Jump To Close Expand all Collapse all Table of contents Using AMQ Streams on OpenShift 1. Overview of AMQ Streams Expand section "1. Overview of AMQ Streams" Collapse section "1. Overview of AMQ Streams" 1.1. Kafka capabilities 1.2. Kafka use cases 1.3. How AMQ Streams supports Kafka 1.4. AMQ Streams Operators Expand section "1.4. AMQ Streams Operators" Collapse section "1.4. AMQ Streams Operators" 1.4.1. Cluster Operator 1.4.2. Topic Operator 1.4.3. User Operator 1.5. AMQ Streams custom resources Expand section "1.5. AMQ Streams custom resources" Collapse section "1.5. AMQ Streams custom resources" 1.5.1. AMQ Streams custom resource example 1.6. Document Conventions 2. Getting started with AMQ Streams Expand section "2. Getting started with AMQ Streams" Collapse section "2. Getting started with AMQ Streams" 2.1. Preparing for your AMQ Streams deployment Expand section "2.1. Preparing for your AMQ Streams deployment" Collapse section "2.1. Preparing for your AMQ Streams deployment" 2.1.1. Deployment prerequisites 2.1.2. Downloading AMQ Streams release artifacts 2.1.3. Pushing container images to your own registry 2.1.4. Designating AMQ Streams administrators 2.1.5. AMQ Streams installation methods 2.2. Create the Kafka cluster Expand section "2.2. Create the Kafka cluster" Collapse section "2.2. Create the Kafka cluster" 2.2.1. Deploying the Cluster Operator Expand section "2.2.1. Deploying the Cluster Operator" Collapse section "2.2.1. Deploying the Cluster Operator" 2.2.1.1. Watch options for a Cluster Operator deployment 2.2.1.2. Deploying the Cluster Operator to watch a single namespace 2.2.1.3. Deploying the Cluster Operator to watch multiple namespaces 2.2.1.4. Deploying the Cluster Operator to watch all namespaces 2.2.1.5. Deploying the Cluster Operator from the OperatorHub 2.2.2. Deploying Kafka Expand section "2.2.2. Deploying Kafka" Collapse section "2.2.2. Deploying Kafka" 2.2.2.1. Deploying the Kafka cluster 2.2.2.2. Deploying the Topic Operator using the Cluster Operator 2.2.2.3. Deploying the User Operator using the Cluster Operator 2.2.3. Alternative standalone deployment options for AMQ Streams Operators Expand section "2.2.3. Alternative standalone deployment options for AMQ Streams Operators" Collapse section "2.2.3. Alternative standalone deployment options for AMQ Streams Operators" 2.2.3.1. Deploying the standalone Topic Operator 2.2.3.2. Deploying the standalone User Operator 2.3. Deploy Kafka Connect Expand section "2.3. Deploy Kafka Connect" Collapse section "2.3. Deploy Kafka Connect" 2.3.1. Deploying Kafka Connect to your OpenShift cluster 2.3.2. Extending Kafka Connect with connector plug-ins Expand section "2.3.2. Extending Kafka Connect with connector plug-ins" Collapse section "2.3.2. Extending Kafka Connect with connector plug-ins" 2.3.2.1. Creating a Docker image from the Kafka Connect base image 2.3.2.2. Creating a container image using OpenShift builds and Source-to-Image 2.3.3. Creating and managing connectors Expand section "2.3.3. Creating and managing connectors" Collapse section "2.3.3. Creating and managing connectors" 2.3.3.1. KafkaConnector resources 2.3.3.2. Availability of the Kafka Connect REST API 2.3.4. Deploying a KafkaConnector resource to Kafka Connect 2.4. Deploy Kafka MirrorMaker Expand section "2.4. Deploy Kafka MirrorMaker" Collapse section "2.4. Deploy Kafka MirrorMaker" 2.4.1. Deploying Kafka MirrorMaker to your OpenShift cluster 2.5. Deploy Kafka Bridge Expand section "2.5. Deploy Kafka Bridge" Collapse section "2.5. Deploy Kafka Bridge" 2.5.1. Deploying Kafka Bridge to your OpenShift cluster 2.6. Deploying example clients 3. Deployment configuration Expand section "3. Deployment configuration" Collapse section "3. Deployment configuration" 3.1. Kafka cluster configuration Expand section "3.1. Kafka cluster configuration" Collapse section "3.1. Kafka cluster configuration" 3.1.1. Sample Kafka YAML configuration 3.1.2. Data storage considerations Expand section "3.1.2. Data storage considerations" Collapse section "3.1.2. Data storage considerations" 3.1.2.1. File systems 3.1.2.2. Apache Kafka and ZooKeeper storage 3.1.3. Kafka and ZooKeeper storage types Expand section "3.1.3. Kafka and ZooKeeper storage types" Collapse section "3.1.3. Kafka and ZooKeeper storage types" 3.1.3.1. Ephemeral storage Expand section "3.1.3.1. Ephemeral storage" Collapse section "3.1.3.1. Ephemeral storage" 3.1.3.1.1. Log directories 3.1.3.2. Persistent storage Expand section "3.1.3.2. Persistent storage" Collapse section "3.1.3.2. Persistent storage" 3.1.3.2.1. Storage class overrides 3.1.3.2.2. Persistent Volume Claim naming 3.1.3.2.3. Log directories 3.1.3.3. Resizing persistent volumes 3.1.3.4. JBOD storage overview Expand section "3.1.3.4. JBOD storage overview" Collapse section "3.1.3.4. JBOD storage overview" 3.1.3.4.1. JBOD configuration 3.1.3.4.2. JBOD and Persistent Volume Claims 3.1.3.4.3. Log directories 3.1.3.5. Adding volumes to JBOD storage 3.1.3.6. Removing volumes from JBOD storage 3.1.4. Kafka broker replicas Expand section "3.1.4. Kafka broker replicas" Collapse section "3.1.4. Kafka broker replicas" 3.1.4.1. Configuring the number of broker nodes 3.1.5. Kafka broker configuration Expand section "3.1.5. Kafka broker configuration" Collapse section "3.1.5. Kafka broker configuration" 3.1.5.1. Kafka broker configuration 3.1.5.2. Configuring Kafka brokers 3.1.6. Kafka broker listeners Expand section "3.1.6. Kafka broker listeners" Collapse section "3.1.6. Kafka broker listeners" 3.1.6.1. Kafka listeners 3.1.6.2. Configuring Kafka listeners 3.1.6.3. Listener authentication Expand section "3.1.6.3. Listener authentication" Collapse section "3.1.6.3. Listener authentication" 3.1.6.3.1. Authentication configuration for a listener 3.1.6.3.2. Mutual TLS authentication Expand section "3.1.6.3.2. Mutual TLS authentication" Collapse section "3.1.6.3.2. Mutual TLS authentication" 3.1.6.3.2.1. When to use mutual TLS authentication for clients 3.1.6.3.3. SCRAM-SHA authentication Expand section "3.1.6.3.3. SCRAM-SHA authentication" Collapse section "3.1.6.3.3. SCRAM-SHA authentication" 3.1.6.3.3.1. Supported SCRAM credentials 3.1.6.3.3.2. When to use SCRAM-SHA authentication for clients 3.1.6.4. External listeners Expand section "3.1.6.4. External listeners" Collapse section "3.1.6.4. External listeners" 3.1.6.4.1. Customizing advertised addresses on external listeners 3.1.6.4.2. Route external listeners Expand section "3.1.6.4.2. Route external listeners" Collapse section "3.1.6.4.2. Route external listeners" 3.1.6.4.2.1. Exposing Kafka using OpenShift Routes 3.1.6.4.2.2. Accessing Kafka using OpenShift routes 3.1.6.4.3. Loadbalancer external listeners Expand section "3.1.6.4.3. Loadbalancer external listeners" Collapse section "3.1.6.4.3. Loadbalancer external listeners" 3.1.6.4.3.1. Exposing Kafka using loadbalancers 3.1.6.4.3.2. Customizing the DNS names of external loadbalancer listeners 3.1.6.4.3.3. Customizing the loadbalancer IP addresses 3.1.6.4.3.4. Accessing Kafka using loadbalancers 3.1.6.4.4. Node Port external listeners Expand section "3.1.6.4.4. Node Port external listeners" Collapse section "3.1.6.4.4. Node Port external listeners" 3.1.6.4.4.1. Exposing Kafka using node ports 3.1.6.4.4.2. Customizing the DNS names of external node port listeners 3.1.6.4.4.3. Accessing Kafka using node ports 3.1.6.4.5. OpenShift Ingress external listeners Expand section "3.1.6.4.5. OpenShift Ingress external listeners" Collapse section "3.1.6.4.5. OpenShift Ingress external listeners" 3.1.6.4.5.1. Exposing Kafka using Kubernetes Ingress 3.1.6.4.5.2. Configuring the Ingress class 3.1.6.4.5.3. Customizing the DNS names of external ingress listeners 3.1.6.4.5.4. Accessing Kafka using ingress 3.1.6.5. Network policies Expand section "3.1.6.5. Network policies" Collapse section "3.1.6.5. Network policies" 3.1.6.5.1. Network policy configuration for a listener 3.1.6.5.2. Restricting access to Kafka listeners using networkPolicyPeers 3.1.7. Authentication and Authorization Expand section "3.1.7. Authentication and Authorization" Collapse section "3.1.7. Authentication and Authorization" 3.1.7.1. Authentication Expand section "3.1.7.1. Authentication" Collapse section "3.1.7.1. Authentication" 3.1.7.1.1. TLS client authentication 3.1.7.2. Configuring authentication in Kafka brokers 3.1.7.3. Authorization Expand section "3.1.7.3. Authorization" Collapse section "3.1.7.3. Authorization" 3.1.7.3.1. Simple authorization 3.1.7.3.2. Super users 3.1.7.4. Configuring authorization in Kafka brokers 3.1.8. ZooKeeper replicas Expand section "3.1.8. ZooKeeper replicas" Collapse section "3.1.8. ZooKeeper replicas" 3.1.8.1. Number of ZooKeeper nodes 3.1.8.2. Changing the number of ZooKeeper replicas 3.1.9. ZooKeeper configuration Expand section "3.1.9. ZooKeeper configuration" Collapse section "3.1.9. ZooKeeper configuration" 3.1.9.1. ZooKeeper configuration 3.1.9.2. Configuring ZooKeeper 3.1.10. ZooKeeper connection Expand section "3.1.10. ZooKeeper connection" Collapse section "3.1.10. ZooKeeper connection" 3.1.10.1. Connecting to ZooKeeper from a terminal 3.1.11. Entity Operator Expand section "3.1.11. Entity Operator" Collapse section "3.1.11. Entity Operator" 3.1.11.1. Entity Operator configuration properties 3.1.11.2. Topic Operator configuration properties 3.1.11.3. User Operator configuration properties 3.1.11.4. Operator loggers 3.1.11.5. Configuring the Entity Operator 3.1.12. CPU and memory resources Expand section "3.1.12. CPU and memory resources" Collapse section "3.1.12. CPU and memory resources" 3.1.12.1. Resource limits and requests Expand section "3.1.12.1. Resource limits and requests" Collapse section "3.1.12.1. Resource limits and requests" 3.1.12.1.1. Resource requests 3.1.12.1.2. Resource limits 3.1.12.1.3. Supported CPU formats 3.1.12.1.4. Supported memory formats 3.1.12.2. Configuring resource requests and limits 3.1.13. Kafka loggers 3.1.14. Kafka rack awareness Expand section "3.1.14. Kafka rack awareness" Collapse section "3.1.14. Kafka rack awareness" 3.1.14.1. Configuring rack awareness in Kafka brokers 3.1.15. Healthchecks Expand section "3.1.15. Healthchecks" Collapse section "3.1.15. Healthchecks" 3.1.15.1. Healthcheck configurations 3.1.15.2. Configuring healthchecks 3.1.16. Prometheus metrics Expand section "3.1.16. Prometheus metrics" Collapse section "3.1.16. Prometheus metrics" 3.1.16.1. Metrics configuration 3.1.16.2. Configuring Prometheus metrics 3.1.17. JMX Options Expand section "3.1.17. JMX Options" Collapse section "3.1.17. JMX Options" 3.1.17.1. Configuring JMX options 3.1.18. JVM Options Expand section "3.1.18. JVM Options" Collapse section "3.1.18. JVM Options" 3.1.18.1. JVM configuration Expand section "3.1.18.1. JVM configuration" Collapse section "3.1.18.1. JVM configuration" 3.1.18.1.1. Garbage collector logging 3.1.18.2. Configuring JVM options 3.1.19. Container images Expand section "3.1.19. Container images" Collapse section "3.1.19. Container images" 3.1.19.1. Container image configurations Expand section "3.1.19.1. Container image configurations" Collapse section "3.1.19.1. Container image configurations" 3.1.19.1.1. Configuring the image property for Kafka, Kafka Connect, and Kafka MirrorMaker 3.1.19.1.2. Configuring the image property in other resources 3.1.19.2. Configuring container images 3.1.20. TLS sidecar Expand section "3.1.20. TLS sidecar" Collapse section "3.1.20. TLS sidecar" 3.1.20.1. TLS sidecar configuration 3.1.20.2. Configuring TLS sidecar 3.1.21. Configuring pod scheduling Expand section "3.1.21. Configuring pod scheduling" Collapse section "3.1.21. Configuring pod scheduling" 3.1.21.1. Scheduling pods based on other applications Expand section "3.1.21.1. Scheduling pods based on other applications" Collapse section "3.1.21.1. Scheduling pods based on other applications" 3.1.21.1.1. Avoid critical applications to share the node 3.1.21.1.2. Affinity 3.1.21.1.3. Configuring pod anti-affinity in Kafka components 3.1.21.2. Scheduling pods to specific nodes Expand section "3.1.21.2. Scheduling pods to specific nodes" Collapse section "3.1.21.2. Scheduling pods to specific nodes" 3.1.21.2.1. Node scheduling 3.1.21.2.2. Affinity 3.1.21.2.3. Configuring node affinity in Kafka components 3.1.21.3. Using dedicated nodes Expand section "3.1.21.3. Using dedicated nodes" Collapse section "3.1.21.3. Using