You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: site/installation.md
+36-36Lines changed: 36 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ When the run completes successfully, the Docker image for the operator will be b
52
52
53
53
## Build the Docker image for the operator locally
54
54
55
-
The following software are required to obtain and build the operator:
55
+
The following software is required to obtain and build the operator:
56
56
57
57
* Git (1.8 or later recommended)
58
58
* Apache Maven (3.3 or later recommended)
@@ -71,28 +71,28 @@ Then run the build using this command:
71
71
mvn clean install
72
72
```
73
73
74
-
Then login to Docker Store so that you will be able to pull the base image, and create the Docker image as follows. These commands should be executed in the project root directory.:
74
+
Log in to the Docker Store so that you will be able to pull the base image and create the Docker image as follows. These commands should be executed in the project root directory:
Note: If you have not used the base image (`store/oracle/serverjre:8`) before you will need to visit the [Docker Store web interface](https://store.docker.com/images/oracle-serverjre-8) and accept the license agreement before Docker Store will give you permission to pull that image.
81
+
**Note**: If you have not used the base image (`store/oracle/serverjre:8`) before, you will need to visit the [Docker Store web interface](https://store.docker.com/images/oracle-serverjre-8) and accept the license agreement before the Docker Store will give you permission to pull that image.
82
82
83
-
We recommend that you use a tag other than `latest` to make it easy to distinguish your image. In the example above, the tag could be the GitHub ID of the developer.
83
+
We recommend that you use a tag other than `latest`, to make it easy to distinguish your image. In the example above, the tag could be the GitHub ID of the developer.
84
84
85
85
Next, upload your image to your Kubernetes server as follows:
86
86
87
87
```
88
-
# on your build machine
88
+
# on your build machine:
89
89
docker save weblogic-kubernetes-operator:developer > operator.tar
Verify that you have the right image by running `docker images | grep webloogic-kubernetes-operator` on both machines and comparing the image ID.
95
+
Verify that you have the right image by running `docker images | grep webloogic-kubernetes-operator` on both machines and comparing the image IDs.
96
96
97
97
[comment]: #( Pull the operator image )
98
98
[comment]: #( You can let Kubernetes pull the Docker image for you the first time you try to create a pod that uses the image, but we have found that you can generally avoid various common issues like putting the secret in the wrong namespace or getting the credentials wrong by just manually pulling the image by running these commands *on the Kubernetes master*: )
@@ -103,64 +103,64 @@ Verify that you have the right image by running `docker images | grep webloogic-
103
103
104
104
The operator is deployed with the provided installation script (`create-weblogic-operator.sh`). The default input to this script is the file `create-weblogic-operator-inputs.yaml`. It contains the following parameters:
105
105
106
-
### CONFIGURATION PARAMETERS FOR THE OPERATOR
106
+
### Configuration parameters for the operator
107
107
108
108
| Parameter | Definition | Default |
109
109
| --- | --- | --- |
110
-
| elkIntegrationEnabled | Determines whether the ELK integration will be enabled. If set to `true`, then ElasticSearch, logstash and Kibana will be installed, and logstash will be configured to export the operator’s logs to ElasticSearch. | false |
111
-
| externalDebugHttpPort | The port number of the operator's debugging port outside of the Kubernetes cluster. | 30999 |
112
-
| externalOperatorCert | A base64 encoded string containing the X.509 certificate that the operator will present to clients accessing its REST endpoints. This value is only used when `externalRestOption` is set to `CUSTOM_CERT`. ||
113
-
| externalOperatorKey | A base64 encoded string containing the private key of the operator's X.509 certificate. This value is only used when externalRestOption is set to `CUSTOM_CERT`. ||
114
-
| externalRestHttpsPort| The NodePort number that should be allocated for the operator REST server should listen for HTTPS requests on. | 31001 |
115
-
| externalRestOption |Which of the available REST options is desired. Allowed values: <br/>- `NONE` Disable the REST interface. <br/>- `SELF_SIGNED_CERT` The operator will use a self-signed certificate for its REST server. If this value is specified, then the `externalSans` parameter must also be set. <br/>- `CUSTOM_CERT` Provide custom certificates, for example from an external certification authority. If this value is specified, then the `externalOperatorCert` and `externalOperatorKey` must also be provided.| NONE |
116
-
| externalSans| A comma-separated list of Subject Alternative Names that should be included in the X.509 Certificate. This list should include ... <br/>Example: `DNS:myhost,DNS:localhost,IP:127.0.0.1`||
117
-
| internalDebugHttpPort | The port number of the operator's debugging port inside the Kubernetes cluster. | 30999 |
118
-
| javaLoggingLevel | The level of Java logging that should be enabled in the operator. Allowed values are `SEVERE`, `WARNING`, `INFO`, `CONFIG`, `FINE`, `FINER`, and `FINEST`| INFO |
119
-
| namespace | The Kubernetes namespace that the operator will be deployed in. It is recommended that a namespace be created for the operator rather than using the `default` namespace.| weblogic-operator |
120
-
| remoteDebugNodePortEnabled | Controls whether or not the operator will start a Java remote debug server on the provided port and suspend execution until a remote debugger has attached. | false |
121
-
| serviceAccount| The name of the service account that the operator will use to make requests to the Kubernetes API server. | weblogic-operator |
122
-
| targetNamespaces | A list of the Kubernetes namespaces that may contain WebLogic domains that the operator will manage. The operator will not take any action against a domain that is in a namespace not listed here. | default |
123
-
| weblogicOperatorImage | The Docker image containing the operator code. | container-registry.oracle.com/middleware/weblogic-kubernetes-operator:latest|
124
-
| weblogicOperatorImagePullPolicy | The image pull policy for the operator docker image. Allowed values are 'Always', 'Never' and 'IfNotPresent'| IfNotPresent |
125
-
| weblogicOperatorImagePullSecretName | Name of the Kubernetes secret to access the Docker Store to pull the WebLogic Server Docker image. The presence of the secret will be validated when this parameter is enabled. ||
110
+
|`elkIntegrationEnabled`| Determines whether the Elastic Stack integration will be enabled. If set to `true`, then Elasticsearch, Logstash, and Kibana will be installed, and Logstash will be configured to export the operator’s logs to Elasticsearch. |`false`|
111
+
|`externalDebugHttpPort`| The port number of the operator's debugging port outside of the Kubernetes cluster. |`30999`|
112
+
|`externalOperatorCert`| A base64 encoded string containing the X.509 certificate that the operator will present to clients accessing its REST endpoints. This value is only used when `externalRestOption` is set to `CUSTOM_CERT`. ||
113
+
|`externalOperatorKey`| A base64 encoded string containing the private key of the operator's X.509 certificate. This value is used only when `externalRestOption` is set to `CUSTOM_CERT`. ||
114
+
|`externalRestHttpsPort`| The `NodePort` number that should be allocated on which the operator REST server should listen for HTTPS requests. |`31001`|
115
+
|`externalRestOption`|The available REST options. Allowed values are: <br/>- `NONE` Disable the REST interface. <br/>- `SELF_SIGNED_CERT` The operator will use a self-signed certificate for its REST server. If this value is specified, then the `externalSans` parameter must also be set. <br/>- `CUSTOM_CERT` Provide custom certificates, for example, from an external certification authority. If this value is specified, then `externalOperatorCert` and `externalOperatorKey` must also be provided.|`NONE`|
116
+
|`externalSans`| A comma-separated list of Subject Alternative Names that should be included in the X.509 Certificate. This list should include ... <br/>Example: `DNS:myhost,DNS:localhost,IP:127.0.0.1`||
117
+
|`internalDebugHttpPort`| The port number of the operator's debugging port inside the Kubernetes cluster. |`30999`|
118
+
|`javaLoggingLevel`| The level of Java logging that should be enabled in the operator. Allowed values are:`SEVERE`, `WARNING`, `INFO`, `CONFIG`, `FINE`, `FINER`, and `FINEST`|`INFO`|
119
+
|`namespace`| The Kubernetes namespace that the operator will be deployed in. It is recommended that a namespace be created for the operator rather than using the `default` namespace.|`weblogic-operator`|
120
+
|`remoteDebugNodePortEnabled`| Controls whether or not the operator will start a Java remote debug server on the provided port and suspend execution until a remote debugger has attached. |`false`|
121
+
|`serviceAccount`| The name of the service account that the operator will use to make requests to the Kubernetes API server. |`weblogic-operator`|
122
+
|`targetNamespaces`| A list of the Kubernetes namespaces that may contain WebLogic domains that the operator will manage. The operator will not take any action against a domain that is in a namespace not listed here. |`default`|
123
+
|`weblogicOperatorImage`| The Docker image containing the operator code. |`container-registry.oracle.com/middleware/weblogic-kubernetes-operator:latest`|
124
+
|`weblogicOperatorImagePullPolicy`| The image pull policy for the operator Docker image. Allowed values are: `Always`, `Never` and `IfNotPresent`|`IfNotPresent`|
125
+
|`weblogicOperatorImagePullSecretName`| Name of the Kubernetes secret to access the Docker Store to pull the WebLogic Server Docker image. The presence of the secret will be validated when this parameter is enabled. ||
126
126
127
127
Review the default values to see if any need to be updated to reflect the target environment. If so, then make a copy of the input file and modify it. Otherwise, you can use the default input file.
