Public

Hi Shawn,
First I tried modifying securityContect first and the familiar error is 
appeared. I remember trying to run as user 1000 a few days ago and had error 
similar to below. OpenShift has restrictions on this value.

        Error creating: pods "nifi-4-" is forbidden: unable to validate against 
any security context constraint: [fsGroup: Invalid value: []int64{1000}: 1000 
is not an allowed group 
spec.containers[0].securityContext.securityContext.runAsUser: Invalid value: 
1000: must be in the ranges: [1000470000, 1000479999]]

So if Nifi has to run as user 1000 and OpenShift only allows range [1000470000, 
1000479999] then the issue is not resolvable in the current image. 
Let me know if you have other views on it.

Thanks

Natalia Fill
Analyst Software Developer

-----Original Message-----
From: Fill, Natalia [mailto:natalia.f...@lgim.com]
Sent: 13 February 2020 14:32
To: dev@nifi.apache.org; Endre Kovacs
Cc: Ali, Rizwan
Subject: RE: Running Nifi on OpenShift

Public

Hi Shawn,

Thank you for your message. I will add your suggested configs and try it out 
today. It certainly has new content not present in my yml so hopefully it will 
resolve the issue.

Thanks

Natalia Fill
Analyst Software Developer

-----Original Message-----
From: Shawn Weeks [mailto:swe...@weeksconsulting.us]
Sent: 13 February 2020 14:26
To: dev@nifi.apache.org; Endre Kovacs
Cc: Ali, Rizwan
Subject: Re: Running Nifi on OpenShift

Your attachment didn't make it through but here are a couple of things to note. 
First of all if you try and put the ./conf directory in a volume you'll have to 
run a init container to copy the initial contents to the volume. Kubernetes 
unlike Docker does not replicate from the container.

Here is how I did that and I'm generally available on Slack if you want quicker 
answers.

      initContainers:
        - name: init-nifi-conf
          image: apache/nifi:latest
          volumeMounts:
            - mountPath: "/opt/nifi/nifi-current/new-conf"
              name: nifi-conf-claim
          command:
            - sh
            - '-c'
            - '\cp /opt/nifi/nifi-current/conf/* 
/opt/nifi/nifi-current/new-conf/'

The other thing you'll want to include is this to set the user and group id to 
1000 which is what the apache image container expects since your not running as 
root.

      securityContext:
        runAsUser: 1000
        runAsGroup: 1000
        fsGroup: 1000

Here is my complete yaml.

