Available Configurations
Contents
Connect Docker Environment Variables
The table below provides a comprehensive overview of the Docker environment variables available for configuring the Connect
container.
You can customize the environment variables to match your specific Connect
configuration.
Configuration |
Required |
Description |
Default Value |
|
Yes |
Axual tenant |
|
|
Yes |
Connect Application ID |
|
|
Yes |
Bootstrap server url |
|
|
Yes |
Key converter |
|
|
Yes |
Value converter |
|
|
Yes |
|
|
|
Yes |
Name of topic used to store connector configurations |
|
|
Yes |
Name of topic used to store connector offsets |
|
|
Yes |
Name of topic used to store connector status |
|
|
No |
Logging configuration file location |
|
|
Yes |
Static tenant name configuration |
|
|
Yes |
Static instance name configuration |
|
|
Yes |
Static cluster name configuration |
|
|
Yes |
Static Schema Registry URL configuration |
|
|
No |
Static Group ID Pattern configuration |
|
|
No |
Static Topic Pattern configuration |
|
|
No |
Static Transactional ID Pattern configuration |
|
|
No |
Connect Application Version |
EMPTY_STRING |
|
No |
Class name or alias of implementation of |
|
|
No |
Common resources directory path |
|
|
No |
|
|
|
No |
Replication factor of topic used to store connector configurations |
|
|
No |
Replication factor of topic used to store connector offsets |
|
|
No |
Replication factor of topic used to store connector status |
|
|
No |
File to store offsets (used on |
|
|
No |
Enable/disable resolving for backing store topic |
|
|
No |
Axual Lineage headers feature flag, enabling all has a significant impact on throughput |
|
|
No |
Axual Lineage |
|
|
No |
Axual Lineage |
|
|
No |
Axual Lineage |
|
|
No |
Axual Lineage |
|
|
No |
Removes existing headers from messages prior to adding the new ones |
|
|
No |
Kafka heap options |
|
|
No |
Kafka JVM performance options |
|
|
No |
Truststore location |
|
|
No |
Truststore password |
|
|
No |
Keystore location |
|
|
No |
Keystore password |
|
|
No |
Key password |
|
|
No |
The endpoint identification algorithm to validate server hostname using server certificate. |
|
|
No |
KeyConverter keystore location |
|
|
No |
KeyConverter truststore location |
|
|
No |
KeyConverter SchemaRegistry keystore location |
|
|
No |
KeyConverter SchemaRegistry keystore password |
|
|
No |
KeyConverter SchemaRegistry key password |
|
|
No |
KeyConverter SchemaRegistry truststore location |
|
|
No |
KeyConverter SchemaRegistry truststore password |
|
|
No |
KeyConverter security protocol |
|
|
No |
ValueConverter keystore location |
|
|
No |
ValueConverter keystore location |
|
|
No |
ValueConverter SchemaRegistry keystore location |
|
|
No |
ValueConverter SchemaRegistry keystore password |
|
|
No |
ValueConverter SchemaRegistry key password |
|
|
No |
ValueConverter SchemaRegistry truststore location |
|
|
No |
ValueConverter SchemaRegistry truststore password |
|
|
No |
ValueConverter security protocol |
|
|
No |
Protocol used to communicate with brokers |
|
|
No |
List of REST listeners in the following format: |
|
|
No |
Sets the advertised listener (HTTP or HTTPS) which will be given to other workers to use |
|
|
No |
Abandoned in favor of |
|
|
No |
The endpoint identification algorithm to validate server hostname using server certificate. |
|
|
No |
Connect REST interface list of protocols enabled for SSL connections |
|
|
No |
REST listeners keystore location |
|
|
No |
REST listeners keystore password |
|
|
No |
REST listeners key password |
|
|
No |
REST listeners truststore location |
|
|
No |
REST listeners truststore password |
|
|
No |
REST listeners keystore type |
|
|
No |
REST listeners truststore type |
|
|
No |
A list of cipher suites. This is a named combination of authentication, encryption, MAC and key exchange algorithm used to negotiate the security settings for a network connection using TLS or SSL network protocol |
|
|
No |
Abandoned in favor of |
|
|
No |
Metrics port |
|
|
No |
Configuration provider. One of |
|
|
No |
Configuration provider. One of |
|
|
No |
Configuration provider. One of |
|
|
No |
Configuration provider. One of |
|
|
No |
The class implementing the configuration provider |
|
|
No |
The URL of the HashiCorp Vault server |
|
|
No |
Vault authentication Method |
|
|
No |
The Role ID for your Axual Connect instance |
|
|
No |
The Secret ID for your Axual Connect instance |
|
|
No |
Perform an SSL verification of the certificate provided by the Vault server |
|
|
No |
The Vault namespace where connect retrieves secrets from |
|
|
No |
The path to vault truststore |
|
|
No |
Vault truststore password |
|
|
No |
The Vault path to connect during initialisation to verify connectivity |
|
|
No |
The class implementing the configuration provider |
|
|
No |
The URL of the HashiCorp Vault server |
|
|
No |
Vault authentication Method |
|
|
No |
The Role ID for your Axual Connect instance |
|
|
No |
The Secret ID for your Axual Connect instance |
|
|
No |
Perform an SSL verification of the certificate provided by the Vault server |
|
|
No |
The Vault namespace where connect retrieves secrets from |
|
|
No |
The path to vault truststore |
|
|
No |
Vault truststore password |
|
|
No |
The Vault path to connect during initialisation to verify connectivity |
|
|
No |
