Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add recipe for kafka operator installation #17

Merged
merged 1 commit into from
Mar 3, 2021
Merged

Conversation

PrasadG193
Copy link
Member

Usage:

$ kbrew install --config=./recipes/kafka-operator.yaml kafka-operator
Installing raw app cert-manager/cert-manager
customresourcedefinition.apiextensions.k8s.io/certificaterequests.certmanager.k8s.io created
customresourcedefinition.apiextensions.k8s.io/certificates.certmanager.k8s.io created
customresourcedefinition.apiextensions.k8s.io/challenges.certmanager.k8s.io created
customresourcedefinition.apiextensions.k8s.io/clusterissuers.certmanager.k8s.io created
customresourcedefinition.apiextensions.k8s.io/issuers.certmanager.k8s.io created
customresourcedefinition.apiextensions.k8s.io/orders.certmanager.k8s.io created
namespace/cert-manager created
serviceaccount/cert-manager-cainjector created
serviceaccount/cert-manager created
serviceaccount/cert-manager-webhook created
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created
clusterrole.rbac.authorization.k8s.io/cert-manager-leaderelection created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-leaderelection created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrole.rbac.authorization.k8s.io/cert-manager-view created
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:auth-delegator created
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:webhook-authentication-reader created
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:webhook-requester created
service/cert-manager created
service/cert-manager-webhook created
deployment.apps/cert-manager-cainjector created
deployment.apps/cert-manager created
deployment.apps/cert-manager-webhook created
apiservice.apiregistration.k8s.io/v1beta1.webhook.certmanager.k8s.io created
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
Installing helm app pravega/zookeeper-operator
NAME: zookeeper-operator
LAST DEPLOYED: Wed Mar  3 15:07:13 2021
NAMESPACE: zookeeper
STATUS: deployed
REVISION: 1
TEST SUITE: None

Installing helm app prometheus-community/kube-prometheus-stack
NAME: kube-prometheus-stack
LAST DEPLOYED: Wed Mar  3 15:09:05 2021
NAMESPACE: default
STATUS: deployed
REVISION: 1
NOTES:
kube-prometheus-stack has been installed. Check its status by running:
  kubectl --namespace default get pods -l "release=kube-prometheus-stack"

Visit https://github.com/prometheus-operator/kube-prometheus for instructions on how to create & configure Alertmanager and Prometheus instances using the Operator.

zookeepercluster.zookeeper.pravega.io/zookeeper created
Waiting for zookeeper cluster to be ready
customresourcedefinition.apiextensions.k8s.io/kafkatopics.kafka.banzaicloud.io configured
customresourcedefinition.apiextensions.k8s.io/kafkaclusters.kafka.banzaicloud.io configured
customresourcedefinition.apiextensions.k8s.io/kafkausers.kafka.banzaicloud.io configured
Installing helm app banzaicloud-stable/kafka-operator
NAME: kafka-operator
LAST DEPLOYED: Wed Mar  3 15:16:29 2021
NAMESPACE: kafka
STATUS: deployed
REVISION: 1
TEST SUITE: None

kafkacluster.kafka.banzaicloud.io/kafka created
servicemonitor.monitoring.coreos.com/kafka-servicemonitor created
servicemonitor.monitoring.coreos.com/cruisecontrol-servicemonitor created
prometheusrule.monitoring.coreos.com/kafka-alerts created
serviceaccount/prometheus created
clusterrole.rbac.authorization.k8s.io/prometheus created
clusterrolebinding.rbac.authorization.k8s.io/prometheus created
prometheus.monitoring.coreos.com/kafka-prometheus created

@PrasadG193 PrasadG193 requested a review from vishal-biyani March 3, 2021 09:55
name: kube-prometheus-stack
namespace: default
sha256:
version:
Copy link
Member Author

@PrasadG193 PrasadG193 Mar 3, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Set versions

@vishal-biyani vishal-biyani merged commit 26fcd0d into main Mar 3, 2021
@vishal-biyani vishal-biyani deleted the add-recipes branch March 3, 2021 10:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants