You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: site/installation.md
+36-36Lines changed: 36 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ Note that there is a short video demonstration of the installation process avail
13
13
14
14
## Build the Docker image for the operator
15
15
16
-
The following software are required to obtain and build the operator:
16
+
The following software is required to obtain and build the operator:
17
17
18
18
* Git (1.8 or later recommended)
19
19
* Apache Maven (3.3 or later recommended)
@@ -32,28 +32,28 @@ Then run the build using this command:
32
32
mvn clean install
33
33
```
34
34
35
-
Then login to Docker Store so that you will be able to pull the base image, and create the Docker image as follows. These commands should be executed in the project root directory.:
35
+
Log in to the Docker Store so that you will be able to pull the base image and create the Docker image as follows. These commands should be executed in the project root directory:
Note: If you have not used the base image (`store/oracle/serverjre:8`) before you will need to visit the [Docker Store web interface](https://store.docker.com/images/oracle-serverjre-8) and accept the license agreement before Docker Store will give you permission to pull that image.
42
+
**Note**: If you have not used the base image (`store/oracle/serverjre:8`) before, you will need to visit the [Docker Store web interface](https://store.docker.com/images/oracle-serverjre-8) and accept the license agreement before the Docker Store will give you permission to pull that image.
43
43
44
-
We recommend that you use a tag other than `latest` to make it easy to distinguish your image. In the example above, the tag could be the GitHub ID of the developer.
44
+
We recommend that you use a tag other than `latest`, to make it easy to distinguish your image. In the example above, the tag could be the GitHub ID of the developer.
45
45
46
46
Next, upload your image to your Kubernetes server as follows:
47
47
48
48
```
49
-
# on your build machine
49
+
# on your build machine:
50
50
docker save weblogic-kubernetes-operator:developer > operator.tar
Verify that you have the right image by running `docker images | grep webloogic-kubernetes-operator` on both machines and comparing the image ID.
56
+
Verify that you have the right image by running `docker images | grep webloogic-kubernetes-operator` on both machines and comparing the image IDs.
57
57
58
58
[comment]: #( Pull the operator image )
59
59
[comment]: #( You can let Kubernetes pull the Docker image for you the first time you try to create a pod that uses the image, but we have found that you can generally avoid various common issues like putting the secret in the wrong namespace or getting the credentials wrong by just manually pulling the image by running these commands *on the Kubernetes master*: )
@@ -64,64 +64,64 @@ Verify that you have the right image by running `docker images | grep webloogic-
64
64
65
65
The operator is deployed with the provided installation script (`create-weblogic-operator.sh`). The default input to this script is the file `create-weblogic-operator-inputs.yaml`. It contains the following parameters:
66
66
67
-
### CONFIGURATION PARAMETERS FOR THE OPERATOR
67
+
### Configuration parameters for the operator
68
68
69
69
| Parameter | Definition | Default |
70
70
| --- | --- | --- |
71
-
| elkIntegrationEnabled | Determines whether the ELK integration will be enabled. If set to `true`, then ElasticSearch, logstash and Kibana will be installed, and logstash will be configured to export the operator’s logs to ElasticSearch. | false |
72
-
| externalDebugHttpPort | The port number of the operator's debugging port outside of the Kubernetes cluster. |30999|
73
-
| externalOperatorCert | A base64 encoded string containing the X.509 certificate that the operator will present to clients accessing its REST endpoints. This value is only used when `externalRestOption` is set to `CUSTOM_CERT`. ||
74
-
| externalOperatorKey | A base64 encoded string containing the private key of the operator's X.509 certificate. This value is only used when externalRestOption is set to `CUSTOM_CERT`. ||
75
-
| externalRestHttpsPort| The NodePort number that should be allocated for the operator REST server should listen for HTTPS requests on. | 31001 |
76
-
| externalRestOption |Which of the available REST options is desired. Allowed values: <br/>- `NONE` Disable the REST interface. <br/>- `SELF_SIGNED_CERT` The operator will use a self-signed certificate for its REST server. If this value is specified, then the `externalSans` parameter must also be set. <br/>- `CUSTOM_CERT` Provide custom certificates, for example from an external certification authority. If this value is specified, then the `externalOperatorCert` and `externalOperatorKey` must also be provided.| NONE |
77
-
| externalSans| A comma-separated list of Subject Alternative Names that should be included in the X.509 Certificate. This list should include ... <br/>Example: `DNS:myhost,DNS:localhost,IP:127.0.0.1`||
78
-
