Este contenido no está disponible en el idioma seleccionado.

8.3.13. Routing Key Wildcard Examples


The following table demonstrates the interaction between routing key wildcards in ACL rules and message headers. Along the top of the table are routing keys with wildcards. Down the left-hand side are message headers.
The character X indicates that the message with the given header will not be routed given an ACL rule that allows messages with the specified routing key. 'Routed' indicates that the message with the given header will be routed by an ACL rule that allows message with the specified routing key.
Expand
Table 8.12. Routing Keys, Message Headers, and Resultant Routing.
Routing Keys -> a.# #.e a.#.e a.#.c.#.e #.c.# #
Message Headers:
ax
X
X
X
X
X
Routed
a.x
Routed
X
X
X
X
Routed
ex
X
X
X
X
X
Routed
e.x
X
X
X
X
X
Routed
ae
X
X
X
X
X
Routed
a.e
Routed
Routed
Routed
X
X
Routed
a..e
Routed
Routed
Routed
X
X
Routed
a.x.e
Routed
Routed
Routed
X
X
Routed
a.c.e
Routed
Routed
Routed
Routed
Routed
Routed
a..c..e
Routed
Routed
Routed
Routed
Routed
Routed
a.b.c.d.e
Routed
Routed
Routed
Routed
Routed
Routed
a.b.x.c.d.y.e
Routed
Routed
Routed
Routed
Routed
Routed
a.#
Routed
X
X
X
X
Routed
#.e
X
Routed
X
X
X
Routed
a.#.e
Routed
Routed
Routed
X
X
Routed
a.#.c.#.e
Routed
Routed
Routed
Routed
Routed
Routed
#.c.#
X
X
X
X
Routed
Routed
#
X
X
X
X
X
Routed
Red Hat logoGithubredditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar. Explore nuestras recientes actualizaciones.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

Theme

© 2026 Red Hat
Volver arriba