Quick start
For information about versions compatibilty of the operator features with Kubernetes and Apache NiFi, let's have look of the version compatibility page
Getting Started
Cluster Setup
For local testing we recommend following one of the following setup guides:
- Docker Desktop (Mac)
- Minikube
note
Start Minikube with at least 4gb RAM with
minikube start --memory=4000
- Kind
- For testing on GKE you can create a cluster with the command line or the Cloud Console UI.
- For testing on EKS you can install eksctl and run
eksctl create cluster
to create an EKS cluster/VPC/subnets/etc. This process should take 10-15 minutes.
Install kubectl
If you do not already have the CLI tool kubectl
installed, please follow these instructions to install.
Configure kubectl
Configure kubectl
to connect to your cluster by using kubectl config use-context my-cluster-name
.
- For GKE
- Configure
gcloud
withgcloud auth login
. - On the Google Cloud Console, the cluster page will have a
Connect
button, which will give a command to run locally that looks like
gcloud container clusters get-credentials CLUSTER_NAME --zone ZONE_NAME --project PROJECT_NAME.
- Use
kubectl config get-contexts
to show the contexts available. - Run
kubectl config use-context ${gke context}
to access the cluster fromkubectl
.
- Configure
- For EKS
- Configure your AWS CLI to connect to your project.
- Install eksctl
- Run
eksctl utils write-kubeconfig --cluster=${CLUSTER NAME}
to make the context available tokubectl
- Use
kubectl config get-context
s to show the contexts available. - Run
kubectl config use-context ${eks context}
to access the cluster withkubectl
.
Install cert-manager
The NiFiKop operator uses cert-manager
for issuing certificates to users and and nodes, so you'll need to have it setup in case you want to deploy a secured cluster with authentication enabled. The minimum supported cert-manager version is v1.0.
- Directly
- helm 3
# Install the CustomResourceDefinitions and cert-manager itself
kubectl apply -f \
https://github.com/jetstack/cert-manager/releases/download/v1.7.2/cert-manager.yaml
# Install CustomResourceDefinitions first
kubectl apply --validate=false -f \
https://github.com/jetstack/cert-manager/releases/download/v1.7.2/cert-manager.crds.yaml
# Add the jetstack helm repo
helm repo add jetstack https://charts.jetstack.io
helm repo update
# You have to create the namespace before executing following command
helm install cert-manager \
--namespace cert-manager \
--version v1.7.2 jetstack/cert-manager
Deploy NiFiKop
You can deploy the operator using a Helm chart Helm chart:
To install an other version of the operator use
helm install --name=nifikop --namespace=nifi --set operator.image.tag=x.y.z konpyutaika-incubator/nifikop
In the case where you don't want to deploy the crds using helm (--skip-crds
), you have to deploy manually the crds:
kubectl apply -f https://raw.githubusercontent.com/konpyutaika/nifikop/master/config/crd/bases/nifi.konpyutaika.com_nificlusters.yaml
kubectl apply -f https://raw.githubusercontent.com/konpyutaika/nifikop/master/config/crd/bases/nifi.konpyutaika.com_nifiusers.yaml
kubectl apply -f https://raw.githubusercontent.com/konpyutaika/nifikop/master/config/crd/bases/nifi.konpyutaika.com_nifiusergroups.yaml
kubectl apply -f https://raw.githubusercontent.com/konpyutaika/nifikop/master/config/crd/bases/nifi.konpyutaika.com_nifidataflows.yaml
kubectl apply -f https://raw.githubusercontent.com/konpyutaika/nifikop/master/config/crd/bases/nifi.konpyutaika.com_nifiparametercontexts.yaml
kubectl apply -f https://raw.githubusercontent.com/konpyutaika/nifikop/master/config/crd/bases/nifi.konpyutaika.com_nifiregistryclients.yaml
Now deploy the helm chart:
# You have to create the namespace before executing following command
helm install nifikop \
oci://ghcr.io/konpyutaika/helm-charts/nifikop \
--namespace=nifi \
--version 0.16.0 \
--set image.tag=v0.16.0-release \
--set resources.requests.memory=256Mi \
--set resources.requests.cpu=250m \
--set resources.limits.memory=256Mi \
--set resources.limits.cpu=250m \
--set namespaces={"nifi"}
Add the following parameter if you are using this instance to only deploy unsecured clusters: --set certManager.enabled=false