Schema Registry Configuration Reference for Confluent Platform¶
This section contains Schema Registry configuration parameters organized by level of importance.
- High: These parameters can have a significant impact on performance. Take care when deciding the values of these parameters.
- Medium: These parameters can have some impact on performance. Your specific environment will determine how much tuning effort should be focused on these parameters.
- Low: These parameters have a less general or less significant impact on performance.
These parameters are defined in the Schema Registry configuration file, schema-registry.properties
, which is located at CONFLUENT_HOME/etc/schema-registry/schema-registry.properties
) on a local install.
kafkastore.connection.url¶
REMOVED AS A METHOD OF CONFIGURING LEADER ELECTION: For leader election, use kafkastore.bootstrap.servers
instead of kafkastore.connection.url
.
Important
- ZooKeeper leader election was removed in Confluent Platform 7.0.0. Kafka leader election should be used instead.
- See Migration from ZooKeeper primary election to Kafka primary election for details on upgrading leader election.
- Previous to 5.5.0 (Confluent Platform 5.4.x and earlier) if the Schema Registry Security Plugin for Confluent Platform was installed and configured to use ACLs,
it had to connect to ZooKeeper and used
kafkastore.connection.url
to do so. This is no longer the case with the addition of Schema Registry ACL Authorizer for Confluent Platform. If you do not have the ACL Authorizer, upgrade to a Confluent Platform version that has it.
ZooKeeper URL for the Apache Kafka® cluster
- Type: string
- Default: “”
- Importance: high
kafkastore.bootstrap.servers¶
A list of Kafka brokers to connect to. For example, PLAINTEXT://hostname:9092,SSL://hostname2:9092
The Kafka cluster containing the bootstrap servers specified in kafkastore.bootstrap.servers
is used to coordinate Schema Registry instances (leader election), and store schema data.
When Kafka security is enabled, kafkastore.bootstrap.servers
is also used to specify security protocols that Schema Registry uses to connect to Kafka.
- Type: list
- Default: []
- Importance: medium
listeners¶
Comma-separated list of listeners that listen for API requests over either HTTP or HTTPS. If a listener uses HTTPS, the appropriate TLS configuration parameters need to be set as well.
Schema Registry identities are stored in ZooKeeper and are made up of a hostname and port. If multiple listeners are configured, the first listener’s port is used for its identity.
- Type: list
- Default: “http://0.0.0.0:8081”
- Importance: high
enable.fips¶
Enable FIPS mode on the server. If FIPS mode is enabled, broker listener security protocols, TLS versions and cipher suites will be validated based on FIPS compliance requirement.
Important
If set to true
, the init.resource.extension.class configuration must be present, and it must contain io.confluent.kafka.schemaregistry.security.SchemaRegistryFipsResourceExtension
.
- Type: boolean
- Default: false
- Importance: low
init.resource.extension.class¶
A list of classes to use as SchemaRegistryResourceExtension
. Implementing the interface SchemaRegistryResourceExtension
allows you to inject user defined resources to Schema Registry. These resources will be injected before Schema Registry is initialized.
- Type: list
- Default: []
- Importance: low
schema.compatibility.level¶
The schema compatibility type.
Valid values are:
none
: New schema can be any valid schema.backward
: New schema can read data produced by latest registered schema.backward_transitive
: New schema can read data produced by all previously registered schemas.forward
: Latest registered schema can read data produced by the new schema.forward_transitive
: All previously registered schemas can read data produced by the new schema.full
: New schema is backward and forward compatible with latest registered schema.full_transitive
: New schema is backward and forward compatible with all previously registered schemas.
In Confluent Platform versions 5.5.0 and later, use schema.compatibility.level
instead of the deprecated avro-compatibility-level
instead.
- Type: string
- Default: “backward”
- Importance: high
See also
- Schema Evolution and Compatibility for Schema Registry on Confluent Platform
- The new property,
schema.compatibility.level
, is designed to support multiple schema formats introduced in Confluent Platform 5.5.0, as described in Formats, Serializers, and Deserializers.
avro.compatibility.level¶
DEPRECATED: The Avro compatibility type.
Use schema.compatibility.level instead.
- Type: string
- Default: “backward”
- Importance: high
schema.canonicalize.on.consume¶
A list of Formats, Serializers, and Deserializers (AVRO, JSON, or PROTOBUF) to canonicalize on consume. Use this parameter if canonicalization changes.
- Type: string
- Default: “”
- Importance: high
host.name¶
The advertised host name. Make sure to set this if running Schema Registry with multiple nodes. Starting with Confluent Platform 7.4.0, this name is always used in the endpoint for communication between Schema Registry instances,
even if inter.instance.listener.name is specified, or does not match any listener. (The schema, port and TLS configurations will continue to be picked based on the inter.instance.listener.name
config, if it is set.)
- Type: string
- Default: “192.168.50.1”
- Importance: high
Important
If host.name
is set in a multi Schema Registry node environment, it must resolve to a valid location or URL from the other Schema Registry instance(s) to ensure communication between the nodes.
host.http.connect.timeout.ms¶
The HTTP connection timeout in milliseconds for Schema Registry client. Specifies the maximum amount of time that a client will wait for a response from Schema Registry when attempting to connect before timing out (giving up). The default is 60000 milliseconds (60 seconds). This is now configurable on Confluent Platform 6.0 and later.
- Type: int
- Default: 60000
- Valid Values: [0,…]
- Importance: low
http.read.timeout.ms¶
The HTTP read timeout in milliseconds for Schema Registry client. Specifies the maximum amount of time that a client will wait for a response from Schema Registry on a READ attempt (for example, to retrieve a schema), before timing out (giving up). The default is 60000 milliseconds (60 seconds). This is now configurable on Confluent Platform 6.0 and later.
- Type: int
- Default: 60000
- Valid Values: [0,…]
- Importance: low
kafkastore.ssl.key.password¶
The password of the key contained in the keystore.
- Type: string
- Default: “”
- Importance: high
kafkastore.ssl.keystore.location¶
The location of the TLS keystore file.
- Type: string
- Default: “”
- Importance: high
kafkastore.ssl.keystore.password¶
The password to access the keystore.
- Type: string
- Default: “”
- Importance: high
kafkastore.ssl.truststore.location¶
The location of the TLS trust store file.
- Type: string
- Default: “”
- Importance: high
kafkastore.ssl.truststore.password¶
The password to access the trust store.
- Type: string
- Default: “”
- Importance: high
kafkastore.topic¶
The durable single partition topic that acts as the durable log for the data. This topic must be compacted to avoid losing data due to retention policy.
- Type: string
- Default: “_schemas”
- Importance: high
kafkastore.topic.replication.factor¶
The desired replication factor of the schema topic. The actual replication factor will be the smaller of this value and the number of live Kafka brokers.
- Type: int
- Default: 3
- Importance: high
response.mediatype.default¶
The default response media type that should be used if no specify types are requested in an Accept header.
- Type: string
- Default: “application/vnd.schemaregistry.v1+json”
- Importance: high
ssl.keystore.location¶
Used for HTTPS. Location of the keystore file to use for SSL.
Important
Jetty requires that the key’s CN, stored in the keystore, must match the FQDN.
- Type: string
- Default: “”
- Importance: high
ssl.keystore.password¶
Used for HTTPS. The store password for the keystore file.
- Type: password
- Default: “”
- Importance: high
ssl.key.password¶
Used for HTTPS. The password of the private key in the keystore file.
- Type: password
- Default: “”
- Importance: high
ssl.principal.mapping.rules¶
Used for HTTPS. A list of rules for mapping distinguished name (DN) from the client certificate to short name. The rules are evaluated in order and the first rule that matches a principal name is used to map it to a short name. Any later rules in the list are ignored. By default, DN of the X.500 certificate is the principal. For details see mTLS to SASL Authentication.
For Schema Registry use: confluent.schema.registry.auth.ssl.principal.mapping.rules
.
- Type: list
- Default: “DEFAULT”
- Importance: low
ssl.truststore.location¶
Used for HTTPS. Location of the trust store. Required only to authenticate HTTPS clients.
- Type: string
- Default: “”
- Importance: high
ssl.truststore.password¶
Used for HTTPS. The store password for the trust store file.
- Type: password
- Default: “”
- Importance: high
response.mediatype.preferred¶
An ordered list of the server’s preferred media types used for responses, from most preferred to least.
- Type: list
- Default: [application/vnd.schemaregistry.v1+json, application/vnd.schemaregistry+json, application/json]
- Importance: high
zookeeper.set.acl¶
Whether or not to set an ACL in ZooKeeper when znodes are created and ZooKeeper SASL authentication is configured.
Important
If set to true
, the ZooKeeper SASL principal must be the same as the Kafka brokers.
- Type: boolean
- Default: false
- Importance: high
kafkastore.init.timeout.ms¶
The timeout for initialization of the Kafka store, including creation of the Kafka topic that stores schema data.
- Type: int
- Default: 60000
- Importance: medium
kafkastore.security.protocol¶
The security protocol to use when connecting with Kafka, the underlying persistent storage. Values can be PLAINTEXT
, SASL_PLAINTEXT
, SSL
or SASL_SSL
.
- Type: string
- Default: “PLAINTEXT”
- Importance: medium
kafkastore.ssl.enabled.protocols¶
The comma-separated list of protocols enabled for TLS connections. The default
value is TLSv1.2,TLSv1.3
when running with Java 11 or later, TLSv1.2
otherwise. With the default value for Java 11 (TLSv1.2,TLSv1.3
), Kafka
clients and brokers prefer TLSv1.3 if both support it, and falls back to
TLSv1.2 otherwise (assuming both support at least TLSv1.2).
- Type: string
- Default: “TLSv1.2, TLSv1.3”
- Importance: medium
kafkastore.ssl.keystore.type¶
The file format of the keystore.
- Type: string
- Default: “JKS”
- Importance: medium
kafkastore.ssl.protocol¶
The TLS protocol used to generate the SSLContext. The default is TLSv1.3
when running with Java 11 or newer, TLSv1.2
otherwise. This value should
be fine for most use cases. Allowed values in recent JVMs are TLSv1.2
and
TLSv1.3
. TLS
, TLSv1.1
, SSL
, SSLv2
and SSLv3
might be
supported in older JVMs, but their usage is discouraged due to known security
vulnerabilities. With the default value for this configuration and ssl.enabled.protocols
,
clients downgrade to TLSv1.2
if the server does not support TLSv1.3
.
If this configuration is set to TLSv1.2
, clients do not use TLSv1.3
,
even if it is one of the values in ssl.enabled.protocols
and the server
only supports TLSv1.3
.
- Type: string
- Default:
TLSv1.3
- Importance: medium
kafkastore.ssl.provider¶
The name of the security provider used for SSL.
- Type: string
- Default: “”
- Importance: medium
kafkastore.ssl.truststore.type¶
The file format of the trust store.
- Type: string
- Default: “JKS”
- Importance: medium
kafkastore.timeout.ms¶
The timeout for an operation on the Kafka store
- Type: int
- Default: 500
- Importance: medium
leader.eligibility¶
If true, this node can participate in primary election. In a multi-colocated setup, turn this off for clusters in the secondary data center.
- Type: boolean
- Default: true
- Importance: medium
kafkastore.sasl.kerberos.service.name¶
The Kerberos principal name that the Kafka client runs as. This can be defined either in the JAAS config file or here.
- Type: string
- Default: “”
- Importance: medium
kafkastore.sasl.mechanism¶
The SASL mechanism used for Kafka connections. GSSAPI is the default.
