From 75a962a25d5a17d42b1a70764f0a58a7046f3c28 Mon Sep 17 00:00:00 2001 From: Bogdan Alov Date: Fri, 12 Apr 2019 14:51:53 +0300 Subject: [PATCH 1/3] updated kafka helm chart to latest changes --- efk/bogi_test_release.txt | Bin 0 -> 50104 bytes kafka/Chart.yaml | 5 +- kafka/README.md | 15 +- kafka/charts/zookeeper/Chart.yaml | 2 +- kafka/requirements.lock | 6 +- kafka/requirements.yaml | 1 - kafka/templates/NOTES.txt | 14 +- kafka/templates/configmap-config.yaml | 9 +- .../templates/deployment-kafka-exporter.yaml | 12 ++ kafka/templates/job-config.yaml | 3 +- kafka/templates/service-brokers-external.yaml | 17 ++- kafka/templates/servicemonitors.yaml | 6 + kafka/templates/statefulset.yaml | 51 +++---- kafka/values.yaml | 136 +++++++++--------- prometheus/bogi_test_release.tx | Bin 0 -> 180 bytes 15 files changed, 162 insertions(+), 115 deletions(-) create mode 100644 efk/bogi_test_release.txt create mode 100644 prometheus/bogi_test_release.tx diff --git a/efk/bogi_test_release.txt b/efk/bogi_test_release.txt new file mode 100644 index 0000000000000000000000000000000000000000..9b91b717da86c34cd0850b09fd0fe7932b3150b0 GIT binary patch literal 50104 zcmeI5`*RdWlE?e!i@5(mCvF4Vw_pjgG z_ft8ks;;i?>6wuP+$tvK)m@d9m6?^Vdi4MP&(mt7+N_>cZ>#O<@6}wjRPF2kdUdGJ z4gEjVon5^)t5^E>wmPVG^lw|gUsZ3a=PJqdJ^kKS*_--(zWTblQeD^kvVQ+_^-tlQ zx3gB=saC5W!Y8%nt4k_>y;`U)j^399Ekc?T0;py$5

h7KDcDVPrdLg{$s)xdLU*DJ2(wyGcbr(Euj;>r*%a^Ke0-UAlo?xt2j{}6wYO8u# z4FYDDgx$4J=1FK{RoB<5C)Fdp9ta~^ofCeG`u9Zt)&v0>{8#ng;hWz}!uz4hKN0-4 z^3R3ye&7R?H5hY(ye`^rCjYs1D4x95)dT(7AMwXH@rUXs;rj>O<#S`i59;uOvpXZM zZ3yxQK>)w}{!n~=6G|J0uOF4#Qmq|H0J8E|m3bxz_jCnJ!25%!0B+vOm7|&mg83rU zdmHM5??t`g%~wZn#|C(CkDelZw^egpZN3WsH$~;mfa9*N9R!{sO&62a-s=8yl{(OC zOMQ9O3*Sot0<@w1$c0T|@heK^@_20&}b#rc^Jk8GPgQvrBny5 ztZPI+)c5NV7wHA`yjtDRHRlSNVlVIjJz#W?9OmvpkemGxr^mSFOAYVU<3&`%K=)N0zk>ZIi{7v_a zI@iRHozM?-CGQoMg`2MeY?pbPa_TF^E?rO}Vy#*1&k7 zGKZqm&FX?)?bN&}ZH-jMagIcl_=_w-%}0_)diGqJiI(mQ-(_7p)E$#o>vM`b*RgMK z+qD{Xe-=!5{Ht0#4BYL)b=cs2+6LNXJ79!;L2fS}@nlzRW24b=(E0fY3vh6&0#Ctl zLn9n(O^?88N56K3WwR`_Mnlu557Ij(u?M2Yx@c%JJ)h_+qk_?HUFB1I5J#xdkbAR^ zdAJ%i4gKQ%ioZuvT^67z@o2?xD@1PnwG4uZkKY&S`-dRGeP<-j1aR%b3snt9Z8PUqf}>4m|(As)8^si+Nn?5*m3-n zy%D4~%hiT^T7MX1*!{?Pjc&MeBauR&xORZzUe-&d7$et?74mJP6%O3jX!nwgXhxO! zT5aRySCx3CQRKD2V^6(46gG^l3qdl`z^3sjw=K9(7(E_qmOO{0;45OuvCPBZJ>VMv zIr0veCH>asDH@K)ulJsXUeVK+>UX{Mls-|XpK)~QSN!y`?0L}{-L5k)9EYKU1|0-0$Ur&+U3N) zwZ~r9lnePhr3I~sv|z1EzWMC2SB$*SF!vOzttgI$zWj&g%d+`*#R-d+xypMGUi>;I z9M^=Q`>kjJ^NB75Ie#r{AFUV`=s!Q@A zey{6|mHMD>O75vue($JFtUu!iP0E!6ed0AhWqdHK_JaP+g@})g=A1lqvR7mQmn0o1Gx3aoo>`h#R>^ za^C9hT+mKX2zibzd9R34$j6(Wun6)Xu^f&w-_XNHW2wJhww{$4sve_kKS)0ql&L~( z({$7)Gi21*5>1d%V%yk0baQDd(FkbhOU4x=7Z^UShw8KClKVjE8UfUg(p16&t^H~w zVQn-U2ufNmjWEr!l_1l@G!F_cuCv?9(-){wmp_vMIMi0pIhyJ)+B>i8f7eWaO9bEJ zW(7)R+h+*U()@;gj3R7ZTQ9&K-FF~qfC}gfc++0PGIV5EyUHM&*a4I6l0@Vd{LFee z|DasV2eEE6+S{+sc|=Ez#TW zBNO0hyy2t{6>F`k4)NCq>GlWWn#~Yf?J|Ck)DBTKoW^6g zt6FFt>L9D}UZh?L-Z!(R9N}$HQ!p(h)??09^oGY+fYV{3d2`gpR|Y zB>PwwTTx^BI#SYpEej7K?EHHAAFmVHNonQxAL|~gp1NMnfd#E#DZxNevC>^IE(9N7 zU-@>kd(5yff($n}i#%UY3k#zXZ7sRnx3!k${7W#b$HS15Va?I|0^VO#f2sbYQO3+O zK8(@$&(%}?8fb3vqCUToCi+5G(E91MuNtMk6tpj@|4`4Sum7be^QCYx%p9X=wdz>@ zr%L|4`nRM;liF#Gg;2Jh$#VKW6pdaB-YtzoV&PnSQSMsE2$!h67IJ`lp&tC+9zlTP zSSVg?S_qxFCApyF3)QTTb*RAmqyxM!GEBb9$Pd0SOX^?FR8|IEUm}( z`7n$dqPz5J^LKgFeLvERL*?UFg?Y1{U2$(3|ABQUCF~X?=c(VhAd0`!2t}KjT{WM= z#-^=~ys3GftMVkvJ%dY(F60HDx{O^L=f9UfwWd*Jb=@CdkS2_F4~Uc2zZ3E}9xK=D zPp;uhQnV6QKhC1Dk@hl8(X#E*QkIf?qCR%2O#iv+U$xfeuIS8~&SgnItNb2lW`P+6 z{4IPhR*bT8bQtC!xMOQRbC^wQUoSCPTaUzDR;rfUGRdH4*kQE8UG>x>sXAvnWB4T>27nx=vocQ`Z{Jt$pVDr#xtd8a?9yFdC<@vuN3-583 z*^@=p@hd6S96Bwx$4tL>+>5pPlq$8I_Q;|E>&sC5bW4ivKs&QOC{o2dE?^#Sw9iT_ zA`<-ZX=epJCb7&v^oMKYYHj@qa?KcT#?9^nF%C;HrPI*MMPG>;MiaLzAD=e+igCz4 zEa=m6UT8Dc!Npv_f^0W=h6P<`}ezIeDAQkL2ay{;JXwRu)2beL%KeBa+@Sr{O;t=72TPA9xEkbR09OV=E%#JwE zsqGpj&egE0zn-&l{?P(?J^T=$8#KqI9zC%>m-4=z!b_3kLyzKnP(NY^HYY)c>9w6p z75Ws+O!Iya%{~?R$}w{)pS+~ujashMX0n^ob~>ES@j!}PGIKfaC&wuSB={S}{rQNn zmG?+6a$$30kL9PwHRn>iHqU#C-;Y#UzR3K`x}Vyv+mRWwTt9^RrL}E+wV&xd z#!VkdWbKpd9oLz*;yT^)1wX*g*Rj!tL+2j;6&eM3v>B~=edp_HY*iWSihTVdz7o+S z^MueXuJl5`*&4CvkEXIjtGkK?*-D@ws&J(-G2KvpnG$qr)y}I zL`~+VEQglv(r{VLDVh4f^uTj?DUX|D(sq?J%U}(=#$~rwnqJOk9nI#YBDaU1jD1OQ za!Q}PWyxD@%3C)NkIRS1@knJbmEk_}>#}e5B(8=zCvL|bPUQKBH*e_^I`7K5pqZfk ztn!uG$xp?9NpU(o`N~^u%9nF1=dxdK^9uU;7vntxB<*x$Jg3F1QuguuV#W))GoPbA zJ-O9o;D?>Sqrly%jDsrgD#pfGY)Q_iZ^P23ew^%>- z&!*QGX%^d8)N$^|La*#Pv5&3O@o0th6x})E+v<<6Wm?m()6TiWr*`kD->SNSAf&4{ zT{3}f*$JlyobsJX+~rlC4Y&My-74j=B+&B6qAAUAB;74i&+W9wkd9wFb-cvvRB}k; zspTb)mue2RNj<-V-$|UhBu?jRhUyfhM(%xjZ8*re1?1VvtD(|;=y12bQ~9Q5S>mqb z7#lm5e4D3@4?&*2iJRj$4iow?&@QD^n!O$Fy^~Ze=)JB{KMdcjv7vRFJNs6v?7r5U zo!VE6P|&lslMc#qR)*2m^hgLkM!-0pSe@U<6V$} zw;E}iTI=Sctc}At)=-Ys_t>d6d{|LzW7pSHLgjqjWT|#rYxs=mnvJHs#hj!|kAIKH z2Iv=R@XKpDOBmCN&m^x%JNT}QHXTCwyqD=%cMVZq$r(=ebopv-?oq7k!qqTS%ZRaWz>)7xYg&Az%7-rl4Ru+7$;S}dnw9O8!uSnWczH! zOI#Zk(@NXySWYX6c~46GA1_hHS5}{HOEZuyZMU6iHe~YFu-NgOrTSW#WwnfMLT8j9 z=bR@WY&rfYyKOS(d%Vc-+lne?&#gXdQcCOd&4bQ!DLw-In;pIM2^?(Zll{W)MN9G) zW$nbQ$W|CnwquIf)HRJRW-~T|#Wo*g`Z&zyIGb}xtR-WY`Wtym&>F9%Uu2l~ZYspfeQ z$YR$V2lvO%ry;K<$D7gv>@iG7oQ)QINY>pvQGYBeRoWM5KK+^`*)k1`=-6K$Iacb4 z;Bi)h?eFkY5~xwPE@?)6HH_R6E{^fZ$E@S%-H+y!YRZdK2%f0kVT&#_elxpX=OO(nd2n?}^WNvS&2)ov*h~3$J&Ky2`3y*l zl!>&`Q-HiR|BkJ;MOuB%v2>)RS` z^f_4;@-wVlFZpL)!@r>jUR7Bucq#uzORy7w^PQKZz2aIOFH!oY) z=Oh5IWEWZgI>rN9>Rab~;q^eTzU8fj??P`TtMg={I!^UlsoeCx7zF!K?