dedicated nodes" 3.1.21.3.1. Dedicated nodes 3.1.21.3.2. Affinity 3.1.21.3.3. Tolerations 3.1.21.3.4. Setting up dedicated nodes and scheduling pods on them 3.1.22. Kafka Exporter Expand section "3.1.22. Kafka Exporter" Collapse section "3.1.22. Kafka Exporter" 3.1.22.1. Configuring Kafka Exporter 3.1.23. Performing a rolling update of a Kafka cluster 3.1.24. Performing a rolling update of a ZooKeeper cluster 3.1.25. Scaling clusters Expand section "3.1.25. Scaling clusters" Collapse section "3.1.25. Scaling clusters" 3.1.25.1. Scaling Kafka clusters Expand section "3.1.25.1. Scaling Kafka clusters" Collapse section "3.1.25.1. Scaling Kafka clusters" 3.1.25.1.1. Adding brokers to a cluster 3.1.25.1.2. Removing brokers from a cluster 3.1.25.2. Partition reassignment Expand section "3.1.25.2. Partition reassignment" Collapse section "3.1.25.2. Partition reassignment" 3.1.25.2.1. Reassignment JSON file 3.1.25.2.2. Reassigning partitions between JBOD volumes 3.1.25.3. Generating reassignment JSON files 3.1.25.4. Creating reassignment JSON files manually 3.1.25.5. Reassignment throttles 3.1.25.6. Scaling up a Kafka cluster 3.1.25.7. Scaling down a Kafka cluster 3.1.26. Deleting Kafka nodes manually 3.1.27. Deleting ZooKeeper nodes manually 3.1.28. Maintenance time windows for rolling updates Expand section "3.1.28. Maintenance time windows for rolling updates" Collapse section "3.1.28. Maintenance time windows for rolling updates" 3.1.28.1. Maintenance time windows overview 3.1.28.2. Maintenance time window definition 3.1.28.3. Configuring a maintenance time window 3.1.29. Renewing CA certificates manually 3.1.30. Replacing private keys 3.1.31. List of resources created as part of Kafka cluster 3.2. Kafka Connect cluster configuration Expand section "3.2. Kafka Connect cluster configuration" Collapse section "3.2. Kafka Connect cluster configuration" 3.2.1. Replicas Expand section "3.2.1. Replicas" Collapse section "3.2.1. Replicas" 3.2.1.1. Configuring the number of nodes 3.2.2. Bootstrap servers Expand section "3.2.2. Bootstrap servers" Collapse section "3.2.2. Bootstrap servers" 3.2.2.1. Configuring bootstrap servers 3.2.3. Connecting to Kafka brokers using TLS Expand section "3.2.3. Connecting to Kafka brokers using TLS" Collapse section "3.2.3. Connecting to Kafka brokers using TLS" 3.2.3.1. TLS support in Kafka Connect 3.2.3.2. Configuring TLS in Kafka Connect 3.2.4. Connecting to Kafka brokers with Authentication Expand section "3.2.4. Connecting to Kafka brokers with Authentication" Collapse section "3.2.4. Connecting to Kafka brokers with Authentication" 3.2.4.1. Authentication support in Kafka Connect Expand section "3.2.4.1. Authentication support in Kafka Connect" Collapse section "3.2.4.1. Authentication support in Kafka Connect" 3.2.4.1.1. TLS Client Authentication 3.2.4.1.2. SASL based SCRAM-SHA-512 authentication 3.2.4.1.3. SASL based PLAIN authentication 3.2.4.2. Configuring TLS client authentication in Kafka Connect 3.2.4.3. Configuring SCRAM-SHA-512 authentication in Kafka Connect 3.2.5. Kafka Connect configuration Expand section "3.2.5. Kafka Connect configuration" Collapse section "3.2.5. Kafka Connect configuration" 3.2.5.1. Kafka Connect configuration 3.2.5.2. Kafka Connect configuration for multiple instances 3.2.5.3. Configuring Kafka Connect 3.2.6. Kafka Connect user authorization Expand section "3.2.6. Kafka Connect user authorization" Collapse section "3.2.6. Kafka Connect user authorization" 3.2.6.1. Configuring Kafka Connect user authorization 3.2.7. CPU and memory resources Expand section "3.2.7. CPU and memory resources" Collapse section "3.2.7. CPU and memory resources" 3.2.7.1. Resource limits and requests Expand section "3.2.7.1. Resource limits and requests" Collapse section "3.2.7.1. Resource limits and requests" 3.2.7.1.1. Resource requests 3.2.7.1.2. Resource limits 3.2.7.1.3. Supported CPU formats 3.2.7.1.4. Supported memory formats 3.2.7.2. Configuring resource requests and limits 3.2.8. Kafka Connect loggers 3.2.9. Healthchecks Expand section "3.2.9. Healthchecks" Collapse section "3.2.9. Healthchecks" 3.2.9.1. Healthcheck configurations 3.2.9.2. Configuring healthchecks 3.2.10. Prometheus metrics Expand section "3.2.10. Prometheus metrics" Collapse section "3.2.10. Prometheus metrics" 3.2.10.1. Metrics configuration 3.2.10.2. Configuring Prometheus metrics 3.2.11. JVM Options Expand section "3.2.11. JVM Options" Collapse section "3.2.11. JVM Options" 3.2.11.1. JVM configuration Expand section "3.2.11.1. JVM configuration" Collapse section "3.2.11.1. JVM configuration" 3.2.11.1.1. Garbage collector logging 3.2.11.2. Configuring JVM options 3.2.12. Container images Expand section "3.2.12. Container images" Collapse section "3.2.12. Container images" 3.2.12.1. Container image configurations Expand section "3.2.12.1. Container image configurations" Collapse section "3.2.12.1. Container image configurations" 3.2.12.1.1. Configuring the image property for Kafka, Kafka Connect, and Kafka MirrorMaker 3.2.12.1.2. Configuring the image property in other resources 3.2.12.2. Configuring container images 3.2.13. Configuring pod scheduling Expand section "3.2.13. Configuring pod scheduling" Collapse section "3.2.13. Configuring pod scheduling" 3.2.13.1. Scheduling pods based on other applications Expand section "3.2.13.1. Scheduling pods based on other applications" Collapse section "3.2.13.1. Scheduling pods based on other applications" 3.2.13.1.1. Avoid critical applications to share the node 3.2.13.1.2. Affinity 3.2.13.1.3. Configuring pod anti-affinity in Kafka components 3.2.13.2. Scheduling pods to specific nodes Expand section "3.2.13.2. Scheduling pods to specific nodes" Collapse section "3.2.13.2. Scheduling pods to specific nodes" 3.2.13.2.1. Node scheduling 3.2.13.2.2. Affinity 3.2.13.2.3. Configuring node affinity in Kafka components 3.2.13.3. Using dedicated nodes Expand section "3.2.13.3. Using dedicated nodes" Collapse section "3.2.13.3. Using dedicated nodes" 3.2.13.3.1. Dedicated nodes 3.2.13.3.2. Affinity 3.2.13.3.3. Tolerations 3.2.13.3.4. Setting up dedicated nodes and scheduling pods on them 3.2.14. Using external configuration and secrets Expand