Skip to content

Commit f5719f3

Browse files
micheleRPclaudeJakeSCahill
authored
DOC-2077: rename "Cluster settings" to "Dataplane settings" (#558)
* DOC-2077: rename "Cluster settings" to "Dataplane settings" The per-cluster page in Redpanda Cloud Console is now labeled "Dataplane settings" across Serverless, BYOC, and Dedicated. Update 27 references across 14 files so step-by-step procedures match the current UI. Scope: post-creation page references only. The cluster-creation wizard step phrasing in quick-start-cloud.adoc is unchanged pending UI verification. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com> * docs: add arc output connector for cloud (#557) * docs: add arc output connector for cloud Add arc output connector page and update whats-new with entry for the new cloud-supported connector. Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com> * chore: temporarily reference auto-docs branch from rp-connect-docs Update playbook to reference the auto-docs/update-rpcn-connector-docs branch so the arc connector include can resolve during preview builds. This should be reverted to main once the rp-connect-docs PR is merged. Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com> * Update local-antora-playbook.yml * Update nav.adoc --------- Co-authored-by: Claude Sonnet 4.5 <noreply@anthropic.com> * update "user impersonation" to "account impersonation" --------- Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com> Co-authored-by: Jake Cahill <45230295+JakeSCahill@users.noreply.github.com>
1 parent cfaf5ce commit f5719f3

14 files changed

Lines changed: 36 additions & 36 deletions

modules/get-started/pages/cluster-types/byoc/aws/create-byoc-cluster-aws.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Optionally, click *Advanced settings* to specify up to five key-value custom tag
4242
** For a xref:networking:cidr-ranges.adoc[CIDR range], choose one that does not overlap with your existing VPCs or your Redpanda network.
4343
** Clusters with private networking include a setting for API Gateway network access. Public access exposes endpoints for Redpanda Console, the Data Plane API, and the MCP Server API, but they remain protected by your authentication and authorization controls. Private access restricts endpoint access to your VPC only.
4444
+
45-
NOTE: After the cluster is created, you can change the API Gateway access on the cluster settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
45+
NOTE: After the cluster is created, you can change the API Gateway access on the Dataplane settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
4646
. Click *Next*.
4747
. On the Deploy page, follow the steps to log in to Redpanda Cloud and deploy the agent.
4848
+

modules/get-started/pages/cluster-types/byoc/azure/create-byoc-cluster-azure.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ Optionally, click *Advanced settings* to specify up to five key-value custom tag
168168
+
169169
Private access incurs an additional cost, since it involves deploying two network load balancers, instead of one.
170170
+
171-
NOTE: After the cluster is created, you can change the API Gateway access on the cluster settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
171+
NOTE: After the cluster is created, you can change the API Gateway access on the Dataplane settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
172172
. Click *Next*.
173173
. On the Deploy page, follow the steps to log in to Redpanda Cloud and deploy the agent.
174174
+

modules/get-started/pages/cluster-types/byoc/gcp/create-byoc-cluster-gcp.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Optionally, click *Advanced settings* to specify up to five key-value custom GCP
4444
** For a xref:networking:cidr-ranges.adoc[CIDR range], choose one that does not overlap with your existing VPCs or your Redpanda network.
4545
** Clusters with private networking include a setting for API Gateway network access. Public access exposes endpoints for Redpanda Console, the Data Plane API, but they remain protected by your authentication and authorization controls. Private access restricts endpoint access to your VPC only.
4646
+
47-
NOTE: After the cluster is created, you can change the API Gateway access on the cluster settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
47+
NOTE: After the cluster is created, you can change the API Gateway access on the Dataplane settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
4848
. Click *Next*.
4949
. On the Deploy page, follow the steps to log in to Redpanda Cloud and deploy the agent.
5050
+

modules/get-started/pages/cluster-types/byoc/gcp/vpc-byo-gcp.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -738,7 +738,7 @@ You can delete the cluster in the Cloud UI.
738738

739739
. Log in to https://cloud.redpanda.com[Redpanda Cloud^].
740740
. Select your cluster.
741-
. Go to the **Cluster settings** page and click **Delete**, then confirm your deletion.
741+
. Go to the **Dataplane settings** page and click **Delete**, then confirm your deletion.
742742

