Available Configurations
Contents
Connect Docker Environment Variables
The table below provides a comprehensive overview of the Docker environment variables available for configuring the Connect container.
You can customize the environment variables to match your specific Connect configuration.
| Configuration | Required | Description | Default Value | 
| 
 | Yes | Axual tenant | 
 | 
| 
 | Yes | Connect Application ID | 
 | 
| 
 | Yes | Bootstrap server url | 
 | 
| 
 | Yes | Key converter | 
 | 
| 
 | Yes | Value converter | 
 | 
| 
 | Yes | 
 | 
 | 
| 
 | Yes | Name of topic used to store connector configurations | 
 | 
| 
 | Yes | Name of topic used to store connector offsets | 
 | 
| 
 | Yes | Name of topic used to store connector status | 
 | 
| 
 | No | Logging configuration file location | 
 | 
| 
 | Yes | Static tenant name configuration | 
 | 
| 
 | Yes | Static instance name configuration | 
 | 
| 
 | Yes | Static cluster name configuration | 
 | 
| 
 | Yes | Static Schema Registry URL configuration | 
 | 
| 
 | No | Static Group ID Pattern configuration | 
 | 
| 
 | No | Static Topic Pattern configuration | 
 | 
| 
 | No | Static Transactional ID Pattern configuration | 
 | 
| 
 | No | Connect Application Version | EMPTY_STRING | 
| 
 | No | Class name or alias of implementation of  | 
 | 
| 
 | No | Common resources directory path | 
 | 
| 
 | No | 
 | 
 | 
| 
 | No | Replication factor of topic used to store connector configurations | 
 | 
| 
 | No | Replication factor of topic used to store connector offsets | 
 | 
| 
 | No | Replication factor of topic used to store connector status | 
 | 
| 
 | No | File to store offsets (used on  | 
 | 
| 
 | No | Enable/disable resolving for backing store topic | 
 | 
| 
 | No | Axual Lineage headers feature flag, enabling all has a significant impact on throughput | 
 | 
| 
 | No | Axual Lineage  | 
 | 
| 
 | No | Axual Lineage  | 
 | 
| 
 | No | Axual Lineage  | 
 | 
| 
 | No | Axual Lineage  | 
 | 
| 
 | No | Removes existing headers from messages prior to adding the new ones | 
 | 
| 
 | No | Kafka heap options | 
 | 
| 
 | No | Kafka JVM performance options | 
 | 
| 
 | No | Truststore location | 
 | 
| 
 | No | Truststore password | 
 | 
| 
 | No | Keystore location | 
 | 
| 
 | No | Keystore password | 
 | 
| 
 | No | Key password | 
 | 
| 
 | No | The endpoint identification algorithm to validate server hostname using server certificate. | 
 | 
| 
 | No | KeyConverter keystore location | 
 | 
| 
 | No | KeyConverter truststore location | 
 | 
| 
 | No | KeyConverter SchemaRegistry keystore location | 
 | 
| 
 | No | KeyConverter SchemaRegistry keystore password | 
 | 
| 
 | No | KeyConverter SchemaRegistry key password | 
 | 
| 
 | No | KeyConverter SchemaRegistry truststore location | 
 | 
| 
 | No | KeyConverter SchemaRegistry truststore password | 
 | 
| 
 | No | KeyConverter security protocol | 
 | 
| 
 | No | ValueConverter keystore location | 
 | 
| 
 | No | ValueConverter keystore location | 
 | 
| 
 | No | ValueConverter SchemaRegistry keystore location | 
 | 
| 
 | No | ValueConverter SchemaRegistry keystore password | 
 | 
| 
 | No | ValueConverter SchemaRegistry key password | 
 | 
| 
 | No | ValueConverter SchemaRegistry truststore location | 
 | 
| 
 | No | ValueConverter SchemaRegistry truststore password | 
 | 
| 
 | No | ValueConverter security protocol | 
 | 
| 
 | No | Protocol used to communicate with brokers | 
 | 
| 
 | No | List of REST listeners in the following format:  | |
| 
 | No | Sets the advertised listener (HTTP or HTTPS) which will be given to other workers to use | 
 | 
| 
 | No | Abandoned in favor of  | 
 | 
| 
 | No | The endpoint identification algorithm to validate server hostname using server certificate. | 
 | 
| 
 | No | Connect REST interface list of protocols enabled for SSL connections | 
 | 
| 
 | No | REST listeners keystore location | 
 | 
| 
 | No | REST listeners keystore password | 
 | 
| 