section "3.2.14. Using external configuration and secrets" Collapse section "3.2.14. Using external configuration and secrets" 3.2.14.1. Storing connector configurations externally Expand section "3.2.14.1. Storing connector configurations externally" Collapse section "3.2.14.1. Storing connector configurations externally" 3.2.14.1.1. External configuration as environment variables 3.2.14.1.2. External configuration as volumes 3.2.14.2. Mounting Secrets as environment variables 3.2.14.3. Mounting Secrets as volumes 3.2.15. Enabling KafkaConnector resources 3.2.16. List of resources created as part of Kafka Connect cluster 3.3. Kafka Connect cluster configuration with Source2Image support Expand section "3.3. Kafka Connect cluster configuration with Source2Image support" Collapse section "3.3. Kafka Connect cluster configuration with Source2Image support" 3.3.1. Replicas Expand section "3.3.1. Replicas" Collapse section "3.3.1. Replicas" 3.3.1.1. Configuring the number of nodes 3.3.2. Bootstrap servers Expand section "3.3.2. Bootstrap servers" Collapse section "3.3.2. Bootstrap servers" 3.3.2.1. Configuring bootstrap servers 3.3.3. Connecting to Kafka brokers using TLS Expand section "3.3.3. Connecting to Kafka brokers using TLS" Collapse section "3.3.3. Connecting to Kafka brokers using TLS" 3.3.3.1. TLS support in Kafka Connect 3.3.3.2. Configuring TLS in Kafka Connect 3.3.4. Connecting to Kafka brokers with Authentication Expand section "3.3.4. Connecting to Kafka brokers with Authentication" Collapse section "3.3.4. Connecting to Kafka brokers with Authentication" 3.3.4.1. Authentication support in Kafka Connect Expand section "3.3.4.1. Authentication support in Kafka Connect" Collapse section "3.3.4.1. Authentication support in Kafka Connect" 3.3.4.1.1. TLS Client Authentication 3.3.4.1.2. SASL based SCRAM-SHA-512 authentication 3.3.4.1.3. SASL based PLAIN authentication 3.3.4.2. Configuring TLS client authentication in Kafka Connect 3.3.4.3. Configuring SCRAM-SHA-512 authentication in Kafka Connect 3.3.5. Kafka Connect configuration Expand section "3.3.5. Kafka Connect configuration" Collapse section "3.3.5. Kafka Connect configuration" 3.3.5.1. Kafka Connect configuration 3.3.5.2. Kafka Connect configuration for multiple instances 3.3.5.3. Configuring Kafka Connect 3.3.6. Kafka Connect user authorization Expand section "3.3.6. Kafka Connect user authorization" Collapse section "3.3.6. Kafka Connect user authorization" 3.3.6.1. Configuring Kafka Connect user authorization 3.3.7. CPU and memory resources Expand section "3.3.7. CPU and memory resources" Collapse section "3.3.7. CPU and memory resources" 3.3.7.1. Resource limits and requests Expand section "3.3.7.1. Resource limits and requests" Collapse section "3.3.7.1. Resource limits and requests" 3.3.7.1.1. Resource requests 3.3.7.1.2. Resource limits 3.3.7.1.3. Supported CPU formats 3.3.7.1.4. Supported memory formats 3.3.7.2. Configuring resource requests and limits 3.3.8. Kafka Connect with S2I loggers 3.3.9. Healthchecks Expand section "3.3.9. Healthchecks" Collapse section "3.3.9. Healthchecks" 3.3.9.1. Healthcheck configurations 3.3.9.2. Configuring healthchecks 3.3.10. Prometheus metrics Expand section "3.3.10. Prometheus metrics" Collapse section "3.3.10. Prometheus metrics" 3.3.10.1. Metrics configuration 3.3.10.2. Configuring Prometheus metrics 3.3.11. JVM Options Expand section "3.3.11. JVM Options" Collapse section "3.3.11. JVM Options" 3.3.11.1. JVM configuration Expand section "3.3.11.1. JVM configuration" Collapse section "3.3.11.1. JVM configuration" 3.3.11.1.1. Garbage collector logging 3.3.11.2. Configuring JVM options 3.3.12. Container images Expand section "3.3.12. Container images" Collapse section "3.3.12. Container images" 3.3.12.1. Container image configurations Expand section "3.3.12.1. Container image configurations" Collapse section "3.3.12.1. Container image configurations" 3.3.12.1.1. Configuring the image property for Kafka, Kafka Connect, and Kafka MirrorMaker 3.3.12.1.2. Configuring the image property in other resources 3.3.12.2. Configuring container images 3.3.13. Configuring pod scheduling Expand section "3.3.13. Configuring pod scheduling" Collapse section "3.3.13. Configuring pod scheduling" 3.3.13.1. Scheduling pods based on other applications Expand section "3.3.13.1. Scheduling pods based on other applications" Collapse section "3.3.13.1. Scheduling pods based on other applications" 3.3.13.1.1. Avoid critical applications to share the node 3.3.13.1.2. Affinity 3.3.13.1.3. Configuring pod anti-affinity in Kafka components 3.3.13.2. Scheduling pods to specific nodes Expand section "3.3.13.2. Scheduling pods to specific nodes" Collapse section "3.3.13.2. Scheduling pods to specific nodes" 3.3.13.2.1. Node scheduling 3.3.13.2.2. Affinity 3.3.13.2.3. Configuring node affinity in Kafka components 3.3.13.3. Using dedicated nodes Expand section "3.3.13.3. Using dedicated nodes" Collapse section "3.3.13.3. Using dedicated nodes" 3.3.13.3.1. Dedicated nodes 3.3.13.3.2. Affinity 3.3.13.3.3. Tolerations 3.3.13.3.4. Setting up dedicated nodes and scheduling pods on them 3.3.14. Using external configuration and secrets Expand section "3.3.14. Using external configuration and secrets" Collapse section "3.3.14. Using external configuration and secrets" 3.3.14.1. Storing connector configurations externally Expand section "3.3.14.1. Storing connector configurations externally" Collapse section "3.3.14.1. Storing connector configurations externally" 3.3.14.1.1. External configuration as environment variables 3.3.14.1.2. External configuration as volumes 3.3.14.2. Mounting Secrets as environment variables 3.3.14.3. Mounting Secrets as volumes 3.3.15. Enabling KafkaConnector resources 3.3.16. List of resources created as part of Kafka Connect cluster with Source2Image support 3.3.17. Integrating with Debezium for change data capture 3.4. Kafka MirrorMaker configuration Expand section "3.4. Kafka MirrorMaker configuration" Collapse section "3.4. Kafka MirrorMaker configuration" 3.4.1. Configuring Kafka MirrorMaker 3.4.2. Kafka MirrorMaker configuration properties Expand section "3.4.2. Kafka MirrorMaker configuration