This example deploys Aerospike Pulsar Outbound connectors and an Aerospike cluster without TLS configured.
- Kubernetes cluster
- Helm v3
- A Pulsar cluster with brokers reachable from the pods in the Kubernetes cluster
- An Aerospike cluster that can connect to Pods in the Kubernetes cluster The Aerospike cluster can be deployed in the same Kubernetes cluster using Aerospike Kubernetes Operator
- Aerospike Pulsar Connector Helm chart
- A clone of this git repository
All subsequent commands are run from this directory.
Create a Kubernetes namespace if not already done
kubectl create namespace aerospike
Update the as-pulsar-outbound-values.yaml file to change connector configuration to use your Pulsar cluster's service url.
Deploy the connectors using configuration from as-pulsar-outbound-values.yaml
helm install --namespace aerospike as-pulsar-outbound -f as-pulsar-outbound-values.yaml aerospike/aerospike-pulsar-outbound
If you do not have a preexisting Aerospike server, install Aerospike Kubernetes Operator. The steps below will deploy an Aerospike cluster using Aerospike Kubernetes Operator and this sample custom resource.
Create the secret for aerospike using your Aerospike licence file
kubectl -n aerospike create secret generic aerospike-secret --from-file=<path to features.conf>
kubectl -n aerospike create -f aerospike.yaml
You can write data to Aerospike using aql, asbench tools or using your own code. The record updates should show up in your pulsar topics.
kubectl -n aerospike delete -f aerospike.yaml
helm -n aerospike uninstall as-pulsar-outbound
kubectl -n aerospike delete secrets aerospike-secret