- Type: string
- Default: “GSSAPI”
- Importance: medium
access.control.allow.methods¶
Set value to Jetty Access-Control-Allow-Origin header for specified methods
- Type: string
- Default: “”
- Importance: low
ssl.keystore.type¶
Used for HTTPS. The type of keystore file.
- Type: string
- Default: “JKS”
- Importance: medium
ssl.truststore.type¶
Used for HTTPS. The type of trust store file.
- Type: string
- Default: “JKS”
- Importance: medium
ssl.protocol¶
The TLS protocol used to generate the SSLContext. The default is TLSv1.3
when running with Java 11 or newer, TLSv1.2
otherwise. This value should
be fine for most use cases. Allowed values in recent JVMs are TLSv1.2
and
TLSv1.3
. TLS
, TLSv1.1
, SSL
, SSLv2
and SSLv3
might be
supported in older JVMs, but their usage is discouraged due to known security
vulnerabilities. With the default value for this configuration and ssl.enabled.protocols
,
clients downgrade to TLSv1.2
if the server does not support TLSv1.3
.
If this configuration is set to TLSv1.2
, clients do not use TLSv1.3
,
even if it is one of the values in ssl.enabled.protocols
and the server
only supports TLSv1.3
.
- Type: string
- Default:
TLSv1.3
- Importance: medium
ssl.provider¶
Used for HTTPS. The TLS security provider name. Leave blank to use Jetty’s default.
- Type: string
- Default: “” (Jetty’s default)
- Importance: medium
ssl.client.auth¶
DEPRECATED: Used for HTTPS. Whether or not to require the HTTPS client to authenticate via the server’s trust store.
Use ssl.client.authentication
instead.
- Type: boolean
- Default: false
- Importance: medium
ssl.client.authentication¶
Used for HTTPS. Whether to require the HTTPS client to authenticate using the server’s trust store.
Valid values are NONE, REQUESTED or REQUIRED. NONE disables TLS client authentication,
REQUESTED requests but does not require TLS client authentication, and REQUIRED requires TLS HTTPS clients to
authenticate using the server’s truststore. This configuration overrides the deprecated ssl.client.auth
.
- Type: string
- Default: NONE
- Importance: medium
ssl.enabled.protocols¶
Used for HTTPS. Leave blank (""
) to use Jetty’s defaults.
The comma-separated list of protocols enabled for TLS connections. The default
value is TLSv1.2,TLSv1.3
when running with Java 11 or later, TLSv1.2
otherwise. With the default value for Java 11 (TLSv1.2,TLSv1.3
), Kafka
clients and brokers prefer TLSv1.3 if both support it, and falls back to
TLSv1.2 otherwise (assuming both support at least TLSv1.2).
- Type: list
- Default: “” (Jetty’s default)
- Importance: medium
access.control.allow.origin¶
Set value for Jetty Access-Control-Allow-Origin
header
- Type: string
- Default: “”
- Importance: low
response.http.headers.config¶
Usetoselect which HTTP headers are returned in the HTTP response for Confluent Platform
components. Specify multiple values in a comma-separated string using the
format [action][header name]:[header value]
where [action]
is one of
the following: set
, add
, setDate
, or addDate
. You must use
quotation marks around the header value when the header value contains commas.
For example:
response.http.headers.config="add Cache-Control: no-cache, no-store, must-revalidate", add X-XSS-Protection: 1; mode=block, add Strict-Transport-Security: max-age=31536000; includeSubDomains, add X-Content-Type-Options: nosniff
- Type: string
- Default: “”
- Importance: low
confluent.schema.registry.auth.ssl.principal.mapping.rules¶
A list of rules for mapping distinguished name (DN) from the client certificate to short name. The rules are evaluated in order and the first rule that matches a principal name is used to map it to a short name. Any later rules in the list are ignored. By default, DN of the X.500 certificate is the principal.
- Type: list
- Default: DEFAULT
- Importance: low
debug¶
Boolean indicating whether extra debugging information is generated in some error response entities.
- Type: boolean
- Default: false
- Importance: low
kafkastore.ssl.cipher.suites¶
A list of cipher suites used for SSL.
- Type: string
- Default: “”
- Importance: low
kafkastore.ssl.endpoint.identification.algorithm¶
The endpoint identification algorithm to validate the server hostname using the server certificate.
- Type: string
- Default: https
- Importance: low
kafkastore.ssl.keymanager.algorithm¶
The algorithm used by key manager factory for TLS connections.
- Type: string
- Default: “SunX509”
- Importance: low
kafkastore.ssl.trustmanager.algorithm¶
The algorithm used by the trust manager factory for TLS connections.
- Type: string
- Default: “PKIX”
- Importance: low
kafkastore.zk.session.timeout.ms¶
ZooKeeper session timeout
- Type: int
- Default: 30000
- Importance: low
metric.reporters¶
A list of classes to use as metrics reporters. Implementing the MetricReporter
interface allows plugging in classes that will be notified of new metric creation. The JmxReporter is always included to register JMX statistics.
- Type: list
- Default: []
- Importance: low
metrics.jmx.prefix¶
Prefix to apply to metric names for the default JMX reporter.
- Type: string
- Default: “kafka.schema.registry”
- Importance: low
metrics.num.samples¶
The number of samples maintained to compute metrics.
- Type: int
- Default: 2
- Importance: low
metrics.sample.window.ms¶
The metrics system maintains a configurable number of samples over a fixed window size. This configuration controls the size of the window. For example we might maintain two samples each measured over a 30 second period. When a window expires we erase and overwrite the oldest window.
- Type: long
- Default: 30000
- Importance: low
port¶
DEPRECATED: port to listen on for new connections.
Use listeners instead.
- Type: int
- Default: 8081
- Importance: low
proxy.host¶
Hostname or IP address of the proxy server that will be used to connect to the Schema Registry instances.
- Type: string
- Default: “”
- Importance: low
proxy.port¶
Port number of the proxy server that will be used to connect to the Schema Registry instances.
- Type: string
- Default: “”
- Importance: low
request.logger.name¶
Name of the SLF4J logger to write the NCSA Common Log Format request log.
- Type: string
- Default: “io.confluent.rest-utils.requests”
- Importance: low
inter.instance.protocol¶
The protocol used while making calls between the instances of Schema Registry. The secondary to primary node calls for writes and deletes will use the specified protocol. The default value would be http
. When https
is set, ssl.keystore
and ssl.truststore
configs are used while making the call. (Use instead of the deprecated schema.registry.inter.instance.protocol
.)
If inter.instance.protocol
and inter.instance.listener.name are both set, inter.instance.listener.name
takes precedence.
- Type: string
- Default: “http”
- Importance: low
schema.registry.inter.instance.protocol¶
DEPRECATED: The protocol used while making calls between the instances of Schema Registry. The secondary-to-primary node calls for writes and deletes will use the specified protocol. The default value would be http
. When https
is set, ssl.keystore
and ssl.truststore
configs are used while making the call.
If both schema.registry.inter.instance.protocol
and inter.instance.listener.name are both set, inter.instance.listener.name
takes precedence.
Use inter.instance.protocol instead.
- Type: string
- Default: “”
- Importance: low
inter.instance.listener.name¶
Name of listener used for communication between Schema Registry instances. If this value is unset, the listener used is defined by inter.instance.protocol.
If both properties are set at the same time, inter.instance.listener.name
takes precedence.
- Type: string
- Default: “”
- Importance: low
resource.extension.class¶
Fully qualified class name of a valid implementation of the interface SchemaRegistryResourceExtension
. This can be used to inject user defined resources like filters. Typically used to add custom capability like logging, security, etc. (Use resource.extension.class
instead of deprecated schema.registry.resource.extension.class
.)