properties" Collapse section "3.4.2. Kafka MirrorMaker configuration properties" 3.4.2.1. Replicas 3.4.2.2. Bootstrap servers 3.4.2.3. Whitelist 3.4.2.4. Consumer group identifier 3.4.2.5. Consumer streams 3.4.2.6. Offset auto-commit interval 3.4.2.7. Abort on message send failure 3.4.2.8. Kafka producer and consumer 3.4.2.9. CPU and memory resources 3.4.2.10. Kafka MirrorMaker loggers 3.4.2.11. Healthchecks 3.4.2.12. Prometheus metrics 3.4.2.13. JVM Options 3.4.2.14. Container images 3.4.3. List of resources created as part of Kafka MirrorMaker 3.5. Kafka MirrorMaker 2.0 configuration Expand section "3.5. Kafka MirrorMaker 2.0 configuration" Collapse section "3.5. Kafka MirrorMaker 2.0 configuration" 3.5.1. MirrorMaker 2.0 data replication 3.5.2. Cluster configuration Expand section "3.5.2. Cluster configuration" Collapse section "3.5.2. Cluster configuration" 3.5.2.1. Bidirectional replication 3.5.2.2. Topic configuration synchronization 3.5.2.3. Data integrity 3.5.2.4. Offset tracking 3.5.2.5. Connectivity checks 3.5.3. ACL rules synchronization 3.5.4. Synchronizing data between Kafka clusters using MirrorMaker 2.0 3.6. Kafka Bridge configuration Expand section "3.6. Kafka Bridge configuration" Collapse section "3.6. Kafka Bridge configuration" 3.6.1. Replicas Expand section "3.6.1. Replicas" Collapse section "3.6.1. Replicas" 3.6.1.1. Configuring the number of nodes 3.6.2. Bootstrap servers Expand section "3.6.2. Bootstrap servers" Collapse section "3.6.2. Bootstrap servers" 3.6.2.1. Configuring bootstrap servers 3.6.3. Connecting to Kafka brokers using TLS Expand section "3.6.3. Connecting to Kafka brokers using TLS" Collapse section "3.6.3. Connecting to Kafka brokers using TLS" 3.6.3.1. TLS support for Kafka connection to the Kafka Bridge 3.6.3.2. Configuring TLS in Kafka Bridge 3.6.4. Connecting to Kafka brokers with Authentication Expand section "3.6.4. Connecting to Kafka brokers with Authentication" Collapse section "3.6.4. Connecting to Kafka brokers with Authentication" 3.6.4.1. Authentication support in Kafka Bridge Expand section "3.6.4.1. Authentication support in Kafka Bridge" Collapse section "3.6.4.1. Authentication support in Kafka Bridge" 3.6.4.1.1. TLS Client Authentication 3.6.4.1.2. SCRAM-SHA-512 authentication 3.6.4.1.3. SASL-based PLAIN authentication 3.6.4.2. Configuring TLS client authentication in Kafka Bridge 3.6.4.3. Configuring SCRAM-SHA-512 authentication in Kafka Bridge 3.6.5. Kafka Bridge configuration Expand section "3.6.5. Kafka Bridge configuration" Collapse section "3.6.5. Kafka Bridge configuration" 3.6.5.1. Kafka Bridge Consumer configuration 3.6.5.2. Kafka Bridge Producer configuration 3.6.5.3. Kafka Bridge HTTP configuration 3.6.5.4. Configuring Kafka Bridge 3.6.6. CPU and memory resources Expand section "3.6.6. CPU and memory resources" Collapse section "3.6.6. CPU and memory resources" 3.6.6.1. Resource limits and requests Expand section "3.6.6.1. Resource limits and requests" Collapse section "3.6.6.1. Resource limits and requests" 3.6.6.1.1. Resource requests 3.6.6.1.2. Resource limits 3.6.6.1.3. Supported CPU formats 3.6.6.1.4. Supported memory formats 3.6.6.2. Configuring resource requests and limits 3.6.7. Kafka Bridge loggers 3.6.8. JVM Options Expand section "3.6.8. JVM Options" Collapse section "3.6.8. JVM Options" 3.6.8.1. JVM configuration Expand section "3.6.8.1. JVM configuration" Collapse section "3.6.8.1. JVM configuration" 3.6.8.1.1. Garbage collector logging 3.6.8.2. Configuring JVM options 3.6.9. Healthchecks Expand section "3.6.9. Healthchecks" Collapse section "3.6.9. Healthchecks" 3.6.9.1. Healthcheck configurations 3.6.9.2. Configuring healthchecks 3.6.10. Container images Expand section "3.6.10. Container images" Collapse section "3.6.10. Container images" 3.6.10.1. Container image configurations Expand section "3.6.10.1. Container image configurations" Collapse section "3.6.10.1. Container image configurations" 3.6.10.1.1. Configuring the image property for Kafka, Kafka Connect, and Kafka MirrorMaker 3.6.10.1.2. Configuring the image property in other resources 3.6.10.2. Configuring container images 3.6.11. Configuring pod scheduling Expand section "3.6.11. Configuring pod scheduling" Collapse section "3.6.11. Configuring pod scheduling" 3.6.11.1. Scheduling pods based on other applications Expand section "3.6.11.1. Scheduling pods based on other applications" Collapse section "3.6.11.1. Scheduling pods based on other applications" 3.6.11.1.1. Avoid critical applications to share the node 3.6.11.1.2. Affinity 3.6.11.1.3. Configuring pod anti-affinity in Kafka components 3.6.11.2. Scheduling pods to specific nodes Expand section "3.6.11.2. Scheduling pods to specific nodes" Collapse section "3.6.11.2. Scheduling pods to specific nodes" 3.6.11.2.1. Node scheduling 3.6.11.2.2. Affinity 3.6.11.2.3. Configuring node affinity in Kafka components 3.6.11.3. Using dedicated nodes Expand section "3.6.11.3. Using dedicated nodes" Collapse section "3.6.11.3. Using dedicated nodes" 3.6.11.3.1. Dedicated nodes 3.6.11.3.2. Affinity 3.6.11.3.3. Tolerations 3.6.11.3.4. Setting up dedicated nodes and scheduling pods on them 3.6.12. List of resources created as part of Kafka Bridge cluster 3.7. Using OAuth 2.0 token-based authentication Expand section "3.7. Using OAuth 2.0 token-based authentication" Collapse section "3.7. Using OAuth 2.0 token-based authentication" 3.7.1. OAuth 2.0 authentication mechanism 3.7.2. OAuth 2.0 Kafka broker configuration Expand section "3.7.2. OAuth 2.0 Kafka broker configuration" Collapse section "3.7.2. OAuth 2.0 Kafka broker configuration" 3.7.2.1. OAuth 2.0 client configuration on an authorization server 3.7.2.2. OAuth 2.0 authentication configuration in the Kafka cluster 3.7.2.3. Fast local JWT token validation configuration 3.7.2.4. OAuth 2.0 introspection endpoint configuration 3.7.3. OAuth 2.0 Kafka client configuration 3.7.4. OAuth 2.0 client authentication flow Expand section "3.7.4. OAuth 2.0 client authentication flow" Collapse section "3.7.4. OAuth 2.0 client authentication flow" 3.7.4.1. Example client authentication flows 3.7.5. Configuring OAuth 2.0 authentication Expand section "3.7.5. Configuring OAuth 2.0 authentication" Collapse section "3.7.5. Configuring OAuth 2.0 authentication" 3.7.5.1. Configuring Red Hat Single Sign-On as an OAuth 2.0 authorization server 3.7.5.2. Configuring OAuth 2.0 support for Kafka brokers 3.7.5.3. Configuring Kafka Java clients to use OAuth 2.0 3.7.5.4. Configuring OAuth 2.0 for Kafka components 3.8. Using OAuth 2.0 token-based authorization Expand section "3.8. Using OAuth 2.0 token-based authorization" Collapse section "3.8. Using OAuth 2.0 token-based authorization" 3.8.1. OAuth 2.0 authorization mechanism Expand section "3.8.1. OAuth 2.0 authorization mechanism" Collapse section "3.8.1. OAuth 2.0 authorization mechanism" 3.8.1.1. Kafka broker custom authorizer 3.8.2. Configuring OAuth 2.0 authorization support 3.9. Customizing deployments Expand section "3.9. Customizing deployments" Collapse section "3.9. Customizing deployments" 3.9.1. Template properties Expand section "3.9.1. Template properties" Collapse section "3.9.1. Template properties" 3.9.1.1. Supported template properties for a Kafka cluster 3.9.1.2. Supported template properties for a ZooKeeper cluster 3.9.1.3. Supported template properties for Entity Operator 3.9.1.4. Supported template properties for Kafka Exporter 3.9.1.5. Supported template properties for Kafka Connect and Kafka Connect with Source2Image support 3.9.1.6. Supported template properties for Kafka MirrorMaker 3.9.2. Labels and Annotations 3.9.3. Customizing Pods 3.9.4. Customizing containers with environment variables 3.9.5. Customizing external Services 3.9.6. Customizing the image pull policy 3.9.7. Customizing Pod Disruption Budgets 3.9.8. Customizing deployments 3.10. External logging Expand section "3.10. External logging" Collapse section "3.10. External logging" 3.10.1. Creating a ConfigMap for logging 4. Operators Expand section "4. Operators" Collapse section "4. Operators" 4.1. Cluster Operator Expand section "4.1. Cluster Operator" Collapse section "4.1. Cluster Operator" 4.1.1. Cluster Operator 4.1.2. Reconciliation 4.1.3. Cluster Operator Configuration 4.1.4. Role-Based Access Control (RBAC) Expand section "4.1.4. Role-Based Access Control (RBAC)" Collapse section "4.1.4. Role-Based Access Control (RBAC)" 4.1.4.1. Provisioning Role-Based Access Control (RBAC) for the Cluster Operator 4.1.4.2. Delegated privileges 4.1.4.3. ServiceAccount 4.1.4.4. ClusterRoles 4.1.4.5. ClusterRoleBindings 4.2. Topic Operator Expand section "4.2. Topic Operator" Collapse section "4.2. Topic Operator" 4.2.1. Topic Operator 4.2.2. Identifying a Kafka cluster for topic handling 4.2.3. Understanding the Topic Operator 4.2.4. Configuring the Topic Operator with resource requests and limits 4.3. User Operator Expand section "4.3. User Operator" Collapse section "4.3. User Operator" 4.3.1. User Operator 4.3.2. Identifying a Kafka cluster for user handling 4.3.3. Configuring the User Operator with resource requests and limits 4.4. Monitoring Operators Expand section "4.4. Monitoring Operators" Collapse section "4.4. Monitoring Operators" 4.4.1. Prometheus metrics 5. Using the Topic Operator Expand section "5. Using the Topic Operator" Collapse section "5. Using the Topic Operator" 5.1. Kafka topic resource Expand section "5.1. Kafka topic resource" Collapse section "5.1. Kafka topic resource" 5.1.1. Kafka topic usage recommendations 5.1.2. Kafka topic naming conventions 5.2. Configuring a Kafka topic 6. Using the User Operator Expand section "6. Using the User Operator" Collapse section "6. Using the User Operator" 6.1. Kafka user resource Expand section "6.1. Kafka user resource" Collapse section "6.1. Kafka user resource" 6.1.1. User authentication Expand section "6.1.1. User authentication" Collapse section "6.1.1. User authentication" 6.1.1.1. TLS Client Authentication 6.1.1.2. SCRAM-SHA-512 Authentication 6.1.2. User authorization Expand section "6.1.2. User authorization" Collapse section "6.1.2. User authorization" 6.1.2.1. Super user access to Kafka brokers 6.1.3. User quotas 6.2. Configuring a Kafka user 7. Kafka Bridge Expand section "7. Kafka Bridge" Collapse section "7. Kafka Bridge" 7.1. Kafka Bridge overview Expand section "7.1. Kafka Bridge overview" Collapse section "7.1. Kafka Bridge overview" 7.1.1. Kafka Bridge interface Expand section "7.1.1. Kafka Bridge interface" Collapse section "7.1.1. Kafka Bridge interface" 7.1.1.1. HTTP requests 7.1.2. Supported clients for the Kafka Bridge 7.1.3. Securing the Kafka Bridge 7.1.4. Accessing the Kafka Bridge outside of OpenShift 7.1.5. Requests to the Kafka Bridge Expand section "7.1.5. Requests to the Kafka Bridge" Collapse section "7.1.5. Requests to the Kafka Bridge" 7.1.5.1. Content Type headers 7.1.5.2. Embedded data format 7.1.5.3. Accept headers 7.1.6. Kafka Bridge API resources 7.1.7. Kafka Bridge deployment 7.2. Kafka Bridge quickstart Expand section "7.2. Kafka Bridge quickstart" Collapse section "7.2. Kafka Bridge quickstart" 7.2.1. Deploying the Kafka Bridge to your OpenShift cluster 7.2.2. Exposing the Kafka Bridge service to your local machine 7.2.3. Producing messages to topics and partitions 7.2.4. Creating a Kafka Bridge consumer 7.2.5. Subscribing a Kafka Bridge consumer to topics 7.2.6. Retrieving the latest messages from a Kafka Bridge consumer 7.2.7. Commiting offsets to the log 7.2.8. Seeking to offsets for a partition 7.2.9. Deleting a Kafka Bridge consumer 8. Using the Kafka Bridge with 3scale Expand section "8. Using the Kafka Bridge with 3scale" Collapse section "8. Using the Kafka Bridge with 3scale" 8.1. Using the Kafka Bridge with 3scale Expand section "8.1. Using the Kafka Bridge with 3scale" Collapse section "8.1. Using the Kafka Bridge with 3scale" 8.1.1. Kafka Bridge service discovery 8.1.2. 3scale APIcast gateway policies 8.1.3. TLS validation 8.1.4. 3scale documentation 8.2. Deploying 3scale for the Kafka Bridge 9. Cruise Control for cluster rebalancing Expand section "9. Cruise Control for cluster rebalancing" Collapse section "9. Cruise Control for cluster rebalancing" 9.1. Why use Cruise Control? 