Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs(acls): describes handling of special users #11118

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

PaulRMellor
Copy link
Contributor

@PaulRMellor PaulRMellor commented Feb 7, 2025

Documentation

Describes handling of special users by User Operator.
Extracts Defining ACLs concepts into higher-level section within client authorization content to make the content easier to find.

Checklist

Please go through this checklist and make sure all applicable tasks have been done

  • Write tests
  • Make sure all tests pass
  • Update documentation
  • Check RBAC rights for Kubernetes / OpenShift roles
  • Try your changes from Pod inside your Kubernetes and OpenShift cluster, not just locally
  • Reference relevant issue(s) and close them after merging
  • Update CHANGELOG.md
  • Supply screenshots for visual changes, such as Grafana dashboards

Signed-off-by: prmellor <pmellor@redhat.com>
@PaulRMellor PaulRMellor added this to the 0.46.0 milestone Feb 7, 2025
@PaulRMellor PaulRMellor self-assigned this Feb 7, 2025
Comment on lines -45 to -50
== Super user access to Kafka brokers

If a user is added to a list of super users in a Kafka broker configuration,
the user is allowed unlimited access to the cluster regardless of any authorization constraints defined in ACLs in `KafkaUser`.

For more information on configuring super user access to brokers, see xref:con-securing-kafka-authorization-{context}[Kafka authorization].
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we have this covered somewhere else?


The User Operator manages ACLs for standard Kafka users but cannot define rules for special usernames such as `User:ANONYMOUS` or `User:*`.
These users are ignored because their names are not valid Kubernetes resource names.
If ACL rules with special usernames are present in a `KafkaUser` resource, the User Operator logs a message for information but does not apply them.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These users cannot have any KafkaUser resources. So this is not valid. The part about logging should be part of the next sentence.

Suggested change
If ACL rules with special usernames are present in a `KafkaUser` resource, the User Operator logs a message for information but does not apply them.

These users are ignored because their names are not valid Kubernetes resource names.
If ACL rules with special usernames are present in a `KafkaUser` resource, the User Operator logs a message for information but does not apply them.
You can manually configure ACL rules for these usernames using tools like `kafka-acls.sh`.
These manual configurations are not deleted by the User Operator.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
These manual configurations are not deleted by the User Operator.
When these manual configurations are present in Kafka, the User Operator logs a message for information but does not delete them.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants