이 콘텐츠는 선택한 언어로 제공되지 않습니다.
Installing and deploying Apicurio Registry on OpenShift
Install, deploy, and configure Apicurio Registry 3.1
Abstract
Preface 링크 복사링크가 클립보드에 복사되었습니다!
Providing feedback on Red Hat documentation
We appreciate your feedback on our documentation.
To propose improvements, open a Jira issue and describe your suggested changes. Provide as much detail as possible to enable us to address your request quickly.
Prerequisite
-
You have a Red Hat Customer Portal account. This account enables you to log in to the Red Hat Jira Software instance.
If you do not have an account, you will be prompted to create one.
Procedure
- Click the following link: Create issue.
- In the Summary text box, enter a brief description of the issue.
In the Description text box, provide the following information:
- The URL of the page where you found the issue.
-
A detailed description of the issue.
You can leave the information in any other fields at their default values.
- Click Create to submit the Jira issue to the documentation team.
Thank you for taking the time to provide feedback.
Chapter 1. Service Registry Operator quickstart 링크 복사링크가 클립보드에 복사되었습니다!
You can quickly install the Service Registry Operator on the command line by using Custom Resource Definitions (CRDs).
The quickstart example deploys your Service Registry instance with storage in an SQL database:
The recommended installation option for production environments is the OpenShift OperatorHub. The recommended storage option is an SQL database for performance, stability, and data management.
1.1. Quickstart Service Registry Operator installation 링크 복사링크가 클립보드에 복사되었습니다!
You can quickly install and deploy the Service Registry Operator on the command line, without the Operator Lifecycle Manager, by using a downloaded set of installation files and example CRDs.
Prerequisites
- You are logged in to an OpenShift cluster with administrator access.
-
You have the OpenShift
occommand-line client installed. For more details, see the OpenShift CLI documentation.
Procedure
-
Browse to Red Hat Software Downloads, select the product version, and download the examples in the Service Registry CRDs
.zipfile. -
Extract the downloaded CRDs
.zipfile and change to theapicurio-registry-install-examplesdirectory. Create an OpenShift project for the Service Registry Operator installation, for example:
export NAMESPACE="apicurio-registry" oc new-project "$NAMESPACE"
export NAMESPACE="apicurio-registry" oc new-project "$NAMESPACE"Copy to Clipboard Copied! Toggle word wrap Toggle overflow Enter the following command to apply the example CRD in the
install/install.yamlfile:cat install/install.yaml | sed "s/PLACEHOLDER_NAMESPACE/$NAMESPACE/g" | oc apply -f -
cat install/install.yaml | sed "s/PLACEHOLDER_NAMESPACE/$NAMESPACE/g" | oc apply -f -Copy to Clipboard Copied! Toggle word wrap Toggle overflow Enter
oc get deploymentto check the readiness of the Service Registry Operator. For example, the output should be as follows:NAME READY UP-TO-DATE AVAILABLE AGE apicurio-registry-operator 1/1 1 1 XmYs
NAME READY UP-TO-DATE AVAILABLE AGE apicurio-registry-operator 1/1 1 1 XmYsCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2. Quickstart Service Registry instance deployment 링크 복사링크가 클립보드에 복사되었습니다!
To create your Service Registry instance deployment, use the SQL database storage option to connect to an existing PostgreSQL database.
Prerequisites
- Ensure that the Service Registry Operator is installed.
- You have a PostgreSQL database that is reachable from your OpenShift cluster.
Procedure
Open the
examples/apicurioregistry_sql_cr.yamlfile in an editor and view theApicurioRegistrycustom resource (CR):Example CR for SQL storage
Copy to Clipboard Copied! Toggle word wrap Toggle overflow In the
dataSourcesection, replace the example settings with your database connection details. For example:dataSource: url: "jdbc:postgresql://postgresql.apicurio-registry.svc:5432/registry" userName: "pgadmin" password: "pgpass"dataSource: url: "jdbc:postgresql://postgresql.apicurio-registry.svc:5432/registry" userName: "pgadmin" password: "pgpass"Copy to Clipboard Copied! Toggle word wrap Toggle overflow Enter the following commands to apply the updated
ApicurioRegistryCR in the namespace with the Service Registry Operator, and wait for the Service Registry instance to deploy:oc project "$NAMESPACE" oc apply -f ./examples/apicurioregistry_sql_cr.yaml
oc project "$NAMESPACE" oc apply -f ./examples/apicurioregistry_sql_cr.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enter
oc get deploymentto check the readiness of the Service Registry instance. For example, the output should be as follows:NAME READY UP-TO-DATE AVAILABLE AGE example-apicurioregistry-sql-deployment 1/1 1 1 XmYs
NAME READY UP-TO-DATE AVAILABLE AGE example-apicurioregistry-sql-deployment 1/1 1 1 XmYsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enter
oc get routesto get theHOST/PORTURL to launch the Service Registry web console in your browser. For example:example-apicurioregistry-sql.apicurio-registry.router-default.apps.mycluster.myorg.mycompany.com
example-apicurioregistry-sql.apicurio-registry.router-default.apps.mycluster.myorg.mycompany.comCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 2. Installing Apicurio Registry on OpenShift 링크 복사링크가 클립보드에 복사되었습니다!