9.2. Optimization goals overview 9.3. Optimization proposals overview 9.4. Deploying Cruise Control 9.5. Cruise Control configuration 9.6. Generating optimization proposals 9.7. Approving an optimization proposal 9.8. Stopping a cluster rebalance 9.9. Fixing problems with a KafkaRebalance resource 10. Managing schemas with Service Registry Expand section "10. Managing schemas with Service Registry" Collapse section "10. Managing schemas with Service Registry" 10.1. Why use Service Registry? 10.2. Producer schema configuration 10.3. Consumer schema configuration 10.4. Strategies to lookup a schema 10.5. Service Registry constants 10.6. Installing Service Registry 10.7. Registering a schema to Service Registry 10.8. Using a Service Registry schema from a producer client 10.9. Using a Service Registry schema from a consumer client 11. Distributed tracing Expand section "11. Distributed tracing" Collapse section "11. Distributed tracing" 11.1. Overview of distributed tracing in AMQ Streams Expand section "11.1. Overview of distributed tracing in AMQ Streams" Collapse section "11.1. Overview of distributed tracing in AMQ Streams" 11.1.1. Distributed tracing support in AMQ Streams 11.2. Setting up tracing for Kafka clients Expand section "11.2. Setting up tracing for Kafka clients" Collapse section "11.2. Setting up tracing for Kafka clients" 11.2.1. Initializing a Jaeger tracer for Kafka clients 11.2.2. Tracing environment variables 11.3. Instrumenting Kafka clients with tracers Expand section "11.3. Instrumenting Kafka clients with tracers" Collapse section "11.3. Instrumenting Kafka clients with tracers" 11.3.1. Instrumenting Kafka Producers and Consumers for tracing Expand section "11.3.1. Instrumenting Kafka Producers and Consumers for tracing" Collapse section "11.3.1. Instrumenting Kafka Producers and Consumers for tracing" 11.3.1.1. Custom span names in a Decorator pattern 11.3.1.2. Built-in span names 11.3.2. Instrumenting Kafka Streams applications for tracing 11.4. Setting up tracing for MirrorMaker, Kafka Connect, and the Kafka Bridge Expand section "11.4. Setting up tracing for MirrorMaker, Kafka Connect, and the Kafka Bridge" Collapse section "11.4. Setting up tracing for MirrorMaker, Kafka Connect, and the Kafka Bridge" 11.4.1. Enabling tracing in MirrorMaker, Kafka Connect, and Kafka Bridge resources 12. Security Expand section "12. Security" Collapse section "12. Security" 12.1. Certificate Authorities Expand section "12.1. Certificate Authorities" Collapse section "12.1. Certificate Authorities" 12.1.1. CA certificates 12.1.2. Validity periods of CA certificates 12.1.3. Installing your own CA certificates 12.2. Secrets Expand section "12.2. Secrets" Collapse section "12.2. Secrets" 12.2.1. PKCS #12 storage 12.2.2. Cluster CA Secrets 12.2.3. Client CA Secrets 12.2.4. User Secrets 12.3. Certificate renewal Expand section "12.3. Certificate renewal" Collapse section "12.3. Certificate renewal" 12.3.1. Renewal process with generated CAs 12.3.2. Client applications Expand section "12.3.2. Client applications" Collapse section "12.3.2. Client applications" 12.3.2.1. Client certificate renewal 12.3.3. Renewing CA certificates manually 12.3.4. Renewing your own CA certificates 12.4. Replacing private keys 12.5. TLS connections Expand section "12.5. TLS connections" Collapse section "12.5. TLS connections" 12.5.1. ZooKeeper communication 12.5.2. Kafka interbroker communication 12.5.3. Topic and User Operators 12.5.4. Kafka Client connections 12.6. Configuring internal clients to trust the cluster CA 12.7. Configuring external clients to trust the cluster CA 12.8. Kafka listener certificates Expand section "12.8. Kafka listener certificates" Collapse section "12.8. Kafka listener certificates" 12.8.1. Providing your own Kafka listener certificates 12.8.2. Alternative subjects in server certificates for Kafka listeners Expand section "12.8.2. Alternative subjects in server certificates for Kafka listeners" Collapse section "12.8.2. Alternative subjects in server certificates for Kafka listeners" 12.8.2.1. TLS listener SAN examples 12.8.2.2. External listener SAN examples 13. Managing AMQ Streams Expand section "13. Managing AMQ Streams" Collapse section "13. Managing AMQ Streams" 13.1. Discovering services using labels and annotations Expand section "13.1. Discovering services using labels and annotations" Collapse section "13.1. Discovering services using labels and annotations" 13.1.1. Returning connection details on services 13.2. Checking the status of a custom resource Expand section "13.2. Checking the status of a custom resource" Collapse section "13.2. Checking the status of a custom resource" 13.2.1. AMQ Streams custom resource status information 13.2.2. Finding the status of a custom resource 13.3. Recovering a cluster from persistent volumes Expand section "13.3. Recovering a cluster from persistent volumes" Collapse section "13.3. Recovering a cluster from persistent volumes" 13.3.1. Recovery from namespace deletion 13.3.2. Recovery from loss of an OpenShift cluster 13.3.3. Recovering a deleted cluster from persistent volumes 13.4. Uninstalling AMQ Streams A. Frequently asked questions Expand section "A. Frequently asked questions" Collapse section "A. Frequently asked questions" A.1. Questions related to the Cluster Operator Expand section "A.1. Questions related to the Cluster Operator" Collapse section "A.1. Questions related to the Cluster Operator" A.1.1. Why do I need cluster administrator privileges to install AMQ Streams? A.1.2. Why does the Cluster Operator need to create ClusterRoleBindings? A.1.3. Can standard OpenShift users create Kafka custom resources? A.1.4. What do the failed to acquire lock warnings in the log mean? A.1.5. Why is hostname verification failing when connecting to NodePorts using TLS? B. Custom Resource API Reference Expand section "B. Custom Resource API Reference" Collapse section "B. Custom Resource API Reference" B.1. Kafka schema reference B.2. KafkaSpec schema reference B.3. KafkaClusterSpec schema reference B.4. EphemeralStorage schema reference B.5. PersistentClaimStorage schema reference B.6. PersistentClaimStorageOverride schema reference B.7. JbodStorage schema reference B.8. KafkaListeners schema reference B.9. KafkaListenerPlain schema reference B.10. KafkaListenerAuthenticationTls