- Type: list
- Default: []
- Importance: low
schema.registry.group.id¶
Schema Registry cluster ID takes its name from the Schema Registry group ID.
- Type: string
- Default: “schema-registry”
- Importance: low
schema.registry.resource.extension.class¶
DEPRECATED: Fully qualified class name of a valid implementation of the interface SchemaRegistryResourceExtension
. This can be used to inject user defined resources like filters. Typically used to add custom capability like logging, security, etc.
Use resource.extension.class
instead.
- Type: string
- Default: “”
- Importance: low
schema.registry.zk.namespace¶
DEPRECATED: Configure schema.registry.group.id
if you originally had schema.registry.zk.namespace
for multiple Schema Registry clusters.
Important
- ZooKeeper leader election was removed in Confluent Platform 7.0.0. Kafka leader election should be used instead.
- See Migration from ZooKeeper primary election to Kafka primary election for full details.
The string that is used as the ZooKeeper namespace for storing Schema Registry metadata. Schema Registry instances which are part of the same Schema Registry service should have the same ZooKeeper namespace.
- Type: string
- Default: “schema_registry”
- Importance: low
schema.linking.rbac.enable¶
Whether or not to enable and enforce role-based access control (RBAC) for Link Schemas on Confluent Platform on Confluent Platform. To learn more, see Access Control (RBAC) for Schema Linking Exporters.
- Type: boolean
- Default: false
- Importance: medium
shutdown.graceful.ms¶
Amount of time to wait after a shutdown request for outstanding requests to complete.
- Type: int
- Default: 1000
- Importance: low
ssl.keymanager.algorithm¶
Used for HTTPS. The algorithm used by the key manager factory for TLS connections. Leave blank to use Jetty’s default.
- Type: string
- Default: “” (Jetty’s default)
- Importance: low
ssl.trustmanager.algorithm¶
Used for HTTPS. The algorithm used by the trust manager factory for TLS connections. Leave blank to use Jetty’s default.
- Type: string
- Default: “” (Jetty’s default)
- Importance: low
ssl.cipher.suites¶
Used for HTTPS. A list of TLS cipher suites. Comma-separated list. Leave blank to use Jetty’s defaults.
- Type: list
- Default: “” (Jetty’s default)
- Importance: low
ssl.endpoint.identification.algorithm¶
Used for HTTPS. The endpoint identification algorithm to validate the server hostname using the server certificate. Leave blank to use Jetty’s default.
- Type: string
- Default: “” (Jetty’s default)
- Importance: low
kafkastore.sasl.kerberos.kinit.cmd¶
The Kerberos kinit command path.
- Type: string
- Default: “/usr/bin/kinit”
- Importance: low
kafkastore.sasl.kerberos.min.time.before.relogin¶
The login time between refresh attempts.
- Type: long
- Default: 60000
- Importance: low
kafkastore.sasl.kerberos.ticket.renew.jitter¶
The percentage of random jitter added to the renewal time.
- Type: double
- Default: 0.05
- Importance: low
kafkastore.sasl.kerberos.ticket.renew.window.factor¶
Login thread will sleep until the specified window factor of time from last refresh to ticket’s expiry has been reached, at which time it will try to renew the ticket.
- Type: double
- Default: 0.8
- Importance: low
kafkastore.group.id¶
Use this setting to override the group.id for the KafkaStore consumer. This setting can become important when security is enabled, to ensure stability over Schema Registry consumer’s group.id
Without this configuration, group.id
will be schema-registry-<host>-<port>
.
- Type: string
- Default: “”
- Importance: low
License for Schema Registry Security Plugin¶
A Confluent Platform enterprise license is required for the Schema Registry Security Plugin for Confluent Platform.
For details on how to configure the plugin, including confluent.license
, see
the configuration options in
Install and Configure the Schema Registry Security Plugin for Confluent Platform.