Skip to main content
Version: 23.1

rpk acl create

Create ACLs.

Following the multiplying effect of combining flags, the create command works on a straightforward basis: every ACL combination is a created ACL.

As mentioned in the rpk acl help text, if no host is specified, an allowed principal is allowed access from all hosts. The wildcard principal * allows all principals. At least one principal, one host, one resource, and one operation is required to create a single ACL.

Allow all permissions to user bar on topic foo and group g:

rpk acl create --allow-principal bar --operation all --topic foo --group g

Allow read permissions to all users on topics biz and baz:

rpk acl create --allow-principal * --operation read --topic biz,baz

Allow write permissions to user buzz to transactional id txn:

rpk acl create --allow-principal User:buzz --operation write --transactional-id txn

Usage

rpk acl create [flags]

Flags

ValueTypeDescription
--allow-hoststringsHosts from which access will be granted (repeatable).
--allow-principalstringsPrincipals for which these permissions will be granted (repeatable).
--cluster-Whether to grant ACLs to the cluster.
--deny-hoststringsHosts from from access will be denied (repeatable).
--deny-principalstringsPrincipal for which these permissions will be denied (repeatable).
--groupstringsGroup to grant ACLs for (repeatable).
-h, --help-Help for create.
--operationstringsOperation to grant (repeatable).
--resource-pattern-typestringPattern to use when matching resource names (literal or prefixed) (default "literal").
--topicstringsTopic to grant ACLs for (repeatable).
--transactional-idstringsTransactional IDs to grant ACLs for (repeatable).
--admin-api-tls-certstringThe certificate to be used for TLS authentication with the Admin API.
--admin-api-tls-enabled-Enable TLS for the Admin API (not necessary if specifying custom certs).
--admin-api-tls-keystringThe certificate key to be used for TLS authentication with the Admin API.
--admin-api-tls-truststorestringThe truststore to be used for TLS communication with the Admin API.
--brokersstringsComma-separated list of broker ip:port pairs (e.g. --brokers '192.168.78.34:9092,192.168.78.35:9092,192.179.23.54:9092'). Alternatively, you may set the REDPANDA_BROKERS environment variable with the comma-separated list of broker addresses.
--configstringRedpanda config file, if not set the file will be searched for in the default locations.
--passwordstringSASL password to be used for authentication.
--sasl-mechanismstringThe authentication mechanism to use. Supported values: SCRAM-SHA-256, SCRAM-SHA-512.
--tls-certstringThe certificate to be used for TLS authentication with the broker.
--tls-enabled-Enable TLS for the Kafka API (not necessary if specifying custom certs).
--tls-keystringThe certificate key to be used for TLS authentication with the broker.
--tls-truststorestringThe truststore to be used for TLS communication with the broker.
--userstringSASL user to be used for authentication.
-v, --verbose-Enable verbose logging (default: false).

What do you like about this doc?




Optional: Share your email address if we can contact you about your feedback.

Let us know what we do well: