This is an automated email from the ASF dual-hosted git repository.

urfree pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/pulsar-site.git


The following commit(s) were added to refs/heads/main by this push:
     new e639c2ef974 Docs sync done from apache/pulsar(#cb30582)
e639c2ef974 is described below

commit e639c2ef974f7010f18cf3fb20d1b8a10620938c
Author: Pulsar Site Updater <[email protected]>
AuthorDate: Mon Aug 1 06:08:20 2022 +0000

    Docs sync done from apache/pulsar(#cb30582)
---
 site2/website-next/docs/client-libraries-java.md            |  6 ++----
 site2/website-next/docs/functions-cli.md                    |  4 ++--
 site2/website-next/docs/functions-concepts.md               | 13 +++++++++----
 .../version-2.1.0-incubating/client-libraries-java.md       |  4 +---
 .../version-2.1.1-incubating/client-libraries-java.md       |  6 ++----
 .../versioned_docs/version-2.10.0/client-libraries-java.md  |  6 ++----
 .../versioned_docs/version-2.10.1/client-libraries-java.md  |  2 --
 .../versioned_docs/version-2.2.0/client-libraries-java.md   |  6 ++----
 .../versioned_docs/version-2.2.1/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.3.0/client-libraries-java.md   |  6 ++----
 .../versioned_docs/version-2.3.1/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.3.2/client-libraries-java.md   |  6 ++----
 .../versioned_docs/version-2.4.0/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.4.1/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.4.2/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.5.0/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.5.1/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.5.2/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.6.0/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.6.1/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.6.2/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.6.3/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.6.4/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.7.0/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.7.1/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.7.2/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.7.3/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.7.4/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.8.0/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.8.1/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.8.2/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.8.3/client-libraries-java.md   |  4 +---
 .../versioned_docs/version-2.9.0/client-libraries-java.md   |  6 ++----
 .../versioned_docs/version-2.9.1/client-libraries-java.md   |  6 ++----
 .../versioned_docs/version-2.9.2/client-libraries-java.md   |  6 ++----
 35 files changed, 52 insertions(+), 113 deletions(-)

