diff --git a/docs/upgrade.html b/docs/upgrade.html index 3263fd853df4a..be1617e8d43f0 100644 --- a/docs/upgrade.html +++ b/docs/upgrade.html @@ -28,6 +28,12 @@
The following are some of the updates in Kafka 4.0 release:
++ The password encoder-related configurations have been removed. These configurations were used in ZooKeeper + mode to define the key and backup key for encrypting sensitive data (e.g., passwords), specify the algorithm + and key generation method for password encryption (e.g., AES, RSA), and control the key length and encryption + strength. +
+password.encoder.secret
password.encoder.old.secret
password.encoder.keyfactory.algorithm
password.encoder.cipher.algorithm
password.encoder.key.length
password.encoder.iterations
+ In Kraft mode, Kafka adopts standardized security configurations. Most sensitive data encryption is handled + by the security framework (e.g., SASL, SSL), making the password encoder-related configurations obsolete. + Sensitive data can now be encrypted in two ways: SASL and SSL/TLS. +
++ Using SASL/SCRAM, you can encrypt communication between clients and brokers with mechanisms such as + SCRAM or GSSAPI. To configure SASL. Use the following parameters to specify the desired SASL mechanism. + +
sasl.enabled.mechanisms
sasl.mechanism.inter.broker.protocol
+ Using SSL/TLS, you can encrypt communication between clients and brokers by specifying the SSL keystore + and truststore configurations. Use the following parameters: +
+ssl.keystore.location
ssl.keystore.password
ssl.key.password
ssl.truststore.location
ssl.truststore.password
+ Removed control.plane.listener.name
. Kafka relies on ZooKeeper to manage metadata, but some
+ internal operations (e.g., communication between controllers (a.k.a., broker controller) and brokers) still require
+ Kafka’s internal control plane for coordination.
+
+ In KRaft mode, Kafka eliminates its dependency on ZooKeeper, and the control plane functionality is fully + integrated into Kafka itself. The process roles are clearly separated: brokers handle data-related requests, + while the controllers (a.k.a., quorum controller) manages metadata-related requests. The controllers use the Raft + protocol for internal communication, which operates differently from the ZooKeeper model. Use the following + parameters to configure the control plane listener: +
+controller.listener.names
listeners
listener.security.protocol.map
+ Remove the broker id generation-related configurations. These configurations were used in ZooKeeper mode to + define the broker id, specify the broker id auto generation, and control the broker id generation process. +
+reserved.broker.max.id
broker.id.generation.enable
broker.id
+ Kafka use the node id in Kraft mode to identify servers. +
+node.id
+ Removed Zookeeper related configurations. +
+zookeeper.connect
zookeeper.session.timeout.ms
zookeeper.connection.timeout.ms
zookeeper.set.acl
zookeeper.max.in.flight.requests
zookeeper.ssl.client.enable
zookeeper.clientCnxnSocket
zookeeper.ssl.keystore.location
zookeeper.ssl.keystore.password
zookeeper.ssl.keystore.type
zookeeper.ssl.truststore.location
zookeeper.ssl.truststore.password
zookeeper.ssl.truststore.type
zookeeper.ssl.protocol
zookeeper.ssl.enabled.protocols
zookeeper.ssl.cipher.suites
zookeeper.ssl.endpoint.identification.algorithm
zookeeper.ssl.crl.enable
zookeeper.ssl.ocsp.enable