_)x*8HJymYk7d+6ax;T-RP2NsR6G zv%>Ql>Dl3U2l3pzyrlm}TaoQRkC|UlI#<|B`!~JlK4;iV`uAyJ)+PacGOpl?CTaRm zY1Y+kNLx$Z<23Gai{DlUE;F}cdtMKuWzo?@Bi&ls;eMx*c#>`K9VfR_aQZ@shw%@{ z>x{2ip38K|`8VEzStVK^YGt14gGOwg=fdiDwO;oUn)R{hZS{Thf(>K!AB(bGl!0Hf zP&Um(J`5flxsHo5VOpV%`DynwPAQK_jc z^LS4JnPHtek&r*XrwtRwh&pRJjS;V%=T)uAtL9`1&TJ~xWp2HX_iH{ZS$EDo>&Bhk z^qi*(Uk8P(spHDG?X`rMEccq0kv4V&Y$`@U)4d+kE9RE) zur@?ZWW1XOv=D2=xj%c#2>DQ75xF3lw^<`}sm)rJI0a|DB$SO$Uh+PdYJHkLEn%AX zk1WNSIOsV5o?>O^C5($=BWIygT`So+u2@G~XZ4{tDso)P&(bROqE2tqY%wobs*$(V z_PmZ#-BN3DKTTOn=Iuo}O3#n)+gj9-leXrk>7P_f@x-Y1_@wAwJJ?Au2yf)4; z`J>)w{9&;lxg0%Gdpu(fT3~fJ-DG^5{d6zhbb87$nW4#aaSnlznOZ*1SmI>H62^I5 zkFelm{z_qXTZlAUQ)(5+wA?=j6d~H2PkcIEj%BI6aoHRAJuYh#_YdVQ@;|j+o>eJf z(x;{7&eycXv?WF|ekIn`@++k_r^ya6r@bdBH=k&HcF5aD_WEH(pFED*Q7^i)JoTqi zru5*qt?`&-B^0%gKztRjU<~%l?l^b*^clH$~*-N43H(zBM~wxl9ICn2Se|0Z@o zf>^g{9#PqndHHnoHv2n$UMt<7GRumglg((QSUR63&1mH?npqmgb)KJ!>syGVXI;-z z&Oqgu!Sj!m4J+XSK22)5WH#+zX|&{Hwyhn9nrA}N)xryb6LANjooriwLR$UbK>7ha zZTXTb9jiYkiK}OeN@7fcM7vab|M@<7AIsMAw9nQ}>uWIs&^8O`HmM{f^m@Ff!;`sq za(IbmKuC3Em(@FMJI>m&9nF8)+Ap5-US3D)GT@ZLK6Lei^8G!c*{%2V*2eMl@kI=Sl)QY1vwC@}O?mqCGJ84BNL}CTUa2k;o6oO(&KbT^AB{$5 zSw7cP=-_|k)50vv=j*@QB*v+Amhp3q>=enrk*Bka-&w}b*IRzFeOo*d0-SN3FCYz^5?JG+nE{B}5HgbXh> zi1l>ibkWa&dwJ%%o|$e^)+1put?lRbd#U#NUZOca)|P3eM((ecWyoQt-+4~sS?E2v z@RwQ(TZeNqK z-19PV^%?ry&Y$-)`6)-Mi+VrNFG}R?Q-*hbo&%-1&QtCGta?0E3PG%^bl08t2_(IQixUT1} zx5KqN7u91pVXyn*zS+(Cb-(X*>i_w7NfHDt%lKRuHXE9OynNJB6N1A&4Sb$S)_22G z=-cq{>vcMu6n*w2@$7|t|B2A&7x4;wu74u0iQg7`FO8K z3s%QGvVnN^OgQkmA$su?kAd*pmXsgr+aT8QnSFdsiqFr&gmcVa95X%_NBVG5d=8{3 ze-$5pITd`;ot5wgeqGmVOB8vo-$>J;aQRvEaal<9^YrplrjPG~85CtMmqGp?m;99R zN#|hu;dI>iH2o7I#<*vy{`?F|yVsOci?e^0f)CWsi=ck=3>=z|`y4NPNAw6D6d9)Y zr07-Y82rvI+#EXRD|dS~rkysz=$IatTS2?osSNfkqc*A?FJ>3yzop#kN0T}EeLu-B zy))7Yj#GV4@gU4~`#qjO@;B9ER*Jqo&`4%3ocsPvsV{`hmm`>w?sbjjBQnC}SDnKS z*Pa=$If7WPF<1Rb_Jo*mGx*x+-EYFF>WrMnf^0ZCZ*y$O^ALmi=~JhTjh)R0R%s8? z-(}jc%bC;nY(M!`=~$lMc3C=>x?QxP=8Yb-No{Y$rw=yx4q)SUz6%@Tvp$?kHRm{N zPDXBs-N+2(duhjEQ|HvRz%ibnYW1e0O=@Rj`}JS_IK{IYuO8{;c5J{n9Z$67W2#Gc z-xk&EwC&xXt86!Pn|379UXxxSM!g*a6M@rQ7Wj$kB&n*EdjmI6^5-poG9S`^8yZYcn6ow8gwExSjWt#D1B!!=$CPL?il#-@HUG=04iB+cp3 z_evis)nzuxEty=?HJAJs4%3n(7+{0?px!K?G(Mp*= z?T~U>_?R_+KA%aUy1F)BX&&l(c5lM4XWihp_PqPp67uDv^=t3|3Ad57wZ53 literal 0 HcmV?d00001 diff --git a/kafka/Chart.yaml b/kafka/Chart.yaml index 5901888..c9630fb 100644 --- a/kafka/Chart.yaml +++ b/kafka/Chart.yaml @@ -2,9 +2,8 @@ apiVersion: v1 description: Apache Kafka is publish-subscribe messaging rethought as a distributed commit log. name: kafka -version: 0.10.1 -#appVersion: 4.1.2 -appVersion: 2.0.0 +version: 0.15.0 +appVersion: 5.0.1 keywords: - kafka - zookeeper diff --git a/kafka/README.md b/kafka/README.md index e3d10b9..b041ac9 100644 --- a/kafka/README.md +++ b/kafka/README.md @@ -57,7 +57,7 @@ following configurable parameters: | Parameter | Description | Default | |------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------------| | `image` | Kafka Container image name | `confluentinc/cp-kafka` | -| `imageTag` | Kafka Container image tag | `4.1.2-2` | +| `imageTag` | Kafka Container image tag | `5.0.1` | | `imagePullPolicy` | Kafka Container pull policy | `IfNotPresent` | | `replicas` | Kafka Brokers | `3` | | `component` | Kafka k8s selector key | `kafka` | @@ -71,15 +71,17 @@ following configurable parameters: | `headless.targetPort` | Target port to be used for the headless service. This is not a required value. | `nil` | | `headless.port` | Port to be used for the headless service. https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ | `9092` | | `external.enabled` | If True, exposes Kafka brokers via NodePort (PLAINTEXT by default) | `false` | +| `external.dns.useInternal` | If True, add Annotation for internal DNS service | `false` | +| `external.dns.useExternal` | If True, add Annotation for external DNS service | `true` | | `external.servicePort` | TCP port configured at external services (one per pod) to relay from NodePort to the external listener port. | '19092' | | `external.firstListenerPort` | TCP port which is added pod index number to arrive at the port used for NodePort and external listener port. | '31090' | | `external.domain` | Domain in which to advertise Kafka external listeners. | `cluster.local` | -| `external.init` | External init container settings. | (see `values.yaml`) | | `external.type` | Service Type. | `NodePort` | | `external.distinct` | Distinct DNS entries for each created A record. | `false` | | `external.annotations` | Additional annotations for the external service. | `{}` | | `podAnnotations` | Annotation to be added to Kafka pods | `{}` | -| `rbac.enabled` | Enable a service account and role for the init container to use in an RBAC enabled cluster | `false` | +| `loadBalancerIP` | Add Static IP to the type Load Balancer. Depends on the provider if enabled | `[]` +| `envOverrides` | Add additional Environment Variables in the dictionary format | `{ zookeeper.sasl.enabled: "False" }` | | `configurationOverrides` | `Kafka ` [configuration setting][brokerconfigs] overrides in the dictionary format | `{ offsets.topic.replication.factor: 3 }` | | `secrets` | `{}` | Pass any secrets to the kafka pods. Each secret will be passed as an environment variable by default. The secret can also be mounted to a specific path if required. Environment variable names are generated as: `_` (All upper