This example deploys Aerospike Kafka Outbound connectors and an Aerospike cluster without TLS configured.
- Kubernetes cluster
- Helm v3
- A Kafka cluster with brokers reachable from the pods in the Kubernetes cluster
- An Aerospike cluster that can connect to Pods in the Kubernetes cluster The Aerospike cluster can be deployed in the same Kubernetes cluster using Aerospike Kubernetes Operator
- Aerospike Kafka Connector Helm chart installed
- A clone of this git repository
All subsequent commands are run from this directory.
Create a Kubernetes namespace if not already done
kubectl create namespace aerospike
Update the as-kafka-outbound-values.yaml file to change connector configuration to use your Kafka cluster's server endpoints as bootstrap servers.
Deploy the connectors using configuration from as-kafka-outbound-values.yaml
helm install --namespace aerospike as-kafka-outbound -f as-kafka-outbound-values.yaml aerospike/aerospike-kafka-outbound
If you do not have a preexisting Aerospike server, install Aerospike Kubernetes Operator. The steps below will deploy an Aerospike cluster using Aerospike Kubernetes Operator and this sample custom resource.
Create the secret for aerospike using your Aerospike licence file
kubectl -n aerospike create secret generic aerospike-secret --from-file=<path to features.conf>
kubectl -n aerospike create -f aerospike.yaml
You can write data to Aerospike using aql, asbench tools or using your own code. The record updates should show up in your kafka topics.
kubectl -n aerospike delete -f aerospike.yaml
helm -n aerospike uninstall as-kafka-outbound
kubectl -n aerospike delete secrets aerospike-secret