Skip to content

Commit 9fc7238

Browse files
committed
use opensearch-operator and opensearch-dashboards image in demo
1 parent 7888242 commit 9fc7238

File tree

4 files changed

+198
-114
lines changed

4 files changed

+198
-114
lines changed

stacks/_templates/opensearch-dashboards.yaml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,12 @@ name: opensearch-dashboards
44
repo:
55
name: opensearch-dashboards
66
url: https://opensearch-project.github.io/helm-charts
7-
version: 2.30.0 # 2.19.2
7+
version: 3.1.0
88
options:
9+
opensearchHosts: https://opensearch:9200
10+
image:
11+
repository: oci.stackable.tech/sdp/opensearch-dashboards
12+
tag: 3.1.0-stackable0.0.0-dev
913
labels:
1014
stackable.tech/vendor: Stackable
1115
service:

stacks/_templates/opensearch.yaml

Lines changed: 0 additions & 110 deletions
This file was deleted.

stacks/logging/opensearch.yaml

Lines changed: 189 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,189 @@
1+
apiVersion: opensearch.stackable.tech/v1alpha1
2+
kind: OpenSearchCluster
3+
metadata:
4+
name: opensearch
5+
spec:
6+
image:
7+
productVersion: 3.1.0
8+
pullPolicy: IfNotPresent
9+
clusterConfig:
10+
vectorAggregatorConfigMapName: vector-aggregator-discovery
11+
nodes:
12+
config:
13+
logging:
14+
enableVectorAgent: true
15+
roleGroups:
16+
default:
17+
config:
18+
listenerClass: cluster-internal
19+
replicas: 1
20+
podOverrides:
21+
spec:
22+
volumes:
23+
- name: tls
24+
ephemeral:
25+
volumeClaimTemplate:
26+
metadata:
27+
annotations:
28+
secrets.stackable.tech/scope: node,pod,service=opensearch,service=opensearch-nodes-cluster-manager-headless
29+
envOverrides:
30+
configOverrides:
31+
opensearch.yml:
32+
# Disable memory mapping in this stack; If memory mapping were activated, the kernel setting
33+
# vm.max_map_count would have to be increased to 262144 on the node.
34+
node.store.allow_mmap: "false"
35+
# Disable the disk allocation decider in this stack; Otherwise depending on the disk
36+
# usage of the node and if the relative watermark set in
37+
# `cluster.routing.allocation.disk.watermark.high` is reached the security index can't
38+
# be created even if enough disk space would be available.
39+
cluster.routing.allocation.disk.threshold_enabled: "false"
40+
plugins.security.allow_default_init_securityindex: "true"
41+
plugins.security.ssl.transport.enabled: "true"
42+
plugins.security.ssl.transport.pemcert_filepath: /stackable/opensearch/config/tls/tls.crt
43+
plugins.security.ssl.transport.pemkey_filepath: /stackable/opensearch/config/tls/tls.key
44+
plugins.security.ssl.transport.pemtrustedcas_filepath: /stackable/opensearch/config/tls/ca.crt
45+
plugins.security.ssl.http.enabled: "true"
46+
plugins.security.ssl.http.pemcert_filepath: /stackable/opensearch/config/tls/tls.crt
47+
plugins.security.ssl.http.pemkey_filepath: /stackable/opensearch/config/tls/tls.key
48+
plugins.security.ssl.http.pemtrustedcas_filepath: /stackable/opensearch/config/tls/ca.crt
49+
podOverrides:
50+
spec:
51+
containers:
52+
- name: opensearch
53+
volumeMounts:
54+
- name: security-config
55+
mountPath: /stackable/opensearch/config/opensearch-security
56+
readOnly: true
57+
- name: tls
58+
mountPath: /stackable/opensearch/config/tls
59+
readOnly: true
60+
volumes:
61+
- name: security-config
62+
secret:
63+
secretName: opensearch-security-config
64+
- name: tls
65+
ephemeral:
66+
volumeClaimTemplate:
67+
metadata:
68+
annotations:
69+
secrets.stackable.tech/class: tls
70+
spec:
71+
storageClassName: secrets.stackable.tech
72+
accessModes:
73+
- ReadWriteOnce
74+
resources:
75+
requests:
76+
storage: "1"
77+
---
78+
apiVersion: v1
79+
kind: Secret
80+
metadata:
81+
name: opensearch-security-config
82+
stringData:
83+
action_groups.yml: |
84+
---
85+
_meta:
86+
type: actiongroups
87+
config_version: 2
88+
allowlist.yml: |
89+
---
90+
_meta:
91+
type: allowlist
92+
config_version: 2
93+
94+
config:
95+
enabled: false
96+
audit.yml: |
97+
---
98+
_meta:
99+
type: audit
100+
config_version: 2
101+
102+
config:
103+
enabled: false
104+
config.yml: |
105+
---
106+
_meta:
107+
type: config
108+
config_version: 2
109+
110+
config:
111+
dynamic:
112+
authc:
113+
basic_internal_auth_domain:
114+
description: Authenticate via HTTP Basic against internal users database
115+
http_enabled: true
116+
transport_enabled: true
117+
order: 1
118+
http_authenticator:
119+
type: basic
120+
challenge: true
121+
authentication_backend:
122+
type: intern
123+
authz: {}
124+
internal_users.yml: |
125+
---
126+
# The hash value is a bcrypt hash and can be generated with plugin/tools/hash.sh
127+
128+
_meta:
129+
type: internalusers
130+
config_version: 2
131+
132+
admin:
133+
hash: {{ bcrypt(password=openSearchAdminPassword) }}
134+
reserved: true
135+
backend_roles:
136+
- admin
137+
description: OpenSearch admin user
138+
139+
kibanaserver:
140+
hash: {{ bcrypt(password=openSearchDashboardPassword) }}
141+
reserved: true
142+
description: OpenSearch Dashboards user
143+
nodes_dn.yml: |
144+
---
145+
_meta:
146+
type: nodesdn
147+
config_version: 2
148+
roles.yml: |
149+
---
150+
_meta:
151+
type: roles
152+
config_version: 2
153+
roles_mapping.yml: |
154+
---
155+
_meta:
156+
type: rolesmapping
157+
config_version: 2
158+
159+
all_access:
160+
reserved: false
161+
backend_roles:
162+
- admin
163+
164+
kibana_server:
165+
reserved: true
166+
users:
167+
- kibanaserver
168+
tenants.yml: |
169+
---
170+
_meta:
171+
type: tenants
172+
config_version: 2
173+
---
174+
apiVersion: v1
175+
kind: Secret
176+
metadata:
177+
name: opensearch-user
178+
stringData:
179+
username: admin
180+
password: {{ openSearchAdminPassword }}
181+
---
182+
apiVersion: v1
183+
kind: Secret
184+
metadata:
185+
name: opensearch-dashboard-user
186+
stringData:
187+
username: kibanaserver
188+
password: {{ openSearchDashboardPassword }}
189+
cookie: {{ random_password() }}

stacks/stacks-v2.yaml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,18 +74,19 @@ stacks:
7474
- commons
7575
- listener
7676
- secret
77+
- opensearch
7778
- zookeeper # demo does install a zookeeper to produce logs
7879
labels:
7980
- logging
8081
- opensearch
8182
- opensearch-dashboards
8283
- vector
8384
manifests:
84-
- helmChart: https://raw.githubusercontent.com/stackabletech/demos/main/stacks/_templates/opensearch.yaml
85-
- helmChart: https://raw.githubusercontent.com/stackabletech/demos/main/stacks/_templates/opensearch-dashboards.yaml
85+
- plainYaml: https://raw.githubusercontent.com/stackabletech/demos/main/stacks/_templates/vector-aggregator-discovery.yaml
86+
- plainYaml: https://raw.githubusercontent.com/stackabletech/demos/main/stacks/stacks/logging/opensearch.yaml
87+
- helmChart: https://raw.githubusercontent.com/stackabletech/demos/main/stacks/stacks/_templates/opensearch-dashboards.yaml
8688
- plainYaml: https://raw.githubusercontent.com/stackabletech/demos/main/stacks/logging/setup-opensearch-dashboards.yaml
8789
- helmChart: https://raw.githubusercontent.com/stackabletech/demos/main/stacks/_templates/vector-aggregator.yaml
88-
- plainYaml: https://raw.githubusercontent.com/stackabletech/demos/main/stacks/_templates/vector-aggregator-discovery.yaml
8990
supportedNamespaces: []
9091
resourceRequests:
9192
cpu: 5150m

0 commit comments

Comments
 (0)