Skip to content

Commit c5b9c78

Browse files
committed
fixed gcp gcs connector
1 parent 00ea0c4 commit c5b9c78

19 files changed

+177
-5
lines changed

examples/custom-connect-gcs/README.md renamed to examples/custom-connect-gcp-gcs/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,14 @@ kubectl apply -k ../../kustomize/crds
1515
./build-inside.sh
1616
```
1717

18-
5. create google service account secret which is used in the connect config
18+
5. deploy confluent platform and connector
1919
```shell
20-
kubectl create secret generic gcs-service-account --from-file=./service-account.json -n sandbox
20+
kubectl apply -k .
2121
```
2222

23-
6. deploy confluent platform and connector
23+
6. create google service account secret which is used in the connect config
2424
```shell
25-
kubectl apply -k .
25+
kubectl create secret generic gcs-service-account --from-file=./service-account.json -n sandbox
2626
```
2727

2828
7. Port forward the connect cluster to create connect task:

examples/custom-connect-gcs/confluent/kafka.yaml renamed to examples/custom-connect-gcp-gcs/confluent/kafka.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ spec:
4747
provider:
4848
type: ldap
4949
ldap:
50-
address: ldap://ldap.tools.svc.cluster.local:389
50+
address: ldap://ldap.sandbox.svc.cluster.local:389
5151
authentication:
5252
type: simple
5353
simple:

examples/custom-connect-gcs/confluent/kustomization.yaml renamed to examples/custom-connect-gcp-gcs/confluent/kustomization.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
namespace: sandbox
22
resources:
33
- ./namespace.yaml
4+
- ./ldap.yaml
45
- ../../../kustomize/base/confluent
56
- ../../../kustomize/base/secrets-tls
67
- ../../../kustomize/base/secrets-user
Lines changed: 171 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,171 @@
1+
apiVersion: v1
2+
kind: Pod
3+
metadata:
4+
name: ldap
5+
labels:
6+
role: ldap
7+
app: ldap
8+
spec:
9+
containers:
10+
- name: ldap
11+
args:
12+
- --copy-service
13+
- --loglevel=debug
14+
image: osixia/openldap:1.3.0
15+
ports:
16+
- name: ldap
17+
containerPort: 389
18+
- name: ldaps
19+
containerPort: 636
20+
livenessProbe:
21+
tcpSocket:
22+
port: 389
23+
initialDelaySeconds: 15
24+
periodSeconds: 20
25+
env:
26+
- name: LDAP_ORGANISATION
27+
value: "Test Inc."
28+
- name: LDAP_DOMAIN
29+
value: "test.com"
30+
- name: LDAP_ADMIN_PASSWORD
31+
value: "confluentrox"
32+
- name: LDAP_CONFIG_PASSWORD
33+
value: "confluentconfigrox"
34+
- name: LDAP_READONLY_USER
35+
value: "True"
36+
- name: LDAP_READONLY_USER_USERNAME
37+
value: "mds"
38+
- name: LDAP_READONLY_USER_PASSWORD
39+
value: "Developer!"
40+
- name: LDAP_TLS
41+
value: "False"
42+
volumeMounts:
43+
- mountPath: /container/service/slapd/assets/config/bootstrap/ldif/custom
44+
name: customldif
45+
- mountPath: /var/lib/ldap
46+
name: ldap-data
47+
- mountPath: /etc/ldap/slapd.d
48+
name: ldap-config
49+
volumes:
50+
- name: customldif
51+
configMap:
52+
defaultMode: 420
53+
name: ldap-ldifs
54+
- name: ldap-data
55+
emptyDir: {}
56+
- name: ldap-config
57+
emptyDir: {}
58+
restartPolicy: Always
59+
---
60+
apiVersion: v1
61+
kind: ConfigMap
62+
metadata:
63+
name: ldap-ldifs
64+
data:
65+
0_groups.ldif: |-
66+
dn: ou=groups,dc=test,dc=com
67+
objectClass: organizationalUnit
68+
objectClass: top
69+
ou: groups
70+
0_users.ldif: |-
71+
dn: ou=users,dc=test,dc=com
72+
objectClass: organizationalUnit
73+
objectClass: top
74+
ou: users
75+
1_emmy.ldif: |-
76+
dn: cn=emmy,ou=users,dc=test,dc=com
77+
userPassword: emmy-secret
78+
objectClass: simpleSecurityObject
79+
objectClass: organizationalRole
80+
description: Interested in action and conservation. If you like it, you should put a Noetherian Ring on it.
81+
cn: emmy
82+
1_alice.ldif: |-
83+
dn: cn=alice,ou=users,dc=test,dc=com
84+
userPassword: alice-secret
85+
objectClass: simpleSecurityObject
86+
objectClass: organizationalRole
87+
description: Alice is great at changing perspectives, but sometimes chases down rabbit holes
88+
cn: alice
89+
1_developers.ldif: |-
90+
dn: cn=developers,ou=groups,dc=test,dc=com
91+
objectClass: top
92+
objectClass: groupOfNames
93+
description: A group of software developers and the apps they are responsible for
94+
cn: developers
95+
member: cn=emmy,ou=users,dc=test,dc=com
96+
member: cn=alice,ou=users,dc=test,dc=com
97+
1_kafka.ldif: |-
98+
dn: cn=kafka,ou=users,dc=test,dc=com
99+
userPassword: kafka-secret
100+
description: kafka user
101+
objectClass: simpleSecurityObject
102+
objectClass: organizationalRole
103+
cn: kafka
104+
1_erp.ldif: |-
105+
dn: cn=erp,ou=users,dc=test,dc=com
106+
userPassword: erp-secret
107+
description: erp user
108+
objectClass: simpleSecurityObject
109+
objectClass: organizationalRole
110+
cn: erp
111+
1_sr.ldif: |-
112+
dn: cn=sr,ou=users,dc=test,dc=com
113+
userPassword: sr-secret
114+
description: schema registry user
115+
objectClass: simpleSecurityObject
116+
objectClass: organizationalRole
117+
cn: sr
118+
1_c3.ldif: |-
119+
dn: cn=c3,ou=users,dc=test,dc=com
120+
userPassword: c3-secret
121+
description: control center user
122+
objectClass: simpleSecurityObject
123+
objectClass: organizationalRole
124+
cn: c3
125+
1_ksql.ldif: |-
126+
dn: cn=ksql,ou=users,dc=test,dc=com
127+
userPassword: ksql-secret
128+
description: ksql user
129+
objectClass: simpleSecurityObject
130+
objectClass: organizationalRole
131+
cn: ksql
132+
1_connect.ldif: |-
133+
dn: cn=connect,ou=users,dc=test,dc=com
134+
userPassword: connect-secret
135+
description: connect user
136+
objectClass: simpleSecurityObject
137+
objectClass: organizationalRole
138+
cn: connect
139+
1_replicator.ldif: |-
140+
dn: cn=replicator,ou=users,dc=test,dc=com
141+
userPassword: replicator-secret
142+
description: replicator user
143+
objectClass: simpleSecurityObject
144+
objectClass: organizationalRole
145+
cn: replicator
146+
1_c3-test.ldif: |-
147+
dn: cn=testadmin,ou=users,dc=test,dc=com
148+
userPassword: testadmin
149+
description: testadmin user
150+
objectClass: simpleSecurityObject
151+
objectClass: organizationalRole
152+
cn: testadmin
153+
---
154+
apiVersion: v1
155+
kind: Service
156+
metadata:
157+
name: ldap
158+
labels:
159+
app: ldap
160+
spec:
161+
ports:
162+
- port: 389
163+
name: ldap
164+
- port: 636
165+
name: ldaps
166+
clusterIP: None
167+
selector:
168+
app: ldap
169+
170+
171+

0 commit comments

Comments
 (0)