128
128
129
129
## Decide which REST configuration to use
130
130
131
131
The operator provides three REST certificate options:
*`CUSTOM_CERT`Provides a mechanism to provide certificates that were created and signed by some other means.
136
136
137
137
## Decide which options to enable
138
138
139
139
The operator provides some optional features that can be enabled in the configuration file.
140
140
141
-
### Load Balancing
141
+
### Load balancing with an Ingress controller or a web server
142
142
143
-
The operator can install the Traefik Ingress provider to provide load balancing for web applications running in WebLogic clusters. If enabled, an instance of Traefik and an Ingress will be created for each WebLogic cluster. Additional configuration is performed when creating the domain.
143
+
You can choose a load balancer provider for your WebLogic domains running in a Kubernetes cluster. Please refer to Load balancing with Voyager Ingress Controller, [Load balancing with Traefik Ingress Controller](site/traefik.md), and [Load balancing with the Apache HTTP Server](site/apache.md)for information about the current capabilities and setup instructions for each of the supported load balancers.
144
144
145
-
Note that the technology preview release provides only basic load balancing:
145
+
Note these limitations:
146
146
147
147
* Only HTTP(S) is supported. Other protocols are not supported.
148
148
* A root path rule is created for each cluster. Rules based on the DNS name, or on URL paths other than ‘/’, are not supported.
149
149
* No non-default configuration of the load balancer is performed in this release. The default configuration gives round robin routing and WebLogic Server will provide cookie-based session affinity.
150
150
151
151
Note that Ingresses are not created for servers that are not part of a WebLogic cluster, including the Administration Server. Such servers are exposed externally using NodePort services.
152
152
153
-
### Log integration with ELK
153
+
### Log integration with Elastic Stack
154
154
155
-
The operator can install the ELK stack and publish its logs into ELK. If enabled, ElasticSearch and Kibana will be installed in the `default` namespace, and a logstash container will be created in the operator pod. Logstash will be configured to publish the operator’s logs into ElasticSearch, and the log data will be available for visualization and analysis in Kibana.
155
+
The operator can install the Elastic Stack and publish its logs into it. If enabled, Elasticsearch and Kibana will be installed in the `default` namespace, and a Logstash container will be created in the operator pod. Logstash will be configured to publish the operator’s logs into Elasticsearch, and the log data will be available for visualization and analysis in Kibana.
156
156
157
-
To enable the ELK integration, set the `elkIntegrationEnabled` option to `true`.
157
+
To enable the Elastic Stack integration, set the `elkIntegrationEnabled` option to `true`.
158
158
159
159
## Deploying the operator to a Kubernetes cluster
160
160
161
161
At this point, you've created a custom inputs file, or you've decided to use the default one.
162
162
163
-
Next, choose and create a directory that generated operatorrelated files will be stored in, e.g. /path/to/weblogic-operator-output-directory.
163
+
Next, choose and create a directory that generated operator-related files will be stored in, for example, `/path/to/weblogic-operator-output-directory`.
164
164
165
165
Finally, run the operator installation script to deploy the operator, pointing it at your inputs file and your output directory:
166
166
@@ -174,20 +174,20 @@ Finally, run the operator installation script to deploy the operator, pointing i
174
174
175
175
The script will carry out the following actions:
176
176
177
-
* Create a directory for the generated Kubernetes YAML files for this operator. The pathname is /path/to/weblogic-operator-output-directory/weblogic-operators/<namespace parameter from create-weblogic-operator-inputs.yaml.
177
+
* Create a directory for the generated Kubernetes YAML files for this operator. The pathname is `/path/to/weblogic-operator-output-directory/weblogic-operators/<namespace parameter from create-weblogic-operator-inputs.yaml`.
178
178
* A set of Kubernetes YAML files will be created from the inputs provided in this directory.
179
179
* A namespace will be created for the operator.
180
180
* A service account will be created in that namespace.
181
181
* A set of RBAC roles and bindings will be created.
182
182
* The operator will be deployed.
183
183
* If requested, the load balancer will be deployed.
184
-
* If requested, ELK will be deployed and logstash will be configured for the operator’s logs.
184
+
* If requested, Elastic Stack will be deployed and Logstash will be configured for the operator’s logs.
185
185
186
186
The script will validate each action before it proceeds.
187
187
188
188
## YAML files created during the deployment of the operator
189
189
190
-
The script will create a YAML file called `weblogic-operator.yaml`. An example of this file is shown below. This file can be kept for later use. Developers or advanced users may wish to hand-edit this file.
190
+
The script will create a YAML file called `weblogic-operator.yaml`. An example of this file is shown below. This file can be kept for later use. Developers or advanced users may wish to handedit this file.
191
191
192
192
```
193
193
# Copyright 2017, 2018, Oracle Corporation and/or its affiliates. All rights reserved.
0 commit comments