apiVersion: v1
kind: Service
metadata:
  name: nifi-service
  namespace: nifi
spec:
  clusterIP: None
  selector:
    app: nifi
  ports:
    - protocol: TCP
      port: 8080
  type: ClusterIP
---
apiVersion: networking.k8s.io/v1beta1
kind: Ingress
metadata:
  name: nifi-ingress
  namespace: nifi
spec:
  rules:
  - host: nifi.dev.example.com
    http:
      paths:
      - backend:
          serviceName: nifi-service
          servicePort: 8080
  tls:
  - hosts:
    - nifi.dev.example.com
    secretName: nifi-ssl-cert
---
apiVersion: apps/v1
kind: StatefulSet
metadata:
  name: nifi-workload
  namespace: nifi
spec:
  replicas: 3
  podManagementPolicy: Parallel
  updateStrategy:
    type: RollingUpdate
  serviceName: nifi-service
  selector:
    matchLabels:
      app: nifi
  template:
    metadata:
      labels:
        app: nifi
    spec:
      nodeSelector:
        node-role.nifi: "true"
      securityContext:
        runAsUser: 1000
        runAsGroup: 1000
        fsGroup: 1000
      initContainers:
        - name: init-nifi-conf
          image: apache/nifi:latest
          volumeMounts:
            - mountPath: "/opt/nifi/nifi-current/new-conf"
              name: nifi-conf-claim
          command:
            - sh
            - '-c'
            - '\cp /opt/nifi/nifi-current/conf/* 
/opt/nifi/nifi-current/new-conf/'
      containers:
        - image: apache/nifi:latest
          imagePullPolicy: Always
          name: nifi
          ports:
            - containerPort: 8080          
            - containerPort: 10000
          volumeMounts:
            - mountPath: "/opt/nifi/nifi-current/conf"
              name: nifi-conf-claim          
            - mountPath: "/opt/nifi/nifi-current/database_repository"
              name: nifi-db-claim
            - mountPath: "/opt/nifi/nifi-current/flowfile_repository"
              name: nifi-flow-claim
            - mountPath: "/opt/nifi/nifi-current/content_repository"
              name: nifi-content-claim
            - mountPath: "/opt/nifi/nifi-current/provenance_repository"
              name: nifi-prov-claim
            - mountPath: "/opt/nifi/nifi-current/state"
              name: nifi-state-claim
            - mountPath: "/opt/nifi/nifi-current/logs"
              name: nifi-logs-claim
          env:
            - name: MY_POD_NAME
              valueFrom:
                fieldRef:
                  fieldPath: metadata.name
            - name: NIFI_CLUSTER_IS_NODE
              value: "true"
            - name: NIFI_ZK_CONNECT_STRING
              value: 
"zookeeper-0.zookeeper-headless.nifi:2181,zookeeper-1.zookeeper-headless.nifi:2181,zookeeper-2.zookeeper-headless.nifi:2181"
            - name: NIFI_CLUSTER_NODE_PROTOCOL_PORT
              value: "11443"
            - name: "NIFI_ELECTION_MAX_CANDIDATES"
              value: "3"
            - name: "NIFI_JVM_HEAP_INIT"
              value: "64g"
            - name: "NIFI_JVM_HEAP_MAX"
              value: "64g"
            - name: "NIFI_WEB_HTTP_HOST"
              value: "$(MY_POD_NAME).nifi-service"
            - name: NIFI_CLUSTER_ADDRESS
              value: "$(MY_POD_NAME).nifi-service"
            - name: NIFI_REMOTE_INPUT_HOST
              value: "$(MY_POD_NAME).nifi-service"
  volumeClaimTemplates:
    - metadata:
        name: nifi-conf-claim
      spec:
        accessModes: ["ReadWriteOnce"]
        resources:
          requests:
            storage: 10Gi  
    - metadata:
        name: nifi-db-claim
      spec:
        accessModes: ["ReadWriteOnce"]
        resources:
          requests:
            storage: 10Gi
    - metadata:
        name: nifi-flow-claim
      spec:
        accessModes: ["ReadWriteOnce"]
        resources:
          requests:
            storage: 10Gi
    - metadata:
        name: nifi-content-claim
      spec:
        accessModes: ["ReadWriteOnce"]
        resources:
          requests:
            storage: 10Gi
    - metadata:
        name: nifi-prov-claim
      spec:
        accessModes: ["ReadWriteOnce"]
        resources:
          requests:
            storage: 10Gi
    - metadata:
        name: nifi-state-claim
      spec:
        accessModes: ["ReadWriteOnce"]
        resources:
          requests:
            storage: 10Gi
    - metadata:
        name: nifi-logs-claim
      spec:
        accessModes: ["ReadWriteOnce"]
        resources:
          requests:
            storage: 10Gi

On 2/13/20, 3:50 AM, "Fill, Natalia" <natalia.f...@lgim.com> wrote:

    Public
    
    Hi Shawn,
    
    We have internal Jenkins deployment process, which eventually comes down to 
running yml configs on OpenShift.
    I attached two yml files. One version with storage mounted and one without.
    The one with storage mounted expects nifi properties file, which I think 
should come from image. So there is something wrong about this set up. I would 
expect it to use default properties and don't which ones to give it. See my 
point 4 in original email below.
    The one without persistent storage mounted comes up with permission error: 
/opt/nifi/nifi-current/conf/sedXGg2lo: Permission denied. See original email 
for full story about this.
    I had few goes on trying to resolve it as per my original story below.
    I have read somewhere that the issue could be due to the fact that Nifi 
image tries to run as root but OpenShift doesn't allow it by default. Not sure 
if this is still true for the latest 1.11.1 version of docker image. 
    If you can suggest what is wrong with these yml files or may be some 
settings need to change on OpenShift admin side it hopefully will help to 
resolve the issue.
    
    Thank you
    
    Natalia Fill
    Analyst Software Developer
    
    -----Original Message-----
    From: Shawn Weeks [mailto:swe...@weeksconsulting.us]
    Sent: 12 February 2020 21:16
    To: dev@nifi.apache.org; Endre Kovacs
    Cc: Ali, Rizwan
    Subject: Re: Running Nifi on OpenShift
    
    I recognize that running NiFi on Kubernetes isn't quite as easy as starting 
it in Docker but it's also not that hard if you've worked with Kubernetes a 
bit. More than likely the issue is in your Kubernetes Yaml that you used to 
deploy NiFi with. This is separate than nifi.properties and would have been the 
config file you used in the command "kubectl apply -f nifi.yaml" or are you 
trying to deploy with Helm?
    
    Thanks
    Shawn
    
    On 2/12/20, 2:26 PM, "Fill, Natalia" <natalia.f...@lgim.com> wrote:
    
        Public
        
        Hi Endre,
        
        I certainly agree with the bare metal option. The reason I have a 
specific request for OpenShift is the requirement to adhere to organisational 
architectural road map.
        I cannot agree more that it is not a single person task. I was working 
on it for few days with OpenShift administrator (on CC list) helping me out.
        Your links certainly give an impression that this task is not for faint 
hearted.
        
        Best regards,
        
        Natalia
        
        -----Original Message-----
        From: Endre Kovacs [mailto:andrewsmit...@protonmail.com.INVALID]
        Sent: 12 February 2020 19:43
        To: dev@nifi.apache.org
        Subject: Re: Running Nifi on OpenShift
        
        Hi,
        
        If to make NiFi work on K8S is a beast, then to make it work on 
Openshift, is a category-5 Kaiju [1][2].
        
        This is definitely not a few days task for a single person.
        
        Why not run NiFi just in docker (docker-compose)? Or on bare metal?
        
        Best regards,
        Endre
        
        
        [1] https://en.wikipedia.org/wiki/Kaiju
        [2] https://en.wikipedia.org/wiki/Pacific_Rim_(film)
        
        Sent with ProtonMail Secure Email.
        
        ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
        On Wednesday, February 12, 2020 8:14 PM, Fill, Natalia 
<natalia.f...@lgim.com> wrote:
        
