Expand section "2.2. Custom resources" Collapse section "2.2. Custom resources" 2.2.1. AMQ Streams custom resource example 2.2.2. AMQ Streams custom resource status 2.3. Cluster Operator Expand section "2.3. Cluster Operator" Collapse section "2.3. Cluster Operator" 2.3.1. Cluster Operator 2.3.2. Watch options for a Cluster Operator deployment 2.3.3. Deploying the Cluster Operator to watch a single namespace 2.3.4. Deploying the Cluster Operator to watch multiple namespaces 2.3.5. Deploying the Cluster Operator to watch all namespaces 2.3.6. Deploying the Cluster Operator from the OperatorHub 2.4. Kafka cluster Expand section "2.4. Kafka cluster" Collapse section "2.4. Kafka cluster" 2.4.1. Deploying the Kafka cluster 2.5. Kafka Connect Expand section "2.5. Kafka Connect" Collapse section "2.5. Kafka Connect" 2.5.1. Deploying Kafka Connect to your cluster 2.5.2. Extending Kafka Connect with connector plug-ins Expand section "2.5.2. Extending Kafka Connect with connector plug-ins" Collapse section "2.5.2. Extending Kafka Connect with connector plug-ins" 2.5.2.1. Creating a Docker image from the Kafka Connect base image 2.5.2.2. Creating a container image using OpenShift builds and Source-to-Image 2.5.3. Creating and managing connectors Expand section "2.5.3. Creating and managing connectors" Collapse section "2.5.3. Creating and managing connectors" 2.5.3.1. KafkaConnector resources 2.5.3.2. Availability of the Kafka Connect REST API 2.5.4. Deploying a KafkaConnector resource to Kafka Connect 2.6. Kafka MirrorMaker Expand section "2.6. Kafka MirrorMaker" Collapse section "2.6. Kafka MirrorMaker" 2.6.1. Deploying Kafka MirrorMaker 2.7. Kafka Bridge Expand section "2.7. Kafka Bridge" Collapse section "2.7. Kafka Bridge" 2.7.1. Deploying Kafka Bridge to your OpenShift cluster 2.8. Deploying example clients 2.9. Topic Operator Expand section "2.9. Topic Operator" Collapse section "2.9. Topic Operator" 2.9.1. Topic Operator 2.9.2. Deploying the Topic Operator using the Cluster Operator 2.10. User Operator Expand section "2.10. User Operator" Collapse section "2.10. User Operator" 2.10.1. User Operator 2.10.2. Deploying the User Operator using the Cluster Operator 2.11. Strimzi Administrators Expand section "2.11. Strimzi Administrators" Collapse section "2.11. Strimzi Administrators" 2.11.1. Designating Strimzi Administrators 2.12. Container images 3. Deployment configuration Expand section "3. Deployment configuration" Collapse section "3. Deployment configuration" 3.1. Kafka cluster configuration Expand section "3.1. Kafka cluster configuration" Collapse section "3.1. Kafka cluster configuration" 3.1.1. Sample Kafka YAML configuration 3.1.2. Data storage considerations Expand section "3.1.2. Data storage considerations" Collapse section "3.1.2. Data storage considerations" 3.1.2.1. File systems 3.1.2.2. Apache Kafka and ZooKeeper storage 3.1.3. Kafka and ZooKeeper storage types Expand section "3.1.3. Kafka and ZooKeeper storage types" Collapse section "3.1.3. Kafka and ZooKeeper storage types" 3.1.3.1. Ephemeral storage Expand section "3.1.3.1. Ephemeral storage" Collapse section "3.1.3.1. Ephemeral storage" 3.1.3.1.1. Log directories 3.1.3.2. Persistent storage Expand section "3.1.3.2. Persistent storage" Collapse section "3.1.3.2. Persistent storage" 3.1.3.2.1. Storage class overrides 3.1.3.2.2. Persistent Volume Claim naming 3.1.3.2.3. Log directories 3.1.3.3. Resizing persistent volumes 3.1.3.4. JBOD storage overview Expand section "3.1.3.4. JBOD storage overview" Collapse section "3.1.3.4. JBOD storage overview" 3.1.3.4.1. JBOD configuration 3.1.3.4.2. JBOD and Persistent Volume Claims 3.1.3.4.3. Log directories 3.1.3.5. Adding volumes to JBOD storage 3.1.3.6. Removing volumes from JBOD storage 3.1.4. Kafka broker replicas Expand section "3.1.4. Kafka broker replicas" Collapse section "3.1.4. Kafka broker replicas" 3.1.4.1. Configuring the number of broker nodes 3.1.5. Kafka broker configuration Expand section "3.1.5. Kafka broker configuration" Collapse section "3.1.5. Kafka broker configuration" 3.1.5.1. Kafka broker configuration 3.1.5.2. Configuring Kafka brokers 3.1.6. Kafka broker listeners Expand section "3.1.6. Kafka broker listeners" Collapse section "3.1.6. Kafka broker listeners" 3.1.6.1. Kafka listeners 3.1.6.2. Configuring Kafka listeners 3.1.6.3. Listener authentication Expand section "3.1.6.3. Listener authentication" Collapse section "3.1.6.3. Listener authentication" 3.1.6.3.1. Authentication configuration for a listener 3.1.6.3.2. Mutual TLS authentication Expand section "3.1.6.3.2. Mutual TLS authentication" Collapse section "3.1.6.3.2. Mutual TLS authentication" 3.1.6.3.2.1. When to use mutual TLS authentication for clients 3.1.6.3.3. SCRAM-SHA authentication Expand section "3.1.6.3.3. SCRAM-SHA authentication" Collapse section "3.1.6.3.3. SCRAM-SHA authentication" 3.1.6.3.3.1. Supported SCRAM credentials 3.1.6.3.3.2. When to use SCRAM-SHA authentication for clients 3.1.6.4. External listeners Expand section "3.1.6.4. External listeners" Collapse section "3.1.6.4. External listeners" 3.1.6.4.1. Customizing advertised addresses on external listeners 3.1.6.4.2. Route external listeners Expand section "3.1.6.4.2. Route external listeners" Collapse section "3.1.6.4.2. Route external listeners" 3.1.6.4.2.1. Exposing Kafka using OpenShift Routes 3.1.6.4.2.2. Accessing Kafka using OpenShift routes 3.1.6.4.3. Loadbalancer external listeners Expand section "3.1.6.4.3. Loadbalancer external listeners" Collapse section "3.1.6.4.3. Loadbalancer external listeners" 3.1.6.4.3.1. Exposing Kafka using loadbalancers 3.1.6.4.3.2. Customizing the DNS names of external loadbalancer listeners 3.1.6.4.3.3. Customizing the loadbalancer IP addresses 3.1.6.4.3.4. Accessing Kafka using loadbalancers 3.1.6.4.4. Node Port external listeners Expand section "3.1.6.4.4. Node Port external listeners" Collapse section "3.1.6.4.4. Node Port external listeners" 3.1.6.4.4.1. Exposing Kafka using node ports 3.1.6.4.4.2. Customizing the DNS names of external node port listeners 3.1.6.4.4.3. Accessing Kafka using node ports 3.1.6.4.5. OpenShift Ingress external listeners Expand section "3.1.6.4.5. OpenShift Ingress external listeners" Collapse section "3.1.6.4.5. OpenShift Ingress external listeners" 3.1.6.4.5.1. Exposing Kafka using Kubernetes Ingress 3.1.6.4.5.2. Configuring the Ingress class 3.1.6.4.5.3. Customizing the DNS names of external ingress listeners 3.1.6.4.5.4. Accessing Kafka using ingress 3.1.6.5. Network policies Expand section "3.1.6.5. Network policies" Collapse section "3.1.6.5. Network policies" 3.1.6.5.1. Network policy configuration for a listener 3.1.6.5.2. Restricting access to Kafka listeners using networkPolicyPeers 3.1.7. Authentication and Authorization Expand section "3.1.7. Authentication and Authorization" Collapse section "3.1.7. Authentication and Authorization" 3.1.7.1. Authentication Expand section "3.1.7.1. Authentication" Collapse section "3.1.7.1. Authentication" 3.1.7.1.1. TLS client authentication 3.1.7.2. Configuring authentication in Kafka brokers 3.1.7.3. Authorization Expand section "3.1.7.3. Authorization" Collapse section "3.1.7.3. Authorization" 3.1.7.3.1. Simple authorization 3.1.7.3.2. Super users 3.1.7.4. Configuring authorization in Kafka brokers 3.1.8. ZooKeeper replicas Expand section "3.1.8. ZooKeeper replicas" Collapse section "3.1.8. ZooKeeper replicas" 3.1.8.1. Number of ZooKeeper nodes 3.1.8.2. Changing the number of ZooKeeper replicas 3.1.9. ZooKeeper configuration Expand section "3.1.9. ZooKeeper configuration" Collapse section "3.1.9. ZooKeeper configuration" 3.1.9.1. ZooKeeper configuration 3.1.9.2. Configuring ZooKeeper 3.1.10. ZooKeeper connection Expand section "3.1.10. ZooKeeper connection" Collapse section "3.1.10. ZooKeeper connection" 3.1.10.1. Connecting to ZooKeeper from a terminal 3.1.11. Entity Operator Expand section "3.1.11. Entity Operator" Collapse section "3.1.11. Entity Operator" 3.1.11.1. Entity Operator configuration properties 3.1.11.2. Topic Operator configuration properties 3.1.11.3. User Operator configuration properties 3.1.11.4. Operator loggers 3.1.11.5. Configuring Entity Operator 3.1.12. CPU and memory resources Expand section "3.1.12. CPU and memory resources" Collapse section "3.1.12. CPU and memory resources" 3.1.12.1. Resource limits and requests Expand section "3.1.12.1. Resource limits and requests" Collapse section "3.1.12.1. Resource limits and requests" 3.1.12.1.1. Resource requests 3.1.12.1.2. Resource limits 3.1.12.1.3. Supported CPU formats 3.1.12.1.4. Supported memory formats 3.1.12.2. Configuring resource requests and limits 3.1.13. Kafka loggers 3.1.14. Kafka rack awareness Expand section "3.1.14. Kafka rack awareness" Collapse section "3.1.14. Kafka rack awareness" 3.1.14.1. Configuring rack awareness in Kafka brokers 3.1.15. Healthchecks Expand section "3.1.15. Healthchecks" Collapse section "3.1.15. Healthchecks" 3.1.15.1. Healthcheck configurations 3.1.15.2. Configuring healthchecks 3.1.16. Prometheus metrics Expand section "3.1.16. Prometheus metrics" Collapse section "3.1.16. Prometheus metrics" 3.1.16.1. Metrics configuration 3.1.16.2. Configuring Prometheus metrics 3.1.17. JMX Options Expand section "3.1.17. JMX Options" Collapse section "3.1.17. JMX Options" 3.1.17.1. Configuring JMX options 3.1.18. JVM Options Expand section "3.1.18. JVM Options" Collapse section "3.1.18. JVM Options" 3.1.18.1. JVM configuration Expand section "3.1.18.1. JVM configuration" Collapse section "3.1.18.1. JVM configuration" 3.1.18.1.1. Garbage collector logging 3.1.18.2. Configuring JVM options 3.1.19. Container images Expand section "3.1.19. Container images" Collapse section "3.1.19. Container images" 3.1.19.1. Container image configurations Expand section "3.1.19.1. Container image configurations" Collapse section "3.1.19.1. Container image configurations" 3.1.19.1.1. Configuring the image property for Kafka, Kafka Connect, and Kafka MirrorMaker 3.1.19.1.2. Configuring the image property in other resources 3.1.19.2. Configuring container images 3.1.20. TLS sidecar Expand section "3.1.20. TLS sidecar" Collapse section "3.1.20. TLS sidecar" 3.1.20.1. TLS sidecar configuration 3.1.20.2. Configuring TLS sidecar 3.1.21. Configuring pod scheduling Expand section "3.1.21. Configuring pod scheduling" Collapse section "3.1.21. Configuring pod scheduling" 3.1.21.1. Scheduling pods based on other applications Expand section "3.1.21.1. Scheduling pods based on other applications" Collapse section "3.1.21.1. Scheduling pods based on other applications" 3.1.21.1.1. Avoid critical applications to share the node 3.1.21.1.2. Affinity 3.1.21.1.3. Configuring pod anti-affinity in Kafka components 3.1.21.2. Scheduling pods to specific nodes Expand section "3.1.21.2. Scheduling pods to specific nodes" Collapse section "3.1.21.2. Scheduling pods to specific nodes" 3.1.21.2.1. Node scheduling 3.1.21.2.2. Affinity 3.1.21.2.3. Configuring node affinity in Kafka components 3.1.21.3. Using dedicated nodes Expand section "3.1.21.3. Using dedicated nodes" Collapse section "3.1.21.3. Using dedicated nodes" 3.1.21.3.1. Dedicated nodes 3.1.21.3.2. Affinity 3.1.21.3.3. Tolerations 3.1.21.3.4. Setting up dedicated nodes and scheduling pods on them 3.1.22. Kafka Exporter Expand section "3.1.22. Kafka Exporter" Collapse section "3.1.22. Kafka Exporter" 3.1.22.1. Configuring Kafka Exporter 3.1.23. Performing a rolling update of a Kafka cluster 3.1.24. Performing a rolling update of a ZooKeeper cluster 3.1.25. Scaling clusters Expand section "3.1.25. Scaling clusters" Collapse section "3.1.25. Scaling clusters" 3.1.25.1. Scaling Kafka clusters Expand section "3.1.25.1. Scaling Kafka clusters" Collapse section "3.1.25.1. Scaling Kafka clusters" 3.1.25.1.1. Adding brokers to a cluster 3.1.25.1.2. Removing brokers from a cluster 3.1.25.2. Partition reassignment Expand section "3.1.25.2. Partition reassignment" Collapse section "3.1.25.2. Partition reassignment" 3.1.25.2.1. Reassignment JSON file 3.1.25.2.2. Reassigning partitions between JBOD volumes 3.1.25.3. Generating reassignment JSON files 3.1.25.4. Creating reassignment JSON files manually 3.1.25.5. Reassignment throttles 3.1.25.6. Scaling up a Kafka cluster 3.1.25.7. Scaling down a Kafka cluster 3.1.26. Deleting Kafka nodes manually 3.1.27. Deleting ZooKeeper nodes manually 3.1.28. Maintenance time windows for rolling updates Expand section "3.1.28. Maintenance time windows for rolling updates" Collapse section "3.1.28. Maintenance time windows for rolling updates" 3.1.28.1. Maintenance time windows overview 3.1.28.2. Maintenance time window definition 3.1.28.3. Configuring a maintenance time window 3.1.29. Renewing CA certificates manually 3.1.30. Replacing private keys 3.1.31. List of resources created as part of Kafka cluster 3.2. Kafka Connect cluster configuration Expand section "3.2. Kafka Connect cluster configuration" Collapse section "3.2. Kafka Connect cluster configuration" 3.2.1. Replicas Expand section "3.2.1. Replicas" Collapse section "3.2.1. Replicas" 3.2.1.1. Configuring the number of nodes 3.2.2. Bootstrap servers Expand section "3.2.2. Bootstrap servers" Collapse section "3.2.2. Bootstrap servers" 3.2.2.1. Configuring bootstrap servers 3.2.3. Connecting to Kafka brokers using TLS Expand section "3.2.3. Connecting to Kafka brokers using TLS" Collapse section "3.2.3. Connecting to Kafka brokers using TLS" 3.2.3.1. TLS support in Kafka Connect 3.2.3.2. Configuring TLS in Kafka Connect 3.2.4. Connecting to Kafka brokers with Authentication Expand section "3.2.4. Connecting to Kafka brokers with Authentication" Collapse section "3.2.4. Connecting to Kafka brokers with Authentication" 3.2.4.1. Authentication support in Kafka Connect Expand section "3.2.4.1. Authentication support in Kafka Connect" Collapse section "3.2.4.1. Authentication support in Kafka Connect" 3.2.4.1.1. TLS Client Authentication 3.2.4.1.2. SASL based SCRAM-SHA-512 authentication 3.2.4.1.3. SASL based PLAIN authentication 3.2.4.2. Configuring TLS client authentication in Kafka Connect 3.2.4.3. Configuring SCRAM-SHA-512 authentication in Kafka Connect 3.2.5. Kafka Connect configuration Expand section "3.2.5. Kafka Connect configuration" Collapse section "3.2.5. Kafka Connect configuration" 3.2.5.1. Kafka Connect configuration 3.2.5.2. Kafka Connect configuration for multiple instances 3.2.5.3. Configuring Kafka Connect 3.2.6. CPU and memory resources Expand section "3.2.6. CPU and memory resources" Collapse section "3.2.6. CPU and memory resources" 3.2.6.1. Resource limits and requests Expand section "3.2.6.1. Resource limits and requests" Collapse section "3.2.6.1. Resource limits and requests" 3.2.6.1.1. Resource requests 3.2.6.1.2. Resource limits 3.2.6.1.3. Supported CPU formats 3.2.6.1.4. Supported memory formats 3.2.6.2. Configuring resource requests and limits 3.2.7. Kafka Connect loggers 3.2.8. Healthchecks Expand section "3.2.8. Healthchecks" Collapse section "3.2.8. Healthchecks" 3.2.8.1. Healthcheck configurations 3.2.8.2. Configuring healthchecks 3.2.9. Prometheus metrics Expand section "3.2.9. Prometheus metrics" Collapse section "3.2.9. Prometheus metrics" 3.2.9.1. Metrics configuration 3.2.9.2. Configuring Prometheus metrics 3.2.10. JVM Options Expand section "3.2.10. JVM Options" Collapse section "3.2.10. JVM Options" 3.2.10.1. JVM configuration Expand section "3.2.10.1. JVM configuration" Collapse section "3.2.10.1. JVM configuration" 3.2.10.1.1. Garbage collector logging 3.2.10.2. Configuring JVM options 3.2.11. Container images Expand section "3.2.11. Container images" Collapse section "3.2.11. Container images" 3.2.11.1. Container image configurations Expand section "3.2.11.1. Container image configurations" Collapse section "3.2.11.1. Container image configurations" 3.2.11.1.1. Configuring the image property for Kafka, Kafka Connect, and Kafka MirrorMaker 3.2.11.1.2. Configuring the image property in other resources 3.2.11.2. Configuring container images 3.2.12. Configuring pod scheduling Expand section "3.2.12. Configuring pod scheduling" Collapse section "3.2.12. Configuring pod scheduling" 3.2.12.1. Scheduling pods based on other applications Expand section "3.2.12.1. Scheduling pods based on other applications" Collapse section "3.2.12.1. Scheduling pods based on other applications" 3.2.12.1.1. Avoid critical applications to share the node 3.2.12.1.2. Affinity 3.2.12.1.3. Configuring pod anti-affinity in Kafka components 3.2.12.2. Scheduling pods to specific nodes Expand section "3.2.12.2. Scheduling pods to specific nodes" Collapse section "3.2.12.2. Scheduling pods to specific nodes" 3.2.12.2.1. Node scheduling 3.2.12.2.2. Affinity 3.2.12.2.3. Configuring node affinity in Kafka components 3.2.12.3. Using dedicated nodes Expand section "3.2.12.3. Using dedicated nodes" Collapse section "3.2.12.3. Using dedicated nodes" 3.2.12.3.1. Dedicated nodes 3.2.12.3.2. Affinity 3.2.12.3.3. Tolerations 3.2.12.3.4. Setting up dedicated nodes and scheduling pods on them 3.2.13. Using external configuration and secrets Expand section "3.2.13. Using external configuration and secrets" Collapse section "3.2.13. Using external configuration and secrets" 3.2.13.1. Storing connector configurations externally Expand section "3.2.13.1. Storing connector configurations externally" Collapse section "3.2.13.1. Storing connector configurations externally" 3.2.13.1.1. External configuration as environment variables 3.2.13.1.2. External configuration as volumes 3.2.13.2. Mounting Secrets as environment variables 3.2.13.3. Mounting Secrets as volumes 3.2.14. Enabling KafkaConnector resources 3.2.15. List of resources created as part of Kafka Connect cluster 3.3. Kafka Connect cluster with Source2Image support Expand section "3.3. Kafka Connect cluster with Source2Image support" Collapse section "3.3. Kafka Connect cluster with Source2Image support" 3.3.1. Replicas Expand section "3.3.1. Replicas" Collapse section "3.3.1. Replicas" 3.3.1.1. Configuring the number of nodes 3.3.2. Bootstrap servers Expand section "3.3.2. Bootstrap servers" Collapse section "3.3.2. Bootstrap servers" 3.3.2.1. Configuring bootstrap servers 3.3.3. Connecting to Kafka brokers using TLS Expand section "3.3.3. Connecting to Kafka brokers using TLS" Collapse section "3.3.3. Connecting to Kafka brokers using TLS" 3.3.3.1. TLS support in Kafka Connect 3.3.3.2. Configuring TLS in Kafka Connect 3.3.4. Connecting to Kafka brokers with Authentication Expand section "3.3.4. Connecting to Kafka brokers with Authentication" Collapse section "3.3.4. Connecting to Kafka brokers with Authentication" 3.3.4.1. Authentication support in Kafka Connect Expand section "3.3.4.1. Authentication support in Kafka Connect" Collapse section "3.3.4.1. Authentication support in Kafka Connect" 3.3.4.1.1. TLS Client Authentication 3.3.4.1.2. SASL based SCRAM-SHA-512 authentication 3.3.4.1.3. SASL based PLAIN authentication 3.3.4.2. Configuring TLS client authentication in Kafka Connect 3.3.4.3. Configuring SCRAM-SHA-512 authentication in Kafka Connect 3.3.5. Kafka Connect configuration Expand section "3.3.5. Kafka Connect configuration" Collapse section "3.3.5. Kafka Connect configuration" 3.3.5.1. Kafka Connect configuration 3.3.5.2. Kafka Connect configuration for multiple instances 3.3.5.3. Configuring Kafka Connect 3.3.6. CPU and memory resources Expand section "3.3.6. CPU and memory resources" Collapse section "3.3.6. CPU and memory resources" 3.3.6.1. Resource limits and requests Expand section "3.3.6.1. Resource limits and requests" Collapse section "3.3.6.1. Resource limits and requests" 3.3.6.1.1. Resource requests 3.3.6.1.2. Resource limits 3.3.6.1.3. Supported CPU formats 3.3.6.1.4. Supported memory formats 3.3.6.2. Configuring resource requests and limits 3.3.7. Kafka Connect with S2I loggers 3.3.8. Healthchecks Expand section "3.3.8. Healthchecks" Collapse section "3.3.8. Healthchecks" 3.3.8.1. Healthcheck configurations 3.3.8.2. Configuring healthchecks 3.3.9. Prometheus metrics Expand section "3.3.9. Prometheus metrics" Collapse section "3.3.9. Prometheus metrics" 3.3.9.1. Metrics configuration 3.3.9.2. Configuring Prometheus metrics 3.3.10. JVM Options Expand section "3.3.10. JVM Options" Collapse section "3.3.10. JVM Options" 3.3.10.1. JVM configuration Expand section "3.3.10.1. JVM configuration" Collapse section "3.3.10.1. JVM configuration" 3.3.10.1.1. Garbage collector logging 3.3.10.2. Configuring JVM options 3.3.11. Container images Expand section "3.3.11. Container images" Collapse section "3.3.11. Container images" 3.3.11.1. Container image configurations Expand section "3.3.11.1. Container image configurations" Collapse section "3.3.11.1. Container image configurations" 3.3.11.1.1. Configuring the image property for Kafka, Kafka Connect, and Kafka MirrorMaker 3.3.11.1.2. Configuring the image property in other resources 3.3.11.2. Configuring container images 3.3.12. Configuring pod scheduling Expand section "3.3.12. Configuring pod scheduling" Collapse section "3.3.12. Configuring pod scheduling" 3.3.12.1. Scheduling pods based on other applications Expand section "3.3.12.1. Scheduling pods based on other applications" Collapse section "3.3.12.1. Scheduling pods based on other applications" 3.3.12.1.1. Avoid critical applications to share the node 3.3.12.1.2. Affinity 3.3.12.1.3. Configuring pod anti-affinity in Kafka components 3.3.12.2. Scheduling pods to specific nodes Expand section "3.3.12.2. Scheduling pods to specific nodes" Collapse section "3.3.12.2. Scheduling pods to specific nodes" 3.3.12.2.1. Node scheduling 3.3.12.2.2. Affinity 3.3.12.2.3. Configuring node affinity in Kafka components 3.3.12.3. Using dedicated nodes Expand section "3.3.12.3. Using dedicated nodes" Collapse section "3.3.12.3. Using dedicated nodes" 3.3.12.3.1. Dedicated nodes 3.3.12.3.2. Affinity 3.3.12.3.3. Tolerations 3.3.12.3.4. Setting up dedicated nodes and scheduling pods on them 3.3.13. Using external configuration and secrets Expand section "3.3.13. Using external configuration and secrets" Collapse section "3.3.13. Using external configuration and secrets" 3.3.13.1. Storing connector configurations externally Expand section "3.3.13.1. Storing connector configurations externally" Collapse section "3.3.13.1. Storing connector configurations externally" 3.3.13.1.1. External configuration as environment variables 3.3.13.1.2. External configuration as volumes 3.3.13.2. Mounting Secrets as environment variables 3.3.13.3. Mounting Secrets as volumes 3.3.14. Enabling KafkaConnector resources 3.3.15. List of resources created as part of Kafka Connect cluster with Source2Image support 3.3.16. Creating a container image using OpenShift builds and Source-to-Image 3.4. Kafka MirrorMaker configuration Expand section "3.4. Kafka MirrorMaker configuration" Collapse section "3.4. Kafka MirrorMaker configuration" 3.4.1. Configuring Kafka MirrorMaker 3.4.2. Kafka MirrorMaker configuration properties Expand section "3.4.2. Kafka MirrorMaker configuration properties" Collapse section "3.4.2. Kafka MirrorMaker configuration properties" 3.4.2.1. Replicas 3.4.2.2. Bootstrap servers 3.4.2.3. Whitelist 3.4.2.4. Consumer group identifier 3.4.2.5. Consumer streams 3.4.2.6. Offset auto-commit interval 3.4.2.7. Abort on message send failure 3.4.2.8. Kafka producer and consumer 3.4.2.9. CPU and memory resources 3.4.2.10. Kafka MirrorMaker loggers 3.4.2.11. Healthchecks 3.4.2.12. Prometheus metrics 3.4.2.13. JVM Options 3.4.2.14. Container images 3.4.3. List of resources created as part of Kafka MirrorMaker 3.4.4. Using AMQ Streams with MirrorMaker 2.0. Expand section "3.4.4. Using AMQ Streams with MirrorMaker 2.0." Collapse section "3.4.4. Using AMQ Streams with MirrorMaker 2.0." 3.4.4.1. MirrorMaker 2.0 data replication 3.4.4.2. Cluster configuration Expand section "3.4.4.2. Cluster configuration" Collapse section "3.4.4.2. Cluster configuration" 3.4.4.2.1. Bidirectional replication 3.4.4.2.2. Topic configuration synchronization 3.4.4.2.3. Data integrity 3.4.4.2.4. Offset tracking 3.4.4.2.5. Connectivity checks 3.4.4.3. ACL rules synchronization 3.4.4.4. Synchronizing data between Kafka clusters using MirrorMaker 2.0 3.5. Kafka Bridge configuration Expand section "3.5. Kafka Bridge configuration" Collapse section "3.5. Kafka Bridge configuration" 3.5.1. Replicas Expand section "3.5.1. Replicas" Collapse section "3.5.1. Replicas" 3.5.1.1. Configuring the number of nodes 3.5.2. Bootstrap servers Expand section "3.5.2. Bootstrap servers" Collapse section "3.5.2. Bootstrap servers" 3.5.2.1. Configuring bootstrap servers 3.5.3. Connecting to Kafka brokers using TLS Expand section "3.5.3. Connecting to Kafka brokers using TLS" Collapse section "3.5.3. Connecting to Kafka brokers using TLS" 3.5.3.1. TLS support for Kafka connection to the Kafka Bridge 3.5.3.2. Configuring TLS in Kafka Bridge 3.5.4. Connecting to Kafka brokers with Authentication Expand section "3.5.4. Connecting to Kafka brokers with Authentication" Collapse section "3.5.4. Connecting to Kafka brokers with Authentication" 3.5.4.1. Authentication support in Kafka Bridge Expand section "3.5.4.1. Authentication support in Kafka Bridge" Collapse section "3.5.4.1. Authentication support in Kafka Bridge" 3.5.4.1.1. TLS Client Authentication 3.5.4.1.2. SCRAM-SHA-512 authentication 3.5.4.1.3. SASL-based PLAIN authentication 3.5.4.2. Configuring TLS client authentication in Kafka Bridge 3.5.4.3. Configuring SCRAM-SHA-512 authentication in Kafka Bridge 3.5.5. Kafka Bridge configuration Expand section "3.5.5. Kafka Bridge configuration" Collapse section "3.5.5. Kafka Bridge configuration" 3.5.5.1. Kafka Bridge Consumer configuration 3.5.5.2. Kafka Bridge Producer configuration 3.5.5.3. Kafka Bridge HTTP configuration 3.5.5.4. Configuring Kafka Bridge 3.5.6. CPU and memory resources Expand section "3.5.6. CPU and memory resources" Collapse section "3.5.6. CPU and memory resources" 3.5.6.1. Resource limits and requests Expand section "3.5.6.1. Resource limits and requests" Collapse section "3.5.6.1. Resource limits and requests" 3.5.6.1.1. Resource requests 3.5.6.1.2. Resource limits 3.5.6.1.3. Supported CPU formats 3.5.6.1.4. Supported memory formats 3.5.6.2. Configuring resource requests and limits 3.5.7. Kafka Bridge loggers 3.5.8. JVM Options Expand section "3.5.8. JVM Options" Collapse section "3.5.8. JVM Options" 3.5.8.1. JVM configuration Expand section "3.5.8.1. JVM configuration" Collapse section "3.5.8.1. JVM configuration" 3.5.8.1.1. Garbage collector logging 3.5.8.2. Configuring JVM options 3.5.9. Healthchecks Expand section "3.5.9. Healthchecks" Collapse section "3.5.9. Healthchecks" 3.5.9.1. Healthcheck configurations 3.5.9.2. Configuring healthchecks 3.5.10. Container images Expand section "3.5.10. Container images" Collapse section "3.5.10. Container images" 3.5.10.1. Container image configurations Expand section "3.5.10.1. Container image configurations" Collapse section "3.5.10.1. Container image configurations" 3.5.10.1.1. Configuring the image property for Kafka, Kafka Connect, and Kafka MirrorMaker 3.5.10.1.2. Configuring the image property in other resources 3.5.10.2. Configuring container images 3.5.11. Configuring pod scheduling Expand section "3.5.11. Configuring pod scheduling" Collapse section "3.5.11. Configuring pod scheduling" 3.5.11.1. Scheduling pods based on other applications Expand section "3.5.11.1. Scheduling pods based on other applications" Collapse section "3.5.11.1. Scheduling pods based on other applications" 3.5.11.1.1. Avoid critical applications to share the node 3.5.11.1.2. Affinity 3.5.11.1.3. Configuring pod anti-affinity in Kafka components 3.5.11.2. Scheduling pods to specific nodes Expand section "3.5.11.2. Scheduling pods to specific nodes" Collapse section "3.5.11.2. Scheduling pods to specific nodes" 3.5.11.2.1. Node scheduling 3.5.11.2.2. Affinity 3.5.11.2.3. Configuring node affinity in Kafka components 3.5.11.3. Using dedicated nodes Expand section "3.5.11.3. Using dedicated nodes" Collapse section "3.5.11.3. Using dedicated nodes" 3.5.11.3.1. Dedicated nodes 3.5.11.3.2. Affinity 3.5.11.3.3. Tolerations 3.5.11.3.4. Setting up dedicated nodes and scheduling pods on them 3.5.12. List of resources created as part of Kafka Bridge cluster 3.6. Using OAuth 2.0 token-based authentication Expand section "3.6. Using OAuth 2.0 token-based authentication" Collapse section "3.6. Using OAuth 2.0 token-based authentication" 3.6.1. OAuth 2.0 authentication mechanism 3.6.2. OAuth 2.0 Kafka broker configuration Expand section "3.6.2. OAuth 2.0 Kafka broker configuration" Collapse section "3.6.2. OAuth 2.0 Kafka broker configuration" 3.6.2.1. OAuth 2.0 client configuration on an authorization server 3.6.2.2. OAuth 2.0 authentication configuration in the Kafka cluster 3.6.2.3. Fast local JWT token validation configuration 3.6.2.4. OAuth 2.0 introspection endpoint configuration 3.6.3. OAuth 2.0 Kafka client configuration 3.6.4. OAuth 2.0 client authentication flow Expand section "3.6.4. OAuth 2.0 client authentication flow" Collapse section "3.6.4. OAuth 2.0 client authentication flow" 3.6.4.1. Example client authentication flows 3.6.5. Configuring OAuth 2.0 authentication Expand section "3.6.5. Configuring OAuth 2.0 authentication" Collapse section "3.6.5. Configuring OAuth 2.0 authentication" 3.6.5.1. Configuring Red Hat Single Sign-On as an OAuth 2.0 authorization server 3.6.5.2. Configuring OAuth 2.0 support for Kafka brokers 3.6.5.3. Configuring Kafka Java clients to use OAuth 2.0 3.6.5.4. Configuring OAuth 2.0 for Kafka components 3.7. Using OAuth 2.0 token-based authorization Expand section "3.7. Using OAuth 2.0 token-based authorization" Collapse section "3.7. Using OAuth 2.0 token-based authorization" 3.7.1. OAuth 2.0 authorization mechanism Expand section "3.7.1. OAuth 2.0 authorization mechanism" Collapse section "3.7.1. OAuth 2.0 authorization mechanism" 3.7.1.1. Kafka broker custom authorizer 3.7.2. Configuring OAuth 2.0 authorization support 3.8. Customizing deployments Expand section "3.8. Customizing deployments" Collapse section "3.8. Customizing deployments" 3.8.1. Template properties Expand section "3.8.1. Template properties" Collapse section "3.8.1. Template properties" 3.8.1.1. Supported template properties for a Kafka cluster 3.8.1.2. Supported template properties for a ZooKeeper cluster 3.8.1.3. Supported template properties for Entity Operator 3.8.1.4. Supported template properties for Kafka Exporter 3.8.1.5. Supported template properties for Kafka Connect and Kafka Connect with Source2Image support 3.8.1.6. Supported template properties for Kafka MirrorMaker 3.8.2. Labels and Annotations 3.8.3. Customizing Pods 3.8.4. Customizing containers with environment variables 3.8.5. Customizing external Services 3.8.6. Customizing the image pull policy 3.8.7. Customizing Pod Disruption Budgets 3.8.8. Customizing deployments 3.9. External logging Expand section "3.9. External logging" Collapse section "3.9. External logging" 3.9.1. Creating a ConfigMap for logging 4. Operators Expand section "4. Operators" Collapse section "4. Operators" 4.1. Cluster Operator Expand section "4.1. Cluster Operator" Collapse section "4.1. Cluster Operator" 4.1.1. Cluster Operator 4.1.2. Watch