Instances
- Create the Instance
- Schema Registry Configuration
- Environment Mapping
- Prevent Reuse of SSL certificate across a Tenant or an Instance
- Granular Stream Browse Permissions For An Instance
- Topic Owner Browse Permission For An Instance
- Self Approval
- KSML support for an Instance
- Connect support for an Instance
- Connect logging support for an Instance
- Apicurio’s Keycloak support for an Instance
Create the Instance
These steps are used to create an Instance in the Axual Self-Service.
We are writing the steps
to create a dta
instance using the local
cluster created in the previous step.
-
Open the
instances
menu and press theAdd instance
button -
Provide the Instance Details and press the
Continue
button-
Put
Dev Test Acceptance
as the Name -
Put
dta
as the ShortName -
Put
DTA Instance
as the Description
Do not fill the Instance Manager URL field, this field is for older installation. It will be removed in future releases. -
-
Press the
Select cluster
button -
Select the
local
cluster created in the previous step and press theApply
button -
Enable the Authentication Method for this Instance
-
Toggle the
SSL (MUTUAL TLS)
-
Upload the Signing CA used to sign your application certificate
-
-
Press the
Add Instance
button
Now you have successfully created an Instance in the Self-Service

Schema Registry Configuration
-
Open the
instances
menu and select freshly createdDev Test Acceptance
instance -
Under the field
Clusters
pressConfigure Cluster
for clusterlocal
. A modal for configuring the Schema Registry will open-
Put
https://apicurio.axual.dta.local/apis/registry/v2
as the Schema Registry URL -
Select
Apicurio
as the Schema Registry Type -
Select
Basic Authentication
as the Authentication Method -
Provide the
Username
andPassword
to authenticate the Self-Service against the Schema Registry
-
-
Verify the Schema Registry details and connectivity by pressing the
Verify
buttonFor Apicurio Keycloak support for an Instance/Cluster, please navigate to Apicurio Keycloak configuration steps -
Once verified, you can press
Add listeners
button to add Schema Registry Listeners. This step is optional.Schema Registry Listeners is a set of protocol:URL pair for setting various Schema Registry Listeners. They are used by the Kafka Clients to connect to the Schema Registry. You can add more listeners and there are no validation on our side. -
You can close the Instance/Cluster modal by pressing the
Save
button -
You can close the configuration modal
Environment Mapping
This setting allows Tenant Admin to enable or disable mapping environments under an Instance regardless of whether the user is an Environment Author.
When enabled, (which is the default), Environment Author can create an environment under that Instance.
When disabled, creation of an environment under that Instance is not allowed regardless of whether the user is an Environment Author.
If Environment Mapping is disabled for Instance 1
then:
-
No user can create a new Environment using
Instance 1
-
No user can update an Environment to use
Instance 1
-
No user can update an Environment using
Instance 1
to use a different Instance
To enable environment mapping for an Instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
Governance Settings
, click on theEnvironment Mapping
toggle -
Click Update Instance button
You can also enable environment mapping when creating an instance from the Create Instance page. |
Prevent Reuse of SSL certificate across a Tenant or an Instance
This setting allows Tenant Admin to enable or disable creating Application authentications using an application-principal certificate that is already used by another Application authentication.
The Instance needs to have SSL (MUTUAL TLS) enabled as Authentication Methods.
|
On the "Instance" edit page, a Tenant Admin can configure the Certificate reuse prevention level in three different modes.

-
None (Default): no restriction is applied for this Instance. Multiple applications can share the same SSL certificate as their application principal.
-
Instance: restriction is applied for this Instance within its Instance scope. Multiple applications cannot share SSL certificate as their application principal defined in any Environment belonging to the Instance.
-
Tenant: restriction is applied for this Instance within its Tenant scope. Multiple applications cannot share SSL certificate as their application principal defined in any Environment belonging to the Tenant.
The restriction is applied only to new application principals
Granular Stream Browse Permissions For An Instance
Granular stream browse permissions allow Tenant Admin to have an instance level access control over topics configured on all environments mapped to it.
When enabled, all environments in the instance will support granular authorization.
When disabled, (which is the default), all environments in the instance have the same authorization for both stream configuration and browse, which means there is no granular browse permission applied over a topic.
To enable granular stream browse permissions for an instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
Governance Settings
, click on theEnable granular stream browse permissions
toggle -
Click Update Instance button
Disabling granular stream browse permissions on an instance that had it enabled leads to deletion of all existing Permission Groups. |
You can also enable granular stream browse permissions when creating an instance from the create instance page. |
Topic Owner Browse Permission For An Instance
Tenant Admin can enable the Topic Owner browse permission
toggle to allow the Topic Owner to browse their topics, even when the Instance has the Granular Browse Permission enabled.