case)| | `additionalPorts` | Additional ports to expose on brokers. Useful when the image exposes metrics (like prometheus, etc.) through a javaagent instead of a sidecar | `{}` | @@ -105,16 +107,21 @@ following configurable parameters: | `prometheus.jmx.image` | JMX Exporter container image | `solsson/kafka-prometheus-jmx-exporter@sha256` | | `prometheus.jmx.imageTag` | JMX Exporter container image tag | `a23062396cd5af1acdf76512632c20ea6be76885dfc20cd9ff40fb23846557e8` | | `prometheus.jmx.interval` | Interval that Prometheus scrapes JMX metrics when using Prometheus Operator | `10s` | +| `prometheus.jmx.scrapeTimeout` | Timeout that Prometheus scrapes JMX metrics when using Prometheus Operator | `10s` | | `prometheus.jmx.port` | JMX Exporter Port which exposes metrics in Prometheus format for scraping | `5556` | | `prometheus.kafka.enabled` | Whether or not to create a separate Kafka exporter | `false` | | `prometheus.kafka.image` | Kafka Exporter container image | `danielqsj/kafka-exporter` | | `prometheus.kafka.imageTag` | Kafka Exporter container image tag | `v1.2.0` | | `prometheus.kafka.interval` | Interval that Prometheus scrapes Kafka metrics when using Prometheus Operator | `10s` | +| `prometheus.kafka.scrapeTimeout` | Timeout that Prometheus scrapes Kafka metrics when using Prometheus Operator | `10s` | | `prometheus.kafka.port` | Kafka Exporter Port which exposes metrics in Prometheus format for scraping | `9308` | | `prometheus.kafka.resources` | Allows setting resource limits for kafka-exporter pod | `{}` | +| `prometheus.kafka.affinity` | Defines affinities and anti-affinities for pods as defined in: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity preferences | `{}` | +| `prometheus.kafka.tolerations` | List of node tolerations for the pods. https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ | `[]` | | `prometheus.operator.enabled` | True if using the Prometheus Operator, False if not | `false` | | `prometheus.operator.serviceMonitor.namespace` | Namespace which Prometheus is running in. Default to kube-prometheus install. | `monitoring` | | `prometheus.operator.serviceMonitor.selector` | Default to kube-prometheus install (CoreOS recommended), but should be set according to Prometheus install | `{ prometheus: kube-prometheus }` | +| `configJob.backoffLimit` | Number of retries before considering kafka-config job as failed | `6` | | `topics` | List of topics to create & configure. Can specify name, partitions, replicationFactor, reassignPartitions, config. See values.yaml | `[]` (Empty list) | | `zookeeper.enabled` | If True, installs Zookeeper Chart | `true` | | `zookeeper.resources` | Zookeeper resource requests and limits | `{}` | @@ -203,7 +210,7 @@ such port at a time, setting the range at every Kafka pod is a reasonably safe c #### Load Balancer External Service Type -The load balancer external service type differs from the node port type by routing to the `port` specified in the service for each statefulset container. Because of this `external.servicePort` is unused and will be set to the sum of `external.firstListenerPort` and the replica number. It is important to note that `external.firstListenerPort` does not have to be within the configured node port range for the cluster, however a node port will be allocated. +The load balancer external service type differs from the node port type by routing to the `external.servicePort` specified in the service for each statefulset container (if `external.distinct` is set). If `external.distinct` is false, `external.servicePort` is unused and will be set to the sum of `external.firstListenerPort` and the replica number. It is important to note that `external.firstListenerPort` does not have to be within the configured node port range for the cluster, however a node port will be allocated. ## Known Limitations diff --git a/kafka/charts/zookeeper/Chart.yaml b/kafka/charts/zookeeper/Chart.yaml index c58087e..fee4b2a 100644 --- a/kafka/charts/zookeeper/Chart.yaml +++ b/kafka/charts/zookeeper/Chart.yaml @@ -1,6 +1,6 @@ name: zookeeper home: https://zookeeper.apache.org/ -version: 1.2.0 +version: 1.2.2 appVersion: 3.4.10 description: Centralized service for maintaining configuration information, naming, providing distributed synchronization, and providing group services. diff --git a/kafka/requirements.lock b/kafka/requirements.lock index 802e6a9..59e9ca7 100644 --- a/kafka/requirements.lock +++ b/kafka/requirements.lock @@ -1,6 +1,6 @@ dependencies: - name: zookeeper repository: https://kubernetes-charts-incubator.storage.googleapis.com/ - version: 1.0.2 -digest: sha256:0ea890c77e32aee10c564b732c9fa27b17fa5c398bc50a6bf342ecbb79094cdc -generated: 2018-07-09T20:04:07.73379146+03:00 + version: 1.2.0 +digest: sha256:48de211cbffc0b7df9995edc4fd5d693e8bbc94e684aa83c11e6f94803f0e8b9 +generated: 2018-11-26T17:47:36.893674-05:00 diff --git a/kafka/requirements.yaml b/kafka/requirements.yaml index 839e0f3..2bee53a 100644 --- a/kafka/requirements.yaml +++ b/kafka/requirements.yaml @@ -1,6 +1,5 @@ dependencies: - name: zookeeper - #version: 1.0.2 version: 1.2.0 repository: https://kubernetes-charts-incubator.storage.googleapis.com/ condition: zookeeper.enabled diff --git a/kafka/templates/NOTES.txt b/kafka/templates/NOTES.txt index 11eade7..08ea4e4 100644 --- a/kafka/templates/NOTES.txt +++ b/kafka/templates/NOTES.txt @@ -19,20 +19,20 @@ You can connect to Kafka by running a simple pod in the K8s cluster like this wi Once you have the testclient pod above running, you can list all kafka topics with: - kubectl -n {{ .Release.Namespace }} exec testclient -- /usr/bin/kafka-topics --zookeeper {{ .Release.Name }}-zookeeper:2181 --list - + kubectl -n {{ .Release.Namespace }} exec testclient -- /opt/kafka/bin/kafka-topics.sh --zookeeper {{ .Release.Name }}-zookeeper:2181 --list +n To create a new topic: - kubectl -n {{ .Release.Namespace }} exec testclient -- /usr/bin/kafka-topics --zookeeper {{ .Release.Name }}-zookeeper:2181 --topic test1 --create --partitions 1 --replication-factor 1 + kubectl -n {{ .Release.Namespace }} exec testclient -- /opt/kafka/bin/kafka-topics.sh --zookeeper {{ .Release.Name }}-zookeeper:2181 --topic test1 --create --partitions 1 --replication-factor 1 To listen for messages on a topic: - kubectl -n {{ .Release.Namespace }} exec -ti testclient -- /usr/bin/kafka-console-consumer --bootstrap-server {{ .Release.Name }}-kafka:9092 --topic test1 --from-beginning + kubectl -n {{ .Release.Namespace }} exec -ti testclient -- /opt/kafka/bin/kafka-console-consumer.sh --bootstrap-server {{ include "kafka.fullname" . }}:9092 --topic test1 --from-beginning To stop the listener session above press: Ctrl+C To start an interactive message producer session: - kubectl -n {{ .Release.Namespace }} exec -ti testclient -- /usr/bin/kafka-console-producer --broker-list {{ .Release.Name }}-kafka-headless:9092 --topic test1 + kubectl -n {{ .Release.Namespace }} exec -ti testclient -- /opt/kafka/bin/kafka-console-producer.sh --broker-list {{ include "kafka.fullname" . }}-headless:9092 --topic test1 To create a message in the above session, simply type the message and press "enter" To end the producer session try: Ctrl+C @@ -51,12 +51,12 @@ clients to point at the following brokers. Please allow a few minutes for all associated resources to become healthy. {{ $fullName := include "kafka.fullname" . }} {{- $replicas := .Values.replicas | int }} - {{- $servicePort := .Values.external.servicePort }} + {{- $servicePort := .Values.external.servicePort | int}} {{- $root := . }} {{- range $i, $e := until $replicas }} {{- $externalListenerPort := add $root.Values.external.firstListenerPort $i }} {{- if $root.Values.external.distinct }} -{{ printf "%s-%d.%s:%d" $root.Release.Name $i $root.Values.external.domain $externalListenerPort | indent 2 }} +{{ printf "%s-%d.%s:%d" $root.Release.Name $i $root.Values.external.domain $servicePort | indent 2 }} {{- else }} {{ printf "%s.%s:%d" $root.Release.Name $root.Values.external.domain $externalListenerPort | indent 2 }} {{- end }} diff --git a/kafka/templates/configmap-config.yaml b/kafka/templates/configmap-config.yaml index 062041c..9af7702 100644 --- a/kafka/templates/configmap-config.yaml +++ b/kafka/templates/configmap-config.yaml @@ -25,7 +25,7 @@ data: sleep 20 done echo "Applying runtime configuration using {{ .Values.image }}:{{ .Values.imageTag }}" - {{- range $n, $topic := .Values.topics }} + {{- range $n, $topic := .Values.topics }} {{- if and $topic.partitions $topic.replicationFactor $topic.reassignPartitions }} cat << EOF > {{ $topic.name }}-increase-replication-factor.json {"version":1, "partitions":[ @@ -50,5 +50,12 @@ data: kafka-configs --zookeeper {{ $zk }} --entity-type topics --entity-name {{ $topic.name }} --alter --force --add-config {{ nospace $topic.config }} {{- end }} kafka-configs --zookeeper {{ $zk }} --entity-type topics --entity-name {{ $topic.name }} --describe + {{- if $topic.acls }} + {{- range $a, $acl := $topic.acls }} + {{ if and $acl.user $acl.operations }} + kafka-acls --authorizer-properties zookeeper.connect={{ $zk }} --force --add --allow-principal User:{{ $acl.user }}{{- range $operation := $acl.operations }} --operation {{ $operation }} {{- end }} --topic {{ $topic.name }} {{ $topic.extraParams }} + {{- end }} + {{- end }} {{- end }} + {{- end }} {{- end -}} diff --git a/kafka/templates/deployment-kafka-exporter.yaml b/kafka/templates/deployment-kafka-exporter.yaml index d43aab1..709ea0c 100644 --- a/kafka/templates/deployment-kafka-exporter.yaml +++ b/kafka/templates/deployment-kafka-exporter.yaml @@ -35,4 +35,16 @@ spec: - containerPort: {{ .Values.prometheus.kafka.port }} resources: {{ toYaml .Values.prometheus.kafka.resources | indent 10 }} +{{- if .Values.prometheus.kafka.tolerations }} + tolerations: +{{ toYaml .Values.prometheus.kafka.tolerations | indent 8 }} +{{- end }} +{{- if .Values.prometheus.kafka.affinity }} + affinity: +{{ toYaml .Values.prometheus.kafka.affinity | indent 8 }} +{{- end }} +{{- if .Values.prometheus.kafka.nodeSelector }} + nodeSelector: +{{ toYaml .Values.prometheus.kafka.nodeSelector | indent 8 }} +{{- end }} {{- end }} diff --git a/kafka/templates/job-config.yaml b/kafka/templates/job-config.yaml index 1bd747f..54bf4f7 100644 --- a/kafka/templates/job-config.yaml +++ b/kafka/templates/job-config.yaml @@ -10,13 +10,14 @@ metadata: heritage: "{{ .Release.Service }}" release: "{{ .Release.Name }}" spec: + backoffLimit: {{ .Values.configJob.backoffLimit }} template: metadata: labels: app: {{ template "kafka.fullname" . }} release: "{{ .Release.Name }}" spec: - restartPolicy: Never + restartPolicy: OnFailure volumes: - name: config-volume configMap: diff --git a/kafka/templates/service-brokers-external.yaml b/kafka/templates/service-brokers-external.yaml index e8084f8..d1e2bfd 100644 --- a/kafka/templates/service-brokers-external.yaml +++ b/kafka/templates/service-brokers-external.yaml @@ -8,17 +8,27 @@ {{- $externalListenerPort := add $root.Values.external.firstListenerPort $i }} {{- $responsiblePod := printf "%s-%d" (printf "%s" $fullName) $i }} {{- $distinctPrefix := printf "%s-%d" $dnsPrefix $i }} + {{- $loadBalancerIPLen := len $root.Values.external.loadBalancerIP }} + --- apiVersion: v1 kind: Service metadata: annotations: {{- if $root.Values.external.distinct }} + {{- if $root.Values.external.dns.useInternal }} dns.alpha.kubernetes.io/internal: "{{ $distinctPrefix }}.{{ $root.Values.external.domain }}" + {{- end }} + {{- if $root.Values.external.dns.useExternal }} external-dns.alpha.kubernetes.io/hostname: "{{ $distinctPrefix }}.{{ $root.Values.external.domain }}" + {{- end }} {{- else }} + {{- if $root.Values.external.dns.useInternal }} dns.alpha.kubernetes.io/internal: "{{ $dnsPrefix }}.{{ $root.Values.external.domain }}" + {{- end }} + {{- if $root.Values.external.dns.useExternal }} external-dns.alpha.kubernetes.io/hostname: "{{ $dnsPrefix }}.{{ $root.Values.external.domain }}" + {{- end }} {{- end }} {{- if $root.Values.external.annotations }} {{ toYaml $root.Values.external.annotations | indent 4 }} @@ -34,7 +44,7 @@ spec: type: {{ $root.Values.external.type }} ports: - name: external-broker - {{- if eq $root.Values.external.type "LoadBalancer" }} + {{- if and (eq $root.Values.external.type "LoadBalancer") (not $root.Values.external.distinct) }} port: {{ $externalListenerPort }} {{- else }} port: {{ $servicePort }} @@ -44,9 +54,12 @@ spec: nodePort: {{ $externalListenerPort }} {{- end }} protocol: TCP + {{- if and (eq $root.Values.external.type "LoadBalancer") (eq $loadBalancerIPLen $replicas) }} + loadBalancerIP: {{ index $root.Values.external.loadBalancerIP $i }} + {{- end }} selector: app: {{ include "kafka.name" $root }} release: {{ $root.Release.Name }} - pod: {{ $responsiblePod | quote }} + statefulset.kubernetes.io/pod-name: {{ $responsiblePod | quote }} {{- end }} {{- end }} diff --git a/kafka/templates/servicemonitors.yaml b/kafka/templates/servicemonitors.yaml index 92eb125..2bff00c 100644 --- a/kafka/templates/servicemonitors.yaml +++ b/kafka/templates/servicemonitors.yaml @@ -14,6 +14,9 @@ spec: endpoints: - port: jmx-exporter interval: {{ .Values.prometheus.jmx.interval }} + {{- if .Values.prometheus.jmx.scrapeTimeout }} + scrapeTimeout: {{ .Values.prometheus.jmx.scrapeTimeout }} + {{- end }} namespaceSelector: any: true {{ end }} @@ -34,6 +37,9 @@ spec: endpoints: - port: kafka-exporter interval: {{ .Values.prometheus.kafka.interval }} + {{- if .Values.prometheus.kafka.scrapeTimeout }} + scrapeTimeout: {{ .Values.prometheus.kafka.scrapeTimeout }} + {{- end }} namespaceSelector: any: true {{ end }} diff --git a/kafka/templates/statefulset.yaml b/kafka/templates/statefulset.yaml index acbdc06..e92157f 100644 --- a/kafka/templates/statefulset.yaml +++ b/kafka/templates/statefulset.yaml @@ -31,29 +31,6 @@ spec: {{- if .Values.schedulerName }} schedulerName: "{{ .Values.schedulerName }}" {{- end }} -{{- if .Values.rbac.enabled }} - serviceAccountName: {{ .Release.Name }} -{{- end }} - {{- if .Values.external.enabled }} - ## ref: https://github.com/Yolean/kubernetes-kafka/blob/master/kafka/50kafka.yml - initContainers: - - name: init-ext - image: "{{ .Values.external.init.image }}:{{ .Values.external.init.imageTag }}" - imagePullPolicy: "{{ .Values.external.init.imagePullPolicy }}" - command: - - sh - - -euxc - - "kubectl label pods ${POD_NAME} --namespace ${POD_NAMESPACE} pod=${POD_NAME} --overwrite" - env: - - name: POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - {{- end }} {{- if .Values.tolerations }} tolerations: {{ toYaml .Values.tolerations | indent 8 }} @@ -154,10 +131,18 @@ spec: - name: JMX_PORT value: "{{ .Values.jmx.port }}" {{- end }} - - name: POD_IP + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: POD_NAMESPACE valueFrom: fieldRef: - fieldPath: status.podIP + fieldPath: metadata.namespace - name: KAFKA_HEAP_OPTS value: {{ .Values.kafkaHeapOptions }} {{- if not (hasKey .Values.configurationOverrides "zookeeper.connect") }} @@ -187,6 +172,10 @@ spec: {{- end }} {{- end }} {{- end }} + {{- range $key, $value := .Values.envOverrides }} + - name: {{ printf "%s" $key | replace "." "_" | upper | quote }} + value: {{ $value | quote }} + {{- end }} # This is required because the Downward API does not yet support identification of # pod numbering in statefulsets. Thus, we are required to specify a command which # allows us to extract the pod ID for usage as the Kafka Broker ID. @@ -196,18 +185,24 @@ spec: - -exc - | unset KAFKA_PORT && \ - export KAFKA_BROKER_ID=${HOSTNAME##*-} && \ - export KAFKA_ADVERTISED_LISTENERS=PLAINTEXT://${POD_IP}:9092{{ if kindIs "string" $advertisedListenersOverride }}{{ printf ",%s" $advertisedListenersOverride }}{{ end }} && \ + export KAFKA_BROKER_ID=${POD_NAME##*-} && \ + export KAFKA_ADVERTISED_LISTENERS=PLAINTEXT://${POD_NAME}.{{ include "kafka.fullname" . }}-headless.