-
Notifications
You must be signed in to change notification settings - Fork 735
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Outside (i.e. cluster-external) access through per-broker Service #78
Conversation
Listener ports from https://hub.docker.com/r/wurstmeister/kafka/ Config based on KIP-103
… zoo This reverts commit dcdac0f.
2588e15
to
73e0e5b
Compare
@comdw in response to #13 (comment), feel free to test with this PR. It works on minikube, and quite possibly also on GKE with outside meaning TCP access to the nodes' internal IPs. In particular I'm interested in how to adapt the init commands to different environments. |
@solsson - tested this and it works fine for me. |
@solsson works for me. Thanks! |
documented in https://cwiki.apache.org/confluence/display/KAFKA/KIP-103%3A+Separation+of+Internal+and+External+traffic#KIP-103:SeparationofInternalandExternaltraffic-Compatibility,Deprecation,andMigrationPlan "ZooKeeper-based consumers will use the first listener with PLAINTEXT as the security protocol, so listener ordering is important in such cases." Confirmed this using kafka-manager (#83)
@solsson works great on bare metal deployment as well |
I'm also using this now. Thanks for the great discussion in #13. |
I wrote this to test the outside services:
|
^ Nice example of how to use the new labels. |
Based on the above I found a horrible :) one-liner relying on bootstrapping, to test #120: |
That is either terrible, or wonderful. I guess both. 😄 |
Just an idea that I have managed to use to get the "outside" service to "connect" to the "Pod'
On previous versions of K8S I also used @solsson |
@mtbbiker Can you please create an issue for the errors with k8s 1.11.1, with the output from |
@solsson As requested for the
I am busy with a new deployment and log a seperate Issue |
@solsson I found a issue in the |
This is my interpretation of a baseline for different type of clusters, from #13.
The new pod label is low-risk, as are the services. The new directives in
server.properties
need more testing. Might de-stabilize regular inside access.I've tested this only on minikube so far:
Outside+minikube is interesting as a local development setup for Kafka services. Production clusters on the other hand will probably always need tailored
advertised.listeners
(maybe through the host lookup command in init config) andlistener.security.protocol.map
.