This chapter explains how to install Apicurio Registry on OpenShift Container Platform:
2.1. Installing Apicurio Registry from the OpenShift OperatorHub 링크 복사링크가 클립보드에 복사되었습니다!
You can install the Apicurio Registry Operator on your OpenShift cluster from the OperatorHub. The OperatorHub is available from the OpenShift Container Platform web console and provides an interface for cluster administrators to discover and install Operators. For more details, see Understanding OperatorHub.
You can install more than one replica of Apicurio Registry depending on your environment. The number of replicas depends on the number and type of artifacts stored in Apicurio Registry and on your chosen storage option.
Prerequisites
- You must have cluster administrator access to an OpenShift cluster.
Procedure
- In the OpenShift Container Platform web console, log in using an account with cluster administrator privileges.
Create a new OpenShift project:
- In the left navigation menu, click Home, Project, and then Create Project.
-
Enter a project name, for example,
my-project, and click Create.
- In the left navigation menu, click Operators and then OperatorHub.
-
In the Filter by keyword text box, enter
registryto find the Apicurio Registry Operator. - Read the information about the Operator, and click Install to display the Operator subscription page.
Select your subscription settings, for example:
Update Channel: Select one of the following:
- 2.x: Includes all minor and patch updates, such as 2.3.0 and 2.0.3. For example, an installation on 2.0.x will upgrade to 2.3.x.
- 2.0.x: Includes patch updates only, such as 2.0.1 and 2.0.2. For example, an installation on 2.0.x will ignore 2.3.x.
Installation Mode: Select one of the following:
- All namespaces on the cluster (default)
- A specific namespace on the cluster and then my-project
- Approval Strategy: Select Automatic or Manual
- Click Install, and wait a few moments until the Operator is ready for use.
Chapter 3. Apicurio Registry configuration reference 링크 복사링크가 클립보드에 복사되었습니다!
This chapter provides reference information on the configuration options that are available for Apicurio Registry.
Additional resources
- For details on migrating a 2.x Apicurio Registry deployment to 3.x see Section 3.2, “Apicurio Registry version 2 to version 3 configuration changes”
-
For details on setting configuration options by using the Core Registry API, see the
/admin/config/propertiesendpoint in the Apicurio Registry REST API documentation. User Guide.
3.1. Apicurio Registry configuration options 링크 복사링크가 클립보드에 복사되었습니다!
The following Apicurio Registry configuration options are available for each component category:
3.1.1. api 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| Include stack trace in errors responses |
|
|
|
|
| API base href (URI) |
|
|
|
| Disable APIs |
3.1.2. auth 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| Auth admin override claim |
|
|
|
|
| Auth admin override claim value |
|
|
|
|
| Auth admin override enabled |
|
|
|
|
| Auth admin override from |
|
|
|
|
| Auth admin override role |
|
|
|
|
| Auth admin override type |
|
|
|
|
| Auth admin override user name |
|
|
|
|
| Anonymous read access |
|
|
|
|
| Authenticated read access |
|
|
|
|
| Artifact owner-only authorization |
|
|
|
|
| Artifact group owner-only authorization |
|
|
|
|
| Enable role based authorization |
|
|
|
|
| Auth roles source |
|
|
|
| Header authorization name | |
|
|
|
|
| Auth roles admin |
|
|
|
|
| Auth roles developer |
|
|
|
|
| Auth roles readonly |
|
|
|
|
| Prefix used for application audit logging. |
|
|
|
|
| Default client credentials token expiration time in minutes. |
|
|
|
|
| Client credentials token expiration offset from JWT expiration, in seconds. |
|
|
|
|
| Enable basic auth client credentials |
|
|
|
| Client credentials scope. | |
|
|
|
|
| Enable basic auth |
|
|
|
| Client identifier used by the server for authentication. | |
|
|
|
| Client secret used by the server for authentication. | |
|
|
|
|
| Enable auth |
|
|
|
| Authentication server token endpoint. |
3.1.3. cache 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| Registry cache enabled |
3.1.4. ccompat 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| Enable group support via concatenation in subject (compatibility API) |
|
|
|
|
| Separator to use when group concatenation is enabled (compatibility API) |
|
|
|
|
| Legacy ID mode (compatibility API) |
|
|
|
|
| Maximum number of Subjects returned (compatibility API) |
|
|
|
|
| Canonical hash mode (compatibility API) |
3.1.5. download 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| Download link expiry |
3.1.6. gitops 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
| Identifier of this Registry instance. Only data that references this identifier will be loaded. | |
|
|
|
|
| Name of the branch in the remote git repository containing data to be loaded. |
|
|
|
| URI of the remote git repository containing data to be loaded. | |
|
|
|
|
| Path to GitOps working directory, which is used to store the local git repository. |
3.1.7. health 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
| Ignored liveness errors | |
|
|
|
|
| Counter reset window duration of persistence liveness check |
|
|
|
|
| Error threshold of persistence liveness check |
|
|
|
|
| Disable logging of persistence liveness check |
|
|
|
|
| Status reset window duration of persistence liveness check |
|
|
|
|
| Error threshold of persistence readiness check |
|
|
|
|
| Timeout of persistence readiness check |
|
|
|
|
| Status reset window duration of persistence readiness check |
|
|
|
|
| Counter reset window duration of response liveness check |
|
|
|
|
| Counter reset window duration of persistence readiness check |
|
|
|
|
| Disable logging of response liveness check |
|
|
|
|
| Error threshold of response liveness check |
|
|
|
|
| Status reset window duration of response liveness check |
|
|
|
|
| Counter reset window duration of response readiness check |
|
|
|
|
| Error threshold of response readiness check |
|
|
|
|
| Timeout of response readiness check |
|
|
|
|
| Status reset window duration of response readiness check |
|
|
|
|
| Storage metrics cache check period |
3.1.8. import 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| When set to true, content IDs from the import file will be used (otherwise new IDs will be generated). Defaults to 'true'. |
|
|
|
|
| When set to true, global IDs from the import file will be used (otherwise new IDs will be generated). Defaults to 'true'. |
|
|
|
|
| When set to true, importing data will only work when the registry is empty. Defaults to 'true'. |
|
|
|
| The import URL | |
|
|
|
| Temporary work directory to use when importing data. |
3.1.9. limits 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| Max artifact labels |
|
|
|
|
| Max artifact properties |
|
|
|
|
| Max artifacts |
|
|
|
|
| Max artifact description length |
|
|
|
|
| Max artifact label size |
|
|
|
|
| Max artifact name length |
|
|
|
|
| Max artifact property key size |
|
|
|
|
| Max artifact property value size |
|
|
|
|
| Max artifact requests per second |
|
|
|
|
| Max schema size (bytes) |
|
|
|
|
| Max total schemas |
|
|
|
|
| Max versions per artifacts |
|
|
|
|
| Storage metrics cache max size. |
3.1.10. redirects 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
| Registry redirects | |
|
|
|
| Enable redirects | |
|
|
|
| Override the hostname used for generating externally-accessible URLs. The host and port overrides are useful when deploying Registry with HTTPS passthrough Ingress or Route. In cases like these, the request URL (and port) that is then re-used for redirection does not belong to actual external URL used by the client, because the request is proxied. The redirection then fails because the target URL is not reachable. | |
|
|
|
| Override the port used for generating externally-accessible URLs. |
3.1.11. rest 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| Max size of the artifact allowed to be downloaded from URL |
|
|
|
|
| Skip SSL validation when downloading artifacts from URL |
|
|
|
|
| Enables artifact version deletion |
|
|
|
|
| Enables artifact deletion |
|
|
|
|
| Enables group deletion |
|
|
|
|
| Enables artifact version mutability |
|
|
|
|
| Max size of the labels (in bytes) per item from within search results |
3.1.12. semver 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| If true, invalid versions will be coerced to Semantic Versioning 2 format (https://semver.org) if possible. |
|
|
|
|
| Automatically create or update branches for major ('A.x') and minor ('A.B.x') artifact versions. |
|
|
|
|
| Validate that all artifact versions conform to Semantic Versioning 2 format (https://semver.org). |
3.1.13. storage 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| Gitops blue datasource db kind |
|
|
|
|
| Gitops blue datasource pool initial size |
|
|
|
|
| Gitops blue datasource pool max size |
|
|
|
|
| Gitops blue datasource pool minimum size |
|
|
|
|
| Gitops blue datasource jdbc url |
|
|
|
|
| Gitops blue datasource password |
|
|
|
|
| Gitops blue datasource username |
|
|
|
|
| Gitops green datasource db kind |
|
|
|
|
| Gitops green datasource pool initial size |
|
|
|
|
| Gitops green datasource pool max size |
|
|
|
|
| Gitops green datasource pool minimum size |
|
|
|
|
| Gitops green datasource jdbc url |
|
|
|
|
| Gitops green datasource password |
|
|
|
|
| Gitops green datasource username |
|
|
|
| Storage event topic | |
|
|
| Kafka sql storage bootstrap servers | ||
|
|
|
| Kafka sql storage prefix for consumer group name | |
