You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Manages ACLs for Redpanda Schema Registry resources within the cluster.
152
+
| You can no longer enable `schema_registry_enable_authorization`, nor can you create or modify schema ACLs.
153
+
150
154
| xref:manage:schema-reg/schema-id-validation.adoc[Server-Side Schema ID Validation]
151
155
| Validates schema IDs server-side to ensure schema compatibility. With schema ID validation, records associated with unregistered schemas are detected and dropped by a broker rather than a consumer.
152
156
| Topics with schema validation settings cannot be created or modified.
Copy file name to clipboardExpand all lines: modules/get-started/pages/release-notes/redpanda.adoc
+8-1Lines changed: 8 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,10 @@ Redpanda now supports the following Kafka APIs for managing SASL user credential
26
26
27
27
See also: xref:manage:security/authentication.adoc#sasl[Configure Authentication] and xref:manage:security/authorization/acl.adoc[]
28
28
29
+
== Schema Registry Authorization
30
+
31
+
You can now use the Enterprise-licensed feature xref:manage:schema-reg-authorization.adoc[Schema Registry Authorization] to control access to Schema Registry subjects and operations using either `rpk` or the xref:api:ROOT:schema-registry-api.adoc#get-/security/acls[Redpanda Schema Registry API] endpoints. Schema Registry Authorization offers more granular control over who can do what with your Redpanda Schema Registry resources. ACLs used for Schema Registry access also support RBAC roles.
32
+
29
33
== Retrieve serialized Protobuf schemas with Schema Registry API
30
34
31
35
Starting in version 25.2, the Schema Registry API supports retrieving serialized schemas (Protobuf only) using the `format=serialized` query parameter for the following endpoints:
@@ -53,13 +57,16 @@ HTTP Proxy previously used automatically-generated ephemeral credentials to auth
53
57
If you need to maintain the current HTTP Proxy functionality while transitioning to authenticated clients, configure the following HTTP Proxy client properties in your `redpanda.yaml` configuration:
54
58
55
59
- xref:reference:properties/broker-properties.adoc#scram_username[`scram_username`]: Username for SASL/SCRAM authentication
56
-
- xref:reference:properties/broker-properties.adoc#scram_password[`scram_password`]: Password for SASL/SCRAM authentication
60
+
- xref:reference:properties/broker-properties.adoc#scram_password[`scram_password`]: Password for SASL/SCRAM authentication
57
61
- xref:reference:properties/broker-properties.adoc#sasl_mechanism[`sasl_mechanism`]: SASL mechanism (typically `SCRAM-SHA-256` or `SCRAM-SHA-512`)
58
62
63
+
59
64
== Cluster properties
60
65
61
66
The following cluster properties are new in this version:
* config_ref:iceberg_rest_catalog_base_location,true,properties/cluster-properties[`iceberg_rest_catalog_base_location`]: Specifies the base location for the Iceberg REST catalog. Required for AWS Glue Data Catalog.
Copy file name to clipboardExpand all lines: modules/manage/pages/schema-reg/schema-reg-api.adoc
+44-1Lines changed: 44 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,6 +76,49 @@ def pretty(text):
76
76
base_uri = "http://localhost:8081"
77
77
----
78
78
79
+
== Manage Schema Registry ACLs
80
+
81
+
ifndef::env-cloud[]
82
+
[NOTE]
83
+
====
84
+
include::shared:partial$enterprise-license.adoc[]
85
+
====
86
+
endif::[]
87
+
88
+
You can use ACLs to control access to Schema Registry resources. You can define fine-grained access on a global level, for example, to allow a principal to read all schemas, or on a per-subject basis, for example, to read and modify only the schemas of a specific subject.
89
+
90
+
See xref:manage:schema-reg/schema-reg-authorization.adoc[] for more details on Schema Registry Authorization.
91
+
92
+
For example, to xref:api:ROOT:pandaproxy-schema-registry.adoc#post-/security/acls[create ACLs] that allow users with the `admin` role read-only access to all registered schemas, run:
93
+
94
+
[,bash]
95
+
----
96
+
curl -X POST "http://localhost:8081/security/acls" \
97
+
-H "Content-Type: application/json" \
98
+
-d '[
99
+
{
100
+
"principal": "RedpandaRole:admin",
101
+
"resource": "*",
102
+
"resource_type": "REGISTRY",
103
+
"pattern_type": "LITERAL",
104
+
"host": "*",
105
+
"operation": "DESCRIBE_CONFIGS",
106
+
"permission": "ALLOW"
107
+
},
108
+
{
109
+
"principal": "RedpandaRole:admin",
110
+
"resource": "*",
111
+
"resource_type": "SUBJECT",
112
+
"pattern_type": "LITERAL",
113
+
"host": "*",
114
+
"operation": "READ",
115
+
"permission": "ALLOW"
116
+
}
117
+
]'
118
+
----
119
+
120
+
This creates two ACLs: one for registry-level read operations (such as reading global configuration) and another for subject-level read operations (such as reading schemas).
121
+
79
122
== Query supported schema formats
80
123
81
124
To get the supported data serialization formats in the Schema Registry, make a GET request to the `/schemas/types` endpoint:
@@ -935,7 +978,7 @@ Curl::
935
978
936
979
== Use READONLY mode for disaster recovery
937
980
938
-
The `/mode` endpoint allows you to put Schema Registry in read-only or read-write mode. A read-only Schema Registry does not accept direct writes. An active production cluster can replicate schemas to a read-only Schema Registry to keep it in sync, for example using Redpanda's https://github.com/redpanda-data/schema-migration/[Schema Migration tool^]. Users in the disaster recovery (DR) site cannot update schemas directly, so the DR cluster has an exact replica of the schemas in production. In a failover due to a disaster or outage, you can set Schema Registry to read-write mode, taking over for the failed cluster and ensuring availability.
981
+
The `/mode` endpoint allows you to put Schema Registry in read-only or read-write mode. A read-only Schema Registry does not accept direct writes. An active production cluster can replicate schemas to a read-only Schema Registry to keep it in sync, for example using Redpanda's https://github.com/redpanda-data/schema-migration/[Schema Migration tool^]. Users in the disaster recovery (DR) site cannot update schemas directly, so the DR cluster has an exact replica of the schemas in production. In a failover due to a disaster or outage, you can set Schema Registry to read-write mode, taking over for the failed cluster and ensuring availability.
939
982
940
983
If authentication is enabled on Schema Registry, only superusers can change global and subject-level modes.
0 commit comments