- Console API/CLI/Terraform - recommended for production and GitOps environments requiring dynamic configuration management. Enables real-time updates without service interruption.
- Console UI - ideal for development, testing, and quick configuration changes through the Console interface. Changes are not version-controlled or easily repeatable.
- YAML/Environment variables - best for initial Console setup and static configurations that rarely change. Requires container restart to apply configuration changes.
Clusters created through the UI are independent and persist regardless of YAML configurations.We recommend not mixing configuration methods to avoid confusion and unwanted overrides.
Ready-to-use configurations
Complete production-ready setup for Confluent Cloud
This demonstrates a complete configuration for Conduktor Console including database, monitoring, authentication and Confluent Cloud cluster connections with SASL_SSL/PLAIN security, Schema Registry, and Kafka Connect.- YAML file
- Environment variables
Amazon MSK with IAM authentication
Connect to an MSK cluster with IAM authentication. You can use explicit credentials or inherit them from the environment.Deploying this CloudFormation template to your environment might result in billable resources being consumed. See Amazon MSK pricing for details .
- YAML file
Complete production-ready setup for Aiven
This demonstrates a complete configuration for Conduktor Console including database, monitoring, authentication and Aiven cluster connections using mTLS with the Aiven flavor. You should have three files:- Your access key (in the keystore.jks file).
- Your access certificate (in the keystore.jks file).
- Your CA certificate (in the truststore.jks file).
- YAML file
- Environment variables
Kafka Cluster configuration
- None (PLAINTEXT)
- SASL
- SSL
- AWS IAM (MSK)
Basic connection without authentication or encryption.
- YAML file
- Environment variables
Schema Registry configuration
To enable Schema Registry support, attach these code examples to any of the cluster configurations above.- Confluent-like Schema Registry
- AWS Glue Schema Registry
- No authentication
- Basic authentication
- Bearer token authentication
- SSL authentication
- YAML file
- Environment variables
Kafka Connect configuration
To add Kafka Connect to your cluster configuration use the code examples below.- No authentication
- Basic authentication
- Bearer token authentication
- SSL authentication
- YAML file
- Environment variables
ksqlDB configuration
OAUTHBEARER with OIDC Authentication is possible since Kafka 3.1 and KIP-768 . To demonstrate OIDC authentication, you can connect to NASA’s GCN Kafka cluster after you sign up . Here’s a configuration example (adapt the values to your needs):- No authentication
- Basic authentication
- Bearer token authentication
- SSL authentication
- YAML file
- Environment variables
Provider configuration
To enable enhanced provider-specific capabilities, attach the following snippets to any of the above cluster configurations.- Confluent Cloud flavor
- Aiven Cloud flavor
- Gateway flavor
Connect to Confluent Cloud with enhanced management capabilities for service accounts, API keys, and ACLs.
- YAML file
- Environment variables
Logging configuration
- Environment variables
- Config file
Global log settings
Configure Console-wide logging behavior using these environment variables:| Environment variable | Default value | Description |
|---|---|---|
CDK_ROOT_LOG_LEVEL | INFO | Global Console log level, one of OFF, ERROR, WARN, INFO, DEBUG |
CDK_ROOT_LOG_FORMAT | TEXT | Log format, one of TEXT or JSON |
CDK_ROOT_LOG_COLOR | true | Enable color in logs when possible |
For backward compatibility,
CDK_DEBUG: true is still supported and is equivalent to CDK_ROOT_LOG_LEVEL: DEBUG.Module-specific log settings
Configure logging levels for individual Console modules:Possible values for all of them are:OFF, ERROR, WARN, INFO, DEBUG, and TRACE.| Environment variable | Default value | Description |
|---|---|---|
PLATFORM_STARTUP_LOG_LEVEL | INFO | Set the setup/configuration process logs level. By default, it is set to INFO, but switches to DEBUG if CDK_ROOT_LOG_LEVEL: DEBUG. |
CONSOLE_ROOT_LOG_LEVEL | CDK_ROOT_LOG_LEVEL | Logs related to any actions done in the Console UI |
PLATFORM_API_ROOT_LOG_LEVEL | CDK_ROOT_LOG_LEVEL | Internal platform API logs (health endpoints) |
Log level inheritance
If you don’t explicitly set the log level for a module, it will inherit theCDK_ROOT_LOG_LEVEL.For instance, if you only setCONSOLE_ROOT_LOG_LEVEL will be automatically set to DEBUG.Similarly, if you set:CONSOLE_ROOT_LOG_LEVEL will still be set to DEBUG, and isn’t overridden.JSON structured logging
Enable structured logging by settingCDK_ROOT_LOG_FORMAT=JSON. Logs will use this JSON format:
The log
timestamp is encoded in ISO-8601 format . When structured logging is enabled, CDK_ROOT_LOG_COLOR is always ignored.Runtime logger API
Console provides runtime log level management via REST API. This requires an admin API key.The
loggerName filter used to GET or SET a logger level uses a contains so you can either use the fully qualified cardinal name or just a part of it, meaning that the filter authenticator will match io.conduktor.authenticator or io.conduktor.authenticator.ConduktorUserProfile loggers, among others.The logLevel is case-insensitive and can be: TRACE, DEBUG, INFO, WARN, ERROR, OFF.