Instances
- Create the Instance
- Schema Registry Configuration
- Environment Mapping
- Granular Stream Browse Permissions for an Instance
- Topic Owner Browse Permission for an Instance
- Self Approval
- KSML support for an Instance
- Connect support for an Instance
- Connect logging support for an Instance
- Apicurio’s Keycloak support for an Instance
Create the Instance
These steps are used to create an Instance in the Axual Self-Service.
We are writing the steps
to create a dta instance using the local cluster created in the previous step.
- 
Open the instancesmenu and press theAdd instancebutton  
- 
Provide the Instance Details and press the Continuebutton- 
Put Dev Test Acceptanceas the Name
- 
Put dtaas the ShortName
- 
Put DTA Instanceas the Description
 Do not fill the Instance Manager URL field, this field is for older installation. It will be removed in future releases. 
- 
- 
Press the Select clusterbutton  
- 
Select the localcluster created in the previous step and press theApplybutton  
- 
Enable the Authentication Method for this Instance - 
Toggle the SSL (MUTUAL TLS)
- 
Upload the Signing CA used to sign your application certificate 
 
- 
- 
Press the Add Instancebutton  
Now you have successfully created an Instance in the Self-Service
 
Schema Registry Configuration
- 
Open the instancesmenu and select freshly createdDev Test Acceptanceinstance  
- 
Under the field ClusterspressConfigure Clusterfor clusterlocal. A modal for configuring the Schema Registry will open  - 
Put https://apicurio.axual.dta.local/apis/registry/v2as the Schema Registry URL
- 
Select Apicurioas the Schema Registry Type
- 
Select Basic Authenticationas the Authentication Method
- 
Provide the UsernameandPasswordto authenticate the Self-Service against the Schema Registry
 
- 
- 
Verify the Schema Registry details and connectivity by pressing the Verifybutton  For Apicurio Keycloak support for an Instance/Cluster, please navigate to Apicurio Keycloak configuration steps 
- 
Once verified, you can press Add listenersbutton to add Schema Registry Listeners. This step is optional.Schema Registry Listeners is a set of protocol:URL pair for setting various Schema Registry Listeners. They are used by the Kafka Clients to connect to the Schema Registry. You can add more listeners and there are no validation on our side. 
- 
You can close the Instance/Cluster modal by pressing the Savebutton  
- 
You can close the configuration modal 
Unconfigure Schema Registry for an Instance
To unconfigure a Schema Registry for an Instance-Cluster, follow these steps:
- 
Log in as a Tenant Admin 
- 
Move to the Instance page 
- 
Select the Instance 
- 
Click the Configure Clusterbutton to open the configuration modal for an Instance-Cluster that has already a Schema Registry configured.
- 
Click the Remove Schema Registrybutton and confirm thedeleteprompt that will be displayed.  
Environment Mapping
This setting allows Tenant Admin to enable or disable mapping environments under an Instance regardless of whether the user is an Environment Author.
When enabled, (which is the default), Environment Author can create an environment under that Instance.
When disabled, creation of an environment under that Instance is not allowed regardless of whether the user is an Environment Author.
If Environment Mapping is disabled for Instance 1 then:
- 
No user can create a new Environment using Instance 1
- 
No user can update an Environment to use Instance 1
- 
No user can update an Environment using Instance 1to use a different Instance
To enable environment mapping for an Instance
- 
Log in as a Tenant Admin 
- 
Move to the Instance page 
- 
Select the Instance 
- 
Click Edit Instance button 
- 
Under Governance Settings, click on theEnvironment Mappingtoggle
- 
Click Update Instance button   
| You can also enable environment mapping when creating an instance from the Create Instance page. | 
Granular Stream Browse Permissions for an Instance
Granular stream browse permissions allow Tenant Admin to have an instance level access control over topics configured on all environments mapped to it.
When enabled, all environments in the instance will support granular authorization.
When disabled, (which is the default), all environments in the instance have the same authorization for both stream configuration and browse, which means there is no granular browse permission applied over a topic.
To enable granular stream browse permissions for an instance
- 
Log in as a Tenant Admin 
- 
Move to the Instance page 
- 
Select the Instance 
- 
Click Edit Instance button 
- 
Under Governance Settings, click on theEnable granular stream browse permissionstoggle
- 
Click Update Instance button   
| Disabling granular stream browse permissions on an instance that had it enabled leads to deletion of all existing Permission Groups. | 
| You can also enable granular stream browse permissions when creating an instance from the create instance page. | 
Topic Owner Browse Permission for an Instance
Tenant Admin can enable the Topic Owner browse permission toggle to allow the Topic Owner to browse their topics, even when the Instance has the Granular Browse Permission enabled.
To enable the Topic Owner browse permission for an instance
- 
Log in as a Tenant Admin 
- 
Move to the Instance page 
- 
Select the Instance 
- 
Click Edit Instance button 
- 
Under Governance Settings- 
click Granular stream browse permissionstoggle
- 
Click the Topic Owner browse permissiontoggle
 
