Skip to main content

KubraGen Builder: EFK

Project description

KubraGen Builder: EFK (Elasticsearch, Fluentd, Kibana)

PyPI version Supported Python versions

kg_efk is a builder for KubraGen that deploys a EFK stack in Kubernetes. (Elasticsearch, Fluentd, Kibana)

KubraGen is a Kubernetes YAML generator library that makes it possible to generate configurations using the full power of the Python programming language.

Example

from kubragen import KubraGen
from kubragen.consts import PROVIDER_GOOGLE, PROVIDERSVC_GOOGLE_GKE
from kubragen.object import Object
from kubragen.option import OptionRoot
from kubragen.options import Options
from kubragen.output import OutputProject, OD_FileTemplate, OutputFile_ShellScript, OutputFile_Kubernetes, \
    OutputDriver_Print
from kubragen.provider import Provider

from kg_efk import EFKBuilder, EFKOptions

kg = KubraGen(provider=Provider(PROVIDER_GOOGLE, PROVIDERSVC_GOOGLE_GKE), options=Options({
    'namespaces': {
        'mon': 'app-monitoring',
    },
}))

out = OutputProject(kg)

shell_script = OutputFile_ShellScript('create_gke.sh')
out.append(shell_script)

shell_script.append('set -e')

#
# OUTPUTFILE: app-namespace.yaml
#
file = OutputFile_Kubernetes('app-namespace.yaml')

file.append([
    Object({
        'apiVersion': 'v1',
        'kind': 'Namespace',
        'metadata': {
            'name': 'app-monitoring',
        },
    }, name='ns-monitoring', source='app', instance='app')
])

out.append(file)
shell_script.append(OD_FileTemplate(f'kubectl apply -f ${{FILE_{file.fileid}}}'))

shell_script.append(f'kubectl config set-context --current --namespace=app-monitoring')

#
# SETUP: efk
#
efk_config = EFKBuilder(kubragen=kg, options=EFKOptions({
    'namespace': OptionRoot('namespaces.mon'),
    'basename': 'myefk',
    'kubernetes': {
        'volumes': {
            'elasticsearch-data': {
                'persistentVolumeClaim': {
                    'claimName': 'efk-storage-claim'
                }
            }
        },
    }
}))

efk_config.ensure_build_names(efk_config.BUILD_ACCESSCONTROL, efk_config.BUILD_SERVICE)

#
# OUTPUTFILE: efk-config.yaml
#
file = OutputFile_Kubernetes('efk-config.yaml')
out.append(file)

file.append(efk_config.build(efk_config.BUILD_ACCESSCONTROL))

shell_script.append(OD_FileTemplate(f'kubectl apply -f ${{FILE_{file.fileid}}}'))

#
# OUTPUTFILE: efk.yaml
#
file = OutputFile_Kubernetes('efk.yaml')
out.append(file)

file.append(efk_config.build(efk_config.BUILD_SERVICE))

shell_script.append(OD_FileTemplate(f'kubectl apply -f ${{FILE_{file.fileid}}}'))

#
# Write files
#
out.output(OutputDriver_Print())
# out.output(OutputDriver_Directory('/tmp/build-gke'))

Output:

****** BEGIN FILE: 001-app-namespace.yaml ********
apiVersion: v1
kind: Namespace
metadata:
  name: app-monitoring

****** END FILE: 001-app-namespace.yaml ********
****** BEGIN FILE: 002-efk-config.yaml ********
apiVersion: v1
kind: ServiceAccount
metadata:
  name: myefk
  namespace: app-monitoring
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: myefk-fluentd
rules:
- apiGroups: ['']
  resources: [pods, namespaces]
  verbs: [get, list, watch]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: myefk-fluentd
roleRef:
  kind: ClusterRole
  name: myefk-fluentd
  apiGroup: rbac.authorization.k8s.io
subjects:
- kind: ServiceAccount
  name: myefk
  namespace: app-monitoring

****** END FILE: 002-efk-config.yaml ********
****** BEGIN FILE: 003-efk.yaml ********
kind: Service
apiVersion: v1
metadata:
  name: myefkelasticsearch-service
  namespace: app-monitoring
  labels:
    app: myefkelasticsearch-pod-label-app
spec:
  selector:
    app: myefkelasticsearch-pod-label-app
  clusterIP: None
  ports:
  - port: 9200
    name: rest
  - port: 9300
    name: inter-node
---
apiVersion: apps/v1
kind: StatefulSet
metadata:
  name: myefk-elasticsearch
  namespace: app-monitoring
spec:
  serviceName: myefk-elasticsearch
  replicas: 3
  selector:
    matchLabels:
      app: myefk-elasticsearch
  template:
    metadata:
      labels:
        app: myefk-elasticsearch
    spec:
      containers:
      - name: elasticsearch
        image: docker.elastic.co/elasticsearch/elasticsearch:7.2.0
<...more...>
****** END FILE: 003-efk.yaml ********
****** BEGIN FILE: create_gke.sh ********
#!/bin/bash

set -e
kubectl apply -f 001-app-namespace.yaml
kubectl config set-context --current --namespace=app-monitoring
kubectl apply -f 002-efk-config.yaml
kubectl apply -f 003-efk.yaml

****** END FILE: create_gke.sh ********

Credits

based on

How To Set Up an Elasticsearch, Fluentd and Kibana (EFK) Logging Stack on Kubernetes

Author

Rangel Reale (rangelspam@gmail.com)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

kg_efk-0.7.3.tar.gz (9.8 kB view details)

Uploaded Source

Built Distribution

kg_efk-0.7.3-py3-none-any.whl (9.0 kB view details)

Uploaded Python 3

File details

Details for the file kg_efk-0.7.3.tar.gz.

File metadata

  • Download URL: kg_efk-0.7.3.tar.gz
  • Upload date:
  • Size: 9.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.6.1 requests/2.24.0 setuptools/50.3.2 requests-toolbelt/0.9.1 tqdm/4.51.0 CPython/3.8.3

File hashes

Hashes for kg_efk-0.7.3.tar.gz
Algorithm Hash digest
SHA256 2fbc1a8537dbe26ffcb62b30ac8604d090f29792c1d4d4712c2146a61b525375
MD5 8606da305d26d7291472264ea71bf579
BLAKE2b-256 9033e16abbda19cdeae7b66ed99ce9bca5262f5c71c567da697806d3a67459e8

See more details on using hashes here.

File details

Details for the file kg_efk-0.7.3-py3-none-any.whl.

File metadata

  • Download URL: kg_efk-0.7.3-py3-none-any.whl
  • Upload date:
  • Size: 9.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.6.1 requests/2.24.0 setuptools/50.3.2 requests-toolbelt/0.9.1 tqdm/4.51.0 CPython/3.8.3

File hashes

Hashes for kg_efk-0.7.3-py3-none-any.whl
Algorithm Hash digest
SHA256 12324bf1091d931923e369fff6c9d9ab79a61117df44d8931789cc00417c5a18
MD5 cccdc52603b278b07b9707acc939f84e
BLAKE2b-256 bbc9bcb5a251a6891f0fe273f90f2a04d506c876b17b9be4cb12e3e5989051ba

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page