The class implementing the configuration provider |
|
|
No |
The URL of the HashiCorp Vault server |
|
|
No |
Vault authentication Method |
|
|
No |
The Role ID for your Axual Connect instance |
|
|
No |
The Secret ID for your Axual Connect instance |
|
|
No |
Perform an SSL verification of the certificate provided by the Vault server |
|
|
No |
The Vault namespace where connect retrieves secrets from |
|
|
No |
The path to vault truststore |
|
|
No |
Vault truststore password |
|
|
No |
The Vault path to connect during initialisation to verify connectivity |
|
|
No |
The class implementing the configuration provider |
|
|
No |
The URL of the HashiCorp Vault server |
|
|
No |
Vault authentication Method |
|
|
No |
The Role ID for your Axual Connect instance |
|
|
No |
The Secret ID for your Axual Connect instance |
|
|
No |
Perform an SSL verification of the certificate provided by the Vault server |
|
|
No |
The Vault namespace where connect retrieves secrets from |
|
|
No |
The path to vault truststore |
|
|
No |
Vault truststore password |
|
|
No |
The Vault path to connect during initialisation to verify connectivity |
|
|
No |
The class implementing the configuration provider |
|
|
No |
The URL of the HashiCorp Vault server |
|
|
No |
The Role ID for your Axual Connect instance |
|
|
No |
The Secret ID for your Axual Connect instance |
|
|
No |
Vault authentication Method |
|
|
No |
Keystore provider certificate chain key name |
|
|
No |
Keystore provider privateKey key name |
|
|
No |
The path to vault truststore |
|
|
No |
Vault truststore password |
|
|
No |
Perform an SSL verification of the certificate provided by the Vault server |
|
|
No |
The Vault namespace where connect retrieves secrets from |
|
|
No |
The path to Connect client truststore |
|
|
No |
Connect client truststore password |
|
|
No |
The Vault path to connect during initialisation to verify connectivity |
|
|
No |
The class implementing the configuration provider |
|
|
No |
The URL of the HashiCorp Vault server |
|
|
No |
The Role ID for your Axual Connect instance |
|
|
No |
The Secret ID for your Axual Connect instance |
|
|
No |
Vault authentication Method |
|
|
No |
Keystore provider certificate chain key name |
|
|
No |
Keystore provider privateKey key name |
|
|
No |
The path to vault truststore |
|
|
No |
Vault truststore password |
|
|
No |
Perform an SSL verification of the certificate provided by the Vault server |
|
|
No |
The Vault namespace where connect retrieves secrets from |
|
|
No |
The path to Connect client truststore |
|
|
No |
Connect client truststore password |
|
|
No |
The Vault path to connect during initialisation to verify connectivity |
|
|
No |
The class implementing the configuration provider |
|
|
No |
The URL of the HashiCorp Vault server |
|
|
No |
The Role ID for your Axual Connect instance |
|
|
No |
The Secret ID for your Axual Connect instance |
|
|
No |
Vault authentication Method |
|
|
No |
Keystore provider certificate chain key name |
|
|
No |
Keystore provider privateKey key name |
|
|
No |
The path to vault truststore |
|
|
No |
Connect client truststore password |
|
|
No |
Perform an SSL verification of the certificate provided by the Vault server |
|
|
No |
The Vault namespace where connect retrieves secrets from |
|
|
No |
The path to Connect client truststore |
|
|
No |
Connect client truststore password |
|
|
No |
The Vault path to connect during initialisation to verify connectivity |
|
|
No |
The class implementing the configuration provider |
|
|
No |
The URL of the HashiCorp Vault server |
|
|
No |
The Role ID for your Axual Connect instance |
|
|
No |
The Secret ID for your Axual Connect instance |
|
|
No |
Vault authentication Method |
|
|
No |
Keystore provider certificate chain key name |
|
|
No |
Keystore provider privateKey key name |
|
|
No |
The path to vault truststore |
|
|
No |
Vault truststore password |
|
|
No |
Perform an SSL verification of the certificate provided by the Vault server |
|
|
No |
The Vault namespace where connect retrieves secrets from |
|
|
No |
The path to Connect client truststore |
|
|
No |
Connect client truststore password |
|
|
No |
The Vault path to connect during initialisation to verify connectivity |
|
|
No |
Basic authentication to access Connect Rest endpoints |
|
|
No |
Basic authentication username to access Connect Rest endpoints |
|
|
No |
Basic authentication password to access Connect Rest endpoints |
|
Running Connect Docker Container
Before running the Connect
container, make sure you have the following prerequisites in place:
-
Docker installed on your system.
Docker Run command
The following Docker run command starts the Connect
container with minimum essential environment variables.
Example:
docker run --name connect \
-e CONNECT_TENANT="tenant" \
-e CONNECT_APP_ID="app_id" \
-e CONNECT_DISCOVERY_BOOTSTRAP_SERVERS="kafka1:9092,kafka2:9093,kafka3:9094" \
-e CONNECT_KEY_CONVERTER="org.apache.kafka.connect.json.JsonConverter" \
-e CONNECT_VALUE_CONVERTER="org.apache.kafka.connect.json.JsonConverter" \
-e CONNECT_GROUP_ID="groupId" \
-e CONNECT_OFFSET_STORAGE_TOPIC="offsetStorageTopic" \
-e CONNECT_CONFIG_STORAGE_TOPIC="configStorageTopic" \
-e CONNECT_STATUS_STORAGE_TOPIC="statusStorageTopic" \
[IMAGE_REGISTRY]/axual/connect:[IMAGE_TAG]
axual/connect:[IMAGE_TAG]: Specifies the Docker image to run. |