schema reference B.11. KafkaListenerAuthenticationScramSha512 schema reference B.12. KafkaListenerAuthenticationOAuth schema reference B.13. GenericSecretSource schema reference B.14. CertSecretSource schema reference B.15. KafkaListenerTls schema reference B.16. TlsListenerConfiguration schema reference B.17. CertAndKeySecretSource schema reference B.18. KafkaListenerExternalRoute schema reference B.19. RouteListenerOverride schema reference B.20. RouteListenerBootstrapOverride schema reference B.21. RouteListenerBrokerOverride schema reference B.22. KafkaListenerExternalConfiguration schema reference B.23. KafkaListenerExternalLoadBalancer schema reference B.24. LoadBalancerListenerOverride schema reference B.25. LoadBalancerListenerBootstrapOverride schema reference B.26. LoadBalancerListenerBrokerOverride schema reference B.27. KafkaListenerExternalNodePort schema reference B.28. NodePortListenerOverride schema reference B.29. NodePortListenerBootstrapOverride schema reference B.30. NodePortListenerBrokerOverride schema reference B.31. NodePortListenerConfiguration schema reference B.32. KafkaListenerExternalIngress schema reference B.33. IngressListenerConfiguration schema reference B.34. IngressListenerBootstrapConfiguration schema reference B.35. IngressListenerBrokerConfiguration schema reference B.36. KafkaAuthorizationSimple schema reference B.37. KafkaAuthorizationOpa schema reference B.38. KafkaAuthorizationKeycloak schema reference B.39. Rack schema reference B.40. Probe schema reference B.41. JvmOptions schema reference B.42. SystemProperty schema reference B.43. KafkaJmxOptions schema reference B.44. KafkaJmxAuthenticationPassword schema reference B.45. InlineLogging schema reference B.46. ExternalLogging schema reference B.47. TlsSidecar schema reference B.48. KafkaClusterTemplate schema reference B.49. StatefulSetTemplate schema reference B.50. MetadataTemplate schema reference B.51. PodTemplate schema reference B.52. ResourceTemplate schema reference B.53. ExternalServiceTemplate schema reference B.54. PodDisruptionBudgetTemplate schema reference B.55. ContainerTemplate schema reference B.56. ContainerEnvVar schema reference B.57. ZookeeperClusterSpec schema reference B.58. ZookeeperClusterTemplate schema reference B.59. TopicOperatorSpec schema reference B.60. EntityOperatorSpec schema reference B.61. EntityTopicOperatorSpec schema reference B.62. EntityUserOperatorSpec schema reference B.63. EntityOperatorTemplate schema reference B.64. CertificateAuthority schema reference B.65. CruiseControlSpec schema reference B.66. CruiseControlTemplate schema reference B.67. BrokerCapacity schema reference B.68. KafkaExporterSpec schema reference B.69. KafkaExporterTemplate schema reference B.70. KafkaStatus schema reference B.71. Condition schema reference B.72. ListenerStatus schema reference B.73. ListenerAddress schema reference B.74. KafkaConnect schema reference B.75. KafkaConnectSpec schema reference B.76. KafkaConnectTls schema reference B.77. KafkaClientAuthenticationTls schema reference B.78. KafkaClientAuthenticationScramSha512 schema reference B.79. PasswordSecretSource schema reference B.80. KafkaClientAuthenticationPlain schema reference B.81. KafkaClientAuthenticationOAuth schema reference B.82. JaegerTracing schema reference B.83. KafkaConnectTemplate schema reference B.84. ExternalConfiguration schema reference B.85. ExternalConfigurationEnv schema reference B.86. ExternalConfigurationEnvVarSource schema reference B.87. ExternalConfigurationVolumeSource schema reference B.88. KafkaConnectStatus schema reference B.89. ConnectorPlugin schema reference B.90. KafkaConnectS2I schema reference B.91. KafkaConnectS2ISpec schema reference B.92. KafkaConnectS2IStatus schema reference B.93. KafkaTopic schema reference B.94. KafkaTopicSpec schema reference B.95. KafkaTopicStatus schema reference B.96. KafkaUser schema reference B.97. KafkaUserSpec schema reference B.98. KafkaUserTlsClientAuthentication schema reference B.99. KafkaUserScramSha512ClientAuthentication schema reference B.100. KafkaUserAuthorizationSimple schema reference B.101. AclRule schema reference B.102. AclRuleTopicResource schema reference B.103. AclRuleGroupResource schema reference B.104. AclRuleClusterResource schema reference B.105. AclRuleTransactionalIdResource schema reference B.106. KafkaUserQuotas schema reference B.107. KafkaUserStatus schema reference B.108. KafkaMirrorMaker schema reference B.109. KafkaMirrorMakerSpec schema reference B.110. KafkaMirrorMakerConsumerSpec schema reference B.111. KafkaMirrorMakerTls schema reference B.112. KafkaMirrorMakerProducerSpec schema reference B.113. KafkaMirrorMakerTemplate schema reference B.114. KafkaMirrorMakerStatus schema reference B.115. KafkaBridge schema reference B.116. KafkaBridgeSpec schema reference B.117. KafkaBridgeTls schema reference B.118. KafkaBridgeHttpConfig schema reference B.119. KafkaBridgeHttpCors schema reference B.120. KafkaBridgeConsumerSpec schema reference B.121. KafkaBridgeProducerSpec schema reference B.122. KafkaBridgeTemplate schema reference B.123. KafkaBridgeStatus schema reference B.124. KafkaConnector schema reference B.125. KafkaConnectorSpec schema reference B.126. KafkaConnectorStatus schema reference B.127. KafkaMirrorMaker2 schema reference B.128. KafkaMirrorMaker2Spec schema reference B.129. KafkaMirrorMaker2ClusterSpec schema reference B.130. KafkaMirrorMaker2Tls schema reference B.131. KafkaMirrorMaker2MirrorSpec schema reference B.132. KafkaMirrorMaker2ConnectorSpec schema reference B.133. KafkaMirrorMaker2Status schema reference B.134. KafkaRebalance schema reference B.135. KafkaRebalanceSpec schema reference B.136. KafkaRebalanceStatus schema reference C. Using Your Subscription Legal Notice Settings Close Language: 日本語 English Language: 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 English Language: 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Using AMQ Streams on OpenShift Red Hat AMQ 7.7For use with AMQ Streams 1.5 on OpenShift Container PlatformLegal NoticeAbstract This guide describes how to install, configure, and manage Red Hat AMQ Streams to build a large-scale messaging network. Next