Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion OracleSOASuite/kubernetes/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ The WebLogic Kubernetes operator (the “operator”) supports deployment of Ora
* `soaosb`: Deploys a domain with SOA, Oracle Enterprise Scheduler (ESS), and Oracle Service Bus

***
The current supported production release is [22.1.2](https://github.com/oracle/fmw-kubernetes/releases).
The current supported production release is [22.2.2](https://github.com/oracle/fmw-kubernetes/releases).
***

In this release, Oracle SOA Suite domains are supported using the “domain on a persistent volume”
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ The Ingress resource will be created in the same namespace as the SOA domain clu
Command to Generate Secret:
```
$ openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /tmp/tls1.key -out /tmp/tls1.crt -subj "/CN=*"
$ kubectl -n soans create secret tls domain1-tls-cert --key /tmp/tls1.key --cert /tmp/tls1.crt
$ kubectl -n soans create secret tls soainfra-tls-cert --key /tmp/tls1.key --cert /tmp/tls1.crt

```

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,110 @@
# Copyright (c) 2020, 2022, Oracle and/or its affiliates.
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.
#
{{- if eq .Values.type "NGINX" }}
{{- if (eq .Values.sslType "E2ESSL")}}
---
apiVersion: v1
kind: Service
metadata:
name: {{ .Values.wlsDomain.domainUID }}-{{ .Values.wlsDomain.adminServerName | lower }}-nginx-ssl
namespace: {{ .Release.Namespace }}
spec:
ports:
- port: {{ .Values.wlsDomain.adminServerSSLPort }}
protocol: TCP
targetPort: {{ .Values.wlsDomain.adminServerSSLPort }}
selector:
weblogic.domainUID: {{ .Values.wlsDomain.domainUID }}
weblogic.serverName: {{ .Values.wlsDomain.adminServerName }}
type: ClusterIP

---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: {{ .Values.wlsDomain.domainUID }}-nginx-e2essl-admin
namespace: {{ .Release.Namespace }}
annotations:
kubernetes.io/ingress.class: 'nginx'
nginx.ingress.kubernetes.io/affinity: 'cookie'
nginx.ingress.kubernetes.io/session-cookie-name: 'sticky'
nginx.ingress.kubernetes.io/ssl-passthrough: 'true'
spec:
tls:
- hosts:
- '{{ .Values.hostName.admin }}'
secretName: {{ .Values.wlsDomain.domainUID }}-tls-cert
rules:
- host: '{{ .Values.hostName.admin }}'
http:
paths:
- path:
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-{{ .Values.wlsDomain.adminServerName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.adminServerSSLPort }}
{{- if or (eq .Values.domainType "soa") (eq .Values.domainType "soaosb") }}
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: {{ .Values.wlsDomain.domainUID }}-nginx-e2essl-soa
namespace: {{ .Release.Namespace }}
annotations:
kubernetes.io/ingress.class: 'nginx'
nginx.ingress.kubernetes.io/affinity: 'cookie'
nginx.ingress.kubernetes.io/session-cookie-name: 'sticky'
nginx.ingress.kubernetes.io/ssl-passthrough: 'true'
spec:
tls:
- hosts:
- '{{ .Values.hostName.soa }}'
secretName: {{ .Values.wlsDomain.domainUID }}-tls-cert
rules:
- host: '{{ .Values.hostName.soa }}'
http:
paths:
- path: /
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-cluster-{{ .Values.wlsDomain.soaClusterName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.soaManagedServerSSLPort }}
{{- end }}
{{- if or (eq .Values.domainType "osb") (eq .Values.domainType "soaosb") }}
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: {{ .Values.wlsDomain.domainUID }}-nginx-e2essl-osb
namespace: {{ .Release.Namespace }}
annotations:
kubernetes.io/ingress.class: 'nginx'
nginx.ingress.kubernetes.io/affinity: 'cookie'
nginx.ingress.kubernetes.io/session-cookie-name: 'sticky'
nginx.ingress.kubernetes.io/ssl-passthrough: 'true'
spec:
tls:
- hosts:
- '{{ .Values.hostName.osb }}'
secretName: {{ .Values.wlsDomain.domainUID }}-tls-cert
rules:
- host: '{{ .Values.hostName.osb }}'
http:
paths:
- path: /
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-cluster-{{ .Values.wlsDomain.osbClusterName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.osbManagedServerSSLPort }}
{{- end }}

{{- end }}
{{- end }}

Original file line number Diff line number Diff line change
@@ -0,0 +1,154 @@
# Copyright (c) 2020, 2022, Oracle and/or its affiliates.
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.
#
{{- if eq .Values.type "NGINX" }}
{{- if (eq .Values.sslType "NONSSL") }}
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: {{ .Values.wlsDomain.domainUID }}-nginx
namespace: {{ .Release.Namespace }}
annotations:
kubernetes.io/ingress.class: 'nginx'
nginx.ingress.kubernetes.io/affinity: 'cookie'
nginx.ingress.kubernetes.io/session-cookie-name: 'sticky'
nginx.ingress.kubernetes.io/affinity-mode: 'persistent'
spec:
rules:
- host: '{{ .Values.nginx.hostname }}'
http:
paths:
- path: /console
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-{{ .Values.wlsDomain.adminServerName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.adminServerPort }}
- path: /em
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-{{ .Values.wlsDomain.adminServerName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.adminServerPort }}
- path: /weblogic/ready
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-{{ .Values.wlsDomain.adminServerName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.adminServerPort }}
{{- if or (eq .Values.domainType "soa") }}
- path: /
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-cluster-{{ .Values.wlsDomain.soaClusterName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.soaManagedServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "osb") }}
- path: /
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-cluster-{{ .Values.wlsDomain.osbClusterName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.osbManagedServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "soa") (eq .Values.domainType "soaosb") }}
- path: /soa-infra
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-cluster-{{ .Values.wlsDomain.soaClusterName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.soaManagedServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "soa") (eq .Values.domainType "soaosb") }}
- path: /soa/composer
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-cluster-{{ .Values.wlsDomain.soaClusterName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.soaManagedServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "soa") (eq .Values.domainType "soaosb") }}
- path: /integration/worklistapp
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-cluster-{{ .Values.wlsDomain.soaClusterName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.soaManagedServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "osb") (eq .Values.domainType "soaosb") }}
- path: /servicebus
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-{{ .Values.wlsDomain.adminServerName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.adminServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "osb") (eq .Values.domainType "soaosb") }}
- path: /lwpfconsole
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-{{ .Values.wlsDomain.adminServerName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.adminServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "osb") (eq .Values.domainType "soaosb") }}
- path: /xbusrouting
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-{{ .Values.wlsDomain.adminServerName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.adminServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "osb") (eq .Values.domainType "soaosb") }}
- path: /xbustransform
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-{{ .Values.wlsDomain.adminServerName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.adminServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "soa") (eq .Values.domainType "soaosb") }}
- path: /ess
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-cluster-{{ .Values.wlsDomain.soaClusterName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.soaManagedServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "soa") (eq .Values.domainType "soaosb") }}
- path: /EssHealthCheck
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-cluster-{{ .Values.wlsDomain.soaClusterName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.soaManagedServerPort }}
{{- end }}
{{- if or (eq .Values.domainType "soa") (eq .Values.domainType "soaosb") }}
- path: /b2bconsole
pathType: ImplementationSpecific
backend:
service:
name: '{{ .Values.wlsDomain.domainUID }}-cluster-{{ .Values.wlsDomain.soaClusterName | lower | replace "_" "-" }}'
port:
number: {{ .Values.wlsDomain.soaManagedServerPort }}
{{- end }}

{{- end }}
{{- end }}

Loading