Configuring Apicurio Registry with KubernetesOps storage
This chapter explains how to configure Apicurio Registry to use Kubernetes ConfigMaps as the data source for registry artifacts. KubernetesOps storage enables Kubernetes-native management of schemas and APIs using standard tools like kubectl, ArgoCD, or Flux.
-
You have installed Apicurio Registry on Kubernetes or OpenShift.
-
You have access to create ConfigMaps and RBAC resources in your cluster.
Overview of KubernetesOps storage
KubernetesOps storage is an experimental feature. You must enable the experimental features gate (APICURIO_FEATURES_EXPERIMENTAL_ENABLED=true) to use it.
|
KubernetesOps storage is a read-only storage variant that loads registry data from Kubernetes ConfigMaps. It extends the proven GitOps storage pattern to use ConfigMaps instead of Git repositories, enabling Kubernetes-native workflows for managing schemas and APIs.
Architecture
KubernetesOps storage uses a polling-based architecture with blue-green database switching:
-
The registry polls the Kubernetes API for ConfigMaps with a specific label
-
When changes are detected (via
resourceVersion), data is loaded into an inactive database -
After successful loading, the active and inactive databases are atomically switched
-
Clients continue to receive read-only access to the active database during the switch
This architecture provides:
-
Zero-downtime updates: The blue-green pattern ensures clients always have access to consistent data
-
Kubernetes-native integration: Manages artifacts using standard Kubernetes tools (
kubectl, ArgoCD, Flux) -
GitOps compatibility: ConfigMaps can be managed via GitOps tools that sync Kubernetes manifests from Git
When to use KubernetesOps storage
KubernetesOps storage is ideal when:
-
You want to manage artifacts using Kubernetes-native tools (
kubectl apply) -
You already use ArgoCD or Flux for GitOps and want to include registry artifacts
-
You need a read-only registry where all changes flow through your GitOps pipeline
-
You want to avoid external dependencies (like a Git server) from within your cluster
Comparison with other storage options
| Aspect | SQL Storage | GitOps Storage | KubernetesOps Storage |
|---|---|---|---|
Data source |
Database (PostgreSQL, etc.) |
Git repository |
Kubernetes ConfigMaps |
Write capability |
Full read/write |
Read-only |
Read-only |
Change management |
REST API, UI |
Git commits |
kubectl, ArgoCD, Flux |
External dependencies |
Database server |
Git server |
None (in-cluster only) |
Use case |
Standard deployment |
Git-based workflows |
Kubernetes-native workflows |
Configuring KubernetesOps storage
This section explains how to configure Apicurio Registry to use KubernetesOps storage.
-
You have a Kubernetes or OpenShift cluster with cluster administrator access.
-
You have installed Apicurio Registry.
-
Configure the following environment variables in your Apicurio Registry deployment:
Table 2. Environment variables for KubernetesOps storage Environment Variable Default Description APICURIO_FEATURES_EXPERIMENTAL_ENABLEDfalseRequired. Must be set to
trueto enable KubernetesOps storage. This feature is currently experimental.APICURIO_STORAGE_KIND-
Set to
kubernetesopsto enable KubernetesOps storage.APICURIO_KUBERNETESOPS_ID-
Required. Unique identifier for this registry instance. Only ConfigMaps with matching label will be loaded.
APICURIO_KUBERNETESOPS_NAMESPACECurrent namespace
Kubernetes namespace to watch for ConfigMaps.
APICURIO_KUBERNETESOPS_REFRESH_EVERY30sHow often to poll for ConfigMap changes. Supports duration format (e.g.,
10s,1m).APICURIO_KUBERNETESOPS_LABEL_REGISTRY_IDapicurio.io/registry-idLabel key used to identify ConfigMaps belonging to this registry.
-
Example deployment configuration:
apiVersion: apps/v1 kind: Deployment metadata: name: apicurio-registry spec: template: spec: serviceAccountName: apicurio-registry containers: - name: registry image: apicurio/apicurio-registry:latest env: - name: APICURIO_FEATURES_EXPERIMENTAL_ENABLED value: "true" - name: APICURIO_STORAGE_KIND value: "kubernetesops" - name: APICURIO_KUBERNETESOPS_ID value: "my-registry" - name: APICURIO_KUBERNETESOPS_NAMESPACE value: "apicurio" - name: APICURIO_KUBERNETESOPS_REFRESH_EVERY value: "30s" -
Create the required RBAC resources as described in RBAC requirements.
-
Create ConfigMaps containing your registry data as described in ConfigMap data format.
ConfigMap data format
ConfigMaps for KubernetesOps storage must use a specific YAML format with $type markers to identify the type of each file. This format is identical to the GitOps storage format.
ConfigMap requirements
-
ConfigMaps must have the registry ID label (e.g.,
apicurio.io/registry-id: my-registry) -
Each data entry key should be a relative path (e.g.,
test/artifact.yaml) -
YAML files must contain a
$typefield identifying the entity type
Entity types
The following $type values are supported:
| Type | Description |
|---|---|
|
Registry configuration including global rules and settings |
|
Group definition |
|
Artifact definition with versions |
|
Content metadata linking to actual schema/API data |
Example: Registry configuration
apiVersion: v1
kind: ConfigMap
metadata:
name: registry-config
namespace: apicurio
labels:
apicurio.io/registry-id: my-registry
data:
registry.yaml: |
$type: registry-v0
id: my-registry
globalRules:
- type: VALIDITY
config: FULL
settings: []
Example: Group definition
apiVersion: v1
kind: ConfigMap
metadata:
name: events-group
namespace: apicurio
labels:
apicurio.io/registry-id: my-registry
data:
test/group-events.yaml: |
$type: group-v0
registryId: my-registry
id: com.example.events
description: "Event schemas for the platform"
Example: Artifact with content
apiVersion: v1
kind: ConfigMap
metadata:
name: user-event-artifact
namespace: apicurio
labels:
apicurio.io/registry-id: my-registry
data:
test/artifact-user-event.yaml: |
$type: artifact-v0
registryId: my-registry
groupId: com.example.events
id: user-event
versions:
- id: "1"
globalId: 1
contentFile: content-1.yaml
rules:
- type: COMPATIBILITY
config: BACKWARD
test/content-1.yaml: |
$type: content-v0
registryId: my-registry
id: 1
contentHash: "sha256:abc123..."
