Strimzi Registry Operator now adds the recommended Kubernetes labels to the Deployment
and Service
resources for the Confluent Schema Registry deployment.
This release adds significant improvements for compatibility with newer versions of Strimzi and the Confluent Schema Registry.
The StrimziSchemaRegistry
CRD has new and revised fields, which you should review before deploying this version:
- The
spec.listener
field inStrimziSchemaRegistry
now refers to the name of the of the listener — thespec.kafka.listeners[].name
field of Strimzi'sKafka
resource (with thekafka.strimzi.io/v1beta2
Strimzi API). With older versions of strimzi (API versionkafka.strimzi.io/v1beta1
), this refers to the type, which also doubled as a name in thespec.kafka.listeners.type
or.external
or.plain
. - The Schema Registry's security protocol (kafkastore.security.protocol) is now configurable through the
spec.securityProtocol
of theStrimziSchemaRegistry
resource. Default isSSL
, but can be changed for plain text or SASL users. - The default subject compatibility level in the Schema Registry (schema.compatibility.level) can be set with the
spec.compatibilityLevel
field ofStrimziSchemaRegistry. Details, as from previous versions of Strimzi Registry Operator, is
forward`. - The Schema Registry Docker image is now configurable via
registryImage
andregistryImageTag
fields ofStrimziSchemaRegistry
. The defaults are updated to Schema Registry 7.2.1. - You can now set CPU and memeory requests and limits for the Schema Registry through the
StrimziSchemaRegistry
.
The default container registry for Strimzi Registry Operator is now ghcr.io
(GitHub Container Registry): ghcr.io/lsst-sqre/strimzi-registry-operator
.