You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@kafka.apache.org by js...@apache.org on 2022/09/29 21:02:54 UTC

[kafka-site] branch minor-3-3-1 created (now cccb73f4)

This is an automated email from the ASF dual-hosted git repository.

jsancio pushed a change to branch minor-3-3-1
in repository https://gitbox.apache.org/repos/asf/kafka-site.git


      at cccb73f4 MINOR; Update documentation for 3.3.1

This branch includes the following new commits:

     new cccb73f4 MINOR; Update documentation for 3.3.1

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.



[kafka-site] 01/01: MINOR; Update documentation for 3.3.1

Posted by js...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

jsancio pushed a commit to branch minor-3-3-1
in repository https://gitbox.apache.org/repos/asf/kafka-site.git

commit cccb73f41e6ce8a3ef1c4b16afbfb5248b388e88
Author: José Armando García Sancio <js...@gmail.com>
AuthorDate: Thu Sep 29 14:02:18 2022 -0700

    MINOR; Update documentation for 3.3.1
---
 33/generated/admin_client_config.html | 4 ++--
 33/generated/connect_config.html      | 4 ++--
 33/generated/connect_metrics.html     | 4 ++--
 33/generated/connect_rest.yaml        | 2 +-
 33/generated/consumer_config.html     | 4 ++--
 33/generated/kafka_config.html        | 4 ++--
 33/generated/producer_config.html     | 4 ++--
 33/generated/streams_config.html      | 2 +-
 33/js/templateData.js                 | 2 +-
 9 files changed, 15 insertions(+), 15 deletions(-)