743743
== Manage custom resource labels and network tags
744744

modules/get-started/pages/cluster-types/create-dedicated-cloud-cluster.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Private networks require either a VPC peering connection or a private connectivi
2626
+
2727
On Azure, private access incurs an additional cost, since it involves deploying two network load balancers, instead of one.
2828
+
29-
NOTE: After the cluster is created, you can change the API Gateway access on the cluster settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
29+
NOTE: After the cluster is created, you can change the API Gateway access on the Dataplane settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
3030

3131
. Click *Create*.
3232
+
@@ -137,7 +137,7 @@ The message that you produced to the topic is displayed along with some other de
137137

138138
If you don't want to continue experimenting with your cluster, you can delete it.
139139

140-
Go to **Cluster settings** and click **Delete cluster**.
140+
Go to **Dataplane settings** and click **Delete cluster**.
141141

142142
== Next steps
143143

modules/get-started/pages/whats-new-cloud.adoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -143,11 +143,11 @@ Shadowing is supported on BYOC and Dedicated clusters running Redpanda version 2
143143

144144
You can now view and export metrics from Serverless clusters to third-party monitoring systems like Prometheus and Grafana. See xref:manage:monitor-cloud.adoc[Monitor Redpanda Cloud] for details on configuring monitoring for your Serverless cluster and xref:reference:public-metrics-reference.adoc[Metrics Reference] for a list of metrics available in Serverless.
145145

146-
=== User impersonation
146+
=== Account impersonation
147147

148-
BYOC and Dedicated clusters now support unified authentication and authorization between the Redpanda Cloud UI and Redpanda with xref:security:cloud-authentication.adoc#user-impersonation[user impersonation]. This means you can authenticate to fine-grained access within Redpanda using the same credentials you use to authenticate to Redpanda Cloud.
148+
BYOC and Dedicated clusters now support unified authentication and authorization between the Redpanda Cloud UI and Redpanda with xref:security:cloud-authentication.adoc#account-impersonation[account impersonation]. This means you can authenticate to fine-grained access within Redpanda using the same credentials you use to authenticate to Redpanda Cloud.
149149

150-
With user impersonation, the topics users see in the UI are identical to what they can access with the Cloud API or `rpk`, ensuring consistent permissions across all interfaces and clear auditing of data plane user actions.
150+
With account impersonation (originally called user impersonation), the topics users see in the UI are identical to what they can access with the Cloud API or `rpk`, ensuring consistent permissions across all interfaces and clear auditing of data plane user actions.
151151

152152
=== Redpanda Connect updates
153153

@@ -207,7 +207,7 @@ BYOC and Dedicated clusters with private networking now allow control of API Gat
207207
* Public access exposes Redpanda Console, Data Plane API, and MCP Server API endpoints over the internet, although they remain protected by your authentication and authorization controls.
208208
* Private access restricts endpoint access to your private network (VPC or VNet) only.
209209

210-
After the cluster is created, you can change the API Gateway access on the cluster settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
210+
After the cluster is created, you can change the API Gateway access on the Dataplane settings page. If you change from public to private access, users without VPN access to the Redpanda VPC will lose access to these services.
211211

212212
=== Redpanda Connect updates
213213

@@ -603,7 +603,7 @@ mTLS authentication is now available for Kafka API clients. You can xref:securit
603603

604604
=== Manage private connectivity in the UI
605605

606-
You can now manage GCP Private Service Connect and AWS PrivateLink connections to your BYOC or Dedicated cluster on the *Cluster settings* page in Redpanda Cloud. See the steps for xref:networking:configure-privatelink-in-cloud-ui.adoc[PrivateLink] and xref:networking:configure-private-service-connect-in-cloud-ui.adoc[Private Service Connect].
606+
You can now manage GCP Private Service Connect and AWS PrivateLink connections to your BYOC or Dedicated cluster on the *Dataplane settings* page in Redpanda Cloud. See the steps for xref:networking:configure-privatelink-in-cloud-ui.adoc[PrivateLink] and xref:networking:configure-private-service-connect-in-cloud-ui.adoc[Private Service Connect].
607607

608608
=== Single message transforms
609609

@@ -673,4 +673,4 @@ In the Redpanda Console UI, you can xref:manage:schema-reg/schema-reg-ui.adoc[pe
673673

674674
=== Maintenance windows
675675

676-
With maintenance windows, you have greater flexibility to plan upgrades to your cluster. By default, Redpanda Cloud upgrades take place on Tuesdays. Optionally, on the **Cluster settings** page, you can select a window of specific off-hours for your business for Redpanda to apply updates. All times are in Coordinated Universal Time (UTC). Updates may start at any time during that window.
676+
With maintenance windows, you have greater flexibility to plan upgrades to your cluster. By default, Redpanda Cloud upgrades take place on Tuesdays. Optionally, on the **Dataplane settings** page, you can select a window of specific off-hours for your business for Redpanda to apply updates. All times are in Coordinated Universal Time (UTC). Updates may start at any time during that window.

modules/get-started/partials/quick-start-cloud.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ The message that you produced to the topic is displayed along with some other de
147147

148148
If you don't want to continue experimenting with your cluster, you can delete it.
149149

150-
Go to **Cluster settings** and click **Delete cluster**.
150+
Go to **Dataplane settings** and click **Delete cluster**.
151151

152152
== Next steps
153153

modules/manage/pages/maintenance.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Redpanda runs maintenance operations on clusters in a rolling fashion, accompani
99

1010
== Maintenance windows
1111

12-
Redpanda Cloud may run maintenance operations on any day, at any time. You can override this default and schedule a specific maintenance window on your cluster's *Cluster settings* page.
12+
Redpanda Cloud may run maintenance operations on any day, at any time. You can override this default and schedule a specific maintenance window on your cluster's *Dataplane settings* page.
1313

1414
If you select a *Scheduled* maintenance window, then Redpanda Cloud runs operations on the day and time specified. Maintenance windows typically take six hours. All operations begin during your maintenance window, but some operations may complete after the window closes. All times are in Coordinated Universal Time (UTC).
1515

modules/networking/pages/configure-private-service-connect-in-cloud-ui.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Consider using Private Service Connect if you have multiple VPC networks and cou
3131

3232
== Enable Private Service Connect for existing clusters
3333

34-
. In the Redpanda Cloud UI, open your https://cloud.redpanda.com/clusters[cluster^], and click **Cluster settings**.
34+
. In the Redpanda Cloud UI, open your https://cloud.redpanda.com/clusters[cluster^], and click **Dataplane settings**.
3535
. Under Private Service Connect, click **Enable**.
3636
ifdef::env-byoc[]
3737
. For xref:get-started:cluster-types/byoc/gcp/vpc-byo-gcp.adoc[BYOVPC clusters], you need a PSC NAT subnet with `purpose` set to `PRIVATE_SERVICE_CONNECT`. You also need to create VPC network firewall rules to allow Private Service Connect traffic. You can use the `gcloud` CLI:
@@ -71,10 +71,10 @@ Provide your values for the following placeholders:
7171
See the GCP documentation for https://cloud.google.com/vpc/docs/configure-private-service-connect-producer#add-subnet-psc[creating a subnet for Private Service Connect^].
7272
endif::[]
7373
. For the accepted consumers list, you need the GCP project IDs from which incoming connections will be accepted.
74-
. It may take several minutes for your cluster to update. When the update is complete, the Private Service Connect status in **Cluster settings** changes from **In progress** to **Enabled**.
74+
. It may take several minutes for your cluster to update. When the update is complete, the Private Service Connect status in **Dataplane settings** changes from **In progress** to **Enabled**.
7575

7676
include::networking:partial$psc-ui.adoc[]
7777

7878
== Disable Private Service Connect
7979

80-
In **Cluster settings**, click **Disable**. Existing connections are closed after it is disabled. To connect using Private Service Connect again, you must re-enable it.
80+
In **Dataplane settings**, click **Disable**. Existing connections are closed after it is disabled. To connect using Private Service Connect again, you must re-enable it.

modules/networking/pages/configure-privatelink-in-cloud-ui.adoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,12 +29,12 @@ include::networking:partial$dns_resolution.adoc[]
2929

3030
== Enable endpoint service for existing clusters
3131

32-
. In the Redpanda Cloud Console, select your https://cloud.redpanda.com/clusters[cluster^], and go to the *Cluster settings* page.
32+
. In the Redpanda Cloud Console, select your https://cloud.redpanda.com/clusters[cluster^], and go to the *Dataplane settings* page.
3333
. For AWS PrivateLink, click *Enable*.
3434
. On the Enable PrivateLink page, for Allowed principal ARNs, click *Add*, and enter the Amazon Resource Names (ARNs) for each AWS principal allowed to access the endpoint service. For example, for all principals in a specific account, use `arn:aws:iam::<account-id>:root`. See the AWS documentation on https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#add-remove-permission[configuring an endpoint service^] for details.
3535
. Click *Add* after entering each ARN, and when finished, click *Enable*.
3636
. (Optional) To enable cross-region PrivateLink, add supported regions. See <<cross-region-privatelink>>.
37-
. It may take several minutes for your cluster to update. When the update is complete, the AWS PrivateLink status on the Cluster settings page changes from *In progress* to *Enabled*.
37+
. It may take several minutes for your cluster to update. When the update is complete, the AWS PrivateLink status on the Dataplane settings page changes from *In progress* to *Enabled*.
3838

3939
NOTE: For help with issues when enabling PrivateLink, contact https://support.redpanda.com/hc/en-us/requests/new[Redpanda support^].
4040

@@ -57,7 +57,7 @@ NOTE: Use `<cluster_domain>` as the domain you target with your DNS conditional
5757

5858
=== Get name of PrivateLink endpoint service
5959

60-
You need the service name to <<create-vpc-endpoint,create a VPC endpoint>>. You can find the service name on the *Cluster settings* page after PrivateLink is enabled, or in the *How to Connect* section of the cluster overview.
60+
You need the service name to <<create-vpc-endpoint,create a VPC endpoint>>. You can find the service name on the *Dataplane settings* page after PrivateLink is enabled, or in the *How to Connect* section of the cluster overview.
6161

6262
[,bash]
6363
----
@@ -94,20 +94,20 @@ For more information about AWS cross-region PrivateLink support, see the https:/
9494

9595
NOTE: The *Supported regions* option only appears in the UI for multi-AZ clusters.
9696

97-
. In the Redpanda Cloud Console, select your https://cloud.redpanda.com/clusters[cluster^], and go to the cluster settings page.
97+
. In the Redpanda Cloud Console, select your https://cloud.redpanda.com/clusters[cluster^], and go to the Dataplane settings page.
9898
. In the AWS PrivateLink section, click *Edit* (or *Enable* if PrivateLink is not yet enabled).
9999
. In the *Supported regions* section, click *Add* to add a region from which PrivateLink endpoints can connect to your cluster.
100100
. Select an AWS region from the dropdown. The cluster's home region is automatically included and not shown in the list.
101101
. Repeat to add additional regions as needed.
102102
. Click *Save* (or *Enable*) to apply the changes.
103103

104-
After saving, the *Supported regions* row on the cluster settings page displays your configured regions.
104+
After saving, the *Supported regions* row on the Dataplane settings page displays your configured regions.
105105

106106
Clients in VPCs located in the supported regions can now create PrivateLink endpoints that connect to your Redpanda cluster.
107107

108108
== Disable endpoint service
109109

110-
On the Cluster settings page for the cluster, click *Disable* for PrivateLink. Existing connections are closed after the AWS PrivateLink service is disabled. To connect using PrivateLink again, you must re-enable the service.
110+
On the Dataplane settings page for the cluster, click *Disable* for PrivateLink. Existing connections are closed after the AWS PrivateLink service is disabled. To connect using PrivateLink again, you must re-enable the service.
111111

112112
include::shared:partial$suggested-reading.adoc[]
113113

0 commit comments

Comments
 (0)