To enable the Topic Owner browse permission
for an instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
Governance Settings
-
click
Granular stream browse permissions
toggle -
Click the
Topic Owner browse permission
toggle
-
-
Click Update Instance button
This setting can only be enabled when Granular Browse permission is enabled.
Self Approval
This setting allows Tenant Admin to enable or disable self approval for topic access requests under an Instance.
When enabled, (which is the default), users can approve their own topic access requests.
When disabled, self-approving of the topic access requests is not allowed, users approving an access request must be a different user than the user requesting access.
To change self-approval for an Instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
Governance Settings
, click on theSelf Approval
toggle -
Click Update Instance button
You can also enable self-approval when creating an instance from the Create Instance page. |
KSML support for an Instance
When KSML is enabled for an Instance, KSML applications can be created in the Instance.
If KSML is enabled, KSML Provisioner URL must be provided. KSML Provisioner URL is the URL of the REST application used to provision KSML applications.
To enable KSML for an instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
KSML Support
, click on theEnable KSML
toggle -
Provide
KSML Provisioner URL
-
Click Update Instance button
Connect support for an Instance
When Connect is enabled for an Instance, Connect applications can be created in the Instance.
If Connect is enabled, Connect URL must be provided. Connect URL is HTTP URL of the Axual Connect REST API for managing Kafka Connectors. The URL is used to interact with the Axual Connect cluster.
To enable Connect for an instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
Connect Support
, click on theEnable Connect
toggle -
Provide
Connect URL
-
Click Update Instance button
Please read more about installing connect plugins here: Installing Connect Plugins |
Connect logging support for an Instance
When Connect logging is enabled for an Instance, Connect logging can be viewed for an Instance.
If Connect logging is enabled, Connect Certificates must be provided.
To enable Connect logging for an instance
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click Edit Instance button
-
Under
Connect Support
, click on theEnable Connect
toggle -
Provide
Connect URL
-
Under
Connect Logging
, click on theEnable Connect logging
toggle -
Upload
Connect Certificates
-
Click Update Instance button
Please read more about connector logging here: Enabling Connector logging into Kafka |
Apicurio’s Keycloak support for an Instance
Apicurio’s Keycloak support is an optional configuration that allows storing Keycloak authentication details for an Instance Cluster. This configuration can only be performed by a Tenant Admin.
To use this feature, ensure the following prerequisites are met:
-
The Instance Cluster is already configured with an Apicurio Schema Registry.
-
The authentication method for the Apicurio Schema Registry is not set to No Authentication (i.e., any other authentication option must be selected).
Configure Apicurio Schema Registry for an Instance/Cluster
To configure your Instance with an Apicurio Schema Registry
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click the
Configure Cluster
button to configure the Apicurio Schema Registry Details for this Instance/Cluster-
Put
https://apicurio.axual.dta.local/apis/registry/v2
as the Schema Registry URL -
Select
Apicurio
as the Schema Registry Type -
Select
Basic Authentication
as the Authentication Method-
Put the
username
used by Platform Manager to authenticate against Apicurio -
Put the
password
used by Platform Manager to authenticate against Apicurio
-
-
Verify the Schema Registry details and connectivity by pressing the
Verify
button
-
-
You can now press the
Save
button to update the Instance Cluster
You can follow the steps in Instance Creation to configure additional instance settings before continue with Keycloak configuration. |
Configure Apicurio’s Keycloak Details for an Instance/Cluster
-
Log in as a Tenant Admin
-
Move to the Instance page
-
Select the Instance
-
Click the
Configure Cluster
button to configure the Apicurio’s Keycloak Details for this Instance/Cluster -
At the bottom of the Schema Registry section, there is the Apicurio Keycloak form
-
Enter Apicurio Keycloak details
-
Keycloak URL: Enter the base URL of the Apicurio’s Keycloak server with the
/auth
prefix (e.g. https://apicurio-keycloak/auth) -
Keycloak Master Realm: Specify the name of the master realm. Default value is master
-
Keycloak Admin Username: Provide the Keycloak administrator username
-
Keycloak Admin Password: Provide the Keycloak administrator password
-
Keycloak Admin Client ID: Enter the admin client ID. Default value is admin-cli
-
Keycloak Apicurio Realm: Specify the name of the Apicurio realm. Default value is apicurio
Currently, to save the Apicurio’s Keycloak details, you will need to provide again the Apicurio Details credentials ( username
andpassword
)
-
-
Click the
Save
button to apply the Keycloak settings to the selected Instance/Cluster
If you have a Multi-Cluster Instance, you can configure Keycloak details independently for each cluster and choose not to configure Keycloak details for specific clusters. |