diff --git a/site2/website-next/docs/client-libraries-java.md 
b/site2/website-next/docs/client-libraries-java.md
index c1cad8a7fe1..6e72d7fdae2 100644
--- a/site2/website-next/docs/client-libraries-java.md
+++ b/site2/website-next/docs/client-libraries-java.md
@@ -140,7 +140,7 @@ If you create a client, you can use the `loadConf` 
configuration. The following
 `numIoThreads`| int| The number of threads used for handling connections to 
brokers | 1 
 `numListenerThreads`|int|The number of threads used for handling message 
listeners. The listener thread pool is shared across all the consumers and 
readers using the "listener" model to get messages. For a given consumer, the 
listener is always invoked from the same thread to ensure ordering. If you want 
multiple threads to process a single topic, you need to create a 
[`shared`](/concepts-messaging.md#shared) subscription and multiple consumers 
for this subscription. This does not ensure [...]
 `useTcpNoDelay`| boolean| Whether to use TCP no-delay flag on the connection 
to disable Nagle algorithm |true
-`useTls` |boolean |Whether to use TLS encryption on the connection| false
+`enableTls` |boolean | Whether to use TLS encryption on the connection. Note 
that this parameter is **deprecated**. If you want to enable TLS, use 
`pulsar+ssl://` in `serviceUrl` instead. | false
  `tlsTrustCertsFilePath` |string |Path to the trusted TLS certificate file|None
 `tlsAllowInsecureConnection`|boolean|Whether the Pulsar client accepts 
untrusted TLS certificate from broker | false
 `tlsHostnameVerificationEnable` |boolean |  Whether to enable TLS hostname 
verification|false
@@ -1515,7 +1515,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication.md), you need to set TLS to `true` 
using the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -1530,7 +1530,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -1562,7 +1561,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git a/site2/website-next/docs/functions-cli.md 
b/site2/website-next/docs/functions-cli.md
index 316266ab069..c2c4f3ee9fa 100644
--- a/site2/website-next/docs/functions-cli.md
+++ b/site2/website-next/docs/functions-cli.md
@@ -38,7 +38,7 @@ You can configure a function by using a predefined YAML file. 
The following tabl
 | outputSchemaType     | String                     | `-st`, `--schema-type`   
  | The built-in schema type or custom schema class name used for message 
outputs.   |
 | outputSerdeClassName | String                     | 
`--output-serde-classname` | The SerDe class used for message outputs. |
 | logTopic             | String                     | `--log-topic`            
  | The topic that the logs of a function are produced to.  |
-| processingGuarantees | String | `--processing-guarantees` | The processing 
guarantees (delivery semantics) applied to a function. Available values: 
`ATLEAST_ONCE`, `ATMOST_ONCE`, `EFFECTIVELY_ONCE`.|
+| processingGuarantees | String | `--processing-guarantees` | The processing 
guarantees (delivery semantics) applied to a function. Available values: 
`ATLEAST_ONCE`, `ATMOST_ONCE`, `EFFECTIVELY_ONCE`, `MANUAL`.|
 | retainOrdering       | Boolean                    | `--retain-ordering`      
     | Whether functions consume and process messages in order or not. |
 | retainKeyOrdering    | Boolean                    | `--retain-key-ordering`  
  | Whether functions consume and process messages in key order or not. |
 | batchBuilder         | String           | `--batch-builder` | Use 
`producerConfig.batchBuilder` instead. <br />**Note**: `batchBuilder` will be 
deprecated in code soon. |
@@ -46,7 +46,7 @@ You can configure a function by using a predefined YAML file. 
The following tabl
 | userConfig           | Map`<String,Object>`         | `--user-config`        
         | User-defined config key/values. |
 | secrets       | Map`<String,Object>` | `--secrets`   | The mapping from 
secretName to objects that encapsulate how the secret is fetched by the 
underlying secrets provider. |
 | runtime       | String             | N/A          | The runtime of a 
function. Available values: `java`,`python`, `go`. |
-| autoAck       | Boolean            | `--auto-ack` | Whether the framework 
acknowledges messages automatically or not. |
+| autoAck       | Boolean            | `--auto-ack` | Whether the framework 
acknowledges messages automatically or not. <br /><br />**Tip**: This 
configuration will be deprecated. If the user specifies delivery semantics, the 
framework will automatically ack messages. If you do not want the framework to 
ack messages, set the **processingGuarantees** to `MANUAL`. |
 | maxMessageRetries    | Int      |    `--max-message-retries` | The number of 
retries to process a message before giving up. |
 | deadLetterTopic      | String   | `--dead-letter-topic`   | The topic used 
for storing messages that are not processed successfully. |
 | subName              | String   | `--subs-name`           | The name of 
Pulsar source subscription used for input-topic consumers if required.|
diff --git a/site2/website-next/docs/functions-concepts.md 
b/site2/website-next/docs/functions-concepts.md
index a758ce45f2c..cfbba46aaf2 100644
--- a/site2/website-next/docs/functions-concepts.md
+++ b/site2/website-next/docs/functions-concepts.md
@@ -71,13 +71,15 @@ The following table outlines the three types of function 
runtime.
 
 ## Processing guarantees and subscription types
 
-Pulsar provides three different messaging delivery semantics that you can 
apply to a function. 
+Pulsar provides three different messaging delivery semantics that you can 
apply to a function. Different delivery semantic implementations are determined 
according to the **ack time node**.
 
 | Delivery semantics | Description | Adopted subscription type |
 |--------------------|-------------|---------------------------|
-| **At-most-once** delivery | Each message sent to a function is processed at 
its best effort. There’s no guarantee that the message will be processed or 
not. | Shared |
-| **At-least-once** delivery (default) | Each message sent to the function can 
be processed more than once (in case of a processing failure or redelivery).<br 
/><br />If you create a function without specifying the 
`--processing-guarantees` flag, the function provides `at-least-once` delivery 
guarantee. | Shared |
-| **Effectively-once** delivery | Each message sent to the function can be 
processed more than once but it has only one output. Duplicated messages are 
ignored.<br /><br />`Effectively once` is achieved on top of `at-least-once` 
processing and guaranteed server-side deduplication. This means a state update 
can happen twice, but the same state update is only applied once, the other 
duplicated state update is discarded on the server-side. | Failover |
+| **At-most-once** delivery | Each message sent to a function is processed at 
its best effort. There’s no guarantee that the message will be processed or 
not. <br /><br /> When setting At-most-once, the `autoAck` configuration must 
be equal to true, otherwise the startup will fail(`autoAck` configuration will 
be deprecated in future releases). <br/><br/> **Ack time node**: Before 
function processing. | Shared |
+| **At-least-once** delivery (default) | Each message sent to the function can 
be processed more than once (in case of a processing failure or redelivery).<br 
/><br />If you create a function without specifying the 
`--processing-guarantees` flag, the function provides `at-least-once` delivery 
guarantee. <br/><br/> **Ack time node**: After sending a message to output. | 
Shared |
+| **Effectively-once** delivery | Each message sent to the function can be 
processed more than once but it has only one output. Duplicated messages are 
ignored.<br /><br />`Effectively once` is achieved on top of `at-least-once` 
processing and guaranteed server-side deduplication. This means a state update 
can happen twice, but the same state update is only applied once, the other 
duplicated state update is discarded on the server-side. <br/><br/> **Ack time 
node**: After sending a messa [...]
+| **Manual** delivery | Under this semantics, the user needs to call the 
method `context.getCurrentRecord().ack()` inside the function to manually 
perform the ack operation, and the framework will not help users to do any ack 
operations. <br/><br/> **Ack time node**: User decides, in function method. | 
Shared |
+
 
 :::tip
 
@@ -167,6 +169,9 @@ Both processing time and event time are supported.
  * Processing time is defined based on the wall time when the function 
instance builds and processes a window. The judging of window completeness is 
straightforward and you don’t have to worry about data arrival disorder. 
  * Event time is defined based on the timestamps that come with the event 
record. It guarantees event time correctness but also offers more data 
buffering and a limited completeness guarantee.
 
+Delivery Semantic Guarantees.
+ * Currently, window function does not support `MANUAL` and  
`Effectively-once` delivery semantics.
+   
 :::
 
 ### Types of window
diff --git 
a/site2/website-next/versioned_docs/version-2.1.0-incubating/client-libraries-java.md
 
b/site2/website-next/versioned_docs/version-2.1.0-incubating/client-libraries-java.md
index 6e7151c866a..18961cd46cb 100644
--- 
a/site2/website-next/versioned_docs/version-2.1.0-incubating/client-libraries-java.md
+++ 
b/site2/website-next/versioned_docs/version-2.1.0-incubating/client-libraries-java.md
@@ -475,7 +475,7 @@ Pulsar currently supports two authentication schemes: 
[TLS](security-tls-authent
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 Here's an example configuration:
 
@@ -490,7 +490,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -522,7 +521,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.1.1-incubating/client-libraries-java.md
 
