Instances
Create the Instance
These steps are used to create an Instance in the Axual Self-Service.
We are writing the steps
to create a dta
instance using the local
cluster created in the previous step.
-
Open the
instances
menu and press theAdd instance
button -
Provide the Instance Details and press the
Continue
button-
Put
Dev Test Acceptance
as the Name -
Put
dta
as the ShortName -
Put
DTA Instance
as the Description
-
-
Press the
Select cluster
buttonDo not fill the Instance Manager URL field, this field is for older installation. It will be removed in future releases. -
Select the
local
cluster -
(Optional) Provide the Confluent Schema Registry Details for this Instance/Cluster
-
Put
http://axual-axual-schema-registry-master:20000/
as the Schema Registry URL -
Select
Confluent
as the Schema Registry Type -
Select
No Authentication
as the Authentication Method
-
-
Verify the Schema Registry details and connectivity by pressing the
Verify
buttonIf you need to have Apicurio Keycloak support for an Instance/Cluster, first you need to navigate to the Apicurio Keycloak configuration steps before proceeding with the instance configurations here. -
Once verified, you can press
Add listeners
button to add Schema Registry Listeners. This step is optional.-
Input
TLS
as the Protocol -
Input
http://platform.local:24000
as the URL
Schema Registry Listeners is a set of protocol:URL pair for setting various Schema Registry Listeners. They are used by the Kafka Clients to connect to the Schema Registry. You can add more listeners and there are no validation on our side. -
-
You can close the Instance/Cluster modal by pressing the
Select Cluster
button -
You can click on
Show full configuration
to validate the selected cluster details -
You can close the full configuration modal
-
Enable the Authentication Method for this Instance
-
Toggle the
SSL (MUTUAL TLS)
-
Upload the Signing CA used to sign your application certificate
-
-
Press the
Add Instance
button
Now you have successfully created an Instance in the Self-Service

Environment Mapping
This setting allows Tenant Admin to enable or disable mapping environments under an Instance regardless of whether the user is an Environment Author.
When enabled (which is the default), Environment Author can create an environment under that Instance.
When disabled, creation of an environment under that Instance is not allowed regardless of whether the user is an Environment Author.
If Environment Mapping is disabled for Instance 1
then:
-
No user can create a new Environment using
Instance 1
-
No user can update an Environment to use
Instance 1
-
No user can update an Environment using
Instance 1
to use a different Instance
To enable environment mapping for an Instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
Governance Settings
, click on theEnvironment Mapping
toggle -
Click Update Instance button
You can also enable environment mapping when creating an instance from the Create Instance page. |
Granular Stream Browse Permissions For An Instance
Granular stream browse permissions allows Tenant Admin to have an instance level access control over topics configured on all environments mapped to it.
When enabled, all environments in the instance will support granular authorization.
When disabled (which is the default), all environments in the instance have the same authorization for both stream configuration and browse, which means there is no granular browse permission applied over a topic.
To enable granular stream browse permissions for an instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
Governance Settings
, click on theEnable granular stream browse permissions
toggle -
Click Update Instance button
Disabling granular stream browse permissions on an instance that had it enabled leads to deletion of all existing Permission Groups. |
You can also enable granular stream browse permissions when creating an instance from the create instance page. |
KSML support for an Instance
When KSML is enabled for an Instance, KSML applications can be created in the Instance.
If KSML is enabled, KSML Provisioner URL must be provided. KSML Provisioner URL is the URL of the REST application used to provision KSML applications.
To enable KSML for an instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
KSML Support
, click on theEnable KSML
toggle -
Provide
KSML Provisioner URL
-
Click Update Instance button
Connect support for an Instance
When Connect is enabled for an Instance, Connect applications can be created in the Instance.
If Connect is enabled, Connect URL must be provided. Connect URL is HTTP URL of the Axual Connect REST API for managing Kafka Connectors. The URL is used to interact with the Axual Connect cluster.
To enable Connect for an instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
Connect Support
, click on theEnable Connect
toggle -
Provide
Connect URL
-
Click Update Instance button
Please read more about installing connect plugins here: Installing Connect Plugins |
Connect logging support for an Instance
When Connect logging is enabled for an Instance, Connect logging can be viewed for an Instance.
If Connect logging is enabled, Connect Certificates must be provided.
To enable Connect logging for an instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
Connect Support
, click on theEnable Connect
toggle -
Provide
Connect URL
-
Under
Connect Logging
, click on theEnable Connect logging
toggle -
Upload
Connect Certificates
-
Click Update Instance button
Please read more about connector logging here: Enabling Connector logging into Kafka |
Apicurio’s Keycloak support for an Instance
Apicurio’s Keycloak support is an optional configuration that allows storing Keycloak authentication details for an Instance Cluster. This configuration can only be performed by a Tenant Admin.
To use this feature, ensure the following prerequisites are met:
-
The Instance Cluster is already configured with an Apicurio Schema Registry.
-
The authentication method for the Apicurio Schema Registry is not set to No Authentication (i.e., any other authentication option must be selected).
Configure Apicurio Schema Registry for an Instance/Cluster
To configure your Instance with an Apicurio Schema Registry
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click the
Configure Cluster
button to configure the Apicurio Schema Registry Details for this Instance/Cluster-
Put
https://apicurio.axual.dta.local/apis/registry/v2
as the Schema Registry URL -
Select
Apicurio
as the Schema Registry Type -
Select
Basic Authentication
as the Authentication Method-
Put the
username
used by Platform Manager to authenticate against Apicurio -
Put the
password
used by Platform Manager to authenticate against Apicurio
-
-
Verify the Schema Registry details and connectivity by pressing the
Verify
button
-
-
You can now press the
Save
button to update the Instance Cluster
You can follow the steps in Instance Creation to configure additional instance settings before continue with Keycloak configuration. |
Configure Apicurio’s Keycloak Details for an Instance/Cluster
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click the
Configure Cluster
button to configure the Apicurio’s Keycloak Details for this Instance/Cluster -
At the bottom of the Schema Registry section, there is the Apicurio Keycloak form
-
Enter Apicurio Keycloak details
-
Keycloak URL: Enter the base URL of the Apicurio’s Keycloak server with the
/auth
prefix (e.g. https://apicurio-keycloak/auth) -
Keycloak Master Realm: Specify the name of the master realm. Default value is master
-
Keycloak Admin Username: Provide the Keycloak administrator username
-
Keycloak Admin Password: Provide the Keycloak administrator password
-
Keycloak Admin Client ID: Enter the admin client ID. Default value is admin-cli
-
Keycloak Apicurio Realm: Specify the name of the Apicurio realm. Default value is apicurio
Currently, to save the Apicurio’s Keycloak details, you will need to provide again the Apicurio Details credentials ( username
andpassword
)
-
-
Click the
Save
button to apply the Keycloak settings to the selected Instance/Cluster
If you have a Multi-Cluster Instance, you can configure Keycloak details independently for each cluster and choose not to configure Keycloak details for specific clusters. |