Configuring external access in Schema Registry
Learn how you can configure Schema Registry to make it accessible from outside of your Kubernetes cluster.
When installing Schema Registry with default values, a ClusterIP type Kubernetes Service is deployed. This provides access to Schema Registry from within the Kubernetes cluster.
To enable secure (TLS) external access, you can configure a Kubernetes Ingress on top of the ClusterIP. Alternatively, you can deploy a LoadBalancer type Service instead of the ClusterIP. Both methods allow you to provide secure external access to Schema Registry. The choice between Ingress and LoadBalancer depends on your infrastructure, security requirements, and need for advanced routing or certificate management.
Configuring external access with Ingress
Learn how to configure external access to Schema Registry with Kubernetes Ingress.
-
An Ingress controller is required. Ensure that you have one deployed in your Kubernetes cluster. For example, you can use the Ingress-Nginx controller.
-
Optional: cert-manager is installed in your Kubernetes cluster.
Although not required, cert-manager enables you to manage certificates automatically. Without cert-manager you must manage your certificate manually through Secrets. The following steps assume that cert-manager is available.
Configuring external access with LoadBalancer
Learn how to configure external access to Schema Registry with a LoadBalancer type Service.
When deploying a LoadBalancer type Service, the actual load balancer is provisioned and managed by your cloud or infrastructure provider. As a result, TLS settings and certificate management may vary depending on the platform. Refer to vendor-specific documentation for detailed guidance on configuring TLS.