| internalDebugHttpPort | The port number of the operator's debugging port inside the Kubernetes cluster. | 30999 |
79
-
| javaLoggingLevel | The level of Java logging that should be enabled in the operator. Allowed values are `SEVERE`, `WARNING`, `INFO`, `CONFIG`, `FINE`, `FINER`, and `FINEST`| INFO |
80
-
| namespace | The Kubernetes namespace that the operator will be deployed in. It is recommended that a namespace be created for the operator rather than using the `default` namespace.| weblogic-operator |
81
-
| remoteDebugNodePortEnabled | Controls whether or not the operator will start a Java remote debug server on the provided port and suspend execution until a remote debugger has attached. | false |
82
-
| serviceAccount| The name of the service account that the operator will use to make requests to the Kubernetes API server. | weblogic-operator |
83
-
| targetNamespaces | A list of the Kubernetes namespaces that may contain WebLogic domains that the operator will manage. The operator will not take any action against a domain that is in a namespace not listed here. | default |
84
-
| weblogicOperatorImage | The Docker image containing the operator code. | container-registry.oracle.com/middleware/weblogic-kubernetes-operator:latest|
85
-
| weblogicOperatorImagePullPolicy | The image pull policy for the operator docker image. Allowed values are 'Always', 'Never' and 'IfNotPresent'| IfNotPresent |
86
-
| weblogicOperatorImagePullSecretName | Name of the Kubernetes secret to access the Docker Store to pull the WebLogic Server Docker image. The presence of the secret will be validated when this parameter is enabled. ||
71
+
|`elkIntegrationEnabled`| Determines whether the Elastic Stack integration will be enabled. If set to `true`, then Elasticsearch, Logstash, and Kibana will be installed, and Logstash will be configured to export the operator’s logs to Elasticsearch. |`false`|
72
+
|`externalDebugHttpPort`| The port number of the operator's debugging port outside of the Kubernetes cluster. |`3099`9|
73
+
|`externalOperatorCert`| A base64 encoded string containing the X.509 certificate that the operator will present to clients accessing its REST endpoints. This value is only used when `externalRestOption` is set to `CUSTOM_CERT`. ||
74
+
|`externalOperatorKey`| A base64 encoded string containing the private key of the operator's X.509 certificate. This value is used only when `externalRestOption` is set to `CUSTOM_CERT`. ||
75
+
|`externalRestHttpsPort`| The `NodePort` number that should be allocated on which the operator REST server should listen for HTTPS requests. |`31001`|
76
+
|`externalRestOption`|The available REST options. Allowed values are: <br/>- `NONE` Disable the REST interface. <br/>- `SELF_SIGNED_CERT` The operator will use a self-signed certificate for its REST server. If this value is specified, then the `externalSans` parameter must also be set. <br/>- `CUSTOM_CERT` Provide custom certificates, for example, from an external certification authority. If this value is specified, then `externalOperatorCert` and `externalOperatorKey` must also be provided.|`NONE`|
77
+
|`externalSans`| A comma-separated list of Subject Alternative Names that should be included in the X.509 Certificate. This list should include ... <br/>Example: `DNS:myhost,DNS:localhost,IP:127.0.0.1`||
78
+
|`internalDebugHttpPort`| The port number of the operator's debugging port inside the Kubernetes cluster. |`30999`|
79
+
|`javaLoggingLevel`| The level of Java logging that should be enabled in the operator. Allowed values are:`SEVERE`, `WARNING`, `INFO`, `CONFIG`, `FINE`, `FINER`, and `FINEST`|`INFO`|
80
+
|`namespace`| The Kubernetes namespace that the operator will be deployed in. It is recommended that a namespace be created for the operator rather than using the `default` namespace.|`weblogic-operator`|
81
+
|`remoteDebugNodePortEnabled`| Controls whether or not the operator will start a Java remote debug server on the provided port and suspend execution until a remote debugger has attached. |`false`|
82
+
|`serviceAccount`| The name of the service account that the operator will use to make requests to the Kubernetes API server. |`weblogic-operator`|
83
+
|`targetNamespaces`| A list of the Kubernetes namespaces that may contain WebLogic domains that the operator will manage. The operator will not take any action against a domain that is in a namespace not listed here. |`default`|
84
+
|`weblogicOperatorImage`| The Docker image containing the operator code. |`container-registry.oracle.com/middleware/weblogic-kubernetes-operator:latest`|
85
+
|`weblogicOperatorImagePullPolicy`| The image pull policy for the operator Docker image. Allowed values are: `Always`, `Never` and `IfNotPresent`|`IfNotPresent`|
86
+
|`weblogicOperatorImagePullSecretName`| Name of the Kubernetes secret to access the Docker Store to pull the WebLogic Server Docker image. The presence of the secret will be validated when this parameter is enabled. ||
87
87
88
88
Review the default values to see if any need to be updated to reflect the target environment. If so, then make a copy of the input file and modify it. Otherwise, you can use the default input file.