 | No | REST listeners key password | 
 | 
| 
 | No | REST listeners truststore location | 
 | 
| 
 | No | REST listeners truststore password | 
 | 
| 
 | No | REST listeners keystore type | 
 | 
| 
 | No | REST listeners truststore type | 
 | 
| 
 | No | A list of cipher suites. This is a named combination of authentication, encryption, MAC and key exchange algorithm used to negotiate the security settings for a network connection using TLS or SSL network protocol | 
 | 
| 
 | No | Abandoned in favor of  | 
 | 
| 
 | No | Metrics port | 
 | 
| 
 | No | Configuration provider. One of  | 
 | 
| 
 | No | Configuration provider. One of  | 
 | 
| 
 | No | Configuration provider. One of  | 
 | 
| 
 | No | Configuration provider. One of  | 
 | 
| 
 | No | The class implementing the configuration provider | 
 | 
| 
 | No | The URL of the HashiCorp Vault server | 
 | 
| 
 | No | Vault authentication Method | 
 | 
| 
 | No | The Role ID for your Axual Connect instance | 
 | 
| 
 | No | The Secret ID for your Axual Connect instance | 
 | 
| 
 | No | Perform an SSL verification of the certificate provided by the Vault server | 
 | 
| 
 | No | The Vault namespace where connect retrieves secrets from | 
 | 
| 
 | No | The path to vault truststore | 
 | 
| 
 | No | Vault truststore password | 
 | 
| 
 | No | The Vault path to connect during initialisation to verify connectivity | 
 | 
| 
 | No | The class implementing the configuration provider | 
 | 
| 
 | No | The URL of the HashiCorp Vault server | 
 | 
| 
 | No | Vault authentication Method | 
 | 
| 
 | No | The Role ID for your Axual Connect instance | 
 | 
| 
 | No | The Secret ID for your Axual Connect instance | 
 | 
| 
 | No | Perform an SSL verification of the certificate provided by the Vault server | 
 | 
| 
 | No | The Vault namespace where connect retrieves secrets from | 
 | 
| 
 | No | The path to vault truststore | 
 | 
| 
 | No | Vault truststore password | 
 | 
| 
 | No | The Vault path to connect during initialisation to verify connectivity | 
 | 
| 
 | No | The class implementing the configuration provider | 
 | 
| 
 | No | The URL of the HashiCorp Vault server | 
 | 
| 
 | No | Vault authentication Method | 
 | 
| 
 | No | The Role ID for your Axual Connect instance | 
 | 
| 
 | No | The Secret ID for your Axual Connect instance | 
 | 
| 
 | No | Perform an SSL verification of the certificate provided by the Vault server | 
 | 
| 
 | No | The Vault namespace where connect retrieves secrets from | 
 | 
| 
 | No | The path to vault truststore | 
 | 
| 
 | No | Vault truststore password | 
 | 
| 
 | No | The Vault path to connect during initialisation to verify connectivity | 
 | 
| 
 | No | The class implementing the configuration provider | 
 | 
| 
 | No | The URL of the HashiCorp Vault server | 
 | 
| 
 | No | Vault authentication Method | 
 | 
| 
 | No | The Role ID for your Axual Connect instance | 
 | 
| 
 | No | The Secret ID for your Axual Connect instance | 
 | 
| 
 | No | Perform an SSL verification of the certificate provided by the Vault server | 
 | 
| 
 | No | The Vault namespace where connect retrieves secrets from | 
 | 
| 
 | No | The path to vault truststore | 
 | 
| 
 | No | Vault truststore password | 
 | 
| 
 | No | The Vault path to connect during initialisation to verify connectivity | 
 | 
| 
 | No | The class implementing the configuration provider | 
 | 
| 
 | No | The URL of the HashiCorp Vault server | 
 | 
| 
 | No | The Role ID for your Axual Connect instance | 
 | 
| 
 | No | The Secret ID for your Axual Connect instance | 
 | 
| 
 | No | Vault authentication Method | 
 | 
| 
 | No | Keystore provider certificate chain key name | 
 | 
| 
 | No | Keystore provider privateKey key name | 
 | 
| 
 | No | The path to vault truststore | 
 | 
| 
 | No | Vault truststore password | 
 | 
| 
 | No | Perform an SSL verification of the certificate provided by the Vault server | 
 | 
| 
 | No | The Vault namespace where connect retrieves secrets from | 
