Skip to content

Commit ef8bcd3

Browse files
authored
Merge branch 'main' into DOC-1812-Document-Cloud-Feature-Schema-Registry-Contexts-Serverless-etc
2 parents fd89f2c + f5719f3 commit ef8bcd3

19 files changed

Lines changed: 109 additions & 50 deletions

File tree

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
name: Check playbook branches
3+
on:
4+
pull_request:
5+
paths:
6+
- local-antora-playbook.yml
7+
push:
8+
branches: [main]
9+
paths:
10+
- local-antora-playbook.yml
11+
12+
jobs:
13+
check-branches:
14+
runs-on: ubuntu-latest
15+
steps:
16+
- uses: actions/checkout@v4
17+
18+
- name: Check for non-standard branch references
19+
run: |
20+
# Allowed branch patterns in local-antora-playbook.yml.
21+
# Any value not matching these is likely a PR branch that
22+
# must be reverted before merge.
23+
ALLOWED='main|HEAD|v/\*|shared|site-search|!v-end-of-life/\*'
24+
25+
# Extract all branch values from the playbook
26+
BRANCHES=$(grep 'branches:' local-antora-playbook.yml \
27+
| sed 's/.*branches:[[:space:]]*//' \
28+
| tr -d "[]'" \
29+
| tr ',' '\n' \
30+
| sed 's/^[[:space:]]*//;s/[[:space:]]*$//')
31+
32+
FAILED=0
33+
while IFS= read -r branch; do
34+
[ -z "$branch" ] && continue
35+
if ! echo "$branch" | grep -qE "^(${ALLOWED})$"; then
36+
echo "::error::Non-standard branch reference found: '${branch}'"
37+
FAILED=1
38+
fi
39+
done <<< "$BRANCHES"
40+
41+
if [ "$FAILED" -eq 1 ]; then
42+
echo ""
43+
echo "local-antora-playbook.yml contains non-standard branch references."
44+
echo "These are used for cross-repo Netlify previews during PR development,"
45+
echo "but must be reverted to standard values (e.g., 'main') before merging."
46+
exit 1
47+
fi
48+
49+
echo "Playbook OK: all branch references are standard."

modules/ROOT/nav.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,7 @@
171171

172172
*** xref:develop:connect/components/outputs/about.adoc[]
173173
**** xref:develop:connect/components/outputs/amqp_0_9.adoc[]
174+
**** xref:develop:connect/components/outputs/arc.adoc[]
174175
**** xref:develop:connect/components/outputs/aws_dynamodb.adoc[]
175176
**** xref:develop:connect/components/outputs/aws_kinesis.adoc[]
176177
**** xref:develop:connect/components/outputs/aws_kinesis_firehose.adoc[]
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
= arc
2+
:page-aliases: components:outputs/arc.adoc
3+
include::redpanda-connect:components:outputs/arc.adoc[tag=single-source]

modules/get-started/pages/cluster-types/byoc/aws/create-byoc-cluster-aws.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Optionally, click *Advanced settings* to specify up to five key-value custom tag
4242
** For a xref:networking:cidr-ranges.adoc[CIDR range], choose one that does not overlap with your existing VPCs or your Redpanda network.
4343
** Clusters with private networking include a setting for API Gateway network access. Public access exposes endpoints for Redpanda Console, the Data Plane API, and the MCP Server API, but they remain protected by your authentication and authorization controls. Private access restricts endpoint access to your VPC only.
4444
+
45-
NOTE: After the cluster is created, you can change the API Gateway access on the cluster settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
45+
NOTE: After the cluster is created, you can change the API Gateway access on the Dataplane settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
4646
. Click *Next*.
4747
. On the Deploy page, follow the steps to log in to Redpanda Cloud and deploy the agent.
4848
+

modules/get-started/pages/cluster-types/byoc/azure/create-byoc-cluster-azure.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ Optionally, click *Advanced settings* to specify up to five key-value custom tag
168168
+
169169
Private access incurs an additional cost, since it involves deploying two network load balancers, instead of one.
170170
+
171-
NOTE: After the cluster is created, you can change the API Gateway access on the cluster settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
171+
NOTE: After the cluster is created, you can change the API Gateway access on the Dataplane settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
172172
. Click *Next*.
173173
. On the Deploy page, follow the steps to log in to Redpanda Cloud and deploy the agent.
174174
+

modules/get-started/pages/cluster-types/byoc/gcp/create-byoc-cluster-gcp.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Optionally, click *Advanced settings* to specify up to five key-value custom GCP
4444
** For a xref:networking:cidr-ranges.adoc[CIDR range], choose one that does not overlap with your existing VPCs or your Redpanda network.
4545
** Clusters with private networking include a setting for API Gateway network access. Public access exposes endpoints for Redpanda Console, the Data Plane API, but they remain protected by your authentication and authorization controls. Private access restricts endpoint access to your VPC only.
4646
+
47-
NOTE: After the cluster is created, you can change the API Gateway access on the cluster settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
47+
NOTE: After the cluster is created, you can change the API Gateway access on the Dataplane settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
4848
. Click *Next*.
4949
. On the Deploy page, follow the steps to log in to Redpanda Cloud and deploy the agent.
5050
+

modules/get-started/pages/cluster-types/byoc/gcp/vpc-byo-gcp.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -738,7 +738,7 @@ You can delete the cluster in the Cloud UI.
738738

739739
. Log in to https://cloud.redpanda.com[Redpanda Cloud^].
740740
. Select your cluster.
741-
. Go to the **Cluster settings** page and click **Delete**, then confirm your deletion.
741+
. Go to the **Dataplane settings** page and click **Delete**, then confirm your deletion.
742742

743743
== Manage custom resource labels and network tags
744744

modules/get-started/pages/cluster-types/create-dedicated-cloud-cluster.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Private networks require either a VPC peering connection or a private connectivi
2626
+
2727
On Azure, private access incurs an additional cost, since it involves deploying two network load balancers, instead of one.
2828
+
29-
NOTE: After the cluster is created, you can change the API Gateway access on the cluster settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
29+
NOTE: After the cluster is created, you can change the API Gateway access on the Dataplane settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
3030

3131
. Click *Create*.
3232
+
@@ -137,7 +137,7 @@ The message that you produced to the topic is displayed along with some other de
137137

138138
If you don't want to continue experimenting with your cluster, you can delete it.
139139

140-
Go to **Cluster settings** and click **Delete cluster**.
140+
Go to **Dataplane settings** and click **Delete cluster**.
141141

142142
== Next steps
143143

modules/get-started/pages/whats-new-cloud.adoc

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ Serverless clusters now support up to 100 Redpanda Connect pipelines and 100 MCP
2222
=== Redpanda Connect updates
2323

2424
* The Redpanda Connect pipeline creation and editing workflow has been simplified. The new UI replaces the previous multi-page wizard with a visual pipeline diagram, an IDE-like configuration editor, slash commands for inserting variables, and inline links to component documentation. See the xref:develop:connect/connect-quickstart.adoc[Redpanda Connect quickstart] to try it out.
25+
* Outputs:
26+
** xref:develop:connect/components/outputs/arc.adoc[arc]: Send data to an Arc columnar analytical database using its high-performance MessagePack ingestion endpoint.
2527
* Processors:
2628
** xref:develop:connect/components/processors/string_split.adoc[string_split]: Splits strings into multiple parts using a delimiter, creating new messages or fields for each part.
2729

@@ -147,11 +149,11 @@ Shadowing is supported on BYOC and Dedicated clusters running Redpanda version 2
147149

148150
You can now view and export metrics from Serverless clusters to third-party monitoring systems like Prometheus and Grafana. See xref:manage:monitor-cloud.adoc[Monitor Redpanda Cloud] for details on configuring monitoring for your Serverless cluster and xref:reference:public-metrics-reference.adoc[Metrics Reference] for a list of metrics available in Serverless.
149151

150-
=== User impersonation
152+
=== Account impersonation
151153

152-
BYOC and Dedicated clusters now support unified authentication and authorization between the Redpanda Cloud UI and Redpanda with xref:security:cloud-authentication.adoc#user-impersonation[user impersonation]. This means you can authenticate to fine-grained access within Redpanda using the same credentials you use to authenticate to Redpanda Cloud.
154+
BYOC and Dedicated clusters now support unified authentication and authorization between the Redpanda Cloud UI and Redpanda with xref:security:cloud-authentication.adoc#account-impersonation[account impersonation]. This means you can authenticate to fine-grained access within Redpanda using the same credentials you use to authenticate to Redpanda Cloud.
153155

154-
With user impersonation, the topics users see in the UI are identical to what they can access with the Cloud API or `rpk`, ensuring consistent permissions across all interfaces and clear auditing of data plane user actions.
156+
With account impersonation (originally called user impersonation), the topics users see in the UI are identical to what they can access with the Cloud API or `rpk`, ensuring consistent permissions across all interfaces and clear auditing of data plane user actions.
155157

156158
=== Redpanda Connect updates
157159

@@ -211,7 +213,7 @@ BYOC and Dedicated clusters with private networking now allow control of API Gat
211213
* Public access exposes Redpanda Console, Data Plane API, and MCP Server API endpoints over the internet, although they remain protected by your authentication and authorization controls.
212214
* Private access restricts endpoint access to your private network (VPC or VNet) only.
213215

214-
After the cluster is created, you can change the API Gateway access on the cluster settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
216+
After the cluster is created, you can change the API Gateway access on the Dataplane settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
215217

216218
=== Redpanda Connect updates
217219

@@ -607,7 +609,7 @@ mTLS authentication is now available for Kafka API clients. You can xref:securit
607609

608610
=== Manage private connectivity in the UI
609611

610-
You can now manage GCP Private Service Connect and AWS PrivateLink connections to your BYOC or Dedicated cluster on the *Cluster settings* page in Redpanda Cloud. See the steps for xref:networking:configure-privatelink-in-cloud-ui.adoc[PrivateLink] and xref:networking:configure-private-service-connect-in-cloud-ui.adoc[Private Service Connect].
612+
You can now manage GCP Private Service Connect and AWS PrivateLink connections to your BYOC or Dedicated cluster on the *Dataplane settings* page in Redpanda Cloud. See the steps for xref:networking:configure-privatelink-in-cloud-ui.adoc[PrivateLink] and xref:networking:configure-private-service-connect-in-cloud-ui.adoc[Private Service Connect].
611613

612614
=== Single message transforms
613615

@@ -677,4 +679,4 @@ In the Redpanda Console UI, you can xref:manage:schema-reg/schema-reg-ui.adoc[pe
677679

678680
=== Maintenance windows
679681

680-
With maintenance windows, you have greater flexibility to plan upgrades to your cluster. By default, Redpanda Cloud upgrades take place on Tuesdays. Optionally, on the **Cluster settings** page, you can select a window of specific off-hours for your business for Redpanda to apply updates. All times are in Coordinated Universal Time (UTC). Updates may start at any time during that window.
682+
With maintenance windows, you have greater flexibility to plan upgrades to your cluster. By default, Redpanda Cloud upgrades take place on Tuesdays. Optionally, on the **Dataplane settings** page, you can select a window of specific off-hours for your business for Redpanda to apply updates. All times are in Coordinated Universal Time (UTC). Updates may start at any time during that window.

modules/get-started/partials/quick-start-cloud.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ The message that you produced to the topic is displayed along with some other de
147147

148148
If you don't want to continue experimenting with your cluster, you can delete it.
149149

150-
Go to **Cluster settings** and click **Delete cluster**.
150+
Go to **Dataplane settings** and click **Delete cluster**.
151151

152152
== Next steps
153153

0 commit comments

Comments
 (0)