diff --git a/33/generated/admin_client_config.html b/33/generated/admin_client_config.html
index d4114538..1b0d02f4 100644
--- a/33/generated/admin_client_config.html
+++ b/33/generated/admin_client_config.html
@@ -274,7 +274,7 @@
 <p>The list of protocols enabled for SSL connections. The default is 'TLSv1.2,TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise. With the default value for Java 11, clients and servers will prefer TLSv1.3 if both support it and fallback to TLSv1.2 otherwise (assuming both support at least TLSv1.2). This default should be fine for most cases. Also see the config documentation for `ssl.protocol`.</p>
 <table><tbody>
 <tr><th>Type:</th><td>list</td></tr>
-<tr><th>Default:</th><td>TLSv1.2,TLSv1.3</td></tr>
+<tr><th>Default:</th><td>TLSv1.2</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>medium</td></tr>
 </tbody></table>
@@ -294,7 +294,7 @@
 <p>The SSL protocol used to generate the SSLContext. The default is 'TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise. This value should be fine for most use cases. Allowed values in recent JVMs are 'TLSv1.2' and 'TLSv1.3'. 'TLS', 'TLSv1.1', 'SSL', 'SSLv2' and 'SSLv3' may be supported in older JVMs, but their usage is discouraged due to known security vulnerabilities. With the default value for this config and 'ssl.enabled.protocols', clients will downgrade to 'TLSv1.2' i [...]
 <table><tbody>
 <tr><th>Type:</th><td>string</td></tr>
-<tr><th>Default:</th><td>TLSv1.3</td></tr>
+<tr><th>Default:</th><td>TLSv1.2</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>medium</td></tr>
 </tbody></table>
diff --git a/33/generated/connect_config.html b/33/generated/connect_config.html
index 09625a60..7c1e7acb 100644
--- a/33/generated/connect_config.html
+++ b/33/generated/connect_config.html
@@ -344,7 +344,7 @@
 <p>The list of protocols enabled for SSL connections. The default is 'TLSv1.2,TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise. With the default value for Java 11, clients and servers will prefer TLSv1.3 if both support it and fallback to TLSv1.2 otherwise (assuming both support at least TLSv1.2). This default should be fine for most cases. Also see the config documentation for `ssl.protocol`.</p>
 <table><tbody>
 <tr><th>Type:</th><td>list</td></tr>
-<tr><th>Default:</th><td>TLSv1.2,TLSv1.3</td></tr>
+<tr><th>Default:</th><td>TLSv1.2</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>medium</td></tr>
 </tbody></table>
@@ -364,7 +364,7 @@
 <p>The SSL protocol used to generate the SSLContext. The default is 'TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise. This value should be fine for most use cases. Allowed values in recent JVMs are 'TLSv1.2' and 'TLSv1.3'. 'TLS', 'TLSv1.1', 'SSL', 'SSLv2' and 'SSLv3' may be supported in older JVMs, but their usage is discouraged due to known security vulnerabilities. With the default value for this config and 'ssl.enabled.protocols', clients will downgrade to 'TLSv1.2' i [...]
 <table><tbody>
 <tr><th>Type:</th><td>string</td></tr>
-<tr><th>Default:</th><td>TLSv1.3</td></tr>
+<tr><th>Default:</th><td>TLSv1.2</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>medium</td></tr>
 </tbody></table>
diff --git a/33/generated/connect_metrics.html b/33/generated/connect_metrics.html
index 8bbd957e..8c872239 100644
--- a/33/generated/connect_metrics.html
+++ b/33/generated/connect_metrics.html
@@ -1,5 +1,5 @@
-[2022-09-28 16:37:02,145] INFO Metrics scheduler closed (org.apache.kafka.common.metrics.Metrics:693)
-[2022-09-28 16:37:02,148] INFO Metrics reporters closed (org.apache.kafka.common.metrics.Metrics:703)
+[2022-09-29 12:06:55,585] INFO Metrics scheduler closed (org.apache.kafka.common.metrics.Metrics:693)
+[2022-09-29 12:06:55,587] INFO Metrics reporters closed (org.apache.kafka.common.metrics.Metrics:703)
 <table class="data-table"><tbody>
 <tr>
 <td colspan=3 class="mbeanName" style="background-color:#ccc; font-weight: bold;">kafka.connect:type=connect-worker-metrics</td></tr>
diff --git a/33/generated/connect_rest.yaml b/33/generated/connect_rest.yaml
index 834edc63..d82982de 100644
--- a/33/generated/connect_rest.yaml
+++ b/33/generated/connect_rest.yaml
@@ -8,7 +8,7 @@ info:
     name: Apache 2.0
     url: https://www.apache.org/licenses/LICENSE-2.0.html
   title: Kafka Connect REST API
-  version: 3.3.0-SNAPSHOT
+  version: 3.3.1
 paths:
   /:
     get:
diff --git a/33/generated/consumer_config.html b/33/generated/consumer_config.html
index c29b73dd..2970db51 100644
--- a/33/generated/consumer_config.html
+++ b/33/generated/consumer_config.html
@@ -434,7 +434,7 @@
 <p>The list of protocols enabled for SSL connections. The default is 'TLSv1.2,TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise. With the default value for Java 11, clients and servers will prefer TLSv1.3 if both support it and fallback to TLSv1.2 otherwise (assuming both support at least TLSv1.2). This default should be fine for most cases. Also see the config documentation for `ssl.protocol`.</p>
 <table><tbody>
 <tr><th>Type:</th><td>list</td></tr>
-<tr><th>Default:</th><td>TLSv1.2,TLSv1.3</td></tr>
+<tr><th>Default:</th><td>TLSv1.2</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>medium</td></tr>
 </tbody></table>
@@ -454,7 +454,7 @@
 <p>The SSL protocol used to generate the SSLContext. The default is 'TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise. This value should be fine for most use cases. Allowed values in recent JVMs are 'TLSv1.2' and 'TLSv1.3'. 'TLS', 'TLSv1.1', 'SSL', 'SSLv2' and 'SSLv3' may be supported in older JVMs, but their usage is discouraged due to known security vulnerabilities. With the default value for this config and 'ssl.enabled.protocols', clients will downgrade to 'TLSv1.2' i [...]
 <table><tbody>
 <tr><th>Type:</th><td>string</td></tr>
-<tr><th>Default:</th><td>TLSv1.3</td></tr>
+<tr><th>Default:</th><td>TLSv1.2</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>medium</td></tr>
 </tbody></table>
diff --git a/33/generated/kafka_config.html b/33/generated/kafka_config.html
index fb52b5f0..f36227be 100644
--- a/33/generated/kafka_config.html
+++ b/33/generated/kafka_config.html
@@ -1896,7 +1896,7 @@
 <p>The list of protocols enabled for SSL connections. The default is 'TLSv1.2,TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise. With the default value for Java 11, clients and servers will prefer TLSv1.3 if both support it and fallback to TLSv1.2 otherwise (assuming both support at least TLSv1.2). This default should be fine for most cases. Also see the config documentation for `ssl.protocol`.</p>
 <table><tbody>
 <tr><th>Type:</th><td>list</td></tr>
-<tr><th>Default:</th><td>TLSv1.2,TLSv1.3</td></tr>
+<tr><th>Default:</th><td>TLSv1.2</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>medium</td></tr>
 <tr><th>Update Mode:</th><td>per-broker</td></tr>
@@ -1984,7 +1984,7 @@
 <p>The SSL protocol used to generate the SSLContext. The default is 'TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise. This value should be fine for most use cases. Allowed values in recent JVMs are 'TLSv1.2' and 'TLSv1.3'. 'TLS', 'TLSv1.1', 'SSL', 'SSLv2' and 'SSLv3' may be supported in older JVMs, but their usage is discouraged due to known security vulnerabilities. With the default value for this config and 'ssl.enabled.protocols', clients will downgrade to 'TLSv1.2' i [...]
 <table><tbody>
 <tr><th>Type:</th><td>string</td></tr>
-<tr><th>Default:</th><td>TLSv1.3</td></tr>
+<tr><th>Default:</th><td>TLSv1.2</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>medium</td></tr>
 <tr><th>Update Mode:</th><td>per-broker</td></tr>
diff --git a/33/generated/producer_config.html b/33/generated/producer_config.html
index d895724f..720a826c 100644
--- a/33/generated/producer_config.html
+++ b/33/generated/producer_config.html
@@ -384,7 +384,7 @@
 <p>The list of protocols enabled for SSL connections. The default is 'TLSv1.2,TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise. With the default value for Java 11, clients and servers will prefer TLSv1.3 if both support it and fallback to TLSv1.2 otherwise (assuming both support at least TLSv1.2). This default should be fine for most cases. Also see the config documentation for `ssl.protocol`.</p>
 <table><tbody>
 <tr><th>Type:</th><td>list</td></tr>
-<tr><th>Default:</th><td>TLSv1.2,TLSv1.3</td></tr>
+<tr><th>Default:</th><td>TLSv1.2</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>medium</td></tr>
 </tbody></table>
@@ -404,7 +404,7 @@
 <p>The SSL protocol used to generate the SSLContext. The default is 'TLSv1.3' when running with Java 11 or newer, 'TLSv1.2' otherwise. This value should be fine for most use cases. Allowed values in recent JVMs are 'TLSv1.2' and 'TLSv1.3'. 'TLS', 'TLSv1.1', 'SSL', 'SSLv2' and 'SSLv3' may be supported in older JVMs, but their usage is discouraged due to known security vulnerabilities. With the default value for this config and 'ssl.enabled.protocols', clients will downgrade to 'TLSv1.2' i [...]
 <table><tbody>
 <tr><th>Type:</th><td>string</td></tr>
-<tr><th>Default:</th><td>TLSv1.3</td></tr>
+<tr><th>Default:</th><td>TLSv1.2</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>medium</td></tr>
 </tbody></table>
diff --git a/33/generated/streams_config.html b/33/generated/streams_config.html
index c8de5bc5..bc216042 100644
--- a/33/generated/streams_config.html
+++ b/33/generated/streams_config.html
@@ -34,7 +34,7 @@
 <p>Directory location for state store. This path must be unique for each streams instance sharing the same underlying filesystem.</p>
 <table><tbody>
 <tr><th>Type:</th><td>string</td></tr>
-<tr><th>Default:</th><td>/var/folders/8t/s723rqwx1h78qt3w98cp_gsm0000gp/T//kafka-streams</td></tr>
+<tr><th>Default:</th><td>/tmp/kafka-streams</td></tr>
 <tr><th>Valid Values:</th><td></td></tr>
 <tr><th>Importance:</th><td>high</td></tr>
 </tbody></table>
diff --git a/33/js/templateData.js b/33/js/templateData.js
index 6b773468..dd5e02d9 100644
--- a/33/js/templateData.js
+++ b/33/js/templateData.js
@@ -19,6 +19,6 @@ limitations under the License.
 var context={
     "version": "33",
     "dotVersion": "3.3",
-    "fullDotVersion": "3.3.0",
+    "fullDotVersion": "3.3.1",
     "scalaVersion": "2.13"
 };