The Red Hat Ecosystem Catalog is the official source for discovering and learning more about the Red Hat Ecosystem of both Red Hat and certified third-party products and services.
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
The kdb+ time-series database is at the forefront of high-performance streaming, real-time and historical analytics. Its unified, elegant q language includes first-class tables, functions and time-series features. Its tiny footprint efficiently scales vertically and horizontally. High precision nanosecond timestamps, time ordered querying, coupled with time-based table joins of unparalleled speed, allows kdb+ to stand alone in time-series analytics.
To find out more about kdb+ and how to get support, visit https://code.kx.com/q/
By using this product you agree to the Red Hat subscription agreement and you have confirmed your acceptance of the terms and conditions of the following software license(s): https://ondemand.kx.com/
Once you have registered for your Kx license, populate your name as KX_LIC_USER and email address as KX_LIC_EMAIL in the pod spec as follows
apiVersion: v1
kind: Pod
metadata:
name: kdb-openshift
spec:
containers:
- name: kdb
image: registry.connect.redhat.com/kx/kdb
env:
- name: KX_LIC_USER
value: "JohnSmith"
- name: KX_LIC_EMAIL
value: "john.smith@kx.com"
To login with a q prompt
$ oc exec -it kdb q
To login with a bash prompt
$ oc exec -it kdb /bin/bash
[kx@kdb ~]$
Then run q
[kx@kdb ~]$ q
KDB+ 4.0 2020.11.27 Copyright (C) 1993-2020 Kx Systems
l64/ 4()core 8978MB kx kdb 10.116.0.112 EXPIRE 2021.11.30
q)
docker run -it -e KX_LIC_USER='JohnSmith' -e KX_LIC_EMAIL='john.smith@kx.com' registry.connect.redhat.com/kx/kdb
Encryption
To create an encryption key, run the following
$ openssl rand 32 | openssl aes-256-cbc -md SHA256 -salt -pbkdf2 -iter 50000 -out testkey.key
When prompted, enter the encryption password.
Next, open q prompt and set encryption key and password
q) -36!(`:testkey.key;"pw1234")
Encrypt a file called etest
q) (`:etest;17;16;6) set asc 10000?`3
Compress a file called ctest
q) (`:ctest;17;2;6) set asc 10000?`3
Compress and encrypt a file called cetest
q) (`:cetest;17;2+16;6) set asc 10000?`3
Or use .z.zd for process-wide default setting for all qualifying files.
q) .z.zd:(17;2+16;6) / zlib compression, with aes256cbc encryption.
The following information was extracted from the containerfile and other sources.
| Summary | kdb+ 4.0 ubi8 container image |
| Description | The Universal Base Image is designed and engineered to be the base layer for all of your containerized applications, middleware and utilities. This base image is freely redistributable, but Red Hat only supports Red Hat technologies through subscriptions for Red Hat products. This image is maintained by Red Hat and updated regularly. |
| Provider | Kx |
| Maintainer | openshift-containercert@kx.com |
| Source location | git@github.com:KxOpenshift/OpenshiftContainerCert.git |
The following information was extracted from the containerfile and other sources.
| Repository name | Kdb+ 4.0 |
| Image version | 4.0 |
| Architecture | amd64 |
| User | kx |
| Working directory | Q/home/kx |
Use the following instructions to get images from a Red Hat container registry using registry service account tokens. You will need to create a registry service account to use prior to completing any of the following tasks.
First, you will need to add a reference to the appropriate secret and repository to your Kubernetes pod configuration via an imagePullSecrets field.
Then, use the following from the command line or from the OpenShift Dashboard GUI interface.
Use the following command(s) from a system with podman installed
Use the following command(s) from a system with docker service installed and running
Use the following instructions to get images from a Red Hat container registry using your Red Hat login.
For best practices, it is recommended to use registry tokens when pulling content for OpenShift deployments.
Use the following command(s) from a system with podman installed
Use the following command(s) from a system with docker service installed and running