        > Public
        >
        > Hi,
        > I am trying to run Nifi pod on OpenShift for several days now and 
unfortunately unsuccessfully.
        >
        > The error that I am getting persistently is replacing target file 
        > /opt/nifi/nifi-current/conf/nifi.properties
        > sed: couldn't open temporary file 
        > /opt/nifi/nifi-current/conf/sedXGg2lo: Permission denied
        >
        > I have tried several things to resolve the issue:
        > My images are downloaded from https://hub.docker.com/r/apache/nifi
        >
        > 1.        First I run 1.10.0 image which resulted in error above
        >
        >
        >
        > 2. Upgraded to 1.11.1 image, the error still persist
        >
        > 3. Tried wrapping the above images in my own image with following 
        > modifications to docker file (used various paths to chmod opt/ 
        > opt/nifi), still the same error
        >
        > FROM xxxRegistry/apache-nifi:1.11.1
        > USER root
        > RUN chmod -R 777 /opt
        > USER 1000
        >
        > 4. Mounted volume opt/nifi, but this resulted in nifi properties file 
        > not being found, so removed volume as it overwrites Nifi paths
        >
        > 5. Involved OpenShift administrators to create privileged account for 
        > nifi and altered my yml to use that account (SUPPLEMENTAL_GROUP is 
        > what all our pods run under and sn_nif was created specially to 
        > resolve this case)
        >
        > securityContext:
        > supplementalGroups:
        >
        > -   ${SUPPLEMENTAL_GROUP}
        >     serviceAccount: sn-nif
        >     serviceAccountName: sn-nif
        >
        >
        > 6.        Removed securityContext to ensure serviceAccount is used
        >
        >
        >
        > Can someone please suggest how to resolve this issue. Otherwise I 
will have to give up on Nifi as I don't have any more time on this project to 
spend on Nifi config.
        >
        > Thank you
        >
        > Natalia
        >
        > Natalia Fill
        > Analyst Software Developer
        > Legal and General Investment Management One Coleman Street, London, 
        > EC2R 5AA
        > 020 3124 3430
        > www.lgim.com
        > This e-mail (and any attachments) may contain privileged and/or 
confidential information. If you are not the intended recipient please do not 
disclose, copy, distribute, disseminate or take any action in reliance on it. 
If you have received this message in error please reply and tell us and then 
delete it. Should you wish to communicate with us by e-mail we cannot guarantee 
the security of any data outside our own computer systems.
        >
        > Any information contained in this message may be subject to 
applicable terms and conditions and must not be construed as giving investment 
advice within or outside the United Kingdom or Republic of Ireland.
        >
        > Telephone Conversations may be recorded for your protection and to 
        > ensure quality of service
        >
        > Legal & General Investment Management Limited (no 2091894), LGIM Real 
        > Assets (Operator) Limited (no 05522016), LGIM (International) Limited 
        > (no 7716001) Legal & General Unit Trust Managers (no 1009418), GO ETF 
        > Solutions LLP (OC329482) and LGIM Corporate Director Limited (no 
        > 7105051) are authorised and regulated by the Financial Conduct 
        > Authority. All are registered in England & Wales with a registered 
        > office at One Coleman Street, London, EC2R 5AA
        >
        > Legal & General Assurance (Pensions Management) Limited (no 1006112) 
is authorised by the Prudential Regulation Authority and regulated by the 
Financial Conduct Authority and the Prudential Regulation Authority. It is 
registered in England & Wales with a registered office at One Coleman Street, 
London, EC2R 5AA.
        >
        > Legal & General Property Limited (no 2091897) is authorised and 
regulated by the Financial Conduct Authority for insurance mediation 
activities. It is registered in England & Wales with a registered office at One 
Coleman Street, London, EC2R 5AA.
        >
        > LGIM Managers (Europe) Limited is authorised and regulated by the 
Central Bank of Ireland (C173733). It is registered in the Republic of Ireland 
(no 609677) with a registered office at 33/34 Sir John Rogerson's Quay, Dublin 
2, D02 XK09.
        >
        > Legal & General Group PLC, Registered Office One Coleman Street, 
London, EC2R 5AA.
        >
        > Registered in England no: 1417162
        >
        > **** This email has come from the internet and has been scanned for 
        > all viruses and potentially offensive content by Messagelabs on 
behalf 
        > of Legal & General ****
        
        
        ________________________________________________________________________
        *** This email has come from the internet and has been scanned for all 
viruses and potentially offensive content by Messagelabs on behalf of Legal & 
General. Please report unwanted spam email to secur...@lgim.com ***
        
        Please consider the environment before printing this email.
        
        ________________________________________________________________________
        **** This email has come from the internet and has been scanned for all 
viruses and potentially offensive content by Messagelabs on behalf of Legal & 
General ****
        
    
    
    ________________________________________________________________________
    *** This email has come from the internet and has been scanned for all 
viruses and potentially offensive content by Messagelabs on behalf of Legal & 
General. Please report unwanted spam email to secur...@lgim.com ***
    
    Please consider the environment before printing this email.
    
    ________________________________________________________________________
    **** This email has come from the internet and has been scanned for all 
viruses and potentially offensive content by Messagelabs on behalf of Legal & 
General ****
    


________________________________________________________________________
*** This email has come from the internet and has been scanned for all viruses 
and potentially offensive content by Messagelabs on behalf of Legal & General. 
Please report unwanted spam email to secur...@lgim.com ***

Please consider the environment before printing this email.

________________________________________________________________________
**** This email has come from the internet and has been scanned for all viruses 
and potentially offensive content by Messagelabs on behalf of Legal & General 
****

________________________________________________________________________
*** This email has come from the internet and has been scanned for all viruses 
and potentially offensive content by Messagelabs on behalf of Legal & General. 
Please report unwanted spam email to secur...@lgim.com ***

Please consider the environment before printing this email.

________________________________________________________________________
**** This email has come from the internet and has been scanned for all viruses 
and potentially offensive content by Messagelabs on behalf of Legal & General 
****

Reply via email to