315157973 commented on pull request #11369: URL: https://github.com/apache/pulsar/pull/11369#issuecomment-882409174
# Service discovery |Name|Description|Default| |---|---|---| | zookeeperServers | Local-Zookeeper quorum connection string | null | | configurationStoreServers | Configuration Store connection string | null | | zookeeperSessionTimeoutMs | ZooKeeper session timeout in ms | 30000 | | zooKeeperCacheExpirySeconds | ZooKeeper cache expiry time in seconds | 300 | | servicePort | Port to use to server binary-proto request | Optional[5000] | | servicePortTls | Port to use to server binary-proto-tls request | Optional.empty | | webServicePort | Port to use to server HTTP request | Optional[8080] | | webServicePortTls | Port to use to server HTTPS request | Optional.empty | | bindOnLocalhost | Control whether to bind directly on localhost rather than on normal hostname | false | | superUserRoles | Role names that are treated as "super-user", meaning they will be able to do all admin operations and publish/consume from all topics | [] | | authorizationAllowWildcardsMatching | Allow wildcard matching in authorization (wildcard matching only applicable if wildcard-char: * presents at first or last position eg: *.pulsar.service, pulsar.service.* | false | | authenticationEnabled | Whether enable authentication | false | | authenticationProviders | Authentication provider name list, which is a list of class names | [] | | authorizationEnabled | Whether Enforce authorization | false | | authorizationProvider | Authorization provider fully qualified class-name | org.apache.pulsar.broker.authorization.PulsarAuthorizationProvider | | tlsCertRefreshCheckDurationSec | Tls cert refresh duration in seconds (set 0 to check on every new connection) | 300 | | tlsCertificateFilePath | Path for the TLS certificate file | null | | tlsKeyFilePath | Path for the TLS private key file | null | | tlsTrustCertsFilePath | Path for the trusted TLS certificate file | | | tlsAllowInsecureConnection | Accept untrusted TLS certificate from client | false | | tlsProtocols | Specify the tls protocols the broker will use to negotiate during TLS Handshake. Example:- [TLSv1.3, TLSv1.2] | [] | | tlsCiphers | Specify the tls cipher the broker will use to negotiate during TLS Handshake. Example:- [TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256] | [] | | tlsRequireTrustedClientCertOnConnect | Specify whether Client certificates are required for TLS. Reject the Connection if the Client Certificate is not trusted. | false | | tlsEnabledWithKeyStore | Enable TLS with KeyStore type configuration in broker | false | | tlsProvider | Full class name of TLS Provider | null | | tlsKeyStoreType | TLS KeyStore type configuration in broker: JKS, PKCS12 | JKS | | tlsKeyStore | TLS KeyStore path in broker | null | | tlsKeyStorePassword | TLS KeyStore password in broker | null | | tlsTrustStoreType | TLS TrustStore type configuration in broker: JKS, PKCS12 | JKS | | tlsTrustStore | TLS TrustStore path in broker | null | | tlsTrustStorePassword | TLS TrustStore password in broker | null | | properties | Can store string in key-value format | {} | -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@pulsar.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org