You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/deploying-airbyte/on-kubernetes-via-helm.md
+75-5
Original file line number
Diff line number
Diff line change
@@ -167,11 +167,10 @@ Before upgrading the chart update values.yaml as stated above and then run:
167
167
- Perform upgrade of chart by running `helm upgrade %release_name% airbyte/airbyte --set auth.rootPassword=$ROOT_PASSWORD`
168
168
- If you get an error about setting the auth.rootPassword, then you forgot to update the `values.yaml` file
169
169
170
-
### External Logs
170
+
### External Logs with S3
171
171
172
172
::info
173
-
This was tested using [Airbyte Helm Chart Version 0.50.13](https://artifacthub.io/packages/helm/airbyte/airbyte/0.50.13) and S3 logs only.
174
-
Previous or newer version can change how to setup the external logs.
173
+
S3 logging was tested on [Airbyte Helm Chart Version 0.50.13](https://artifacthub.io/packages/helm/airbyte/airbyte/0.50.13)
175
174
:::
176
175
177
176
Create a file called `airbyte-logs-secrets.yaml` to store the AWS Keys and other informations:
@@ -219,7 +218,7 @@ global:
219
218
tolerations: []
220
219
affinity: {}
221
220
```
222
-
You can try to use `GCS` or `External Minio` but both weren't tested yet. Feel free to run tests and update the documentation.
221
+
GCS Logging information is below but you can try to use `External Minio` as well but it was not tested yet. Feel free to run tests and update the documentation.
GCS Logging is similar to the approach taken for S3 above, with a few small differences
304
+
GCS logging was tested on [Airbyte Helm Chart Version 0.53.178](https://artifacthub.io/packages/helm/airbyte/airbyte/0.53.178)
305
+
:::
306
+
307
+
#### Create Google Cloud Storage Bucket
308
+
309
+
1. **Access Google Cloud Console**: Go to the Google Cloud Console and select or create a project where you want to create the bucket.
310
+
2. **Open Cloud Storage**: Navigate to "Storage" > "Browser" in the left-side menu.
311
+
3. **Create Bucket**: Click on "Create bucket". Give your bucket a unique name, select a region for the bucket, and configure other settings such as storage class and access control according to your requirements. Finally, click "Create".
312
+
313
+
#### Create Google Cloud Service Account
314
+
315
+
1. **Open IAM & Admin**: In the Cloud Console, navigate to "IAM & Admin" > "Service Accounts".
316
+
2. **Create Service Account**: Click "Create Service Account", enter a name, description, and then click "Create".
317
+
3. **Grant Permissions**: Assign the role of "Storage Object Admin" to the service account by selecting it from the role list.
318
+
4. **Create Key**: After creating the service account, click on it, go to the "Keys" tab, and then click "Add Key" > "Create new key". Choose JSON as the key type and click "Create". The key file will be downloaded automatically to your computer.
319
+
320
+
#### Create a Kubernetes Secret
321
+
322
+
- Use the **`kubectl create secret`** command to create a Kubernetes secret from the JSON key file. Replace **`<secret-name>`** with the desired name for your secret, **`<path-to-json-key-file>`** with the path to the JSON key file you downloaded, and **`<namespace>`** with the namespace where your deployment will be running.
0 commit comments