UNCLASSIFIED
Skip to content
GitLab
Projects
Groups
Snippets
Help
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Open sidebar
Ironbank Containers
O
Opensource
tchiotludo
akhq
Commits
042f4d84
Commit
042f4d84
authored
Mar 23, 2021
by
Chris Byrd
Browse files
tweak boilerplate config
parent
6d89f269
Pipeline
#198040
passed with stages
in 10 minutes and 56 seconds
Changes
1
Pipelines
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
27 additions
and
27 deletions
+27
-27
config/application.yml
config/application.yml
+27
-27
No files found.
config/application.yml
View file @
042f4d84
...
@@ -8,7 +8,7 @@ micronaut:
...
@@ -8,7 +8,7 @@ micronaut:
context
:
context
:
server
:
'
ldap://ldap.forumsys.com:389'
server
:
'
ldap://ldap.forumsys.com:389'
managerDn
:
'
cn=read-only-admin,dc=example,dc=com'
managerDn
:
'
cn=read-only-admin,dc=example,dc=com'
managerPassword
:
'
password'
managerPassword
:
search
:
search
:
base
:
"
dc=example,dc=com"
base
:
"
dc=example,dc=com"
groups
:
groups
:
...
@@ -28,7 +28,7 @@ micronaut:
...
@@ -28,7 +28,7 @@ micronaut:
signatures
:
signatures
:
secret
:
secret
:
generator
:
generator
:
secret
:
pleasechangeme
secret
:
server
:
server
:
context-path
:
"
"
# if behind a reverse proxy, path to akhq without trailing slash (optional). Example: akhq is
context-path
:
"
"
# if behind a reverse proxy, path to akhq without trailing slash (optional). Example: akhq is
...
@@ -56,41 +56,41 @@ akhq:
...
@@ -56,41 +56,41 @@ akhq:
url
:
"
http://schema-registry:8085"
# schema registry url (optional)
url
:
"
http://schema-registry:8085"
# schema registry url (optional)
type
:
"
confluent"
# schema registry type (optional). Supported types are "confluent" (default) or "tibco"
type
:
"
confluent"
# schema registry type (optional). Supported types are "confluent" (default) or "tibco"
# Basic Auth user / pass
# Basic Auth user / pass
basic-auth-username
:
basic-auth-user
basic-auth-username
:
${UN}
basic-auth-password
:
basic-auth-pass
basic-auth-password
:
${PW}
properties
:
# standard kafka properties (optional)
properties
:
# standard kafka properties (optional)
ssl.protocol
:
TLS
ssl.protocol
:
TLS
connect
:
connect
:
-
name
:
connect-1
-
name
:
connect-1
url
:
"
http://connect:8083"
url
:
"
http://connect:8083"
# Basic Auth user / pass (optional)
# Basic Auth user / pass (optional)
basic-auth-username
:
basic-auth-user
basic-auth-username
:
${UN}
basic-auth-password
:
basic-auth-pass
basic-auth-password
:
${PW}
# ssl store configuration (optional)
# ssl store configuration (optional)
ssl-trust-store
:
/app/truststore.jks
ssl-trust-store
:
/app/truststore.jks
ssl-trust-store-password
:
trust-store-password
ssl-trust-store-password
:
${PW}
ssl-key-store
:
/app/truststore.jks
ssl-key-store
:
/app/truststore.jks
ssl-key-store-password
:
key-store-password
ssl-key-store-password
:
${PW}
-
name
:
connect-2
-
name
:
connect-2
url
:
"
http://connect:8084"
url
:
"
http://connect:8084"
# Basic Auth user / pass (optional)
# Basic Auth user / pass (optional)
basic-auth-username
:
basic-auth-user
basic-auth-username
:
${UN}
basic-auth-password
:
basic-auth-pass
basic-auth-password
:
${PW}
# ssl store configuration (optional)
# ssl store configuration (optional)
ssl-trust-store
:
/app/truststore.jks
ssl-trust-store
:
/app/truststore.jks
ssl-trust-store-password
:
trust-store-password
ssl-trust-store-password
:
${PW}
ssl-key-store
:
/app/truststore.jks
ssl-key-store
:
/app/truststore.jks
ssl-key-store-password
:
key-store-password
ssl-key-store-password
:
${PW}
deserialization
:
deserialization
:
protobuf
:
protobuf
:
# (optional) if descriptor-file properties are used
# (optional) if descriptor-file properties are used
descriptors-folder
:
"
/app/protobuf_desc"
descriptors-folder
:
"
/app/protobuf_desc"
topics-mapping
:
topics-mapping
:
-
topic-regex
:
"
album.*"
-
topic-regex
:
"
album.*"
descriptor-file-base64
:
"
Cs4BCgthbGJ1bS5wcm90bxIXY29tLm5ldGNyYWNrZXIucHJvdG9idWYidwoFQWxidW0SFAoFdGl0bGUYASABKAlSBXRpdGxlEhYKBmFydGlzdBgCIAMoCVIGYXJ0aXN0EiEKDHJlbGVhc2VfeWVhchgDIAEoBVILcmVsZWFzZVllYXISHQoKc29uZ190aXRsZRgEIAMoCVIJc29uZ1RpdGxlQiUKF2NvbS5uZXRjcmFja2VyLnByb3RvYnVmQgpBbGJ1bVByb3RvYgZwcm90bzM="
descriptor-file-base64
:
"
"
#Base64
value-message-type
:
"
Album"
value-message-type
:
"
Album"
-
topic-regex
:
"
film.*"
-
topic-regex
:
"
film.*"
descriptor-file-base64
:
"
CuEBCgpmaWxtLnByb3RvEhRjb20uY29tcGFueS5wcm90b2J1ZiKRAQoERmlsbRISCgRuYW1lGAEgASgJUgRuYW1lEhoKCHByb2R1Y2VyGAIgASgJUghwcm9kdWNlchIhCgxyZWxlYXNlX3llYXIYAyABKAVSC3JlbGVhc2VZZWFyEhoKCGR1cmF0aW9uGAQgASgFUghkdXJhdGlvbhIaCghzdGFycmluZxgFIAMoCVIIc3RhcnJpbmdCIQoUY29tLmNvbXBhbnkucHJvdG9idWZCCUZpbG1Qcm90b2IGcHJvdG8z"
descriptor-file-base64
:
"
"
#Base64
value-message-type
:
"
Film"
value-message-type
:
"
Film"
-
topic-regex
:
"
test.*"
-
topic-regex
:
"
test.*"
descriptor-file
:
"
other.desc"
descriptor-file
:
"
other.desc"
...
@@ -110,22 +110,22 @@ akhq:
...
@@ -110,22 +110,22 @@ akhq:
bootstrap.servers
:
"
kafka:9093"
bootstrap.servers
:
"
kafka:9093"
security.protocol
:
SSL
security.protocol
:
SSL
ssl.truststore.location
:
/app/truststore.jks
ssl.truststore.location
:
/app/truststore.jks
ssl.truststore.password
:
password
ssl.truststore.password
:
${PW}
ssl.keystore.location
:
/app/keystore.jks
ssl.keystore.location
:
/app/keystore.jks
ssl.keystore.password
:
password
ssl.keystore.password
:
${PW}
ssl.key.password
:
password
ssl.key.password
:
${PW}
my-cluster-sasl
:
my-cluster-sasl
:
properties
:
properties
:
bootstrap.servers
:
"
kafka:9094"
bootstrap.servers
:
"
kafka:9094"
security.protocol
:
SASL_SSL
security.protocol
:
SASL_SSL
sasl.mechanism
:
SCRAM-SHA-256
sasl.mechanism
:
SCRAM-SHA-256
sasl.jaas.config
:
org.apache.kafka.common.security.scram.ScramLoginModule required username="
admin
" password="
password
";
sasl.jaas.config
:
org.apache.kafka.common.security.scram.ScramLoginModule required username="
${UN}
" password="
${PW}
";
ssl.truststore.location
:
/app/truststore.jks
ssl.truststore.location
:
/app/truststore.jks
ssl.truststore.password
:
password
ssl.truststore.password
:
${PW}
ssl.keystore.location
:
/app/keystore.jks
ssl.keystore.location
:
/app/keystore.jks
ssl.keystore.password
:
password
ssl.keystore.password
:
${PW}
ssl.key.password
:
password
ssl.key.password
:
${PW}
pagination
:
pagination
:
page-size
:
25
# number of elements per page (default : 25)
page-size
:
25
# number of elements per page (default : 25)
...
@@ -210,8 +210,8 @@ akhq:
...
@@ -210,8 +210,8 @@ akhq:
# Basic auth configuration
# Basic auth configuration
basic-auth
:
basic-auth
:
-
username
:
user
# Username
-
username
:
${UN}
# Username
password
:
pass
# Password in sha256
password
:
${PW}
# Password in sha256
groups
:
# Groups for the user
groups
:
# Groups for the user
-
admin
-
admin
-
topic-reader
-
topic-reader
...
@@ -227,10 +227,10 @@ akhq:
...
@@ -227,10 +227,10 @@ akhq:
groups
:
groups
:
-
admin
-
admin
users
:
users
:
-
username
:
riemann
# ldap user id
-
username
:
${UN}
# ldap user id
groups
:
# Akhq groups list
groups
:
# Akhq groups list
-
topic-reader
-
topic-reader
-
username
:
einstein
-
username
:
${UN}
groups
:
groups
:
-
admin
-
admin
...
@@ -240,7 +240,7 @@ akhq:
...
@@ -240,7 +240,7 @@ akhq:
providers
:
providers
:
oidc
:
oidc
:
label
:
"
Login
with
OIDC"
label
:
"
Login
with
OIDC"
username-field
:
preferred_username
username-field
:
${UN}
groups-field
:
roles
groups-field
:
roles
default-group
:
topic-reader
default-group
:
topic-reader
groups
:
groups
:
...
@@ -248,6 +248,6 @@ akhq:
...
@@ -248,6 +248,6 @@ akhq:
groups
:
groups
:
-
admin
-
admin
users
:
users
:
-
username
:
einstein
-
username
:
${UN}
groups
:
groups
:
-
admin
-
admin
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment