-
Notifications
You must be signed in to change notification settings - Fork 200
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Redhat Openshift support #912
Conversation
0b80fa8
to
e6c7744
Compare
e6c7744
to
a89c73e
Compare
Yeah, those seem to be the changes required for rbacs to make the operator work (just tried them today). But there are some changes required to the kafka build to not use the root account otherwise the broker attached pvcs cannot be used (permission denied). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm - although I don't have access to OpenShift so can't really play with it myself
Yeah I made those changes as well but forgot to create a PR for it in our kafka docker repo, I will add it in a sec. |
Thanks for the reviews, I will take over this PR and fix the commented things. |
fyi, we're also going to need to set without that RHOS picks a random UID for this mapping and it screws up any filesystem access (owner doesn't map). |
1badae5
to
50b41f0
Compare
I force-with-lease-pushed the branch to clean up redundant commits I manually rebased, I will fix the comments in subsequent pushes, stay tuned. |
1df5df1
to
3cb22dd
Compare
Fixed in Also I will highlight this in the docs, because it is KafkaCluster CR config details the user needs to pay attention to. I will retest Koperator using banzaicloud/docker-kafka#29 and #912 on K8s, RHOS 4.10 and 4.11 and if everything seems to work fine I will rerequest the reviews so we can get these merged ASAP. |
c32648a
to
a62b459
Compare
for the koperator Dockerfile, I think the distroless base image should change to and possibly need to ensure the deployment of koperator sets the securitycontext:
|
Converted to draft, because there is still stuff to figure out unfortunately, working on it. |
I think this needs to change to
|
5410bdb
to
8c7f653
Compare
I mean this will always be outdated if the user overconfigures it, but pushed an update in https://github.com/banzaicloud/koperator/compare/5410bdb1a28dbfa881301952ac7a350dad91f437..8c7f6536849a049fc95e8e92b93746776945b3f7. (Also removed the commit for the user/group specification, because this way it works on RHOS 4.10 and 4.11 and it doesn't with those and we need to figure out the correct combination of configuration for those with the init containers as well which takes more time but we also want to release the basic RHOS support to move forward.) |
8c7f653
to
f7afeb0
Compare
For the external listeners with envoy ingress I added the podSecurityContext propagation which is needed to run fine. This last one will build on top of an API change that will be merged in #956 , I will update this PR once that is merged and the new API is tagged. That is what breaks the CI now. |
89a8fba
to
ee1eb4d
Compare
RHOS requires ports to be over 1024.
To decouple service ports from container ports.
So finalizer RBACs would be covered for create, delete, patch, update. Required for RHOS. After changing the controller markers the manifests were regenerated using `make manifests`.
To an advertised tag.
RHOS requires the propagation of the envoy config podSecurityContext to set uid/gid.
ee1eb4d
to
b5b1437
Compare
Required to be able to use the envoy podSecurityContext.
cb0cf90
to
99c3b7a
Compare
I added the new Koperator API version containing the envoy podSecurityContext, this is the final form of this PR. |
What's in this PR?
Add openshift support by:
Checklist
ToDo
Kafka broker image is updated(We will customize the broker images in a later step because it seems to work fine with the current ones and the modification is a bigger effort because of the init containers.)