Skip to content

Commit 2899528

Browse files
committed
Apply suggestions from SME review
1 parent bc81859 commit 2899528

1 file changed

Lines changed: 13 additions & 7 deletions

File tree

modules/manage/partials/iceberg/use-iceberg-catalogs.adoc

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -33,19 +33,25 @@ Redpanda uses the bearer token unconditionally and does not attempt to refresh t
3333

3434
For REST catalogs that use self-signed certificates, also configure these properties:
3535

36-
* config_ref:iceberg_rest_catalog_trust_file,true,properties/cluster-properties[`iceberg_rest_catalog_trust_file`]: The path to a file containing a certificate chain to trust for the REST catalog.
37-
* config_ref:iceberg_rest_catalog_crl_file,true,properties/cluster-properties[`iceberg_rest_catalog_crl_file`]: The path to the certificate revocation list for the specified trust file.
36+
* config_ref:iceberg_rest_catalog_trust,true,properties/cluster-properties[`iceberg_rest_catalog_trust`]: The contents of a certificate chain to trust for the REST catalog.
37+
ifndef::env-cloud[]
38+
** Or, use config_ref:iceberg_rest_catalog_trust_file,true,properties/cluster-properties[`iceberg_rest_catalog_trust_file`] to specify the path to the certificate chain file.
39+
endif::[]
40+
* config_ref:iceberg_rest_catalog_crl,true,properties/cluster-properties[`iceberg_rest_catalog_crl`]: The contents of a certificate revocation list for `iceberg_rest_catalog_trust`.
41+
ifndef::env-cloud[]
42+
** Or, use config_ref:iceberg_rest_catalog_crl_file,true,properties/cluster-properties[`iceberg_rest_catalog_crl_file`] to specify the path to the certificate revocation list file.
43+
endif::[]
3844

3945
See xref:reference:properties/cluster-properties.adoc[Cluster Configuration Properties] for the full list of cluster properties to configure for a catalog integration.
4046

4147
ifdef::env-cloud[]
4248
=== Store a secret for REST catalog authentication
4349

44-
To store a secret that you can reference in your catalog authentication cluster properties, you must create the secret using `rpk` or the Cloud API. Secrets are stored in the secret management solution of your cloud provider. Redpanda retrieves the secrets at runtime.
50+
To store a secret that you can reference in your catalog authentication cluster properties, you must create the secret using `rpk` or the Data Plane API. Secrets are stored in the secret management solution of your cloud provider. Redpanda retrieves the secrets at runtime.
4551

4652
To learn more about `rpk` and the Cloud API, see xref:manage:rpk/intro-to-rpk.adoc[] and xref:manage:api/cloud-api-overview.adoc[].
4753

48-
Store secrets for the following properties:
54+
If you need to configure any of the following properties, you must set their values using secrets:
4955

5056
* `iceberg_rest_catalog_client_secret`
5157
* `iceberg_rest_catalog_crl`
@@ -91,7 +97,7 @@ You must include the following values:
9197
- This scope: `"SCOPE_REDPANDA_CLUSTER"`.
9298
9399
+
94-
The response returns the name of the secret and the scope `"SCOPE_REDPANDA_CLUSTER"`.
100+
The response returns the name and scope of the secret.
95101
96102
You can now <<use-a-secret-in-cluster-configuration,reference the secret in your cluster configuration>>.
97103
@@ -100,7 +106,7 @@ You can now <<use-a-secret-in-cluster-configuration,reference the secret in your
100106

101107
=== Use a secret in cluster configuration
102108

103-
To set the cluster property to use the value of the secret, use `rpk` or the Cloud API.
109+
To set the cluster property to use the value of the secret, use `rpk` or the Control Plane API.
104110

105111
For example, to use a secret for the `iceberg_rest_catalog_client_secret` property, run the following:
106112

@@ -111,7 +117,7 @@ rpk::
111117
--
112118
[,bash]
113119
----
114-
rpk cluster config set iceberg_rest_catalog_client_secret <secret-name>
120+
rpk cluster config set iceberg_rest_catalog_client_secret ${secrets.<secret-name>}
115121
----
116122
--
117123

0 commit comments

Comments
 (0)