You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
Oracle is finding ways for organizations using WebLogic Server to run important workloads, to move those workloads into the cloud. By certifying on industry standards, such as Docker and Kubernetes, WebLogic now runs in a cloud neutral infrastructure. In addition, we've provided an open-source Oracle WebLogic Server Kubernetes Operator (the “operator”) which has several key features to assist you with deploying and managing WebLogic domains in a Kubernetes environment. You can:
4
4
5
5
* Create WebLogic domains in a Kubernetes persistent volume. This persistent volume can reside in an NFS file system or other Kubernetes volume types.
6
-
* Create a WebLogic domain in a Docker image.
6
+
* Create a WebLogic domain in a container image.
7
7
* Override certain aspects of the WebLogic domain configuration.
8
8
* Define WebLogic domains as a Kubernetes resource (using a Kubernetes custom resource definition).
9
9
* Start servers based on declarative startup parameters and desired states.
@@ -17,8 +17,8 @@ Oracle is finding ways for organizations using WebLogic Server to run important
17
17
The fastest way to experience the operator is to follow the [Quick Start guide](https://oracle.github.io/weblogic-kubernetes-operator/quickstart/), or you can peruse our [documentation](https://oracle.github.io/weblogic-kubernetes-operator), read our [blogs](https://blogs.oracle.com/weblogicserver/updated-weblogic-kubernetes-support-with-operator-20), or try out the [samples](https://oracle.github.io/weblogic-kubernetes-operator/samples/).
18
18
19
19
***
20
-
The [current release of the operator](https://github.com/oracle/weblogic-kubernetes-operator/releases) is 3.1.1.
21
-
This release was published on December 17, 2020.
20
+
The [current release of the operator](https://github.com/oracle/weblogic-kubernetes-operator/releases) is 3.1.2.
echo"WebLogic Kubernetes Operator Docker Image was NOT successfully created. Check the output and correct any reported problems with the docker build operation."
87
+
echo"WebLogic Kubernetes Operator container image was NOT successfully created. Check the output and correct any reported problems with the docker build operation."
Copy file name to clipboardExpand all lines: docs-source/content/_index.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
Oracle is finding ways for organizations using WebLogic Server to run important workloads, to move those workloads into the cloud. By certifying on industry standards, such as Docker and Kubernetes, WebLogic now runs in a cloud neutral infrastructure. In addition, we've provided an open source Oracle WebLogic Server Kubernetes Operator (the “operator”) which has several key features to assist you with deploying and managing WebLogic domains in a Kubernetes environment. You can:
4
4
5
5
* Create WebLogic domains in a Kubernetes PersistentVolume. This PersistentVolume can reside in an NFS file system or other Kubernetes volume types.
6
-
* Create a WebLogic domain in a Docker image.
6
+
* Create a WebLogic domain in a container image.
7
7
* Override certain aspects of the WebLogic domain configuration.
8
8
* Define WebLogic domains as a Kubernetes resource (using a Kubernetes custom resource definition).
9
9
* Start servers based on declarative startup parameters and desired states.
@@ -23,8 +23,8 @@ using the operator to deploy and run a WebLogic domain container-packaged web ap
23
23
***
24
24
#### Current production release
25
25
26
-
The [current release of the operator](https://github.com/oracle/weblogic-kubernetes-operator/releases) is 3.1.1.
27
-
This release was published on December 17, 2020. See the operator prerequisites and supported environments [here]({{< relref "/userguide/introduction/introduction#operator-prerequisites" >}}).
26
+
The [current release of the operator](https://github.com/oracle/weblogic-kubernetes-operator/releases) is 3.1.2.
27
+
This release was published on January 22, 2021. See the operator prerequisites and supported environments [here]({{< relref "/userguide/introduction/introduction#operator-prerequisites" >}}).
Copy file name to clipboardExpand all lines: docs-source/content/developerguide/building.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,13 +28,12 @@ $ mvn javadoc:aggregate
28
28
29
29
The Javadoc is also available in the GitHub repository [here](https://oracle.github.io/weblogic-kubernetes-operator/apidocs/index.html).
30
30
31
-
#### Building the operator Docker image
31
+
#### Building the operator container image
32
32
33
-
Log in to the Docker Store so that you will be able to pull the base image and create the Docker image as follows. These commands should be executed in the project root directory:
33
+
These commands should be executed in the project root directory:
Replace `<version>` with the version of the project found in the `pom.xml` file in the project root directory.
@@ -51,7 +50,7 @@ You may need to create a directory called `/operator` on your machine. Please b
51
50
52
51
#### Running the operator in a Kubernetes cluster
53
52
54
-
If you're not running Kubernetes on your development machine, you'll need to make the Docker image available to a registry visible to your Kubernetes cluster. Either `docker push` the image to a private registry or upload your image to a machine running Docker and Kubernetes as follows:
53
+
If you're not running Kubernetes on your development machine, you'll need to make the container image available to a registry visible to your Kubernetes cluster. Either `docker push` the image to a private registry or upload your image to a machine running Docker and Kubernetes as follows:
Copy file name to clipboardExpand all lines: docs-source/content/developerguide/integration-tests.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ weight: 4
6
6
---
7
7
8
8
9
-
The project includes integration tests that can be run against a Kubernetes cluster. If you want to use these tests, you will need to provide your own Kubernetes cluster. The Kubernetes cluster must meet the version number requirements and have Helm installed. Ensure that the operator Docker image is in a Docker registry visible to the Kubernetes cluster.
