Skip to content

Commit db8ad61

Browse files
author
Kacper Zienkiewicz
committed
[#81266] server: deploy: pubsub-demo: Update README instructions for CPU demo
1 parent 10fe694 commit db8ad61

File tree

1 file changed

+9
-3
lines changed

1 file changed

+9
-3
lines changed

server/deploy/pubsub-demo/README.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Keystore is the means of storage of cryptographic credentials for a Kafka broker
2020
They can be password protected. To generate valid keystores for this demo deployment, first run [RDFM's certgen script](../../tests/certgen.sh):
2121

2222
```sh
23-
../../tests/certgen.sh server IP:127.0.0.1,DNS:localhost,DNS:rdfm-server
23+
../../tests/certgen.sh server IP:127.0.0.1,DNS:localhost,DNS:rdfm-server DEVICE no
2424
```
2525

2626
It generates a `server` directory in which, alongside the key-cert pair that will be used for a RDFM server, lie `CA.crt` and `CA.key`. They are essential for generating keystores:
@@ -48,6 +48,14 @@ To run the whole demo, the server and client are also required. The server will
4848
make docker-demo-client
4949
```
5050

51+
After running make for the `docker-demo-client` target, return to this directory and run:
52+
53+
```sh
54+
docker build -t antmicro/rdfm-linux-demo-client-stress -f Dockerfile.demo-client-stress .
55+
```
56+
57+
The above adds a couple of tweaks to how the client behaves. It adds config fields instructing it to report CPU usage and run `stress-ng`.
58+
5159
#### Run
5260

5361
The following starts the Kafka broker alongside Keycloak, RDFM server, and RDFM client:
@@ -133,5 +141,3 @@ Finally create a permission that ties it all together:
133141
3. Go to kafka-broker-introspection client authorization tab
134142
4. Under settings, import [kafka-broker-introspection-test-authz-config.json](kafka-broker-introspection-test-authz-config.json)
135143
5. Remove `Default Resource` from resources under the authorization tab
136-
137-
With the premade config, OAUTH [client scripts](scripts/client) will work straight away with no need to modify credentials.

0 commit comments

Comments
 (0)