Skip to content

Commit f99fcb4

Browse files
authored
Merge branch 'main' into feat/redesign
2 parents 6743d0e + a1e539c commit f99fcb4

File tree

1 file changed

+13
-5
lines changed

1 file changed

+13
-5
lines changed

modules/ROOT/pages/kubernetes/openshift.adoc

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,12 @@ SDP operators are certified for the OpenShift platform and can be installed from
55
IMPORTANT: OpenShift installations with FIPS mode enabled are not supported. This is because neither the SDP operators, nor the supported Apache products are FIPS-compliant.
66

77
== Customizing operator installations
8-
Depending on the cluster size, you may need to customize the resources requested by the SDP operator Pods.
9-
This is possible when installing the operators from the command line.
8+
9+
As described in the https://github.com/operator-framework/operator-lifecycle-manager/blob/master/doc/design/subscription-config.md[Openshift Subscription documentation] you can configure the deployed operators.
10+
11+
E.g. depending on the cluster size, you may need to customize the resources requested by the SDP operator containers.
12+
This is possible when installing the operators via a Subscription CustomResource.
13+
1014
For example, to assign `256Mi` of memory to the Apache Kafka operator, you need to create a custom Subscription as follows:
1115

1216
[source,yaml]
@@ -23,12 +27,14 @@ spec:
2327
name: stackable-kafka-operator
2428
source: certified-operators
2529
sourceNamespace: openshift-marketplace
26-
startingCSV: kafka-operator.v23.11.0
30+
startingCSV: kafka-operator.v24.7.0
2731
config:
2832
resources:
29-
limits:
30-
memory: 256Mi
3133
requests:
34+
cpu: 100m
35+
memory: 256Mi
36+
limits:
37+
cpu: 100m
3238
memory: 256Mi
3339
----
3440

@@ -44,6 +50,8 @@ spec:
4450
value: kafka-namespace
4551
----
4652

53+
IMPORTANT: The described configuration mechanism currently does not work for secret and listener-operator due to restrictions on deploying DaemonSets.
54+
4755
== Security context constraints
4856

4957
Starting with the release version `24.7.0`, all products run with the `nonroot-v2` security context constraints (SCC) on OpenShift. This security context is used by the product's cluster role.

0 commit comments

Comments
 (0)