89
89
90
90
## Decide which REST configuration to use
91
91
92
92
The operator provides three REST certificate options:
*`CUSTOM_CERT`Provides a mechanism to provide certificates that were created and signed by some other means.
97
97
98
98
## Decide which options to enable
99
99
100
100
The operator provides some optional features that can be enabled in the configuration file.
101
101
102
-
### Load Balancing
102
+
### Load balancing with an Ingress controller or a web server
103
103
104
-
The operator can install the Traefik Ingress provider to provide load balancing for web applications running in WebLogic clusters. If enabled, an instance of Traefik and an Ingress will be created for each WebLogic cluster. Additional configuration is performed when creating the domain.
104
+
You can choose a load balancer provider for your WebLogic domains running in a Kubernetes cluster. Please refer to Load balancing with Voyager Ingress Controller, [Load balancing with Traefik Ingress Controller](site/traefik.md), and [Load balancing with Apache Web Server](site/apache.md)for information about the current capabilities and setup instructions for each of the supported load balancers.
105
105
106
-
Note that the technology preview release provides only basic load balancing:
106
+
Note that this release provides only basic load balancing:
107
107
108
108
* Only HTTP(S) is supported. Other protocols are not supported.
109
109
* A root path rule is created for each cluster. Rules based on the DNS name, or on URL paths other than ‘/’, are not supported.
110
110
* No non-default configuration of the load balancer is performed in this release. The default configuration gives round robin routing and WebLogic Server will provide cookie-based session affinity.
111
111
112
112
Note that Ingresses are not created for servers that are not part of a WebLogic cluster, including the Administration Server. Such servers are exposed externally using NodePort services.
113
113
114
-
### Log integration with ELK
114
+
### Log integration with Elastic Stack
115
115
116
-
The operator can install the ELK stack and publish its logs into ELK. If enabled, ElasticSearch and Kibana will be installed in the `default` namespace, and a logstash container will be created in the operator pod. Logstash will be configured to publish the operator’s logs into ElasticSearch, and the log data will be available for visualization and analysis in Kibana.
116
+
The operator can install the Elastic Stack and publish its logs into it. If enabled, Elasticsearch and Kibana will be installed in the `default` namespace, and a Logstash container will be created in the operator pod. Logstash will be configured to publish the operator’s logs into Elasticsearch, and the log data will be available for visualization and analysis in Kibana.
117
117
118
-
To enable the ELK integration, set the `elkIntegrationEnabled` option to `true`.
118
+
To enable the Elastic Stack integration, set the `elkIntegrationEnabled` option to `true`.
119
119
120
120
## Deploying the operator to a Kubernetes cluster
121
121
122
122
At this point, you've created a custom inputs file, or you've decided to use the default one.
123
123
124
-
Next, choose and create a directory that generated operatorrelated files will be stored in, e.g. /path/to/weblogic-operator-output-directory.
124
+
Next, choose and create a directory that generated operator-related files will be stored in, for example, `/path/to/weblogic-operator-output-directory`.
125
125
126
126
Finally, run the operator installation script to deploy the operator, pointing it at your inputs file and your output directory:
127
127
@@ -135,20 +135,20 @@ Finally, run the operator installation script to deploy the operator, pointing i
135
135
136
136
The script will carry out the following actions:
137
137
138
-
* Create a directory for the generated Kubernetes YAML files for this operator. The pathname is /path/to/weblogic-operator-output-directory/weblogic-operators/<namespace parameter from create-weblogic-operator-inputs.yaml.
138
+
* Create a directory for the generated Kubernetes YAML files for this operator. The pathname is `/path/to/weblogic-operator-output-directory/weblogic-operators/<namespace parameter from create-weblogic-operator-inputs.yaml`.
139
139
* A set of Kubernetes YAML files will be created from the inputs provided in this directory.
140
140
* A namespace will be created for the operator.
141
141
* A service account will be created in that namespace.
142
142
* A set of RBAC roles and bindings will be created.
143
143
* The operator will be deployed.
144
144
* If requested, the load balancer will be deployed.
145
-
* If requested, ELK will be deployed and logstash will be configured for the operator’s logs.
145
+
* If requested, Elastic Stack will be deployed and Logstash will be configured for the operator’s logs.
146
146
147
147
The script will validate each action before it proceeds.
148
148
149
149
## YAML files created during the deployment of the operator
150
150
151
-
The script will create a YAML file called `weblogic-operator.yaml`. An example of this file is shown below. This file can be kept for later use. Developers or advanced users may wish to hand-edit this file.
151
+
The script will create a YAML file called `weblogic-operator.yaml`. An example of this file is shown below. This file can be kept for later use. Developers or advanced users may wish to handedit this file.
152
152
153
153
```
154
154
# Copyright 2017, 2018, Oracle Corporation and/or its affiliates. All rights reserved.
0 commit comments