1+ apiVersion: v1
2+ kind: ConfigMap
3+ metadata:
4+ name: kpow-config
5+ data:
6+
7+ ### See https://docs.kpow.io for full configuration and installation guides
8+
9+ ### Note: The simplest Kpow configuration requires only LICENSE_* and BOOTSTRAP.
10+
11+ ### License Configuration (https://kpow.io/try <- 30 day trial licenses available)
12+ ### Note: If using the AWS Marketplace Kpow Container you do not need to supply LICENSE* parameters
13+ ### (https://aws.amazon.com/marketplace/seller-profile?id=ab356f1d-3394-4523-b5d4-b339e3cca9e0)
14+
15+ LICENSE_ID: "replace-me"
16+ LICENSE_CODE: "replace-me"
17+ LICENSEE: "replace-me"
18+ LICENSE_EXPIRY: "replace-me"
19+ LICENSE_SIGNATURE: "replace-me"
20+
21+ ### Resource Set Configuration
22+
23+ ### Kpow manages sets of Kafka resources. Clusters, Schema Registries and Kafka Connect Installations.
24+ ### To configure multiple kafka resources prepend environment variables with _2, _3, etc.
25+ ### Resources with the same set-id are considered related.
26+ ### E.g. cluster with BOOTSTRAP_2 can decode messages from with registry SCHEMA_REGISTRY_URL_2.
27+
28+ ## Optional Resource Set Name (this is displayed in the Kpow UI for each set of resources)
29+
30+ ENVIRONMENT_NAME: "Change Me"
31+
32+ ## Kafka Cluster Configuration
33+ ## Required parameters for configuring a Kafka Cluster
34+ ## You must configure at least one Kafka Booktstrap to use Kpow.
35+
36+ BOOTSTRAP: "replace-with-your-bootstrap-url"
37+
38+ ## Optional Kafka Cluster Configuration
39+
40+ # SECURITY_PROTOCOL: SASL_SSL
41+ # SASL_MECHANISM: PLAIN
42+ # SASL_JAAS_CONFIG: "org.apache.kafka.common.security.plain.Plain.."
43+ # SASL_LOGIN_CALLBACK_HANDLER_CLASS: "com.corp.kafka.security.sasl.oauth.KafkaBrokerTokenCreator"
44+ # SSL_KEYSTORE_LOCATION: "/ssl/kafka.keystore.jks"
45+ # SSL_KEYSTORE_PASSWORD: "keystore-pass-123"
46+ # SSL_KEY_PASSWORD: "key-pass-123"
47+ # SSL_KEYSTORE_TYPE: JKS
48+ # SSL_KEYMANAGER_ALGORITHM: SunX509
49+ # SSL_TRUSTSTORE_LOCATION: "/ssl/kafka.truststore.jks"
50+ # SSL_TRUSTSTORE_PASSWORD: "trust-pass-123"
51+ # SSL_TRUSTSTORE_TYPE: JKS
52+ # SSL_TRUSTMANAGER_ALGORITHM: PKIX
53+ # SSL_ENDPOINT_IDENTIFICATION_ALGORITHM: https
54+ # SSL_PROVIDER: default
55+ # SSL_CIPHER_SUITES: default
56+ # SSL_PROTOCOL: TLS
57+ # SSL_ENABLED_PROTOCOLS: "TLSv.12,TLSv1.1,TLSv1"
58+ # SSL_SECURE_RANDOM_IMPLEMENTATION: SHA1PRNG
59+
60+ ## Schema Registry Configuration
61+
62+ # SCHEMA_REGISTRY_URL: https://registry-host
63+ # SCHEMA_REGISTRY_AUTH: USER_INFO
64+ # SCHEMA_REGISTRY_USER: registry-user
65+ # SCHEMA_REGISTRY_PASSWORD: registry-pass
66+ # SCHEMA_REGISTRY_NAME: registry-label (optional)
67+
68+ ## Kafka Connect Configuration
69+
70+ # CONNECT_REST_URL: http://localhost:8083
71+ # CONNECT_AUTH: BASIC (optional)
72+ # CONNECT_BASIC_AUTH_USER: connect-user (optional)
73+ # CONNECT_BASIC_AUTH_PASS: connect-pass (optional)
74+ # CONNECT_GROUP_ID: connect-group-id (optional)
75+ # CONNECT_OFFSET_STORAGE_TOPIC: connect-topic (optional)
76+
77+ ### System Configuration
78+
79+ # PORT: 3000 - the port to serve content
80+ # REPLICATION_FACTOR: 3 - the replication factor of internal kpow topics (reduce if you have fewer than 3 brokers)
81+ # SNAPSHOT_PARALLELISM: 3 - the parallelism of kpow snapshot execution (increase for very big resource-sets)
82+ # SHOW_SPLASH: true - turn on/off the initial splash screen for new user sessions
83+
84+ ### Live Mode Configuration
85+
86+ # LIVE_MODE_ENABLED=true
87+ # LIVE_MODE_PERIOD_MS=60000
88+ # LIVE_MODE_INTERVAL_MS=5000
89+ # LIVE_MODE_MAX_CONCURRENT_USERS=2
90+
91+ ## System HTTPS Configuration
92+
93+ # ENABLE_HTTPS: "true"
94+ # HTTPS_KEYSTORE_LOCATION: "/ssl/https.keystore.jks"
95+ # HTTPS_KEYSTORE_TYPE: "JKS"
96+ # HTTPS_KEYSTORE_PASSWORD: "ssl-key-pass"
97+ # HTTPS_TRUSTSTORE_LOCATION: "/ssl/https.truststore.jks"
98+ # HTTPS_TRUSTSTORE_TYPE: "JKS"
99+ # HTTPS_TRUSTSTORE_PASSWORD: "ssl-trust-pass"
100+
101+ ## Data Inspect Configuration
102+ ## Provide custom serdes, set the default serdes, and restrict serdes available to users.
