apiVersion: v1 kind: ConfigMap metadata: name: {{ printf "%s-scripts" (include "common.names.fullname" .) }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common.labels.standard" . | nindent 4 }} {{- if .Values.commonLabels }} {{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }} {{- end }} {{- if .Values.commonAnnotations }} annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }} {{- end }} data: {{- $fullname := include "common.names.fullname" . }} {{- $releaseNamespace := .Release.Namespace }} {{- $clusterDomain := .Values.clusterDomain }} {{- $interBrokerPort := .Values.service.ports.internal }} {{- $clientPort := .Values.service.ports.client }} {{- $jksTruststoreSecret := .Values.auth.tls.jksTruststoreSecret -}} {{- $jksTruststore := .Values.auth.tls.jksTruststore -}} {{- $jksKeystoreSAN := .Values.auth.tls.jksKeystoreSAN -}} {{- if .Values.externalAccess.autoDiscovery.enabled }} auto-discovery.sh: |- #!/bin/bash SVC_NAME="${MY_POD_NAME}-external" {{- if eq .Values.externalAccess.service.type "LoadBalancer" }} # Auxiliary functions retry_while() { local -r cmd="${1:?cmd is missing}" local -r retries="${2:-12}" local -r sleep_time="${3:-5}" local return_value=1 read -r -a command <<< "$cmd" for ((i = 1 ; i <= retries ; i+=1 )); do "${command[@]}" && return_value=0 && break sleep "$sleep_time" done return $return_value } k8s_svc_lb_ip() { local namespace=${1:?namespace is missing} local service=${2:?service is missing} local service_ip=$(kubectl get svc "$service" -n "$namespace" -o jsonpath="{.status.loadBalancer.ingress[0].ip}") local service_hostname=$(kubectl get svc "$service" -n "$namespace" -o jsonpath="{.status.loadBalancer.ingress[0].hostname}") if [[ -n ${service_ip} ]]; then echo "${service_ip}" else echo "${service_hostname}" fi } k8s_svc_lb_ip_ready() { local namespace=${1:?namespace is missing} local service=${2:?service is missing} [[ -n "$(k8s_svc_lb_ip "$namespace" "$service")" ]] } # Wait until LoadBalancer IP is ready retry_while "k8s_svc_lb_ip_ready {{ $releaseNamespace }} $SVC_NAME" || exit 1 # Obtain LoadBalancer external IP k8s_svc_lb_ip "{{ $releaseNamespace }}" "$SVC_NAME" | tee "$SHARED_FILE" {{- else if eq .Values.externalAccess.service.type "NodePort" }} k8s_svc_node_port() { local namespace=${1:?namespace is missing} local service=${2:?service is missing} local index=${3:-0} local node_port="$(kubectl get svc "$service" -n "$namespace" -o jsonpath="{.spec.ports[$index].nodePort}")" echo "$node_port" } k8s_svc_node_port "{{ $releaseNamespace }}" "$SVC_NAME" | tee "$SHARED_FILE" {{- end }} {{- end }} setup.sh: |- #!/bin/bash ID="${MY_POD_NAME#"{{ $fullname }}-"}" # If process.roles is not set at all, it is assumed to be in ZooKeeper mode. # https://kafka.apache.org/documentation/#kraft_role if [[ -f "{{ .Values.logsDirs | splitList "," | first }}/meta.properties" ]]; then if [[ $KAFKA_CFG_PROCESS_ROLES == "" ]]; then export KAFKA_CFG_BROKER_ID="$(grep "broker.id" "{{ .Values.logsDirs | splitList "," | first }}/meta.properties" | awk -F '=' '{print $2}')" else export KAFKA_CFG_BROKER_ID="$(grep "node.id" "{{ .Values.logsDirs | splitList "," | first }}/meta.properties" | awk -F '=' '{print $2}')" fi else export KAFKA_CFG_BROKER_ID="$((ID + {{ .Values.minBrokerId }}))" fi if [[ $KAFKA_CFG_PROCESS_ROLES == *"controller"* ]]; then node_id={{ .Values.minBrokerId }} pod_id=0 while : do VOTERS="${VOTERS}$node_id@{{ include "common.names.fullname" . }}-$pod_id.{{ include "common.names.fullname" . }}-headless.{{ $releaseNamespace }}.svc.{{ $clusterDomain }}:{{ .Values.containerPorts.controller }}" node_id=$(( $node_id + 1 )) pod_id=$(( $pod_id + 1 )) if [[ $pod_id -ge {{ .Values.replicaCount }} ]]; then break else VOTERS="$VOTERS," fi done export KAFKA_CFG_CONTROLLER_QUORUM_VOTERS=$VOTERS fi {{- if eq .Values.brokerRackAssignment "aws-az" }} export KAFKA_CFG_BROKER_RACK=$(curl "http://169.254.169.254/latest/meta-data/placement/availability-zone-id") {{- end }} {{- if .Values.externalAccess.enabled }} # Configure external ip and port {{- if eq .Values.externalAccess.service.type "LoadBalancer" }} {{- if .Values.externalAccess.autoDiscovery.enabled }} export EXTERNAL_ACCESS_HOST="$(<${SHARED_FILE})" {{- else }} export EXTERNAL_ACCESS_HOST=$(echo '{{ .Values.externalAccess.service.loadBalancerNames | default .Values.externalAccess.service.loadBalancerIPs }}' | tr -d '[]' | cut -d ' ' -f "$(($ID + 1))") {{- end }} export EXTERNAL_ACCESS_PORT={{ .Values.externalAccess.service.ports.external }} {{- else if eq .Values.externalAccess.service.type "NodePort" }} {{- if and .Values.externalAccess.service.usePodIPs .Values.externalAccess.autoDiscovery.enabled }} export EXTERNAL_ACCESS_HOST="${MY_POD_IP}" {{- else if or .Values.externalAccess.service.useHostIPs .Values.externalAccess.autoDiscovery.enabled }} export EXTERNAL_ACCESS_HOST="${HOST_IP}" {{- else if .Values.externalAccess.service.domain }} export EXTERNAL_ACCESS_HOST={{ .Values.externalAccess.service.domain }} {{- else }} export EXTERNAL_ACCESS_HOST=$(curl -s https://ipinfo.io/ip) {{- end }} {{- if .Values.externalAccess.autoDiscovery.enabled }} export EXTERNAL_ACCESS_PORT="$(<${SHARED_FILE})" {{- else }} export EXTERNAL_ACCESS_PORT=$(echo '{{ .Values.externalAccess.service.nodePorts }}' | tr -d '[]' | cut -d ' ' -f "$(($ID + 1))") {{- end }} {{- else }} export EXTERNAL_ACCESS_HOST={{ .Values.externalAccess.service.domain }} export EXTERNAL_ACCESS_PORT="$((ID + {{ .Values.externalAccess.service.ports.external }}))" {{- end }} # Configure Kafka advertised listeners {{- if .Values.advertisedListeners }} export KAFKA_CFG_ADVERTISED_LISTENERS={{ join "," .Values.advertisedListeners }} {{- else }} export KAFKA_CFG_ADVERTISED_LISTENERS="INTERNAL://${MY_POD_NAME}.{{ $fullname }}-headless.{{ $releaseNamespace }}.svc.{{ $clusterDomain }}:{{ $interBrokerPort }},CLIENT://${MY_POD_NAME}.{{ $fullname }}-headless.{{ $releaseNamespace }}.svc.{{ $clusterDomain }}:{{ $clientPort }},EXTERNAL://${EXTERNAL_ACCESS_HOST}:${EXTERNAL_ACCESS_PORT}" {{- end }} {{- end }} {{- if (include "kafka.tlsEncryption" .) }} mkdir -p /opt/bitnami/kafka/config/certs {{- if eq .Values.auth.tls.type "jks" }} {{- if not (empty .Values.auth.tls.existingSecrets) }} JKS_TRUSTSTORE={{ printf "/%s/%s" (ternary "certs-${ID}" "truststore" (empty $jksTruststoreSecret)) (default "kafka.truststore.jks" $jksTruststore) | quote }} JKS_KEYSTORE={{ printf "/certs-${ID}/%s" (default "kafka.keystore.jks" $jksKeystoreSAN) | quote }} {{- else }} JKS_TRUSTSTORE={{ printf "/%s/%s" (ternary "certs" "truststore" (empty $jksTruststoreSecret)) (default "kafka.truststore.jks" $jksTruststore) | quote }} JKS_KEYSTORE={{ printf "/certs/%s" (default "kafka-${ID}.keystore.jks" $jksKeystoreSAN) | quote }} {{- end }} if [[ -f "$JKS_TRUSTSTORE" ]] && [[ -f "$JKS_KEYSTORE" ]]; then cp "$JKS_TRUSTSTORE" "/opt/bitnami/kafka/config/certs/kafka.truststore.jks" cp "$JKS_KEYSTORE" "/opt/bitnami/kafka/config/certs/kafka.keystore.jks" else echo "Couldn't find the expected Java Key Stores (JKS) files! They are mandatory when encryption via TLS is enabled." exit 1 fi export KAFKA_TLS_TRUSTSTORE_FILE="/opt/bitnami/kafka/config/certs/kafka.truststore.jks" {{- else if eq .Values.auth.tls.type "pem" }} {{- if or (not (empty .Values.auth.tls.existingSecrets)) .Values.auth.tls.autoGenerated }} PEM_CA="/certs-${ID}/ca.crt" PEM_CERT="/certs-${ID}/tls.crt" PEM_KEY="/certs-${ID}/tls.key" {{- else }} PEM_CA="/certs/kafka.truststore.pem" PEM_CERT="/certs/kafka-${ID}.keystore.pem" PEM_KEY="/certs/kafka-${ID}.keystore.key" {{- end }} if [[ -f "$PEM_CERT" ]] && [[ -f "$PEM_KEY" ]]; then CERT_DIR="/opt/bitnami/kafka/config/certs" PEM_CA_LOCATION="${CERT_DIR}/kafka.truststore.pem" PEM_CERT_LOCATION="${CERT_DIR}/kafka.keystore.pem" {{- if .Values.auth.tls.pemChainIncluded }} cat $PEM_CERT | csplit - -s -z '/\-*END CERTIFICATE\-*/+1' '{*}' -f ${CERT_DIR}/xx FIND_CA_RESULT=$(find ${CERT_DIR} -not -name 'xx00' -name 'xx*') if [[ $(echo $FIND_CA_RESULT | wc -l) < 1 ]]; then echo "auth.tls.pemChainIncluded was set, but PEM chain only contained 1 cert" exit 1 fi echo $FIND_CA_RESULT | sort | xargs cat >> "$PEM_CA_LOCATION" cat ${CERT_DIR}/xx00 > "$PEM_CERT_LOCATION" {{- else }} if [[ -f "$PEM_CA" ]]; then cp "$PEM_CA" "$PEM_CA_LOCATION" cp "$PEM_CERT" "$PEM_CERT_LOCATION" else echo "PEM_CA not provided, and auth.tls.pemChainIncluded was not true. One of these values must be set when using PEM type for TLS." exit 1 fi {{- end }} # Ensure the key used PEM format with PKCS#8 openssl pkcs8 -topk8 -nocrypt -in "$PEM_KEY" > "/opt/bitnami/kafka/config/certs/kafka.keystore.key" else echo "Couldn't find the expected PEM files! They are mandatory when encryption via TLS is enabled." exit 1 fi export KAFKA_TLS_TRUSTSTORE_FILE="/opt/bitnami/kafka/config/certs/kafka.truststore.pem" {{- end }} {{- end }} # Configure zookeeper client {{- if and (not (empty .Values.auth.zookeeper.tls.existingSecret)) .Values.auth.zookeeper.tls.enabled }} JKS_TRUSTSTORE={{ printf "/kafka-zookeeper-cert/%s" (.Values.auth.zookeeper.tls.existingSecretTruststoreKey) | quote }} JKS_KEYSTORE={{ printf "/kafka-zookeeper-cert/%s" (.Values.auth.zookeeper.tls.existingSecretKeystoreKey) | quote }} if [[ -f "$JKS_TRUSTSTORE" ]] && [[ -f "$JKS_KEYSTORE" ]]; then CERT_DIR="/opt/bitnami/kafka/config/certs" TRUSTSTORE_LOCATION="${CERT_DIR}/zookeeper.truststore.jks" cp "$JKS_TRUSTSTORE" "$TRUSTSTORE_LOCATION" cp "$JKS_KEYSTORE" "${CERT_DIR}/zookeeper.keystore.jks" export KAFKA_ZOOKEEPER_TLS_TRUSTSTORE_FILE="${TRUSTSTORE_LOCATION}" fi {{- end }} exec /entrypoint.sh /run.sh