options for a Cluster Operator deployment 4.1.3. Deploying the Cluster Operator to watch a single namespace 4.1.4. Deploying the Cluster Operator to watch multiple namespaces 4.1.5. Deploying the Cluster Operator to watch all namespaces 4.1.6. Reconciliation 4.1.7. Cluster Operator Configuration 4.1.8. Role-Based Access Control (RBAC) Expand section "4.1.8. Role-Based Access Control (RBAC)" Collapse section "4.1.8. Role-Based Access Control (RBAC)" 4.1.8.1. Provisioning Role-Based Access Control (RBAC) for the Cluster Operator 4.1.8.2. Delegated privileges 4.1.8.3. ServiceAccount 4.1.8.4. ClusterRoles 4.1.8.5. ClusterRoleBindings 4.2. Topic Operator Expand section "4.2. Topic Operator" Collapse section "4.2. Topic Operator" 4.2.1. Topic Operator 4.2.2. Identifying a Kafka cluster for topic handling 4.2.3. Understanding the Topic Operator 4.2.4. Deploying the Topic Operator using the Cluster Operator 4.2.5. Configuring the Topic Operator with resource requests and limits 4.2.6. Deploying the standalone Topic Operator 4.2.7. Topic Operator environment 4.3. User Operator Expand section "4.3. User Operator" Collapse section "4.3. User Operator" 4.3.1. User Operator 4.3.2. Identifying a Kafka cluster for user handling 4.3.3. Deploying the User Operator using the Cluster Operator 4.3.4. Configuring the User Operator with resource requests and limits 4.3.5. Deploying the standalone User Operator 5. Using the Topic Operator Expand section "5. Using the Topic Operator" Collapse section "5. Using the Topic Operator" 5.1. Topic Operator usage recommendations 5.2. Creating a topic 5.3. Changing a topic 5.4. Deleting a topic 6. Using the User Operator Expand section "6. Using the User Operator" Collapse section "6. Using the User Operator" 6.1. User Operator 6.2. Mutual TLS authentication Expand section "6.2. Mutual TLS authentication" Collapse section "6.2. Mutual TLS authentication" 6.2.1. When to use mutual TLS authentication for clients 6.3. Creating a Kafka user with mutual TLS authentication 6.4. SCRAM-SHA authentication Expand section "6.4. SCRAM-SHA authentication" Collapse section "6.4. SCRAM-SHA authentication" 6.4.1. Supported SCRAM credentials 6.4.2. When to use SCRAM-SHA authentication for clients 6.5. Creating a Kafka user with SCRAM SHA authentication 6.6. Editing a Kafka user 6.7. Deleting a Kafka user 6.8. Kafka User resource Expand section "6.8. Kafka User resource" Collapse section "6.8. Kafka User resource" 6.8.1. Authentication Expand section "6.8.1. Authentication" Collapse section "6.8.1. Authentication" 6.8.1.1. TLS Client Authentication 6.8.1.2. SCRAM-SHA-512 Authentication 6.8.2. Authorization Expand section "6.8.2. Authorization" Collapse section "6.8.2. Authorization" 6.8.2.1. Simple authorization 6.8.2.2. Super user access to Kafka brokers 6.8.3. User quotas 7. Kafka Bridge Expand section "7. Kafka Bridge" Collapse section "7. Kafka Bridge" 7.1. Kafka Bridge overview Expand section "7.1. Kafka Bridge overview" Collapse section "7.1. Kafka Bridge overview" 7.1.1. Kafka Bridge interface Expand section "7.1.1. Kafka Bridge interface" Collapse section "7.1.1. Kafka Bridge interface" 7.1.1.1. HTTP requests 7.1.2. Supported clients for the Kafka Bridge 7.1.3. Securing the Kafka Bridge 7.1.4. Accessing the Kafka Bridge outside of OpenShift 7.1.5. Requests to the Kafka Bridge Expand section "7.1.5. Requests to the Kafka Bridge" Collapse section "7.1.5. Requests to the Kafka Bridge" 7.1.5.1. Content Type headers 7.1.5.2. Embedded data format 7.1.5.3. Accept headers 7.1.6. Kafka Bridge API resources 7.1.7. Kafka Bridge deployment 7.2. Kafka Bridge quickstart Expand section "7.2. Kafka Bridge quickstart" Collapse section "7.2. Kafka Bridge quickstart" 7.2.1. Deploying the Kafka Bridge to your OpenShift cluster 7.2.2. Exposing the Kafka Bridge service to your local machine 7.2.3. Producing messages to topics and partitions 7.2.4. Creating a Kafka Bridge consumer 7.2.5. Subscribing a Kafka Bridge consumer to topics 7.2.6. Retrieving the latest messages from a Kafka Bridge consumer 7.2.7. Commiting offsets to the log 7.2.8. Seeking to offsets for a partition 7.2.9. Deleting a Kafka Bridge consumer 8. Using the Kafka Bridge with 3scale Expand section "8. Using the Kafka Bridge with 3scale" Collapse section "8. Using the Kafka Bridge with 3scale" 8.1. Using the Kafka Bridge with 3scale Expand section "8.1. Using the Kafka Bridge with 3scale" Collapse section "8.1. Using the Kafka Bridge with 3scale" 8.1.1. Kafka Bridge service discovery 8.1.2. 3scale APIcast gateway policies 8.1.3. TLS validation 8.1.4. 3scale documentation 8.2. Deploying 3scale for the Kafka Bridge 9. Managing schemas with Service Registry Expand section "9. Managing schemas with Service Registry" Collapse section "9. Managing schemas with Service Registry" 9.1. Why use Service Registry? 9.2. Producer schema configuration 9.3. Consumer schema configuration 9.4. Strategies to lookup a schema 9.5. Service Registry constants 9.6. Installing Service Registry 9.7. Registering a schema to Service Registry 9.8. Using a Service Registry schema from a producer client 9.9. Using a Service Registry schema from a consumer client 10. Introducing Metrics Expand section "10. Introducing Metrics" Collapse section "10. Introducing Metrics" 10.1. Example Metrics files 10.2. Prometheus metrics Expand section "10.2. Prometheus metrics" Collapse section "10.2. Prometheus metrics" 10.2.1. Prometheus metrics configuration 10.2.2. Prometheus metrics deployment options 10.2.3. Copying Prometheus metrics configuration to a Kafka resource 10.2.4. Deploying a Kafka cluster with Prometheus metrics configuration 10.3. Prometheus Expand section "10.3. Prometheus" Collapse section "10.3. Prometheus" 10.3.1. Prometheus configuration 10.3.2. Prometheus resources 10.3.3. Deploying the Prometheus Operator 10.3.4. Deploying Prometheus 10.4. Prometheus Alertmanager Expand section "10.4. Prometheus Alertmanager" Collapse section "10.4. Prometheus Alertmanager" 10.4.1. Alertmanager configuration 10.4.2. Alerting rules 10.4.3. Alerting rule examples 10.4.4. Deploying Alertmanager 10.5. Grafana Expand section "10.5. Grafana" Collapse section "10.5. Grafana" 10.5.1. Grafana configuration 10.5.2. Deploying Grafana 10.5.3. Enabling the