b/site2/website-next/versioned_docs/version-2.1.1-incubating/client-libraries-java.md
index 791c626c28b..b201e8573e8 100644
--- 
a/site2/website-next/versioned_docs/version-2.1.1-incubating/client-libraries-java.md
+++ 
b/site2/website-next/versioned_docs/version-2.1.1-incubating/client-libraries-java.md
@@ -140,7 +140,7 @@ If you create a client, you can use the `loadConf` 
configuration. The following
 `numIoThreads`| int| The number of threads used for handling connections to 
brokers | 1 
 `numListenerThreads`|int|The number of threads used for handling message 
listeners. The listener thread pool is shared across all the consumers and 
readers using the "listener" model to get messages. For a given consumer, the 
listener is always invoked from the same thread to ensure ordering. If you want 
multiple threads to process a single topic, you need to create a 
[`shared`](https://pulsar.apache.org/docs/en/next/concepts-messaging/#shared) 
subscription and multiple consumers for thi [...]
 `useTcpNoDelay`| boolean| Whether to use TCP no-delay flag on the connection 
to disable Nagle algorithm |true
-`useTls` |boolean |Whether to use TLS encryption on the connection| false
+`enableTls` |boolean | Whether to use TLS encryption on the connection. Note 
that this parameter is **deprecated**. If you want to enable TLS, use 
`pulsar+ssl://` in `serviceUrl` instead. | false
  `tlsTrustCertsFilePath` |string |Path to the trusted TLS certificate file|None
 `tlsAllowInsecureConnection`|boolean|Whether the Pulsar client accepts 
untrusted TLS certificate from broker | false
 `tlsHostnameVerificationEnable` |boolean |  Whether to enable TLS hostname 
verification|false
@@ -1513,7 +1513,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -1528,7 +1528,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -1560,7 +1559,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.10.0/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.10.0/client-libraries-java.md
index 8be1962290e..030d9f6f9d5 100644
--- a/site2/website-next/versioned_docs/version-2.10.0/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.10.0/client-libraries-java.md
@@ -141,7 +141,7 @@ If you create a client, you can use the `loadConf` 
configuration. The following
 `numIoThreads`| int| The number of threads used for handling connections to 
brokers | 1 
 `numListenerThreads`|int|The number of threads used for handling message 
listeners. The listener thread pool is shared across all the consumers and 
readers using the "listener" model to get messages. For a given consumer, the 
listener is always invoked from the same thread to ensure ordering. If you want 
multiple threads to process a single topic, you need to create a 
[`shared`](concepts-messaging.md#shared) subscription and multiple consumers 
for this subscription. This does not ensure  [...]
 `useTcpNoDelay`| boolean| Whether to use TCP no-delay flag on the connection 
to disable Nagle algorithm |true
-`useTls` |boolean |Whether to use TLS encryption on the connection| false
+`enableTls` |boolean | Whether to use TLS encryption on the connection. Note 
that this parameter is **deprecated**. If you want to enable TLS, use 
`pulsar+ssl://` in `serviceUrl` instead. | false
  `tlsTrustCertsFilePath` |string |Path to the trusted TLS certificate file|None
 `tlsAllowInsecureConnection`|boolean|Whether the Pulsar client accepts 
untrusted TLS certificate from broker | false
 `tlsHostnameVerificationEnable` |boolean |  Whether to enable TLS hostname 
verification|false
@@ -1453,7 +1453,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication.md), you need to set TLS to `true` 
using the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -1468,7 +1468,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -1500,7 +1499,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.10.1/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.10.1/client-libraries-java.md
index 8be1962290e..efba798e6b2 100644
--- a/site2/website-next/versioned_docs/version-2.10.1/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.10.1/client-libraries-java.md
@@ -1468,7 +1468,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -1500,7 +1499,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.2.0/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.2.0/client-libraries-java.md
index 791c626c28b..b201e8573e8 100644
--- a/site2/website-next/versioned_docs/version-2.2.0/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.2.0/client-libraries-java.md
@@ -140,7 +140,7 @@ If you create a client, you can use the `loadConf` 
configuration. The following
 `numIoThreads`| int| The number of threads used for handling connections to 
brokers | 1 
 `numListenerThreads`|int|The number of threads used for handling message 
listeners. The listener thread pool is shared across all the consumers and 
readers using the "listener" model to get messages. For a given consumer, the 
listener is always invoked from the same thread to ensure ordering. If you want 
multiple threads to process a single topic, you need to create a 
[`shared`](https://pulsar.apache.org/docs/en/next/concepts-messaging/#shared) 
subscription and multiple consumers for thi [...]
 `useTcpNoDelay`| boolean| Whether to use TCP no-delay flag on the connection 
to disable Nagle algorithm |true
-`useTls` |boolean |Whether to use TLS encryption on the connection| false
+`enableTls` |boolean | Whether to use TLS encryption on the connection. Note 
that this parameter is **deprecated**. If you want to enable TLS, use 
`pulsar+ssl://` in `serviceUrl` instead. | false
  `tlsTrustCertsFilePath` |string |Path to the trusted TLS certificate file|None
 `tlsAllowInsecureConnection`|boolean|Whether the Pulsar client accepts 
untrusted TLS certificate from broker | false
 `tlsHostnameVerificationEnable` |boolean |  Whether to enable TLS hostname 
verification|false
@@ -1513,7 +1513,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -1528,7 +1528,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -1560,7 +1559,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.2.1/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.2.1/client-libraries-java.md
index eeba554ee19..c33b1a68be5 100644
--- a/site2/website-next/versioned_docs/version-2.2.1/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.2.1/client-libraries-java.md
@@ -474,7 +474,7 @@ Pulsar currently supports two authentication schemes: 
[TLS](security-tls-authent
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 Here's an example configuration:
 
