cambridgesemantics/anzo-operator-bundle

Anzo® - operator bundle image

Cambridge Semantics
Updated
Overview

Features

Release categoryGenerally Available
Privilege modeUnprivileged

Download this image

This will require authentication. View other options.

Description

anzo-operator

By Cambridge Semantics Inc.

Supported tags

Project Status: stable
Operator Version: v1

Prerequisites

  • Red Hat Openshift Container Platform on Kubernetes, version >= 4.3
  • Kubectl, versions {1.20-1.16}

Anzo Docker Images Used for Deployment

When you deploy Anzo using operator, following are the set of images used for actual deployments. We have given reference docker commands to download the latest releases for each of them below.

Anzo Operator

  • To download latest release, please use:
   docker pull registry.connect.redhat.com/cambridgesemantics/anzo-operator

Anzo

  • To download latest release, please use:
   docker pull registry.connect.redhat.com/cambridgesemantics/anzo

Steps to deploy anzo-operator

For deploying Anzo operator and CRs managed by it, user needs to enable RBAC and configure kubernetes objects mentioned below.

# Create Namespace, mention namespace in metadata.name
$ kubectl create -f deploy/v1_namespace_default.yaml
# Setup Service Account
$ kubectl create -f deploy/default_v1_serviceaccount_anzo-operator.yaml --namespace <namespace>
# Setup RBAC
$ kubectl create -f deploy/default_rbac.authorization.k8s.io_v1_role_anzo-operator.yaml  --namespace <namespace>
$ kubectl create -f deploy/default_rbac.authorization.k8s.io_v1_rolebinding_anzo-operator.yaml  --namespace <namespace>
$ kubectl create -f deploy/rbac.authorization.k8s.io_v1_clusterrole_anzo-operator.yaml

$ kubectl create -f deploy/rbac.authorization.k8s.io_v1_clusterrolebinding_anzo-operator.yaml
$ kubectl create -f deploy/policy_v1beta1_podsecuritypolicy_anzo-privileged.yaml
# Setup the CRD
$ kubectl create -f deploy/crds/apiextensions.k8s.io_v1_customresourcedefinition_anzos.anzo.cambridgesemantics.com.yaml
# Deploy anzo-operator
$ kubectl create -f deploy/default_apps_v1_deployment_anzo-operator.yaml --namespace <namespace>
# Deploy Anzo Custom Resource(CR), i.e. Anzo deployment
$ kubectl apply -f deploy/default_anzo.cambridgesemantics.com_v1_anzo_agent01.yaml --namespace <namespace>

NOTE One needs to edit operator deployment, CR deployment with right docker image details.

Steps to delete Anzo CR and anzo-operator

# Delete Anzo CR
kubectl delete -f deploy/default_anzo.cambridgesemantics.com_v1_anzo_agent01.yaml --namespace <namespace>
# Delete anzo-operator
kubectl delete -f deploy/default_apps_v1_deployment_anzo-operator.yaml --namespace <namespace>
# Delete RBAC
kubectl delete -f deploy/default_rbac.authorization.k8s.io_v1_role_anzo-operator.yaml --namespace <namespace>
kubectl delete -f deploy/default_rbac.authorization.k8s.io_v1_rolebinding_anzo-operator.yaml --namespace <namespace>
kubectl delete -f deploy/rbac.authorization.k8s.io_v1_clusterrole_anzo-operator.yaml --namespace <namespace>
kubectl delete -f deploy/rbac.authorization.k8s.io_v1_clusterrolebinding_anzo-operator.yaml
kubectl delete -f deploy/policy_v1beta1_podsecuritypolicy_anzo-privileged.yaml
# Delete Service Account
kubectl delete -f deploy/default_v1_serviceaccount_anzo-operator.yaml --namespace <namespace>
# Delete CRD
kubectl delete -f deploy/crds/apiextensions.k8s.io_v1_customresourcedefinition_anzos.anzo.cambridgesemantics.com.yaml

Anzo CustomResource(CR) Specification

The following table lists the configurable parameters for Anzo and their default values.(CR API Version: v1)

ParameterDescriptionDefault
metadata.nameName of CRa01
metadata.namespaceNamespace of CR
metadata.labelsDictionary of (key: val) as labels of CR
spec.nodeConfig.specConfiguration specification for Anzo
spec.nodeConfig.spec.replicasNumber of pods for Anzo Agent or Server1
spec.nodeConfig.spec.serviceNameName of headless service for Anzoanzo-
spec.nodeConfig.spec.template.spec.serviceAccountNameService account name for podsanzo-operator
spec.nodeConfig.spec.template.spec.containers.x.NameName of Anzo containeranzo
spec.serviceAnzo loadbalancer service attributes, of type v1.Servicecommented, please uncomment to add value
spec.volumesList of persistent volumes for Anzocommented, please uncomment to add value
spec.volumes.[i].nameName for persistent volume
spec.volumes.[i].mountPathPath where persistent volume should be mounted inside container
spec.volumes.[i].pvAttributes to configure persistent volume, of type v1.PersistentVolume
spec.volumes.[i].pvcAttributes to configure persistent volume claim, of type v1.PersistentVolumeClaim
spec.volumes.[i].deletePVCSet this to true if you want to delete PVC after CR deletionfalse
spec.roleRole of Anzo, AnzoAgent or AnzoServer
spec.licenseUser provided license string""
spec.credentialsExisting credentials for AnzoAgent or AnzoServercommented, please uncomment to add value
spec.macIDAnzo Mac ID associated with licese
spec.jsonActivationSet this to true if Anzo should be activated using JSON data file
spec.bootPropertiesDictinary having combination to configure boot properties at Anzo installation
spec.jvmMemoryAmount of memory that should be given for JVM processing(Pod Memory - 1204M)
spec.skipLbCheckSet this to true if you want to disable the check of loadbalancerfalse

References

https://docs.cambridgesemantics.com/

Type

Operator bundle

Stream

Single-stream

Size

97.7 kB

Digest

Category

Other
SecurityPackagesGet this image
Terms & conditionsBefore downloading or using this Container, you must agree to the Red Hat subscription agreement located at redhat.com/licenses. If you do not agree with these terms, do not download or use the Container. If you have an existing Red Hat Enterprise Agreement (or other negotiated agreement with Red Hat) with terms that govern subscription services associated with Containers, then your existing agreement will control.

Registry tokens

Use a registry service account token to authenticate your container client. This allows you to pull images without using your personal Red Hat credentials, which is recommended for CI/CD pipelines and automated deployments.

Using Podman login


Image identifiers

Red Hat login

Use the following instructions to get images from a Red Hat container registry using your Red Hat login.

Using Podman login


Image identifiers

Red Hat logoLinkedInYouTubeFacebookTwitter

Platforms

Products & services

Try, buy, sell

Help

About Red Hat Ecosystem Catalog

The Red Hat Ecosystem Catalog is the official source for discovering and learning more about the Red Hat Ecosystem of both Red Hat and certified third-party products and services.

We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2025 Red Hat, LLC
Feedback