dataFile: ../content/user-event.avsc
content/user-event.avsc: |
{
"type": "record",
"name": "UserEvent",
"namespace": "com.example.events",
"fields": [
{"name": "userId", "type": "string"},
{"name": "action", "type": "string"},
{"name": "timestamp", "type": "long"}
]
}
The contentFile and dataFile fields use relative paths. The path resolution works the same as in GitOps storage.
|
RBAC requirements
Apicurio Registry requires read access to ConfigMaps in the configured namespace. Create the following RBAC resources:
apiVersion: v1
kind: ServiceAccount
metadata:
name: apicurio-registry
namespace: apicurio
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: apicurio-registry-configmaps
namespace: apicurio
rules:
- apiGroups: [""]
resources: ["configmaps"]
verbs: ["get", "list", "watch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: apicurio-registry-configmaps
namespace: apicurio
subjects:
- kind: ServiceAccount
name: apicurio-registry
namespace: apicurio
roleRef:
kind: Role
name: apicurio-registry-configmaps
apiGroup: rbac.authorization.k8s.io
For multi-namespace scenarios, create a ClusterRole and ClusterRoleBinding instead.
Limitations and considerations
KubernetesOps storage has specific limitations and considerations you should understand before deployment.
Read-only storage
KubernetesOps storage is read-only. You cannot create, update, or delete artifacts through the Apicurio Registry REST API or web console. All changes must be made by updating ConfigMaps.
ConfigMap size limits
Kubernetes ConfigMaps have a maximum size of 1 MiB per ConfigMap. This is a hard limit enforced by etcd, the backing store for all Kubernetes objects, and cannot be changed at the ConfigMap level.
Artifact content (schemas, API definitions) is stored inline in ConfigMap data values. This means a single large schema can consume most or all of a ConfigMap’s capacity. Most schemas (Avro, JSON Schema, Protobuf) are well under this limit, but large OpenAPI or AsyncAPI specifications may approach it.
| ConfigMaps are designed for configuration data, not large data payloads. Artifact content is data, and this storage variant uses ConfigMaps as a convenience to enable GitOps workflows where tools like ArgoCD or Flux can sync both the metadata and the content from a Git repository. This is a deliberate tradeoff: the seamless GitOps workflow requires content to be part of a Kubernetes resource manifest, and ConfigMaps are the most natural fit. The 1 MiB limit is the cost of that convenience. |
To work within these limits:
-
Distribute content across multiple ConfigMaps: Each ConfigMap matching the registry label is pooled together. Use one ConfigMap per artifact or per group to keep individual ConfigMaps small.
-
Keep schemas focused: Break large monolithic API definitions into smaller, modular schemas when possible.
-
Monitor ConfigMap sizes: Use
kubectl get configmap <name> -o json | wc -cto check sizes before they hit the limit.
If individual schemas consistently exceed 1 MiB, KubernetesOps storage is not the right fit. Consider:
-
SQL storage for full read/write capability with no size limits.
-
GitOps storage for the same read-only GitOps workflow, but reading directly from a Git repository with no size constraint per file.
Update latency
With Watch API enabled (the default), ConfigMap changes are detected in near real-time. When Watch is disabled, changes are detected via polling with a default interval of 30 seconds.
-
With Watch enabled, updates typically propagate within 1-2 seconds
-
With Watch disabled, expect up to one polling interval delay
-
Decrease
APICURIO_KUBERNETESOPS_REFRESH_EVERYfor faster fallback polling (increases API load) -
Increase the interval for larger deployments to reduce Kubernetes API load
Scalability estimates
| Registry Size | ConfigMaps | Artifacts | Performance |
|---|---|---|---|
Small |
5-20 |
<100 |
Excellent |
Medium |
20-100 |
100-1000 |
Good |
Large |
100-500 |
1000-5000 |
Acceptable |
Very Large |
500+ |
5000+ |
Consider alternatives |
For very large registries (5000+ artifacts), consider:
-
SQL storage with proper backup/restore procedures
-
GitOps storage if Git-based workflows are required
-
Custom partitioning strategies
Memory usage
The blue-green architecture requires maintaining two copies of the database in memory:
-
One active database serving read requests
-
One inactive database for loading new data
This doubles the memory footprint compared to single-database storage. Plan your resource limits accordingly.
Full reload behavior
On each detected change, the entire dataset is reloaded from ConfigMaps. This approach:
-
Ensures consistency - no partial updates
-
Simplifies error recovery
-
May increase load times for large datasets
Watch API and polling
By default, KubernetesOps storage uses the Kubernetes Watch API for real-time ConfigMap change detection, with scheduled polling as a fallback. When a ConfigMap is created, modified, or deleted, the registry is notified immediately and reloads the data.
If the watch connection is lost (for example, due to API server restarts or network issues), the registry automatically reconnects with exponential backoff. Scheduled polling continues as a safety net to ensure no changes are missed.
| Environment Variable | Default | Description |
|---|---|---|
|
|
Enable Watch API for real-time updates. Set to |
|
|
Base delay before reconnecting after watch failure. Uses exponential backoff up to 5 minutes. |