@@ -489,7 +489,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -521,7 +520,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.3.0/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.3.0/client-libraries-java.md
index 791c626c28b..b201e8573e8 100644
--- a/site2/website-next/versioned_docs/version-2.3.0/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.3.0/client-libraries-java.md
@@ -140,7 +140,7 @@ If you create a client, you can use the `loadConf` 
configuration. The following
 `numIoThreads`| int| The number of threads used for handling connections to 
brokers | 1 
 `numListenerThreads`|int|The number of threads used for handling message 
listeners. The listener thread pool is shared across all the consumers and 
readers using the "listener" model to get messages. For a given consumer, the 
listener is always invoked from the same thread to ensure ordering. If you want 
multiple threads to process a single topic, you need to create a 
[`shared`](https://pulsar.apache.org/docs/en/next/concepts-messaging/#shared) 
subscription and multiple consumers for thi [...]
 `useTcpNoDelay`| boolean| Whether to use TCP no-delay flag on the connection 
to disable Nagle algorithm |true
-`useTls` |boolean |Whether to use TLS encryption on the connection| false
+`enableTls` |boolean | Whether to use TLS encryption on the connection. Note 
that this parameter is **deprecated**. If you want to enable TLS, use 
`pulsar+ssl://` in `serviceUrl` instead. | false
  `tlsTrustCertsFilePath` |string |Path to the trusted TLS certificate file|None
 `tlsAllowInsecureConnection`|boolean|Whether the Pulsar client accepts 
untrusted TLS certificate from broker | false
 `tlsHostnameVerificationEnable` |boolean |  Whether to enable TLS hostname 
verification|false
@@ -1513,7 +1513,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -1528,7 +1528,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -1560,7 +1559,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.3.1/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.3.1/client-libraries-java.md
index 5380d674333..ecf0eba3512 100644
--- a/site2/website-next/versioned_docs/version-2.3.1/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.3.1/client-libraries-java.md
@@ -481,7 +481,7 @@ Pulsar currently supports two authentication schemes: 
[TLS](security-tls-authent
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 Here's an example configuration:
 
@@ -496,7 +496,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -528,7 +527,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.3.2/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.3.2/client-libraries-java.md
index 791c626c28b..b201e8573e8 100644
--- a/site2/website-next/versioned_docs/version-2.3.2/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.3.2/client-libraries-java.md
@@ -140,7 +140,7 @@ If you create a client, you can use the `loadConf` 
configuration. The following
 `numIoThreads`| int| The number of threads used for handling connections to 
brokers | 1 
 `numListenerThreads`|int|The number of threads used for handling message 
listeners. The listener thread pool is shared across all the consumers and 
readers using the "listener" model to get messages. For a given consumer, the 
listener is always invoked from the same thread to ensure ordering. If you want 
multiple threads to process a single topic, you need to create a 
[`shared`](https://pulsar.apache.org/docs/en/next/concepts-messaging/#shared) 
subscription and multiple consumers for thi [...]
 `useTcpNoDelay`| boolean| Whether to use TCP no-delay flag on the connection 
to disable Nagle algorithm |true
-`useTls` |boolean |Whether to use TLS encryption on the connection| false
+`enableTls` |boolean | Whether to use TLS encryption on the connection. Note 
that this parameter is **deprecated**. If you want to enable TLS, use 
`pulsar+ssl://` in `serviceUrl` instead. | false
  `tlsTrustCertsFilePath` |string |Path to the trusted TLS certificate file|None
 `tlsAllowInsecureConnection`|boolean|Whether the Pulsar client accepts 
untrusted TLS certificate from broker | false
 `tlsHostnameVerificationEnable` |boolean |  Whether to enable TLS hostname 
verification|false
@@ -1513,7 +1513,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -1528,7 +1528,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -1560,7 +1559,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.4.0/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.4.0/client-libraries-java.md
index bc970118a84..778129d9077 100644
--- a/site2/website-next/versioned_docs/version-2.4.0/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.4.0/client-libraries-java.md
@@ -703,7 +703,7 @@ Pulsar currently supports two authentication schemes: 
[TLS](security-tls-authent
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 Here's an example configuration:
 
