Known Issues in Schema Registry
There are no known issues for Schema Registry in Cloudera Runtime 7.1.7.
- CDPD-49304: AvroConverter does not support composite default values
- AvroConverter cannot handle schemas containing a
STRUCT
type default value. - CDPD-49217 and CDPD-50309: Schema Registry caches user group membership indefinitely
-
Schema Registry caches the Kerberos user and group information indefinitely and does not catch up on group membership changes.
- CDPD-56890: New schemas cannot be created following an upgrade
- If you delete the latest version of a schema (the one with the highest ID) from the Schema Registry database before an upgrade, you might not be able to create new schemas after you upgrade the cluster to a newer version.
- CDPD-58265: Schema Registry Client incorrectly applies SSL configuration
- The Cloudera distributed Schema Registry Java client might fail to apply the SSL configurations correctly with concurrent access in Jersey clients due to a Jersey issue related to JDK.
- OPSAPS-68139: Schema Registry does not apply cluster wide Kerberos principal mapping by default
- Schema Registry does not apply the cluster-wide Kerberos auth-to-local (ATL) rules from the Core Setting service.
- OPSAPS-68171: Schema Registry does not set Knox principal and service user as trusted proxies when using custom Kerberos principals
- Schema Registry automatically sets the Knox principal name as a trusted proxy. If the Schema Registry Kerberos Name Rules property is set in deployments where custom Kerberos principals are used, Knox might not be allowed to work as a trusted proxy.
- CDPD-48822: AvroConverter ignores default values when converting from Avro to Connect schema
- AvroConverter does not propagate field default values when converting Avro schemas to Connect schemas.
- CDPD-55381: Schema Registry issues authentication cookie for the authorized user, not for the authenticated one
- When the authenticated user is different from the authorized user, which can happen when Schema Registry is used behind Knox, authorization issues can occur for subsequent requests as the authentication cookie in Schema Registry stores the authorized user.
- CDPD-48853: Schemas created with the Confluent Schema Registry API cannot be viewed in the UI
- Schemas created in Cloudera Schema Registry using the Confluent
Schema Registry API are not visible in the Cloudera Schema Registry UI.
In addition, the /api/v1/schemaregistry/search/schemas/aggregated endpoint of the Cloudera Schema Registry API does not return schemas created with the Confluent Schema Registry API.
A typical case where this issue can manifest is when you are using the Confluent Avro converter for SerDes in a Kafka Connect connector and the connector connects to Cloudera Schema Registry. That is, the
key.converter
and/orvalue.converter
properties of the connector are set to io.confluent.connect.avro.AvroConverter, andkey.converter.schema.registry.url
and/orvalue.converter.schema.registry.url
are set to a Cloudera Schema Registry server URL.