Enable Private Networking on Confluent Cloud with Schema Registry PrivateLink (Early Access)

Note

The Schema Registry PrivateLink feature is available in a limited Early Access release, and not available by default. Contact your Confluent Cloud team if you want to join the Early Access program, and gain access to Schema Registry PrivateLink. Early Access Program features are intended for evaluation use in development and testing environments only, and not suitable for production use. Early Access Program features are considered to be a Proof of Concept as defined in the Confluent Cloud Terms of Service.

Confluent Cloud Schema Registry now supports private networking on Amazon Web Services. This feature enables your client applications in the virtual private cloud (VPC) to securely access Schema Registry without egressing to the public internet from your VPC.

This capability is available for new environments. Schema Registry will be automatically provisioned to use private networking if the first Apache Kafka® cluster within the environment is provisioned to use private link connectivity. Currently, Schema Registry private link supports only AWS Dedicated clusters and Enterprise clusters. Therefore, the first Kafka cluster in the new environment must be either an AWS Dedicated cluster or Enterprise cluster configured to use Private Link.

All Confluent Cloud internal access to a Schema Registry with private connectivity (Schema Validation, Connectors using schemas, Flink, and ksqlDB) is also via private network. Therefore, your traffic is never exposed to the public internet when connecting to Schema Registry.

How does it work?

Schema Registry Private Networking requires a Private Link Attachment (PLATT). Private Link Attachments are resources that enable you to connect to Confluent serverless products, like Enterprise Clusters and Apache Flink®.

For Schema Registry, the new Private Link Attachment is used only to establish a connection between your client applications (including Cloud Console, Confluent CLI, Terraform) and Schema Registry. As a result, this PLATT is used by your clients to access Schema Registry from your VPC.

Prerequisites

Provision Schema Registry to use private networking

Once you create the new environment, provision an AWS Dedicated or Enterprise cluster with private link configuration as the first Kafka cluster in the environment, the Schema Registry will automatically be provisioned to use Private Link.

After you provision the Enterprise (ESKU) or Dedicated (DSKU) cluster, you will need to create a PLATT to access the Schema Registry.

  • For Dedicated clusters, Schema Registry requires that you define a PLATT in the same region and environment of the cluster, even if you create a Private Link for the Dedicated cluster.
  • For Enterprise clusters, the same PLATT is automatically used by Schema Registry and vice-versa.

(Optional) Step 2: Connect to the network with Confluent Cloud Console

This step is required only if you want to view and manage schemas on the Cloud Console outside of your VPC. If you don’t connect from a machine within the VPC, you see the following error when attempting to access schemas.

Error state for Schema Registry PrivateLink on Cloud Console

To connect to Confluent Cloud with PrivateLink Attachment, see Use Confluent Cloud with Private Networking. The Resource Metadata access option is not currently supported for Schema Registry.

One way to connect is to set up a reverse proxy:

  1. Create an EC2 instance

  2. Connect to the instance with SSH

  3. Install NGINX

  4. Configure Routing Table

  5. Set up DNS resolution: point to the Schema Registry regional endpoints you use, as described in Step 6 of Configure a proxy.

    <Public IP Address of VM instance> <schema-registry-private-endpoint>
    

    <schema-registry-private-endpoint> will resemble lsrc-1234.<region>.<cloud>.private.confluent.cloud, for example: lsrc-axliw12p.us-east-2.aws.private.confluent.cloud.

    Find the DNS part of the PrivateLink Attachment by navigating to your environment’s Network management page and finding the DNS domain setting.

    DNS domain on the Network Management for Schema Registry with PrivateLink

Once networking is set up in Cloud Console, the interface uses the correct endpoint automatically, and you should be able to view your schemas on the Schema Registry page.

View schemas on Confluent Cloud with Schema Registry PrivateLink

Limitations

  • Make sure all your resources in the environment belong to the region where the Schema Registry exists. Confluent Cloud resources outside this region cannot access the Schema Registry with private connectivity enabled.
  • Resource Metadata access is not applicable for Schema Registry.
  • To view the schemas on the Schema Registry tab you have to connect to the Schema Registry through the private network containing the Schema Registry private endpoints or set up a proxy as described in Step 2.
  • Schema Linking is not supported between two fully managed registries on Confluent Cloud.
  • Existing registries using public endpoints cannot be configured to use Private Connectivity.
  • Schema Registry with private connectivity is not resilient to AWS zonal failures.
  • Service level agreements (SLAs) provided by the Governance package will not be applicable.