Skip to main content

KubraGen Builder: EFK

Project description

KubraGen Builder: EFK (Elasticsearch, Fluentd, Kibana)

PyPI version Supported Python versions

kg_efk is a builder for KubraGen that deploys a EFK stack in Kubernetes. (Elasticsearch, Fluentd, Kibana)

KubraGen is a Kubernetes YAML generator library that makes it possible to generate configurations using the full power of the Python programming language.

Example

from kubragen import KubraGen
from kubragen.consts import PROVIDER_GOOGLE, PROVIDERSVC_GOOGLE_GKE
from kubragen.object import Object
from kubragen.option import OptionRoot
from kubragen.options import Options
from kubragen.output import OutputProject, OD_FileTemplate, OutputFile_ShellScript, OutputFile_Kubernetes, \
    OutputDriver_Print
from kubragen.provider import Provider

from kg_efk import EFKBuilder, EFKOptions

kg = KubraGen(provider=Provider(PROVIDER_GOOGLE, PROVIDERSVC_GOOGLE_GKE), options=Options({
    'namespaces': {
        'mon': 'app-monitoring',
    },
}))

out = OutputProject(kg)

shell_script = OutputFile_ShellScript('create_gke.sh')
out.append(shell_script)

shell_script.append('set -e')

#
# OUTPUTFILE: app-namespace.yaml
#
file = OutputFile_Kubernetes('app-namespace.yaml')

file.append([
    Object({
        'apiVersion': 'v1',
        'kind': 'Namespace',
        'metadata': {
            'name': 'app-monitoring',
        },
    }, name='ns-monitoring', source='app', instance='app')
])

out.append(file)
shell_script.append(OD_FileTemplate(f'kubectl apply -f ${{FILE_{file.fileid}}}'))

shell_script.append(f'kubectl config set-context --current --namespace=app-monitoring')

#
# SETUP: efk
#
efk_config = EFKBuilder(kubragen=kg, options=EFKOptions({
    'namespace': OptionRoot('namespaces.mon'),
    'basename': 'myefk',
    'kubernetes': {
        'volumes': {
            'elasticsearch-data': {
                'persistentVolumeClaim': {
                    'claimName': 'efk-storage-claim'
                }
            }
        },
    }
}))

efk_config.ensure_build_names(efk_config.BUILD_ACCESSCONTROL, efk_config.BUILD_SERVICE)

#
# OUTPUTFILE: efk-config.yaml
#
file = OutputFile_Kubernetes('efk-config.yaml')
out.append(file)

file.append(efk_config.build(efk_config.BUILD_ACCESSCONTROL))

shell_script.append(OD_FileTemplate(f'kubectl apply -f ${{FILE_{file.fileid}}}'))

#
# OUTPUTFILE: efk.yaml
#
file = OutputFile_Kubernetes('efk.yaml')
out.append(file)

file.append(efk_config.build(efk_config.BUILD_SERVICE))

shell_script.append(OD_FileTemplate(f'kubectl apply -f ${{FILE_{file.fileid}}}'))

#
# Write files
#
out.output(OutputDriver_Print())
# out.output(OutputDriver_Directory('/tmp/build-gke'))

Output:

****** BEGIN FILE: 001-app-namespace.yaml ********
apiVersion: v1
kind: Namespace
metadata:
  name: app-monitoring

****** END FILE: 001-app-namespace.yaml ********
****** BEGIN FILE: 002-efk-config.yaml ********
apiVersion: v1
kind: ServiceAccount
metadata:
  name: myefk
  namespace: app-monitoring
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: myefk-fluentd
rules:
- apiGroups: ['']
  resources: [pods, namespaces]
  verbs: [get, list, watch]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: myefk-fluentd
roleRef:
  kind: ClusterRole
  name: myefk-fluentd
  apiGroup: rbac.authorization.k8s.io
subjects:
- kind: ServiceAccount
  name: myefk
  namespace: app-monitoring

****** END FILE: 002-efk-config.yaml ********
****** BEGIN FILE: 003-efk.yaml ********
kind: Service
apiVersion: v1
metadata:
  name: myefkelasticsearch-service
  namespace: app-monitoring
  labels:
    app: myefkelasticsearch-pod-label-app
spec:
  selector:
    app: myefkelasticsearch-pod-label-app
  clusterIP: None
  ports:
  - port: 9200
    name: rest
  - port: 9300
    name: inter-node
---
apiVersion: apps/v1
kind: StatefulSet
metadata:
  name: myefk-elasticsearch
  namespace: app-monitoring
spec:
  serviceName: myefk-elasticsearch
  replicas: 3
  selector:
    matchLabels:
      app: myefk-elasticsearch
  template:
    metadata:
      labels:
        app: myefk-elasticsearch
    spec:
      containers:
      - name: elasticsearch
        image: docker.elastic.co/elasticsearch/elasticsearch:7.2.0
<...more...>
****** END FILE: 003-efk.yaml ********
****** BEGIN FILE: create_gke.sh ********
#!/bin/bash

set -e
kubectl apply -f 001-app-namespace.yaml
kubectl config set-context --current --namespace=app-monitoring
kubectl apply -f 002-efk-config.yaml
kubectl apply -f 003-efk.yaml

****** END FILE: create_gke.sh ********

Credits

based on

How To Set Up an Elasticsearch, Fluentd and Kibana (EFK) Logging Stack on Kubernetes

Author

Rangel Reale (rangelreale@gmail.com)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

kg_efk-0.7.6.tar.gz (9.8 kB view details)

Uploaded Source

Built Distribution

kg_efk-0.7.6-py3-none-any.whl (9.1 kB view details)

Uploaded Python 3

File details

Details for the file kg_efk-0.7.6.tar.gz.

File metadata

  • Download URL: kg_efk-0.7.6.tar.gz
  • Upload date:
  • Size: 9.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.6.1 requests/2.24.0 setuptools/50.3.2 requests-toolbelt/0.9.1 tqdm/4.51.0 CPython/3.8.6

File hashes

Hashes for kg_efk-0.7.6.tar.gz
Algorithm Hash digest
SHA256 d269180460d3312d12862104ecb1db98e9e88ef58e3b0a6257da33c7997a1045
MD5 4f60ba6fb7ed1b48b9edca2b3e9f0ed3
BLAKE2b-256 e90f22464ec3c79fbd4d5f8eb55fea125d615b8b18edb99b9b167621c537d76e

See more details on using hashes here.

File details

Details for the file kg_efk-0.7.6-py3-none-any.whl.

File metadata

  • Download URL: kg_efk-0.7.6-py3-none-any.whl
  • Upload date:
  • Size: 9.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.6.1 requests/2.24.0 setuptools/50.3.2 requests-toolbelt/0.9.1 tqdm/4.51.0 CPython/3.8.6

File hashes

Hashes for kg_efk-0.7.6-py3-none-any.whl
Algorithm Hash digest
SHA256 0595736138d432b2e538ac1ce57271be843b5f89a30f849e40f6fb34ffadbf4f
MD5 e52b559195f426f34acbc585a18840b5
BLAKE2b-256 c16640bf3e966d075fce633e1686344155f5ed68dcae62a0d6dee17e417ba4bb

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page