${POD_NAMESPACE}:9092{{ if kindIs "string" $advertisedListenersOverride }}{{ printf ",%s" $advertisedListenersOverride }}{{ end }} && \ exec /etc/confluent/docker/run volumeMounts: - name: datadir mountPath: {{ .Values.persistence.mountPath | quote }} {{- range $secret := .Values.secrets }} {{- if $secret.mountPath }} - {{- range $key := $secret.keys }} + {{- if $secret.keys }} + {{- range $key := $secret.keys }} - name: {{ include "kafka.fullname" $ }}-{{ $secret.name }} mountPath: {{ $secret.mountPath }}/{{ $key }} subPath: {{ $key }} + readOnly: true + {{- end }} + {{- else }} + - name: {{ include "kafka.fullname" $ }}-{{ $secret.name }} + mountPath: {{ $secret.mountPath }} readOnly: true {{- end }} {{- end }} diff --git a/kafka/values.yaml b/kafka/values.yaml index c3305a2..20493d4 100644 --- a/kafka/values.yaml +++ b/kafka/values.yaml @@ -9,8 +9,7 @@ replicas: 3 image: "confluentinc/cp-kafka" ## The kafka image tag -#imageTag: "4.1.2-2" -imageTag: "5.0.0-2" +imageTag: "5.0.1" # Confluent image for Kafka 2.0.0 ## Specify a imagePullPolicy ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -36,11 +35,6 @@ updateStrategy: ## ref: https://kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/#pod-management-policy podManagementPolicy: OrderedReady -## If RBAC is enabled on the cluster, the Kafka init container needs a service account -## with permissisions sufficient to apply pod labels -rbac: - enabled: false - ## Useful if using any custom authorizer ## Pass in some secrets to use (if required) # secrets: @@ -56,9 +50,6 @@ rbac: # mountPath: /opt/zookeeper/secret -## The name of the storage class which the cluster should use. -# storageClass: default - ## The subpath within the Kafka container's PV where logs will be stored. ## This is combined with `persistence.mountPath`, to create, by default: /opt/kafka/data/logs logSubPath: "logs" @@ -139,13 +130,16 @@ external: type: NodePort # annotations: # service.beta.kubernetes.io/openstack-internal-load-balancer: "true" - + dns: + useInternal: false + useExternal: true # create an A record for each statefulset pod distinct: false enabled: false servicePort: 19092 firstListenerPort: 31090 domain: cluster.local + loadBalancerIP: [] init: image: "lwolf/kubectl_deployer" imageTag: "0.4" @@ -160,6 +154,7 @@ podAnnotations: {} ## configurationOverrides: "offsets.topic.replication.factor": 3 + "confluent.support.metrics.enable": false # Disables confluent metric submission # "auto.leader.rebalance.enable": true # "auto.create.topics.enable": true # "controlled.shutdown.enable": true @@ -176,6 +171,11 @@ configurationOverrides: # "listener.security.protocol.map": |- # PLAINTEXT:PLAINTEXT,EXTERNAL:PLAINTEXT +## set extra ENVs +# key: "value" +envOverrides: {} + + ## A collection of additional ports to expose on brokers (formatted as normal containerPort yaml) # Useful when the image exposes metrics (like prometheus, etc.) through a javaagent instead of a sidecar additionalPorts: {} @@ -248,8 +248,7 @@ jmx: prometheus: ## Prometheus JMX Exporter: exposes the majority of Kafkas metrics jmx: - #enabled: false - enabled: true + enabled: true # default: false ## The image to use for the metrics collector image: solsson/kafka-prometheus-jmx-exporter@sha256 @@ -260,6 +259,9 @@ prometheus: ## Interval at which Prometheus scrapes metrics, note: only used by Prometheus Operator interval: 10s + ## Timeout at which Prometheus timeouts scrape run, note: only used by Prometheus Operator + scrapeTimeout: 10s + ## Port jmx-exporter exposes Prometheus format metrics to scrape port: 5556 @@ -273,8 +275,7 @@ prometheus: ## Prometheus Kafka Exporter: exposes complimentary metrics to JMX Exporter kafka: - #enabled: false - enabled: true + enabled: true # default: false ## The image to use for the metrics collector image: danielqsj/kafka-exporter @@ -285,6 +286,9 @@ prometheus: ## Interval at which Prometheus scrapes metrics, note: only used by Prometheus Operator interval: 10s + ## Timeout at which Prometheus timeouts scrape run, note: only used by Prometheus Operator + scrapeTimeout: 10s + ## Port kafka-exporter exposes for Prometheus to scrape metrics port: 9308 @@ -297,6 +301,39 @@ prometheus: cpu: 100m memory: 100Mi + # Tolerations for nodes that have taints on them. + # Useful if you want to dedicate nodes to just run kafka-exporter + # https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ + tolerations: [] + # tolerations: + # - key: "key" + # operator: "Equal" + # value: "value" + # effect: "NoSchedule" + + ## Pod scheduling preferences (by default keep pods within a release on separate nodes). + ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity + ## By default we don't set affinity + affinity: {} + ## Alternatively, this typical example defines: + ## affinity (to encourage Kafka Exporter pods to be collocated with Kafka pods) + # affinity: + # podAffinity: + # preferredDuringSchedulingIgnoredDuringExecution: + # - weight: 50 + # podAffinityTerm: + # labelSelector: + # matchExpressions: + # - key: app + # operator: In + # values: + # - kafka + # topologyKey: "kubernetes.io/hostname" + + ## Node labels for pod assignment + ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector + nodeSelector: {} + operator: ## Are you using Prometheus Operator? enabled: false @@ -311,6 +348,13 @@ prometheus: selector: prometheus: kube-prometheus +## Kafka Config job configuration +## +configJob: + ## Specify the number of retries before considering kafka-config job as failed. + ## https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/#pod-backoff-failure-policy + backoffLimit: 6 + ## Topic creation and configuration. ## The job will be run on a deployment only when the config has been changed. ## - If 'partitions' and 'replicationFactor' are specified we create the topic (with --if-not-exists.) @@ -339,6 +383,17 @@ topics: [] # replicationFactor: 3 # defaultConfig: "segment.bytes,segment.ms" # config: "cleanup.policy=compact,delete.retention.ms=604800000" + # - name: myAclTopicPartitions + # partitions: 8 + # acls: + # - user: read + # operations: [ Read ] + # - user: read_and_write + # operations: + # - Read + # - Write + # - user: all + # operations: [ All ] # ------------------------------------------------------------------------------ # Zookeeper: @@ -349,15 +404,8 @@ zookeeper: ## ref: https://github.com/kubernetes/charts/tree/master/incubator/zookeeper enabled: true - ## As weighted quorums are not supported, it is imperative that an odd number of replicas - ## be chosen. Moreover, the number of replicas should be either 1, 3, 5, or 7. - ## - ## ref: https://github.com/kubernetes/contrib/tree/master/statefulsets/zookeeper#stateful-set - replicaCount: 3 # Desired quantity of ZooKeeper pods. This should always be (1,3,5, or 7) - ## Configure Zookeeper resource requests and limits ## ref: http://kubernetes.io/docs/user-guide/compute-resources/ - #resources: ~ resources: limits: cpu: 200m @@ -365,17 +413,15 @@ zookeeper: requests: cpu: 100m memory: 128Mi - + ## Environmental variables to set in Zookeeper env: ## The JVM heap size to allocate to Zookeeper ZK_HEAP_SIZE: "500M" persistence: - #enabled: false - enabled: true + enabled: true # default: false ## The amount of PV storage allocated to each Zookeeper pod in the statefulset - # size: "2Gi" size: "2Gi" ## Specify a Zookeeper imagePullPolicy @@ -397,41 +443,3 @@ zookeeper: # labelSelector: # matchLabels: # release: zookeeper - -exporters: - - jmx: - #enabled: false - enabled: true - config: - lowercaseOutputName: false - ## ref: https://github.com/prometheus/jmx_exporter/blob/master/example_configs/zookeeper.yaml - env: {} - #resources: {} - resources: - limits: - cpu: 150m - memory: 200Mi - requests: - cpu: 100m - memory: 128Mi - - zookeeper: - ## refs: - ## - https://github.com/carlpett/zookeeper_exporter - ## - https://hub.docker.com/r/josdotso/zookeeper-exporter/ - ## - https://www.datadoghq.com/blog/monitoring-kafka-performance-metrics/#zookeeper-metrics - #enabled: false - enabled: true - config: - logLevel: info - resetOnScrape: "true" - env: {} - #resources: {} - resources: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 50m - memory: 100Mi diff --git a/prometheus/bogi_test_release.tx b/prometheus/bogi_test_release.tx new file mode 100644 index 0000000000000000000000000000000000000000..32b7e7ae806837a21c8f459eaeb91133715392e5 GIT binary patch literal 180 zcmZ9F%L;;E6okKZ&^w5mcHsrd+J-M+&_-OS|BnP>;pO$UQ6wP_Gt8XJoO#MHSV~4} zavbh-@&$v~$Pb#dDoZ0b(({t5r5oN<+Fbe{=}x;h=@Stl0as$_BZn3Le;y>HJXc<> STzuVJIOA>bm9{6jzoajdn;QNA literal 0 HcmV?d00001 -- GitLab From 545d49a75215b9a43e297544b4232988461aa785 Mon Sep 17 00:00:00 2001 From: Bogdan Alov Date: Fri, 12 Apr 2019 14:54:06 +0300 Subject: [PATCH 2/3] removing unnecessay helm release file --- efk/bogi_test_release.txt | Bin 50104 -> 0 bytes 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 efk/bogi_test_release.txt diff --git a/efk/bogi_test_release.txt b/efk/bogi_test_release.txt deleted file mode 100644 index 9b91b717da86c34cd0850b09fd0fe7932b3150b0..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 50104 zcmeI5`*RdWlE?e!i@5(mCvF4Vw_pjgG z_ft8ks;;i?>6wuP+$tvK)m@d9m6?^Vdi4MP&(mt7+N_>cZ>#O<@6}wjRPF2kdUdGJ z4gEjVon5^)t5^E>wmPVG^lw|gUsZ3a=PJqdJ^kKS*_--(zWTblQeD^kvVQ+_^-tlQ zx3gB=saC5W!Y8%nt4k_>y;`U)j^399Ekc?T0;py$5

h7KDcDVPrdLg{$s)xdLU*DJ2(wyGcbr(Euj;>r*%a^Ke0-UAlo?xt2j{}6wYO8u# z4FYDDgx$4J=1FK{RoB<5C)Fdp9ta~^ofCeG`u9Zt)&v0>{8#ng;hWz}!uz4hKN0-4 z^3R3ye&7R?H5hY(ye`^rCjYs1D4x95)dT(7AMwXH@rUXs;rj>O<#S`i59;uOvpXZM zZ3yxQK>)w}{!n~=6G|J0uOF4#Qmq|H0J8E|m3bxz_jCnJ!25%!0B+vOm7|&mg83rU zdmHM5??t`g%~wZn#|C(CkDelZw^egpZN3WsH$~;mfa9*N9R!{sO&62a-s=8yl{(OC zOMQ9O3*Sot0<@w1$c0T|@heK^@_20&}b#rc^Jk8GPgQvrBny5 ztZPI+)c5NV7wHA`yjtDRHRlSNVlVIjJz#W?9OmvpkemGxr^mSFOAYVU<3&`%K=)N0zk>ZIi{7v_a zI@iRHozM?-CGQoMg`2MeY?pbPa_TF^E?rO}Vy#*1&k7 zGKZqm&FX?)?bN&}ZH-jMagIcl_=_w-%}0_)diGqJiI(mQ-(_7p)E$#o>vM`b*RgMK z+qD{Xe-=!5{Ht0#4BYL)b=cs2+6LNXJ79!;L2fS}@nlzRW24b=(E0fY3vh6&0#Ctl zLn9n(O^?88N56K3WwR`_Mnlu557Ij(u?M2Yx@c%JJ)h_+qk_?HUFB1I5J#xdkbAR^ zdAJ%i4gKQ%ioZuvT^67z@o2?xD@1PnwG4uZkKY&S`-dRGeP<-j1aR%b3snt9Z8PUqf}>4m|(As)8^si+Nn?5*m3-n zy%D4~%hiT^T7MX1*!{?Pjc&MeBauR&xORZzUe-&d7$et?74mJP6%O3jX!nwgXhxO! zT5aRySCx3CQRKD2V^6(46gG^l3qdl`z^3sjw=K9(7(E_qmOO{0;45OuvCPBZJ>VMv zIr0veCH>asDH@K)ulJsXUeVK+>UX{Mls-|XpK)~QSN!y`?0L}{-L5k)9EYKU1|0-0$Ur&+U3N) zwZ~r9lnePhr3I~sv|z1EzWMC2SB$*SF!vOzttgI$zWj&g%d+`*#R-d+xypMGUi>;I z9M^=Q`>kjJ^NB75Ie#r{AFUV`=s!Q@A zey{6|mHMD>O75vue($JFtUu!iP0E!6ed0AhWqdHK_JaP+g@})g=A1lqvR7mQmn0o1Gx3aoo>`h#R>^ za^C9hT+mKX2zibzd9R34$j6(Wun6)Xu^f&w-_XNHW2wJhww{$4sve_kKS)0ql&L~( z({$7)Gi21*5>1d%V%yk0baQDd(FkbhOU4x=7Z^UShw8KClKVjE8UfUg(p16&t^H~w zVQn-U2ufNmjWEr!l_1l@G!F_cuCv?9(-){wmp_vMIMi0pIhyJ)+B>i8f7eWaO9bEJ zW(7)R+h+*U()@;gj3R7ZTQ9&K-FF~qfC}gfc++0PGIV5EyUHM&*a4I6l0@Vd{LFee z|DasV2eEE6+S{+sc|=Ez#TW zBNO0hyy2t{6>F`k4)NCq>GlWWn#~Yf?J|Ck)DBTKoW^6g zt6FFt>L9D}UZh?L-Z!