@@ -718,7 +718,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -750,7 +749,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.4.1/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.4.1/client-libraries-java.md
index 095d0475f41..686bd1241df 100644
--- a/site2/website-next/versioned_docs/version-2.4.1/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.4.1/client-libraries-java.md
@@ -748,7 +748,7 @@ Pulsar currently supports two authentication schemes: 
[TLS](security-tls-authent
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 Here's an example configuration:
 
@@ -763,7 +763,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -795,7 +794,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.4.2/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.4.2/client-libraries-java.md
index 095d0475f41..686bd1241df 100644
--- a/site2/website-next/versioned_docs/version-2.4.2/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.4.2/client-libraries-java.md
@@ -748,7 +748,7 @@ Pulsar currently supports two authentication schemes: 
[TLS](security-tls-authent
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 Here's an example configuration:
 
@@ -763,7 +763,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -795,7 +794,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.5.0/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.5.0/client-libraries-java.md
index 6f37d6ebbad..d5dc98fcb99 100644
--- a/site2/website-next/versioned_docs/version-2.5.0/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.5.0/client-libraries-java.md
@@ -875,7 +875,7 @@ Pulsar currently supports two authentication schemes: 
[TLS](security-tls-authent
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -890,7 +890,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -922,7 +921,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.5.1/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.5.1/client-libraries-java.md
index 801f9894dad..e1906188233 100644
--- a/site2/website-next/versioned_docs/version-2.5.1/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.5.1/client-libraries-java.md
@@ -877,7 +877,7 @@ Pulsar currently supports two authentication schemes: 
[TLS](security-tls-authent
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -892,7 +892,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -924,7 +923,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.5.2/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.5.2/client-libraries-java.md
index 801f9894dad..e1906188233 100644
--- a/site2/website-next/versioned_docs/version-2.5.2/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.5.2/client-libraries-java.md
@@ -877,7 +877,7 @@ Pulsar currently supports two authentication schemes: 
[TLS](security-tls-authent
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -892,7 +892,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -924,7 +923,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.6.0/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.6.0/client-libraries-java.md
index b6ced396cd0..e53110f93c7 100644
--- a/site2/website-next/versioned_docs/version-2.6.0/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.6.0/client-libraries-java.md
@@ -919,7 +919,7 @@ Pulsar currently supports two authentication schemes: 
[TLS](security-tls-authent
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -934,7 +934,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -966,7 +965,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.6.1/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.6.1/client-libraries-java.md
index 2399c1ad3a3..98572b1e35b 100644
--- a/site2/website-next/versioned_docs/version-2.6.1/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.6.1/client-libraries-java.md
@@ -900,7 +900,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -915,7 +915,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -947,7 +946,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.6.2/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.6.2/client-libraries-java.md
index 2399c1ad3a3..98572b1e35b 100644
--- a/site2/website-next/versioned_docs/version-2.6.2/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.6.2/client-libraries-java.md
@@ -900,7 +900,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -915,7 +915,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -947,7 +946,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.6.3/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.6.3/client-libraries-java.md
index 2399c1ad3a3..98572b1e35b 100644
--- a/site2/website-next/versioned_docs/version-2.6.3/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.6.3/client-libraries-java.md
@@ -900,7 +900,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -915,7 +915,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -947,7 +946,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.6.4/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.6.4/client-libraries-java.md
index b9ce639e5e6..a95ea3b2c7b 100644
--- a/site2/website-next/versioned_docs/version-2.6.4/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.6.4/client-libraries-java.md
@@ -901,7 +901,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -916,7 +916,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -948,7 +947,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.7.0/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.7.0/client-libraries-java.md
