This is an automated email from the ASF dual-hosted git repository.

rgoers pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/flume-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 4ae3fb36 Add info about Kafka headers and timestamp
4ae3fb36 is described below

commit 4ae3fb36c00b5e0b19dc0ca67c6160c0676a31ba
Author: Ralph Goers <[email protected]>
AuthorDate: Sat Oct 8 12:43:13 2022 -0700

    Add info about Kafka headers and timestamp
---
 source/sphinx/FlumeUserGuide.rst | 8 ++++++++
 source/sphinx/security.rst       | 2 +-
 2 files changed, 9 insertions(+), 1 deletion(-)

diff --git a/source/sphinx/FlumeUserGuide.rst b/source/sphinx/FlumeUserGuide.rst
index b0dcf928..45632aa0 100644
--- a/source/sphinx/FlumeUserGuide.rst
+++ b/source/sphinx/FlumeUserGuide.rst
@@ -1814,6 +1814,10 @@ topicHeader                         topic        Defines 
the name of the header
                                                  from, if the 
``setTopicHeader`` property is set to ``true``. Care should be taken if 
combining
                                                  with the Kafka Sink 
``topicHeader`` property so as to avoid sending the message back to the same
                                                  topic in a loop.
+timestampHeader                     --           If present the Kafka message 
timestamp value will be copied into the specified Flume header name.
+header.NAME                         --           Used to identify which 
headers from the Kafka message should be added as a FLume header. The value
+                                                 of NAME should match the 
Flume header name and the value should be the name of the header to be used
+                                                 as the Kafka header name.
 kafka.consumer.security.protocol    PLAINTEXT    Set to SASL_PLAINTEXT, 
SASL_SSL or SSL if writing to Kafka using some level of security. See below for 
additional info on secure setup.
 *more consumer security props*                   If using SASL_PLAINTEXT, 
SASL_SSL or SSL refer to `Kafka security 
<http://kafka.apache.org/documentation.html#security>`_ for additional
                                                  properties that need to be 
set on consumer.
@@ -3441,6 +3445,10 @@ partitionIdHeader                   --                   
When set, the sink will
 allowTopicOverride                  true                 When set, the sink 
will allow a message to be produced into a topic specified by the 
``topicHeader`` property (if provided).
 topicHeader                         topic                When set in 
conjunction with ``allowTopicOverride`` will produce a message into the value 
of the header named using the value of this property.
                                                          Care should be taken 
when using in conjunction with the Kafka Source ``topicHeader`` property to 
avoid creating a loopback.
+timestampHeader                     --                   The header containing 
the caller provided timestamp value to use. If not provided the current time 
will
+                                                         be used.
+header.NAME                         --                   Used to identify 
which headers from the Flume Event should be passed to Kafka. The value of NAME 
should match
+                                                         the Flume header name 
and the value should be the name of the header to be used as the Kafka header 
name.
 kafka.producer.security.protocol    PLAINTEXT            Set to 
SASL_PLAINTEXT, SASL_SSL or SSL if writing to Kafka using some level of 
security. See below for additional info on secure setup.
 *more producer security props*                           If using 
SASL_PLAINTEXT, SASL_SSL or SSL refer to `Kafka security 
<http://kafka.apache.org/documentation.html#security>`_ for additional
                                                          properties that need 
to be set on producer.
diff --git a/source/sphinx/security.rst b/source/sphinx/security.rst
index ee4ca840..be6fae26 100644
--- a/source/sphinx/security.rst
+++ b/source/sphinx/security.rst
@@ -15,7 +15,7 @@ If you have encountered an unlisted security vulnerability or 
other unexpected b
 `CVE-2022-34916 
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916>`__: Apache 
Flume vulnerable to a JNDI RCE in JMSMessageConsumer.
 
 
+------------------------------------------------------------------------------------+--------------------------------------------------------------------------+
-| `CVE-2022-25167 
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916>`__ | 
Deserialization of Untrusted Data                                        |
+| `CVE-2022-34916 
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916>`__ | 
Deserialization of Untrusted Data                                        |
 
+====================================================================================+==========================================================================+
 | Severity                                                                     
      | Moderate                                                                
 |
 
+------------------------------------------------------------------------------------+--------------------------------------------------------------------------+

Reply via email to