103+
104+ # CUSTOM_SERDES: "io.kpow.SerdeOne,io.kpow.SerdeTwo"
105+ # DEFAULT_KEY_SERDES: "JSON"
106+ # DEFAULT_VALUE_SERDES: "AVRO"
107+ # AVAILABLE_KEY_SERDES: "JSON,String,Transit / JSON"
108+ # AVAILABLE_VALUE_SERDES: "JSON,String,io.kpow.SerdeOne"
109+
110+ ## Prometheus Endpoints
111+
112+ # PROMETHEUS_EGRESS: "true"
113+
114+ ### User Authentication and Authorization
115+
116+ ## RBAC Configuration (requires SSO provider configured, e.g. Okta, Github, Azure AD, AWS SSO, SAML, etc.)
117+
118+ # RBAC_CONFIGURATION_FILE: /opt/kpow/rbac-config.yaml
119+
120+ ## Global Access Controls Configuration (default to false, apply to all users, overriden if you configure RBAC)
121+
122+ # ALLOW_TOPIC_CREATE: "true"
123+ # ALLOW_TOPIC_DELETE: "true"
124+ # ALLOW_TOPIC_INSPECT: "true"
125+ # ALLOW_TOPIC_PRODUCE: "true"
126+ # ALLOW_TOPIC_EDIT: "true"
127+ # ALLOW_BROKER_EDIT: "true"
128+ # ALLOW_GROUP_EDIT: "true"
129+ # ALLOW_SCHEMA_CREATE: "true"
130+ # ALLOW_SCHEMA_EDIT: "true"
131+ # ALLOW_CONNECT_CREATE: "true"
132+ # ALLOW_CONNECT_EDIT: "true"
133+ # ALLOW_ACL_EDIT: "true"
134+
135+ ## Data Policy (Masking / Redaction) Configuration
136+
137+ # DATA_POLICY_CONFIGURATION_FILE: /opt/kpow/data-config.yml
138+
139+ ## Slack Integration (Send Audit Log records to a Slack channel)
140+
141+ # SLACK_WEBHOOK_URL: https://hooks.slack.com/services/...
142+
143+ ## Okta SSO (OpenID)
144+
145+ # AUTH_PROVIDER_TYPE: "okta"
146+ # OKTA_ORGANISATION: "your-organisation"
147+ # OPENID_CLIENT_ID: "The 'Client ID' found in the "Client Credentials" section of your Okta integration"
148+ # OPENID_CLIENT_SECRET: "The 'Client Secret' found in the "Client Credentials" section of your Okta integration"
149+ # OPENID_LANDING_URI: "https://staging.kpow.z-corp.com"
150+
151+ ## Github SSO (OpenID)
152+
153+ # AUTH_PROVIDER_TYPE: "github"
154+ # OPENID_TOKEN_URI: "https://github.com/login/oauth/access_token" or "[GHE Server URL]/login/oauth/access_token"
155+ # OPENID_AUTH_URI: "https://github.com/login/oauth/authorize" or "[GHE Server URL]/login/oauth/authorize"
156+ # OPENID_API_URI: "https://api.github.com/user" or, "[GHE Server URL]/api/v3/user"
157+ # OPENID_CLIENT_ID: "The 'Client ID' found in your configured Github Oath App"
158+ # OPENID_CLIENT_SECRET: "The 'Client Secret' found in your configured Github Oath App"
159+ # OPENID_LANDING_URI: "https://staging.kpow.z-corp.com/"
160+
161+ ## SAML SSO
162+
163+ # AUTH_PROVIDER_TYPE: "saml"
164+ # SAML_RELYING_PARTY_IDENTIFIER: "kpow.io"
165+ # SAML_ACS_URL: "https://kpow.corp.com/saml"
166+ # SAML_METADATA_FILE: "/opt/kpow/aws-metadata.xml"
167+ # SAML_CERT: "/var/certs/saml-cert.cer"
0 commit comments