generated from camel.apache.org/kamelet
2
Home
gitea_admin edited this page 2026-03-11 14:38:12 +00:00
Kafka Not Secured with Apicurio Registry secured with Keycloak Sink
Send data to Kafka topics on an insecure broker with Apicurio Registry secured with Keycloak.
The Kamelet is able to understand the following headers to be set:
-
key/ce-key: as message key -
partition-key/ce-partitionkey: as message partition key
Both the headers are optional.
Metadata
| Property | Value |
|---|---|
| Type | sink |
| Group | Kafka |
| Namespace | Kafka |
| Support Level | Stable |
| Provider | Apache Software Foundation |
Properties
| Name | Type | Required | Default | Description |
|---|---|---|---|---|
topic |
string | ✓ | Comma separated list of Kafka topic names | |
bootstrapServers |
string | ✓ | Comma separated list of Kafka Broker URLs | |
valueSerializer |
string | io.apicurio.registry.serde.avro.AvroKafkaSerializer |
Serliazer class for value that implements the Serializer interface. | |
apicurioRegistryUrl |
string | ✓ | The Apicurio Schema Registry URL | |
avroDatumProvider |
string | io.apicurio.registry.serde.avro.ReflectAvroDatumProvider |
How to write data with Avro | |
apicurioAuthServiceUrl |
string | ✓ | The URL for Keycloak instance securing the Apicurio Registry | |
apicurioAuthRealm |
string | ✓ | The Realm in Keycloak instance securing the Apicurio Registry | |
apicurioAuthClientId |
string | ✓ | The Client ID in Keycloak instance securing the Apicurio Registry | |
apicurioAuthClientSecret |
string | ✓ | The Client Secret in Keycloak instance securing the Apicurio Registry | |
apicurioAuthUsername |
string | ✓ | The Username in Keycloak instance securing the Apicurio Registry | |
apicurioAuthPassword |
string | ✓ | The Password in Keycloak instance securing the Apicurio Registry |
Dependencies
camel:corecamel:kameletcamel:kafkamvn:io.apicurio:apicurio-registry-serdes-avro-serde:2.4.14.Final