Skip to main content

KubraGen Builder: EFK

Project description

KubraGen Builder: EFK (Elasticsearch, Fluentd, Kibana)

PyPI version Supported Python versions

kg_efk is a builder for KubraGen that deploys a EFK stack in Kubernetes. (Elasticsearch, Fluentd, Kibana)

KubraGen is a Kubernetes YAML generator library that makes it possible to generate configurations using the full power of the Python programming language.

Example

from kubragen import KubraGen
from kubragen.consts import PROVIDER_GOOGLE, PROVIDERSVC_GOOGLE_GKE
from kubragen.object import Object
from kubragen.option import OptionRoot
from kubragen.options import Options
from kubragen.output import OutputProject, OD_FileTemplate, OutputFile_ShellScript, OutputFile_Kubernetes, \
    OutputDriver_Print
from kubragen.provider import Provider

from kg_efk import EFKBuilder, EFKOptions

kg = KubraGen(provider=Provider(PROVIDER_GOOGLE, PROVIDERSVC_GOOGLE_GKE), options=Options({
    'namespaces': {
        'mon': 'app-monitoring',
    },
}))

out = OutputProject(kg)

shell_script = OutputFile_ShellScript('create_gke.sh')
out.append(shell_script)

shell_script.append('set -e')

#
# OUTPUTFILE: app-namespace.yaml
#
file = OutputFile_Kubernetes('app-namespace.yaml')

file.append([
    Object({
        'apiVersion': 'v1',
        'kind': 'Namespace',
        'metadata': {
            'name': 'app-monitoring',
        },
    }, name='ns-monitoring', source='app', instance='app')
])

out.append(file)
shell_script.append(OD_FileTemplate(f'kubectl apply -f ${{FILE_{file.fileid}}}'))

shell_script.append(f'kubectl config set-context --current --namespace=app-monitoring')

#
# SETUP: efk
#
efk_config = EFKBuilder(kubragen=kg, options=EFKOptions({
    'namespace': OptionRoot('namespaces.mon'),
    'basename': 'myefk',
    'kubernetes': {
        'volumes': {
            'elasticsearch-data': {
                'persistentVolumeClaim': {
                    'claimName': 'efk-storage-claim'
                }
            }
        },
    }
}))

efk_config.ensure_build_names(efk_config.BUILD_ACCESSCONTROL, efk_config.BUILD_SERVICE)

#
# OUTPUTFILE: efk-config.yaml
#
file = OutputFile_Kubernetes('efk-config.yaml')
out.append(file)

file.append(efk_config.build(efk_config.BUILD_ACCESSCONTROL))

shell_script.append(OD_FileTemplate(f'kubectl apply -f ${{FILE_{file.fileid}}}'))

#
# OUTPUTFILE: efk.yaml
#
file = OutputFile_Kubernetes('efk.yaml')
out.append(file)

file.append(efk_config.build(efk_config.BUILD_SERVICE))

shell_script.append(OD_FileTemplate(f'kubectl apply -f ${{FILE_{file.fileid}}}'))

#
# Write files
#
out.output(OutputDriver_Print())
# out.output(OutputDriver_Directory('/tmp/build-gke'))

Output:

****** BEGIN FILE: 001-app-namespace.yaml ********
apiVersion: v1
kind: Namespace
metadata:
  name: app-monitoring

****** END FILE: 001-app-namespace.yaml ********
****** BEGIN FILE: 002-efk-config.yaml ********
apiVersion: v1
kind: ServiceAccount
metadata:
  name: myefk
  namespace: app-monitoring
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: myefk-fluentd
rules:
- apiGroups: ['']
  resources: [pods, namespaces]
  verbs: [get, list, watch]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: myefk-fluentd
roleRef:
  kind: ClusterRole
  name: myefk-fluentd
  apiGroup: rbac.authorization.k8s.io
subjects:
- kind: ServiceAccount
  name: myefk
  namespace: app-monitoring

****** END FILE: 002-efk-config.yaml ********
****** BEGIN FILE: 003-efk.yaml ********
kind: Service
apiVersion: v1
metadata:
  name: myefkelasticsearch-service
  namespace: app-monitoring
  labels:
    app: myefkelasticsearch-pod-label-app
spec:
  selector:
    app: myefkelasticsearch-pod-label-app
  clusterIP: None
  ports:
  - port: 9200
    name: rest
  - port: 9300
    name: inter-node
---
apiVersion: apps/v1
kind: StatefulSet
metadata:
  name: myefk-elasticsearch
  namespace: app-monitoring
spec:
  serviceName: myefk-elasticsearch
  replicas: 3
  selector:
    matchLabels:
      app: myefk-elasticsearch
  template:
    metadata:
      labels:
        app: myefk-elasticsearch
    spec:
      containers:
      - name: elasticsearch
        image: docker.elastic.co/elasticsearch/elasticsearch:7.2.0
<...more...>
****** END FILE: 003-efk.yaml ********
****** BEGIN FILE: create_gke.sh ********
#!/bin/bash

set -e
kubectl apply -f 001-app-namespace.yaml
kubectl config set-context --current --namespace=app-monitoring
kubectl apply -f 002-efk-config.yaml
kubectl apply -f 003-efk.yaml

****** END FILE: create_gke.sh ********

Credits

based on

How To Set Up an Elasticsearch, Fluentd and Kibana (EFK) Logging Stack on Kubernetes

Author

Rangel Reale (rangelreale@gmail.com)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

kg_efk-0.8.2.tar.gz (10.6 kB view details)

Uploaded Source

Built Distribution

kg_efk-0.8.2-py3-none-any.whl (10.2 kB view details)

Uploaded Python 3

File details

Details for the file kg_efk-0.8.2.tar.gz.

File metadata

  • Download URL: kg_efk-0.8.2.tar.gz
  • Upload date:
  • Size: 10.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.6.1 requests/2.24.0 setuptools/50.3.2 requests-toolbelt/0.9.1 tqdm/4.51.0 CPython/3.8.3

File hashes

Hashes for kg_efk-0.8.2.tar.gz
Algorithm Hash digest
SHA256 deb439838c7f605419e6549dc565bf1e7db9aff9505c0b8b0ebb2e98426aa749
MD5 86c6eadd851fe26e0f5a4e863b166775
BLAKE2b-256 73f74d6eb53138b58b410bb93c5475b732c7fe4974ac414513b49a385aaeab15

See more details on using hashes here.

File details

Details for the file kg_efk-0.8.2-py3-none-any.whl.

File metadata

  • Download URL: kg_efk-0.8.2-py3-none-any.whl
  • Upload date:
  • Size: 10.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.6.1 requests/2.24.0 setuptools/50.3.2 requests-toolbelt/0.9.1 tqdm/4.51.0 CPython/3.8.3

File hashes

Hashes for kg_efk-0.8.2-py3-none-any.whl
Algorithm Hash digest
SHA256 3b3ed0083ca82fa31e41f4c273098e6fe548f9d4d46f3882fb545b697d1cfbd7
MD5 e97e2798a1904fabe23525f81e9ccb59
BLAKE2b-256 10013c841a5cda413e6c9ba9f36deacc5a52e41a745fcb5eaa52e1a44cf203f5

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page