|
|
|
| Kafka sql storage consumer poll timeout | |
|
|
|
| Kafka sql storage coordinator response timeout | |
|
|
| Kafka sql storage security protocol | ||
|
|
| Kafka sql storage sasl client identifier | ||
|
|
| Kafka sql storage sasl client secret | ||
|
|
|
| Kafka sql storage sasl enabled | |
|
|
| Kafka sql storage sasl login callback handler | ||
|
|
| Kafka sql storage sasl mechanism | ||
|
|
| Kafka sql storage sasl token endpoint | ||
|
|
| Kafka sql storage ssl truststore location | ||
|
|
| Kafka sql storage ssl truststore type | ||
|
|
|
|
| Kafka sql journal topic snapshot every |
|
|
|
|
| Kafka sql storage topic name |
|
|
| Kafka sql storage ssl key password | ||
|
|
| Kafka sql storage ssl keystore location | ||
|
|
| Kafka sql storage ssl keystore password | ||
|
|
| Kafka sql storage ssl keystore type | ||
|
|
| Kafka sql storage ssl truststore password | ||
|
|
|
| Kafka sql storage topic name | |
|
|
|
| Kafka sql storage topic auto create | |
|
|
|
|
| Database schema name (only needed when running two instances of Registry against the same database, in multiple schemas) |
|
|
|
|
| SQL init |
|
|
|
| Application storage variant, for example, sql, kafkasql, or gitops | |
|
|
|
|
| Enable Registry storage read-only mode |
|
|
|
|
| Kafka sql snapshots store location |
|
|
|
|
| Application datasource database type |
|
|
|
|
| Skip artifact versions with DISABLED state when retrieving latest artifact version |
3.1.14. system 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
|
3.1.15. ui 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
|
| The OIDC clientId |
|
|
|
|
| The OIDC logout URL |
|
|
|
|
| The OIDC redirectUri |
|
|
|
|
| UI auth OIDC scope value |
|
|
|
|
| Context path of the UI |
|
|
|
|
| URL of the Documentation component |
|
|
|
|
| Enabled to show breadcrumbs in the UI |
|
|
|
|
| Enabled to set the UI to read-only mode |
|
|
|
|
| Enabled to show the Settings tab in the UI |
|
|
|
|
| Navigation prefix for all UI paths |
3.1.16. unknown 링크 복사링크가 클립보드에 복사되었습니다!
| Name | Type | Default | Available from | Description |
|---|---|---|---|---|
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
|
3.2. Apicurio Registry version 2 to version 3 configuration changes 링크 복사링크가 클립보드에 복사되었습니다!
Apicurio Registry v3 has simplified the configuration options, removing duplicates and improving consistency. For most options, the only change is ssrenaming of the prefix from registry to apicurio, for example, changing registry.kafkasql.bootstrap.servers to apicurio.kafkasql.bootstrap.servers.
For each configuration property you can override the value by using the corresponding environment variable, for example, APICURIO_KAFKASQL_BOOTSTRAP_SERVERS.s
3.2.1. api 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
|
|
|
3.2.2. auth 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3.2.3. cache 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
3.2.4. ccompat 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
|
|
|
|
|
|
3.2.5. download 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
3.2.6. events 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
3.2.7. health 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3.2.8. import 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
3.2.9. kafka 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
|
|
|
3.2.10. limits 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3.2.11. redirects 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
3.2.12. rest 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
|
|
|
|
|
|
3.2.13. store 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
|
|
|
3.2.14. ui 링크 복사링크가 클립보드에 복사되었습니다!
| Name | New Option |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Appendix A. Using your subscription 링크 복사링크가 클립보드에 복사되었습니다!
Apicurio Registry is provided through a software subscription. To manage your subscriptions, access your account at the Red Hat Customer Portal.
Accessing your account
- Go to access.redhat.com.
- If you do not already have an account, create one.
- Log in to your account.
Activating a subscription
- Go to access.redhat.com.
- Navigate to My Subscriptions.
- Navigate to Activate a subscription and enter your 16-digit activation number.
Downloading ZIP and TAR files
To access ZIP or TAR files, use the customer portal to find the relevant files for download. If you are using RPM packages, this step is not required.
- Open a browser and log in to the Red Hat Customer Portal Product Downloads page at access.redhat.com/downloads.
- Locate the Red Hat Integration entries in the Integration and Automation category.
- Select the desired Apicurio Registry product. The Software Downloads page opens.
- Click the Download link for your component.
Revised on 2025-10-23 18:25:49 UTC