9
+
The project includes integration tests that can be run against a Kubernetes cluster. If you want to use these tests, you will need to provide your own Kubernetes cluster. The Kubernetes cluster must meet the version number requirements and have Helm installed. Ensure that the operator container image is in a Docker registry visible to the Kubernetes cluster.
10
10
11
11
12
12
You will need to obtain the `kube.config` file for an administrative user and make it available on the machine running the build. To run the tests, update the `KUBECONFIG` environment variable to point to your config file and then execute:
You can provide multiple `imagePullSecrets` if you need to pull Docker images from multiple
126
-
remote Docker registries or if your images require different authentication credentials.
127
-
For more information, see [Docker Image Protection]({{<relref "/security/domain-security/image-protection#weblogic-domain-in-docker-image-protection">}}).
125
+
You can provide multiple `imagePullSecrets` if you need to pull container images from multiple
126
+
remote container registries or if your images require different authentication credentials.
127
+
For more information, see [Container Image Protection]({{<relref "/security/domain-security/image-protection#weblogic-domain-in-container-image-protection">}}).
128
128
{{% /notice %}}
129
129
130
130
#### Pushing the image to a repository
@@ -151,8 +151,8 @@ a remote repository, then the Docker steps are:
151
151
152
152
#### Manually copying the image to your worker nodes
153
153
154
-
If you are not able to use a remote Docker registry, for example if your Kubernetes cluster is
155
-
in a secure network with no external access, then you can manually copy the Docker images to the
154
+
If you are not able to use a remote container registry, for example if your Kubernetes cluster is
155
+
in a secure network with no external access, then you can manually copy the container images to the
156
156
cluster instead.
157
157
158
158
On the machine where you created the image, export it into a TAR file using this command:
Copy file name to clipboardExpand all lines: docs-source/content/faq/domain-secret-mismatch.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,28 +32,28 @@ This can happen in a variety of ways, depending on the [domain home source type]
32
32
33
33
##### Rolling to an image containing new or unrelated domain directory
34
34
35
-
The error occurs while rolling pods have containers based on a new Docker image that contains an entirely new or unrelated domain directory.
35
+
The error occurs while rolling pods have containers based on a new container image that contains an entirely new or unrelated domain directory.
36
36
37
37
The problem is that WebLogic cannot support server instances being part of the same WebLogic domain if the server instances do
38
38
not all share the same domain-specific encryption key. Additionally, operator introspection
39
39
currently happens only when starting servers following a total shutdown. Therefore, the `boot.properites` files generated from
40
40
introspecting the image containing the original domain directory will be invalid when used with a container started with
41
-
the updated Docker image containing the new or unrelated domain directory.
41
+
the updated container image containing the new or unrelated domain directory.
42
42
43
-
The solution is to follow either the recommended [CI/CD guidelines](https://oracle.github.io/weblogic-kubernetes-operator/userguide/cicd/) so that the original and new Docker images contain domain directories
43
+
The solution is to follow either the recommended [CI/CD guidelines](https://oracle.github.io/weblogic-kubernetes-operator/userguide/cicd/) so that the original and new container images contain domain directories
44
44
with consistent domain-specific encryption keys and bootstrapping security details, or to [perform a total shutdown](https://oracle.github.io/weblogic-kubernetes-operator/userguide/managing-domains/domain-lifecycle/startup/#starting-and-stopping-servers) of the domain so
45
45
that introspection reoccurs as servers are restarted.
46
46
47
47
##### Full domain shutdown and restart
48
48
49
49
The error occurs while starting servers after a full domain shutdown.
50
50
51
-
If your development model generates new Docker images
51
+
If your development model generates new container images
52
52
with new and unrelated domain directories and then tags those images with the same tag, then different Kubernetes worker nodes
53
-
may have different images under the same tag in their individual, local Docker repositories.
53
+
may have different images under the same tag in their individual, local container repositories.
54
54
55
55
The simplest solution is to set `imagePullPolicy` to `Always`; however, the better solution would be to design your development
56
-
pipeline to generate new Docker image tags on every build and to never reuse an existing tag.
56
+
pipeline to generate new container image tags on every build and to never reuse an existing tag.
57
57
58
58
#### Domain in PV
59
59
@@ -67,4 +67,4 @@ Because all servers will already be stopped, there is no requirement that the ne
67
67
the previous contents of the domain directory. When starting servers again, the operator will perform its introspection
68
68
of the domain directory. However, you may want to preserve the domain directory security configuration including the domain-specific
69
69
encryption key and, in that case, you should follow a similar pattern as is described in the [CI/CD guidelines](https://oracle.github.io/weblogic-kubernetes-operator/userguide/cicd/) for the domain
70
-
in a Docker image model to preserve the original security-related domain directory files.
70
+
in a container image model to preserve the original security-related domain directory files.
0 commit comments