315157973 commented on pull request #11369:
URL: https://github.com/apache/pulsar/pull/11369#issuecomment-882409174


   # Service discovery
   |Name|Description|Default|
   |---|---|---|
   | zookeeperServers | Local-Zookeeper quorum connection string | null | 
   | configurationStoreServers | Configuration Store connection string | null | 
   | zookeeperSessionTimeoutMs | ZooKeeper session timeout in ms | 30000 | 
   | zooKeeperCacheExpirySeconds | ZooKeeper cache expiry time in seconds | 300 
| 
   | servicePort | Port to use to server binary-proto request | Optional[5000] 
| 
   | servicePortTls | Port to use to server binary-proto-tls request | 
Optional.empty | 
   | webServicePort | Port to use to server HTTP request | Optional[8080] | 
   | webServicePortTls | Port to use to server HTTPS request | Optional.empty | 
   | bindOnLocalhost | Control whether to bind directly on localhost rather 
than on normal hostname | false | 
   | superUserRoles | Role names that are treated as "super-user", meaning they 
will be able to do all admin operations and publish/consume from all topics | 
[] | 
   | authorizationAllowWildcardsMatching | Allow wildcard matching in 
authorization (wildcard matching only applicable if wildcard-char: * presents 
at first or last position eg: *.pulsar.service, pulsar.service.* | false | 
   | authenticationEnabled | Whether enable authentication | false | 
   | authenticationProviders | Authentication provider name list, which is a 
list of class names | [] | 
   | authorizationEnabled | Whether Enforce authorization | false | 
   | authorizationProvider | Authorization provider fully qualified class-name 
| org.apache.pulsar.broker.authorization.PulsarAuthorizationProvider | 
   | tlsCertRefreshCheckDurationSec | Tls cert refresh duration in seconds (set 
0 to check on every new connection) | 300 | 
   | tlsCertificateFilePath | Path for the TLS certificate file | null | 
   | tlsKeyFilePath | Path for the TLS private key file | null | 
   | tlsTrustCertsFilePath | Path for the trusted TLS certificate file |  | 
   | tlsAllowInsecureConnection | Accept untrusted TLS certificate from client 
| false | 
   | tlsProtocols | Specify the tls protocols the broker will use to negotiate 
during TLS Handshake. Example:- [TLSv1.3, TLSv1.2] | [] | 
   | tlsCiphers | Specify the tls cipher the broker will use to negotiate 
during TLS Handshake. Example:- [TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256] | [] | 
   | tlsRequireTrustedClientCertOnConnect | Specify whether Client certificates 
are required for TLS. Reject the Connection if the Client Certificate is not 
trusted. | false | 
   | tlsEnabledWithKeyStore | Enable TLS with KeyStore type configuration in 
broker | false | 
   | tlsProvider | Full class name of TLS Provider | null | 
   | tlsKeyStoreType | TLS KeyStore type configuration in broker: JKS, PKCS12 | 
JKS | 
   | tlsKeyStore | TLS KeyStore path in broker | null | 
   | tlsKeyStorePassword | TLS KeyStore password in broker | null | 
   | tlsTrustStoreType | TLS TrustStore type configuration in broker: JKS, 
PKCS12 | JKS | 
   | tlsTrustStore | TLS TrustStore path in broker | null | 
   | tlsTrustStorePassword | TLS TrustStore password in broker | null | 
   | properties | Can store string in key-value format | {} | 
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@pulsar.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


Reply via email to