example Grafana dashboards 11. Distributed tracing Expand section "11. Distributed tracing" Collapse section "11. Distributed tracing" 11.1. Overview of distributed tracing in AMQ Streams Expand section "11.1. Overview of distributed tracing in AMQ Streams" Collapse section "11.1. Overview of distributed tracing in AMQ Streams" 11.1.1. Distributed tracing support in AMQ Streams 11.2. Setting up tracing for Kafka clients Expand section "11.2. Setting up tracing for Kafka clients" Collapse section "11.2. Setting up tracing for Kafka clients" 11.2.1. Initializing a Jaeger tracer for Kafka clients 11.2.2. Tracing environment variables 11.3. Instrumenting Kafka clients with tracers Expand section "11.3. Instrumenting Kafka clients with tracers" Collapse section "11.3. Instrumenting Kafka clients with tracers" 11.3.1. Instrumenting Kafka Producers and Consumers for tracing Expand section "11.3.1. Instrumenting Kafka Producers and Consumers for tracing" Collapse section "11.3.1. Instrumenting Kafka Producers and Consumers for tracing" 11.3.1.1. Custom span names in a Decorator pattern 11.3.1.2. Built-in span names 11.3.2. Instrumenting Kafka Streams applications for tracing 11.4. Setting up tracing for MirrorMaker, Kafka Connect, and the Kafka Bridge Expand section "11.4. Setting up tracing for MirrorMaker, Kafka Connect, and the Kafka Bridge" Collapse section "11.4. Setting up tracing for MirrorMaker, Kafka Connect, and the Kafka Bridge" 11.4.1. Enabling tracing in MirrorMaker, Kafka Connect, and Kafka Bridge resources 12. Kafka Exporter Expand section "12. Kafka Exporter" Collapse section "12. Kafka Exporter" 12.1. Consumer lag 12.2. Kafka Exporter alerting rule examples 12.3. Kafka Exporter metrics 12.4. Enabling the Kafka Exporter Grafana dashboard 13. Security Expand section "13. Security" Collapse section "13. Security" 13.1. Certificate Authorities Expand section "13.1. Certificate Authorities" Collapse section "13.1. Certificate Authorities" 13.1.1. CA certificates 13.1.2. Validity periods of CA certificates 13.1.3. Installing your own CA certificates 13.2. Secrets Expand section "13.2. Secrets" Collapse section "13.2. Secrets" 13.2.1. PKCS #12 storage 13.2.2. Cluster CA Secrets 13.2.3. Client CA Secrets 13.2.4. User Secrets 13.3. Certificate renewal Expand section "13.3. Certificate renewal" Collapse section "13.3. Certificate renewal" 13.3.1. Renewal process with generated CAs 13.3.2. Client applications Expand section "13.3.2. Client applications" Collapse section "13.3.2. Client applications" 13.3.2.1. Client certificate renewal 13.3.3. Renewing CA certificates manually 13.3.4. Renewing your own CA certificates 13.4. Replacing private keys 13.5. TLS connections Expand section "13.5. TLS connections" Collapse section "13.5. TLS connections" 13.5.1. ZooKeeper communication 13.5.2. Kafka interbroker communication 13.5.3. Topic and User Operators 13.5.4. Kafka Client connections 13.6. Configuring internal clients to trust the cluster CA 13.7. Configuring external clients to trust the cluster CA 13.8. Kafka listener certificates Expand section "13.8. Kafka listener certificates" Collapse section "13.8. Kafka listener certificates" 13.8.1. Providing your own Kafka listener certificates 13.8.2. Alternative subjects in server certificates for Kafka listeners Expand section "13.8.2. Alternative subjects in server certificates for Kafka listeners" Collapse section "13.8.2. Alternative subjects in server certificates for Kafka listeners" 13.8.2.1. TLS listener SAN examples 13.8.2.2. External listener SAN examples 14. AMQ Streams and Kafka upgrades Expand section "14. AMQ Streams and Kafka upgrades" Collapse section "14. AMQ Streams and Kafka upgrades" 14.1. Upgrade prerequisites 14.2. Upgrade process 14.3. Kafka versions 14.4. Upgrading the Cluster Operator Expand section "14.4. Upgrading the Cluster Operator" Collapse section "14.4. Upgrading the Cluster Operator" 14.4.1. Upgrading the Cluster Operator to a later version 14.5. Upgrading Kafka Expand section "14.5. Upgrading Kafka" Collapse section "14.5. Upgrading Kafka" 14.5.1. Kafka version and image mappings 14.5.2. Strategies for upgrading clients 14.5.3. Upgrading Kafka brokers and client applications 14.5.4. Upgrading consumers and Kafka Streams applications to cooperative rebalancing 14.6. Downgrading Kafka Expand section "14.6. Downgrading Kafka" Collapse section "14.6. Downgrading Kafka" 14.6.1. Target downgrade version 14.6.2. Downgrading Kafka brokers and client applications 15. AMQ Streams resource upgrades Expand section "15. AMQ Streams resource upgrades" Collapse section "15. AMQ Streams resource upgrades" 15.1. Upgrading Kafka resources 15.2. Upgrading Kafka Connect resources 15.3. Upgrading Kafka Connect S2I resources 15.4. Upgrading Kafka MirrorMaker resources 15.5. Upgrading Kafka Topic resources 15.6. Upgrading Kafka User resources 16. Managing AMQ Streams Expand section "16. Managing AMQ Streams" Collapse section "16. Managing AMQ Streams" 16.1. Checking the status of a custom resource 16.2. Recovering a cluster from persistent volumes Expand section "16.2. Recovering a cluster from persistent volumes" Collapse section "16.2. Recovering a cluster from persistent volumes" 16.2.1. Recovery from namespace deletion 16.2.2. Recovery from loss of an OpenShift cluster 16.2.3. Recovering a cluster from persistent volumes 16.3. Uninstalling AMQ Streams A. Frequently asked questions Expand section "A. Frequently asked questions" Collapse section "A. Frequently asked questions" A.1. Questions related to the Cluster Operator Expand section "A.1. Questions related to the Cluster Operator" Collapse section "A.1. Questions related to the Cluster Operator" A.1.1. Why do I need cluster administrator privileges to install AMQ Streams? A.1.2. Why does the Cluster Operator need to create ClusterRoleBindings? A.1.3. Can standard OpenShift users create Kafka custom resources? A.1.4. What do the failed to acquire lock warnings in the log mean? A.1.5. Why is hostname verification failing when connecting to NodePorts using TLS? B. Custom Resource API Reference Expand section "B. Custom Resource API Reference" Collapse section "B. Custom Resource API Reference" B.1. Kafka schema reference B.2. KafkaSpec schema reference