You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please refer to the [values.yaml](https://github.com/aiven/aiven-charts/blob/main/charts/aiven-operator/values.yaml) of the chart.
75
75
76
-
#### Installing without full cluster administrator access
76
+
#### Install without full cluster administrator access
77
77
78
78
If the person installing the Helm chart does not have the necessary permissions to create cluster-wide resources such as `ClusterRole` and `ClusterRoleBinding`, a cluster administrator can manually install these roles. This ensures that the operator can function properly.
Aiven resources need to have an accompanying secret that contains the token that is used to authorize the manipulation of that resource.
19
19
If that token expired then you will not be able to delete the custom resource and deletion will also hang until the situation is resolved.
20
20
The recommended approach to deal with that situation is to patch a valid token into the secret again so that proper cleanup of aiven resources can take place.
21
21
22
22
## Hanging deletions
23
23
24
-
To protect the secrets that the operator is using from deletion, it adds the [finalizer](https://kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/)`finalizers.aiven.io/needed-to-delete-services` to the secret.
25
-
This solves a race condition that happens when deleting a namespace, where there is a possibility of the secret getting deleted before the resource that uses it.
26
-
When the controller is deleted it may not cleanup the finalizers from all secrets.
27
-
If there is a secret with this finalizer blocking deletion of a namespace, for now please do
24
+
To protect the Secrets that the operator is using from deletion, it adds the [finalizer](https://kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/)`finalizers.aiven.io/needed-to-delete-services` to the Secret.
25
+
This solves a race condition that happens when deleting a namespace, where there is a possibility of the Secret getting deleted before the resource that uses it.
26
+
When the controller is deleted it may not cleanup the finalizers from all Secrets.
27
+
If there is a Secret with this finalizer blocking deletion of a namespace, you can remove the finalizer by running:
Copy file name to clipboardexpand all lines: docs/docs/resources/cassandra.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ Aiven for Apache Cassandra® is a distributed database designed to handle large
9
9
!!! note
10
10
Before going through this guide, make sure you have a [Kubernetes cluster](../installation/prerequisites.md) with the operator installed (see instructions for [helm](../installation/helm.md) or [kubectl](../installation/kubectl.md)), and a [Kubernetes Secret with an Aiven authentication token](../authentication.md).
11
11
12
-
## Creating a Cassandra instance
12
+
## Create a Cassandra instance
13
13
14
14
1\. Create a file named `cassandra-sample.yaml`, and add the following content:
15
15
@@ -29,7 +29,7 @@ spec:
29
29
name: cassandra-secret
30
30
31
31
# add your Project name here
32
-
project: <your-project-name>
32
+
project: PROJECT_NAME
33
33
34
34
# cloud provider and plan of your choice
35
35
# you can check all of the possibilities here https://aiven.io/pricing
@@ -81,7 +81,7 @@ Status:
81
81
82
82
The resource can be in the `REBUILDING` state for a few minutes. Once the state changes to `RUNNING`, you can access the resource.
83
83
84
-
## Using the connection Secret
84
+
## Use the connection Secret
85
85
86
86
For your convenience, the operator automatically stores the Cassandra connection information in a Secret created with the
87
87
name specified on the `connInfoSecretTarget` field.
@@ -131,7 +131,7 @@ The output is similar to the following:
131
131
}
132
132
```
133
133
134
-
## Creating a Cassandra user
134
+
## Create a Cassandra user
135
135
136
136
You can create service users for your instance of Aiven for Apache Cassandra. Service users are unique to this instance and are not shared with any other services.
After a couple of minutes, the `STATE` field is changed to `RUNNING`, and is ready to be used.
72
72
73
-
## Using the connection Secret
73
+
## Use the connection Secret
74
74
75
75
For your convenience, the operator automatically stores the Kafka connection information in a Secret created with the
76
76
name specified on the `connInfoSecretTarget` field.
@@ -119,7 +119,7 @@ The output is similar to the following:
119
119
}
120
120
```
121
121
122
-
## Testing the connection
122
+
## Test the connection
123
123
124
124
You can verify your access to the Kafka cluster from a Pod using the authentication data from the `kafka-auth` Secret. [kcat](https://github.com/edenhill/kcat) is used for our examples below.
125
125
@@ -197,7 +197,7 @@ Metadata for all topics (from broker -1: ssl://kafka-sample-your-project.aivencl
197
197
0 topics:
198
198
```
199
199
200
-
## Creating a `KafkaTopic` and `KafkaACL`
200
+
## Create a `KafkaTopic` and `KafkaACL`
201
201
202
202
To properly produce and consume content on Kafka, you need topics and ACLs. The operator supports both with
203
203
the `KafkaTopic` and `KafkaACL` resources.
@@ -216,7 +216,7 @@ spec:
216
216
name: aiven-token
217
217
key: token
218
218
219
-
project: <your-project-name>
219
+
project: PROJECT_NAME
220
220
serviceName: kafka-sample
221
221
222
222
# here we can specify how many partitions the topic should have
@@ -258,7 +258,7 @@ spec:
258
258
name: kafka-crab-connection
259
259
260
260
# the Aiven project the user is related to
261
-
project: <your-project-name>
261
+
project: PROJECT_NAME
262
262
263
263
# the name of our Kafka Service
264
264
serviceName: kafka-sample
@@ -273,7 +273,7 @@ spec:
273
273
name: aiven-token
274
274
key: token
275
275
276
-
project: <your-project-name>
276
+
project: PROJECT_NAME
277
277
serviceName: kafka-sample
278
278
279
279
# the username from the ServiceUser above
@@ -292,7 +292,7 @@ To create the `crab` user and its permissions, execute the following command:
292
292
kubectl apply -f kafka-acl-user-crab.yaml
293
293
```
294
294
295
-
## Producing and consuming events
295
+
## Produce and consume events
296
296
297
297
Using the previously created `KafkaTopic`, `ServiceUser`, `KafkaACL`, you can produce and consume events.
Now you can follow the instructions to [use a schema registry in Java](https://aiven.io/docs/products/kafka/howto/schema-registry) on how to use the schema created.
0 commit comments