(R9N}$HQ!p(h)??09^oGY+fYV{3d2`gpR|Y zB>PwwTTx^BI#SYpEej7K?EHHAAFmVHNonQxAL|~gp1NMnfd#E#DZxNevC>^IE(9N7 zU-@>kd(5yff($n}i#%UY3k#zXZ7sRnx3!k${7W#b$HS15Va?I|0^VO#f2sbYQO3+O zK8(@$&(%}?8fb3vqCUToCi+5G(E91MuNtMk6tpj@|4`4Sum7be^QCYx%p9X=wdz>@ zr%L|4`nRM;liF#Gg;2Jh$#VKW6pdaB-YtzoV&PnSQSMsE2$!h67IJ`lp&tC+9zlTP zSSVg?S_qxFCApyF3)QTTb*RAmqyxM!GEBb9$Pd0SOX^?FR8|IEUm}( z`7n$dqPz5J^LKgFeLvERL*?UFg?Y1{U2$(3|ABQUCF~X?=c(VhAd0`!2t}KjT{WM= z#-^=~ys3GftMVkvJ%dY(F60HDx{O^L=f9UfwWd*Jb=@CdkS2_F4~Uc2zZ3E}9xK=D zPp;uhQnV6QKhC1Dk@hl8(X#E*QkIf?qCR%2O#iv+U$xfeuIS8~&SgnItNb2lW`P+6 z{4IPhR*bT8bQtC!xMOQRbC^wQUoSCPTaUzDR;rfUGRdH4*kQE8UG>x>sXAvnWB4T>27nx=vocQ`Z{Jt$pVDr#xtd8a?9yFdC<@vuN3-583 z*^@=p@hd6S96Bwx$4tL>+>5pPlq$8I_Q;|E>&sC5bW4ivKs&QOC{o2dE?^#Sw9iT_ zA`<-ZX=epJCb7&v^oMKYYHj@qa?KcT#?9^nF%C;HrPI*MMPG>;MiaLzAD=e+igCz4 zEa=m6UT8Dc!Npv_f^0W=h6P<`}ezIeDAQkL2ay{;JXwRu)2beL%KeBa+@Sr{O;t=72TPA9xEkbR09OV=E%#JwE zsqGpj&egE0zn-&l{?P(?J^T=$8#KqI9zC%>m-4=z!b_3kLyzKnP(NY^HYY)c>9w6p z75Ws+O!Iya%{~?R$}w{)pS+~ujashMX0n^ob~>ES@j!}PGIKfaC&wuSB={S}{rQNn zmG?+6a$$30kL9PwHRn>iHqU#C-;Y#UzR3K`x}Vyv+mRWwTt9^RrL}E+wV&xd z#!VkdWbKpd9oLz*;yT^)1wX*g*Rj!tL+2j;6&eM3v>B~=edp_HY*iWSihTVdz7o+S z^MueXuJl5`*&4CvkEXIjtGkK?*-D@ws&J(-G2KvpnG$qr)y}I zL`~+VEQglv(r{VLDVh4f^uTj?DUX|D(sq?J%U}(=#$~rwnqJOk9nI#YBDaU1jD1OQ za!Q}PWyxD@%3C)NkIRS1@knJbmEk_}>#}e5B(8=zCvL|bPUQKBH*e_^I`7K5pqZfk ztn!uG$xp?9NpU(o`N~^u%9nF1=dxdK^9uU;7vntxB<*x$Jg3F1QuguuV#W))GoPbA zJ-O9o;D?>Sqrly%jDsrgD#pfGY)Q_iZ^P23ew^%>- z&!*QGX%^d8)N$^|La*#Pv5&3O@o0th6x})E+v<<6Wm?m()6TiWr*`kD->SNSAf&4{ zT{3}f*$JlyobsJX+~rlC4Y&My-74j=B+&B6qAAUAB;74i&+W9wkd9wFb-cvvRB}k; zspTb)mue2RNj<-V-$|UhBu?jRhUyfhM(%xjZ8*re1?1VvtD(|;=y12bQ~9Q5S>mqb z7#lm5e4D3@4?&*2iJRj$4iow?&@QD^n!O$Fy^~Ze=)JB{KMdcjv7vRFJNs6v?7r5U zo!VE6P|&lslMc#qR)*2m^hgLkM!-0pSe@U<6V$} zw;E}iTI=Sctc}At)=-Ys_t>d6d{|LzW7pSHLgjqjWT|#rYxs=mnvJHs#hj!|kAIKH z2Iv=R@XKpDOBmCN&m^x%JNT}QHXTCwyqD=%cMVZq$r(=ebopv-?oq7k!qqTS%ZRaWz>)7xYg&Az%7-rl4Ru+7$;S}dnw9O8!uSnWczH! zOI#Zk(@NXySWYX6c~46GA1_hHS5}{HOEZuyZMU6iHe~YFu-NgOrTSW#WwnfMLT8j9 z=bR@WY&rfYyKOS(d%Vc-+lne?&#gXdQcCOd&4bQ!DLw-In;pIM2^?(Zll{W)MN9G) zW$nbQ$W|CnwquIf)HRJRW-~T|#Wo*g`Z&zyIGb}xtR-WY`Wtym&>F9%Uu2l~ZYspfeQ z$YR$V2lvO%ry;K<$D7gv>@iG7oQ)QINY>pvQGYBeRoWM5KK+^`*)k1`=-6K$Iacb4 z;Bi)h?eFkY5~xwPE@?)6HH_R6E{^fZ$E@S%-H+y!YRZdK2%f0kVT&#_elxpX=OO(nd2n?}^WNvS&2)ov*h~3$J&Ky2`3y*l zl!>&`Q-HiR|BkJ;MOuB%v2>)RS` z^f_4;@-wVlFZpL)!@r>jUR7Bucq#uzORy7w^PQKZz2aIOFH!oY) z=Oh5IWEWZgI>rN9>Rab~;q^eTzU8fj??P`TtMg={I!^UlsoeCx7zF!K?_)x*8HJymYk7d+6ax;T-RP2NsR6G zv%>Ql>Dl3U2l3pzyrlm}TaoQRkC|UlI#<|B`!~JlK4;iV`uAyJ)+PacGOpl?CTaRm zY1Y+kNLx$Z<23Gai{DlUE;F}cdtMKuWzo?@Bi&ls;eMx*c#>`K9VfR_aQZ@shw%@{ z>x{2ip38K|`8VEzStVK^YGt14gGOwg=fdiDwO;oUn)R{hZS{Thf(>K!AB(bGl!0Hf zP&Um(J`5flxsHo5VOpV%`DynwPAQK_jc z^LS4JnPHtek&r*XrwtRwh&pRJjS;V%=T)uAtL9`1&TJ~xWp2HX_iH{ZS$EDo>&Bhk z^qi*(Uk8P(spHDG?X`rMEccq0kv4V&Y$`@U)4d+kE9RE) zur@?ZWW1XOv=D2=xj%c#2>DQ75xF3lw^<`}sm)rJI0a|DB$SO$Uh+PdYJHkLEn%AX zk1WNSIOsV5o?>O^C5($=BWIygT`So+u2@G~XZ4{tDso)P&(bROqE2tqY%wobs*$(V z_PmZ#-BN3DKTTOn=Iuo}O3#n)+gj9-leXrk>7P_f@x-Y1_@wAwJJ?Au2yf)4; z`J>)w{9&;lxg0%Gdpu(fT3~fJ-DG^5{d6zhbb87$nW4#aaSnlznOZ*1SmI>H62^I5 zkFelm{z_qXTZlAUQ)(5+wA?=j6d~H2PkcIEj%BI6aoHRAJuYh#_YdVQ@;|j+o>eJf z(x;{7&eycXv?WF|ekIn`@++k_r^ya6r@bdBH=k&HcF5aD_WEH(pFED*Q7^i)JoTqi zru5*qt?`&-B^0%gKztRjU<~%l?l^b*^clH$~*-N43H(zBM~wxl9ICn2Se|0Z@o zf>^g{9#PqndHHnoHv2n$UMt<7GRumglg((QSUR63&1mH?npqmgb)KJ!>syGVXI;-z z&Oqgu!Sj!m4J+XSK22)5WH#+zX|&{Hwyhn9nrA}N)xryb6LANjooriwLR$UbK>7ha zZTXTb9jiYkiK}OeN@7fcM7vab|M@<7AIsMAw9nQ}>uWIs&^8O`HmM{f^m@Ff!;`sq za(IbmKuC3Em(@FMJI>m&9nF8)+Ap5-US3D)GT@ZLK6Lei^8G!c*{%2V*2eMl@kI=Sl)QY1vwC@}O?mqCGJ84BNL}CTUa2k;o6oO(&KbT^AB{$5 zSw7cP=-_|k)50vv=j*@QB*v+Amhp3q>=enrk*Bka-&w}b*IRzFeOo*d0-SN3FCYz^5?JG+nE{B}5HgbXh> zi1l>ibkWa&dwJ%%o|$e^)+1put?lRbd#U#NUZOca)|P3eM((ecWyoQt-+4~sS?E2v z@RwQ(TZeNqK z-19PV^%?ry&Y$-)`6)-Mi+VrNFG}R?Q-*hbo&%-1&QtCGta?0E3PG%^bl08t2_(IQixUT1} zx5KqN7u91pVXyn*zS+(Cb-(X*>i_w7NfHDt%lKRuHXE9OynNJB6N1A&4Sb$S)_22G z=-cq{>vcMu6n*w2@$7|t|B2A&7x4;wu74u0iQg7`FO8K z3s%QGvVnN^OgQkmA$su?kAd*pmXsgr+aT8QnSFdsiqFr&gmcVa95X%_NBVG5d=8{3 ze-$5pITd`;ot5wgeqGmVOB8vo-$>J;aQRvEaal<9^YrplrjPG~85CtMmqGp?m;99R zN#|hu;dI>iH2o7I#<*vy{`?F|yVsOci?e^0f)CWsi=ck=3>=z|`y4NPNAw6D6d9)Y zr07-Y82rvI+#EXRD|dS~rkysz=$IatTS2?osSNfkqc*A?FJ>3yzop#kN0T}EeLu-B zy))7Yj#GV4@gU4~`#qjO@;B9ER*Jqo&`4%3ocsPvsV{`hmm`>w?sbjjBQnC}SDnKS z*Pa=$If7WPF<1Rb_Jo*mGx*x+-EYFF>WrMnf^0ZCZ*y$O^ALmi=~JhTjh)R0R%s8? z-(}jc%bC;nY(M!`=~$lMc3C=>x?QxP=8Yb-No{Y$rw=yx4q)SUz6%@Tvp$?kHRm{N zPDXBs-N+2(duhjEQ|HvRz%ibnYW1e0O=@Rj`}JS_IK{IYuO8{;c5J{n9Z$67W2#Gc z-xk&EwC&xXt86!Pn|379UXxxSM!g*a6M@rQ7Wj$kB&n*EdjmI6^5-poG9S`^8yZYcn6ow8gwExSjWt#D1B!!=$CPL?il#-@HUG=04iB+cp3 z_evis)nzuxEty=?HJAJs4%3n(7+{0?px!K?G(Mp*= z?T~U>_?R_+KA%aUy1F)BX&&l(c5lM4XWihp_PqPp67uDv^=t3|3Ad57wZ53 -- GitLab From 222170478120fd30604dd400eb52cf811e1007f3 Mon Sep 17 00:00:00 2001 From: Bogdan Alov Date: Wed, 3 Jul 2019 11:30:28 +0300 Subject: [PATCH 3/3] updating zookeeper default log level to WARN --- kafka/charts/zookeeper/values.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kafka/charts/zookeeper/values.yaml b/kafka/charts/zookeeper/values.yaml index 53daa41..57cbb24 100644 --- a/kafka/charts/zookeeper/values.yaml +++ b/kafka/charts/zookeeper/values.yaml @@ -286,7 +286,7 @@ env: ## The Log Level that for the ZooKeeper processes logger. ## Choices are `TRACE,DEBUG,INFO,WARN,ERROR,FATAL`. - ZK_LOG_LEVEL: INFO + ZK_LOG_LEVEL: WARN ## The maximum number of concurrent client connections that ## a server in the ensemble will accept. -- GitLab