- 
- 
Click Update Instance button   This setting can only be enabled when Granular Browse permission is enabled. 
Self Approval
This setting allows Tenant Admin to enable or disable self approval for topic access requests under an Instance.
When enabled, (which is the default), users can approve their own topic access requests.
When disabled, self-approving of the topic access requests is not allowed, users approving an access request must be a different user than the user requesting access.
To change self-approval for an Instance
- 
Log in as a Tenant Admin 
- 
Move to the Instance page 
- 
Select the Instance 
- 
Click Edit Instance button 
- 
Under Governance Settings, click on theSelf Approvaltoggle
- 
Click Update Instance button   
| You can also enable self-approval when creating an instance from the Create Instance page. | 
KSML support for an Instance
When KSML is enabled for an Instance, KSML applications can be created in the Instance.
If KSML is enabled, KSML Provisioner URL must be provided. KSML Provisioner URL is the URL of the REST application used to provision KSML applications.
To enable KSML for an instance
- 
Log in as a Tenant Admin 
- 
Move to the Instance page 
- 
Select the Instance 
- 
Click Edit Instance button 
- 
Under KSML Support, click on theEnable KSMLtoggle
- 
Provide KSML Provisioner URL
- 
Click Update Instance button   
Connect support for an Instance
When Connect is enabled for an Instance, Connect applications can be created in the Instance.
If Connect is enabled, Connect URL must be provided. Connect URL is HTTP URL of the Axual Connect REST API for managing Kafka Connectors. The URL is used to interact with the Axual Connect cluster.
To enable Connect for an instance
- 
Log in as a Tenant Admin 
- 
Move to the Instance page 
- 
Select the Instance 
- 
Click Edit Instance button 
- 
Under Connect Support, click on theEnable Connecttoggle
- 
Provide Connect URL
- 
Click Update Instance button   
| Please read more about installing connect plugins here: Installing Connect Plugins | 
Connect logging support for an Instance
When Connect logging is enabled for an Instance, Connect logging can be viewed for an Instance.
If Connect logging is enabled, Connect Certificates must be provided.
To enable Connect logging for an instance
- 
Log in as a Tenant Admin 
- 
Move to the Instance page 
- 
Select the Instance 
- 
Click Edit Instance button 
- 
Under Connect Support, click on theEnable Connecttoggle
- 
Provide Connect URL
- 
Under Connect Logging, click on theEnable Connect loggingtoggle
- 
Upload Connect Certificates
- 
Click Update Instance button   
| Please read more about connector logging here: Enabling Connector logging into Kafka | 
Apicurio’s Keycloak support for an Instance
Apicurio’s Keycloak support is an optional configuration that allows storing Keycloak authentication details for an Instance-Cluster. This configuration can only be performed by a Tenant Admin.
To use this feature, ensure the following prerequisites are met:
- 
The Instance-Cluster is already configured with an Apicurio Schema Registry. 
- 
The authentication method for the Apicurio Schema Registry is not set to No Authentication (i.e., any other authentication option must be selected). 
Configure Apicurio Schema Registry for an Instance
To configure your Instance with an Apicurio Schema Registry
- 
Log in as a Tenant Admin 
- 
Move to the Instance page 
- 
Select the Instance 
- 
Click the Configure Clusterbutton to configure the Apicurio Schema Registry Details for this Instance-Cluster- 
Put https://apicurio.axual.dta.local/apis/registry/v2as the Schema Registry URL
- 
Select Apicurioas the Schema Registry Type
- 
Select Basic Authenticationas the Authentication Method- 
Put the usernameused by Platform Manager to authenticate against Apicurio
- 
Put the passwordused by Platform Manager to authenticate against Apicurio
 
- 
- 
Verify the Schema Registry details and connectivity by pressing the Verifybutton  
 
- 
- 
You can now press the Savebutton to update the Instance-Cluster
| You can follow the steps in Instance Creation to configure additional instance settings before continue with Keycloak configuration. | 
Configure Apicurio’s Keycloak Details for an Instance-Cluster
- 
Log in as a Tenant Admin 
- 
Move to the Instance page 
- 
Select the Instance 
- 
Click the Configure Clusterbutton to configure the Apicurio’s Keycloak Details for this Instance-Cluster
- 
At the bottom of the Schema Registry section, there is the Apicurio Keycloak form   
- 
Enter Apicurio Keycloak details - 
Keycloak URL: Enter the base URL of the Apicurio’s Keycloak server with the /authprefix (e.g. https://apicurio-keycloak/auth)
- 
Keycloak Master Realm: Specify the name of the master realm. Default value is master 
- 
Keycloak Admin Username: Provide the Keycloak administrator username 
- 
Keycloak Admin Password: Provide the Keycloak administrator password 
- 
Keycloak Admin Client ID: Enter the admin client ID. Default value is admin-cli 
- 
Keycloak Apicurio Realm: Specify the name of the Apicurio realm. Default value is apicurio   
 
- 
- 
Click the Savebutton to apply the Keycloak settings to the selected Instance-Cluster
| If you have an Instance configured with multiple clusters, you can configure Keycloak details independently for each cluster and choose not to configure Keycloak details for specific clusters. |