 | 
| 
 | No | The path to Connect client truststore | 
 | 
| 
 | No | Connect client truststore password | 
 | 
| 
 | No | The Vault path to connect during initialisation to verify connectivity | 
 | 
| 
 | No | The class implementing the configuration provider | 
 | 
| 
 | No | The URL of the HashiCorp Vault server | 
 | 
| 
 | No | The Role ID for your Axual Connect instance | 
 | 
| 
 | No | The Secret ID for your Axual Connect instance | 
 | 
| 
 | No | Vault authentication Method | 
 | 
| 
 | No | Keystore provider certificate chain key name | 
 | 
| 
 | No | Keystore provider privateKey key name | 
 | 
| 
 | No | The path to vault truststore | 
 | 
| 
 | No | Vault truststore password | 
 | 
| 
 | No | Perform an SSL verification of the certificate provided by the Vault server | 
 | 
| 
 | No | The Vault namespace where connect retrieves secrets from | 
 | 
| 
 | No | The path to Connect client truststore | 
 | 
| 
 | No | Connect client truststore password | 
 | 
| 
 | No | The Vault path to connect during initialisation to verify connectivity | 
 | 
| 
 | No | The class implementing the configuration provider | 
 | 
| 
 | No | The URL of the HashiCorp Vault server | 
 | 
| 
 | No | The Role ID for your Axual Connect instance | 
 | 
| 
 | No | The Secret ID for your Axual Connect instance | 
 | 
| 
 | No | Vault authentication Method | 
 | 
| 
 | No | Keystore provider certificate chain key name | 
 | 
| 
 | No | Keystore provider privateKey key name | 
 | 
| 
 | No | The path to vault truststore | 
 | 
| 
 | No | Connect client truststore password | 
 | 
| 
 | No | Perform an SSL verification of the certificate provided by the Vault server | 
 | 
| 
 | No | The Vault namespace where connect retrieves secrets from | 
 | 
| 
 | No | The path to Connect client truststore | 
 | 
| 
 | No | Connect client truststore password | 
 | 
| 
 | No | The Vault path to connect during initialisation to verify connectivity | 
 | 
| 
 | No | The class implementing the configuration provider | 
 | 
| 
 | No | The URL of the HashiCorp Vault server | 
 | 
| 
 | No | The Role ID for your Axual Connect instance | 
 | 
| 
 | No | The Secret ID for your Axual Connect instance | 
 | 
| 
 | No | Vault authentication Method | 
 | 
| 
 | No | Keystore provider certificate chain key name | 
 | 
| 
 | No | Keystore provider privateKey key name | 
 | 
| 
 | No | The path to vault truststore | 
 | 
| 
 | No | Vault truststore password | 
 | 
| 
 | No | Perform an SSL verification of the certificate provided by the Vault server | 
 | 
| 
 | No | The Vault namespace where connect retrieves secrets from | 
 | 
| 
 | No | The path to Connect client truststore | 
 | 
| 
 | No | Connect client truststore password | 
 | 
| 
 | No | The Vault path to connect during initialisation to verify connectivity | 
 | 
| 
 | No | Basic authentication to access Connect Rest endpoints | 
 | 
| 
 | No | Basic authentication username to access Connect Rest endpoints | 
 | 
| 
 | No | Basic authentication password to access Connect Rest endpoints | 
 | 
Running Connect Docker Container
Before running the Connect container, make sure you have the following prerequisites in place:
- 
Docker installed on your system. 
Docker Run command
The following Docker run command starts the Connect container with minimum essential environment variables.
Example:
docker run --name connect \
-e CONNECT_TENANT="tenant" \
-e CONNECT_APP_ID="app_id" \
-e CONNECT_DISCOVERY_BOOTSTRAP_SERVERS="kafka1:9092,kafka2:9093,kafka3:9094" \
-e CONNECT_KEY_CONVERTER="org.apache.kafka.connect.json.JsonConverter" \
-e CONNECT_VALUE_CONVERTER="org.apache.kafka.connect.json.JsonConverter" \
-e CONNECT_GROUP_ID="groupId" \
-e CONNECT_OFFSET_STORAGE_TOPIC="offsetStorageTopic" \
-e CONNECT_CONFIG_STORAGE_TOPIC="configStorageTopic" \
-e CONNECT_STATUS_STORAGE_TOPIC="statusStorageTopic" \
[IMAGE_REGISTRY]/axual/connect:[IMAGE_TAG]| axual/connect:[IMAGE_TAG]: Specifies the Docker image to run. |