index 8bdec5bc562..bbe9473622f 100644
--- a/site2/website-next/versioned_docs/version-2.7.0/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.7.0/client-libraries-java.md
@@ -940,7 +940,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -955,7 +955,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -987,7 +986,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.7.1/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.7.1/client-libraries-java.md
index 8bdec5bc562..bbe9473622f 100644
--- a/site2/website-next/versioned_docs/version-2.7.1/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.7.1/client-libraries-java.md
@@ -940,7 +940,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -955,7 +955,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -987,7 +986,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.7.2/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.7.2/client-libraries-java.md
index 8bdec5bc562..bbe9473622f 100644
--- a/site2/website-next/versioned_docs/version-2.7.2/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.7.2/client-libraries-java.md
@@ -940,7 +940,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -955,7 +955,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -987,7 +986,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.7.3/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.7.3/client-libraries-java.md
index 8bdec5bc562..bbe9473622f 100644
--- a/site2/website-next/versioned_docs/version-2.7.3/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.7.3/client-libraries-java.md
@@ -940,7 +940,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -955,7 +955,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -987,7 +986,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.7.4/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.7.4/client-libraries-java.md
index 8bdec5bc562..bbe9473622f 100644
--- a/site2/website-next/versioned_docs/version-2.7.4/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.7.4/client-libraries-java.md
@@ -940,7 +940,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -955,7 +955,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -987,7 +986,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.8.0/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.8.0/client-libraries-java.md
index cdc1794bab3..9c4e129e3e6 100644
--- a/site2/website-next/versioned_docs/version-2.8.0/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.8.0/client-libraries-java.md
@@ -946,7 +946,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -961,7 +961,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -993,7 +992,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.8.1/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.8.1/client-libraries-java.md
index b31b7a225f2..e57c83f7963 100644
--- a/site2/website-next/versioned_docs/version-2.8.1/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.8.1/client-libraries-java.md
@@ -949,7 +949,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -964,7 +964,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -996,7 +995,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.8.2/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.8.2/client-libraries-java.md
index b31b7a225f2..e57c83f7963 100644
--- a/site2/website-next/versioned_docs/version-2.8.2/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.8.2/client-libraries-java.md
@@ -949,7 +949,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -964,7 +964,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -996,7 +995,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.8.3/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.8.3/client-libraries-java.md
index b31b7a225f2..e57c83f7963 100644
--- a/site2/website-next/versioned_docs/version-2.8.3/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.8.3/client-libraries-java.md
@@ -949,7 +949,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -964,7 +964,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -996,7 +995,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.9.0/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.9.0/client-libraries-java.md
index 613e91f3fe5..e87c5e6c23c 100644
--- a/site2/website-next/versioned_docs/version-2.9.0/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.9.0/client-libraries-java.md
@@ -128,7 +128,7 @@ If you create a client, you can use the `loadConf` 
configuration. The following
 `numIoThreads`| int| The number of threads used for handling connections to 
brokers | 1 
 `numListenerThreads`|int|The number of threads used for handling message 
listeners. The listener thread pool is shared across all the consumers and 
readers using the "listener" model to get messages. For a given consumer, the 
listener is always invoked from the same thread to ensure ordering. If you want 
multiple threads to process a single topic, you need to create a 
[`shared`](https://pulsar.apache.org/docs/en/next/concepts-messaging/#shared) 
subscription and multiple consumers for thi [...]
 `useTcpNoDelay`| boolean| Whether to use TCP no-delay flag on the connection 
to disable Nagle algorithm |true
-`useTls` |boolean |Whether to use TLS encryption on the connection| false
+`enableTls` |boolean | Whether to use TLS encryption on the connection. Note 
that this parameter is **deprecated**. If you want to enable TLS, use 
`pulsar+ssl://` in `serviceUrl` instead. | false
  `tlsTrustCertsFilePath` |string |Path to the trusted TLS certificate file|None
 `tlsAllowInsecureConnection`|boolean|Whether the Pulsar client accepts 
untrusted TLS certificate from broker | false
 `tlsHostnameVerificationEnable` |boolean |  Whether to enable TLS hostname 
verification|false
@@ -949,7 +949,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -964,7 +964,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -996,7 +995,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.9.1/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.9.1/client-libraries-java.md
index 613e91f3fe5..e87c5e6c23c 100644
--- a/site2/website-next/versioned_docs/version-2.9.1/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.9.1/client-libraries-java.md
@@ -128,7 +128,7 @@ If you create a client, you can use the `loadConf` 
configuration. The following
 `numIoThreads`| int| The number of threads used for handling connections to 
brokers | 1 
 `numListenerThreads`|int|The number of threads used for handling message 
listeners. The listener thread pool is shared across all the consumers and 
readers using the "listener" model to get messages. For a given consumer, the 
listener is always invoked from the same thread to ensure ordering. If you want 
multiple threads to process a single topic, you need to create a 
[`shared`](https://pulsar.apache.org/docs/en/next/concepts-messaging/#shared) 
subscription and multiple consumers for thi [...]
 `useTcpNoDelay`| boolean| Whether to use TCP no-delay flag on the connection 
to disable Nagle algorithm |true
-`useTls` |boolean |Whether to use TLS encryption on the connection| false
+`enableTls` |boolean | Whether to use TLS encryption on the connection. Note 
that this parameter is **deprecated**. If you want to enable TLS, use 
`pulsar+ssl://` in `serviceUrl` instead. | false
  `tlsTrustCertsFilePath` |string |Path to the trusted TLS certificate file|None
 `tlsAllowInsecureConnection`|boolean|Whether the Pulsar client accepts 
untrusted TLS certificate from broker | false
 `tlsHostnameVerificationEnable` |boolean |  Whether to enable TLS hostname 
verification|false
@@ -949,7 +949,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -964,7 +964,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -996,7 +995,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();
diff --git 
a/site2/website-next/versioned_docs/version-2.9.2/client-libraries-java.md 
b/site2/website-next/versioned_docs/version-2.9.2/client-libraries-java.md
index 613e91f3fe5..e87c5e6c23c 100644
--- a/site2/website-next/versioned_docs/version-2.9.2/client-libraries-java.md
+++ b/site2/website-next/versioned_docs/version-2.9.2/client-libraries-java.md
@@ -128,7 +128,7 @@ If you create a client, you can use the `loadConf` 
configuration. The following
 `numIoThreads`| int| The number of threads used for handling connections to 
brokers | 1 
 `numListenerThreads`|int|The number of threads used for handling message 
listeners. The listener thread pool is shared across all the consumers and 
readers using the "listener" model to get messages. For a given consumer, the 
listener is always invoked from the same thread to ensure ordering. If you want 
multiple threads to process a single topic, you need to create a 
[`shared`](https://pulsar.apache.org/docs/en/next/concepts-messaging/#shared) 
subscription and multiple consumers for thi [...]
 `useTcpNoDelay`| boolean| Whether to use TCP no-delay flag on the connection 
to disable Nagle algorithm |true
-`useTls` |boolean |Whether to use TLS encryption on the connection| false
+`enableTls` |boolean | Whether to use TLS encryption on the connection. Note 
that this parameter is **deprecated**. If you want to enable TLS, use 
`pulsar+ssl://` in `serviceUrl` instead. | false
  `tlsTrustCertsFilePath` |string |Path to the trusted TLS certificate file|None
 `tlsAllowInsecureConnection`|boolean|Whether the Pulsar client accepts 
untrusted TLS certificate from broker | false
 `tlsHostnameVerificationEnable` |boolean |  Whether to enable TLS hostname 
verification|false
@@ -949,7 +949,7 @@ Pulsar currently supports three authentication schemes: 
[TLS](security-tls-authe
 
 ### TLS Authentication
 
-To use [TLS](security-tls-authentication), you need to set TLS to `true` using 
the `setUseTls` method, point your Pulsar client to a TLS cert path, and 
provide paths to cert and key files.
+To use [TLS](security-tls-authentication.md), `enableTls` method is deprecated 
and you need to use "pulsar+ssl://" in serviceUrl to enable, point your Pulsar 
client to a TLS cert path, and provide paths to cert and key files.
 
 The following is an example.
 
@@ -964,7 +964,6 @@ Authentication tlsAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(tlsAuth)
         .build();
@@ -996,7 +995,6 @@ Authentication athenzAuth = AuthenticationFactory
 
 PulsarClient client = PulsarClient.builder()
         .serviceUrl("pulsar+ssl://my-broker.com:6651")
-        .enableTls(true)
         .tlsTrustCertsFilePath("/path/to/cacert.pem")
         .authentication(athenzAuth)
         .build();

Reply via email to