B.3. KafkaClusterSpec schema reference B.4. EphemeralStorage schema reference B.5. PersistentClaimStorage schema reference B.6. PersistentClaimStorageOverride schema reference B.7. JbodStorage schema reference B.8. KafkaListeners schema reference B.9. KafkaListenerPlain schema reference B.10. KafkaListenerAuthenticationTls schema reference B.11. KafkaListenerAuthenticationScramSha512 schema reference B.12. KafkaListenerAuthenticationOAuth schema reference B.13. GenericSecretSource schema reference B.14. CertSecretSource schema reference B.15. KafkaListenerTls schema reference B.16. TlsListenerConfiguration schema reference B.17. CertAndKeySecretSource schema reference B.18. KafkaListenerExternalRoute schema reference B.19. RouteListenerOverride schema reference B.20. RouteListenerBootstrapOverride schema reference B.21. RouteListenerBrokerOverride schema reference B.22. KafkaListenerExternalConfiguration schema reference B.23. KafkaListenerExternalLoadBalancer schema reference B.24. LoadBalancerListenerOverride schema reference B.25. LoadBalancerListenerBootstrapOverride schema reference B.26. LoadBalancerListenerBrokerOverride schema reference B.27. KafkaListenerExternalNodePort schema reference B.28. NodePortListenerOverride schema reference B.29. NodePortListenerBootstrapOverride schema reference B.30. NodePortListenerBrokerOverride schema reference B.31. NodePortListenerConfiguration schema reference B.32. KafkaListenerExternalIngress schema reference B.33. IngressListenerConfiguration schema reference B.34. IngressListenerBootstrapConfiguration schema reference B.35. IngressListenerBrokerConfiguration schema reference B.36. KafkaAuthorizationSimple schema reference B.37. KafkaAuthorizationKeycloak schema reference B.38. Rack schema reference B.39. Probe schema reference B.40. JvmOptions schema reference B.41. SystemProperty schema reference B.42. KafkaJmxOptions schema reference B.43. KafkaJmxAuthenticationPassword schema reference B.44. ResourceRequirements schema reference B.45. InlineLogging schema reference B.46. ExternalLogging schema reference B.47. TlsSidecar schema reference B.48. KafkaClusterTemplate schema reference B.49. StatefulSetTemplate schema reference B.50. MetadataTemplate schema reference B.51. PodTemplate schema reference B.52. ResourceTemplate schema reference B.53. ExternalServiceTemplate schema reference B.54. PodDisruptionBudgetTemplate schema reference B.55. ContainerTemplate schema reference B.56. ContainerEnvVar schema reference B.57. ZookeeperClusterSpec schema reference B.58. ZookeeperClusterTemplate schema reference B.59. TopicOperatorSpec schema reference B.60. EntityOperatorJvmOptions schema reference B.61. EntityOperatorSpec schema reference B.62. EntityTopicOperatorSpec schema reference B.63. EntityUserOperatorSpec schema reference B.64. EntityOperatorTemplate schema reference B.65. CertificateAuthority schema reference B.66. KafkaExporterSpec schema reference B.67. KafkaExporterTemplate schema reference B.68. KafkaStatus schema reference B.69. Condition schema reference B.70. ListenerStatus schema reference B.71. ListenerAddress schema reference B.72. KafkaConnect schema reference B.73. KafkaConnectSpec schema reference B.74. KafkaConnectTls schema reference B.75. KafkaClientAuthenticationTls schema reference B.76. KafkaClientAuthenticationScramSha512 schema reference B.77. PasswordSecretSource schema reference B.78. KafkaClientAuthenticationPlain schema reference B.79. KafkaClientAuthenticationOAuth schema reference B.80. JaegerTracing schema reference B.81. KafkaConnectTemplate schema reference B.82. ExternalConfiguration schema reference B.83. ExternalConfigurationEnv schema reference B.84. ExternalConfigurationEnvVarSource schema reference B.85. ExternalConfigurationVolumeSource schema reference B.86. KafkaConnectStatus schema reference B.87. ConnectorPlugin schema reference B.88. KafkaConnectS2I schema reference B.89. KafkaConnectS2ISpec schema reference B.90. KafkaConnectS2IStatus schema reference B.91. KafkaTopic schema reference B.92. KafkaTopicSpec schema reference B.93. KafkaTopicStatus schema reference B.94. KafkaUser schema reference B.95. KafkaUserSpec schema reference B.96. KafkaUserTlsClientAuthentication schema reference B.97. KafkaUserScramSha512ClientAuthentication schema reference B.98. KafkaUserAuthorizationSimple schema reference B.99. AclRule schema reference B.100. AclRuleTopicResource schema reference B.101. AclRuleGroupResource schema reference B.102. AclRuleClusterResource schema reference B.103. AclRuleTransactionalIdResource schema reference B.104. KafkaUserQuotas schema reference B.105. KafkaUserStatus schema reference B.106. KafkaMirrorMaker schema reference B.107. KafkaMirrorMakerSpec schema reference B.108. KafkaMirrorMakerConsumerSpec schema reference B.109. KafkaMirrorMakerTls schema reference B.110. KafkaMirrorMakerProducerSpec schema reference B.111. KafkaMirrorMakerTemplate schema reference B.112. KafkaMirrorMakerStatus schema reference B.113. KafkaBridge schema reference B.114. KafkaBridgeSpec schema reference B.115. KafkaBridgeTls schema reference B.116. KafkaBridgeHttpConfig schema reference B.117. KafkaBridgeConsumerSpec schema reference B.118. KafkaBridgeProducerSpec schema reference B.119. KafkaBridgeTemplate schema reference B.120. KafkaBridgeStatus schema reference B.121. KafkaConnector schema reference B.122. KafkaConnectorSpec schema reference B.123. KafkaConnectorStatus schema reference B.124. KafkaMirrorMaker2 schema reference B.125. KafkaMirrorMaker2Spec schema reference B.126. KafkaMirrorMaker2ClusterSpec schema reference B.127. KafkaMirrorMaker2Tls schema reference B.128. KafkaMirrorMaker2MirrorSpec schema reference B.129. KafkaMirrorMaker2ConnectorSpec schema reference B.130. KafkaMirrorMaker2Status schema reference C. Using Your Subscription Legal Notice Settings Close Language: 日本語 English Language: 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 English Language: 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Using AMQ Streams on OpenShift Red Hat AMQ 7.6For use with AMQ Streams 1.4 on OpenShift Container PlatformLegal NoticeAbstract This guide describes how to install, configure, and manage Red Hat AMQ Streams to build a large-scale messaging network. Next