You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ROOT/pages/kubernetes/openshift.adoc
+13-5Lines changed: 13 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -5,8 +5,12 @@ SDP operators are certified for the OpenShift platform and can be installed from
5
5
IMPORTANT: OpenShift installations with FIPS mode enabled are not supported. This is because neither the SDP operators, nor the supported Apache products are FIPS-compliant.
6
6
7
7
== Customizing operator installations
8
-
Depending on the cluster size, you may need to customize the resources requested by the SDP operator Pods.
9
-
This is possible when installing the operators from the command line.
8
+
9
+
As described in the https://github.com/operator-framework/operator-lifecycle-manager/blob/master/doc/design/subscription-config.md[Openshift Subscription documentation] you can configure the deployed operators.
10
+
11
+
E.g. depending on the cluster size, you may need to customize the resources requested by the SDP operator containers.
12
+
This is possible when installing the operators via a Subscription CustomResource.
13
+
10
14
For example, to assign `256Mi` of memory to the Apache Kafka operator, you need to create a custom Subscription as follows:
11
15
12
16
[source,yaml]
@@ -23,12 +27,14 @@ spec:
23
27
name: stackable-kafka-operator
24
28
source: certified-operators
25
29
sourceNamespace: openshift-marketplace
26
-
startingCSV: kafka-operator.v23.11.0
30
+
startingCSV: kafka-operator.v24.7.0
27
31
config:
28
32
resources:
29
-
limits:
30
-
memory: 256Mi
31
33
requests:
34
+
cpu: 100m
35
+
memory: 256Mi
36
+
limits:
37
+
cpu: 100m
32
38
memory: 256Mi
33
39
----
34
40
@@ -44,6 +50,8 @@ spec:
44
50
value: kafka-namespace
45
51
----
46
52
53
+
IMPORTANT: The described configuration mechanism currently does not work for secret and listener-operator due to restrictions on deploying DaemonSets.
54
+
47
55
== Security context constraints
48
56
49
57
Starting with the release version `24.7.0`, all products run with the `nonroot-v2` security context constraints (SCC) on OpenShift. This security context is used by the product's cluster role.
0 commit comments