This sample demonstrates how to use the WebLogic Kubernetes Operator (hereafter “the operator”) to set up a WebLogic Server (WLS) cluster on the Azure Kubernetes Service (AKS) using the domain on PV approach. After going through the steps, your WLS domain runs on an AKS cluster instance and you can manage your WLS domain by accessing the WebLogic Server Administration Console.
This sample assumes the following prerequisite environment.
git --version
to test if git
works. This document was tested with version 2.25.1.az --version
to test if az
works. This document was tested with version 2.48.1.Docker version 20.10.7
kubectl version
to test if kubectl
works. This document was tested with version v1.21.2.helm version
to check the helm
version. This document was tested with version v3.6.2.JAVA_HOME
environment variable is set correctly in the shells in which you run the commands.domain creation image
tagged as wdt-domain-image:WLS-v1
in your local Docker server’s image cache. You can create it by following the Build the domain creation image step.You will need an Oracle account. The following steps will direct you to accept the license agreement for WebLogic Server. Make note of your Oracle Account password and email. This sample pertains to 12.2.1.4, but other versions may work as well.
--recommendedPatches
option. For more guidance,
see Apply the Latest Patches and Updates
in Securing a Production Environment for Oracle WebLogic Server.$ docker login container-registry.oracle.com -u ${ORACLE_SSO_EMAIL} -p ${ORACLE_SSO_PASSWORD}
$ docker pull container-registry.oracle.com/middleware/weblogic:12.2.1.4
If you have problems accessing the Oracle Container Registry, you can build your own images from the Oracle GitHub repository.
The steps in this section show you how to sign in to the Azure CLI.
Open a Bash shell.
Sign out and delete some authentication files to remove any lingering credentials.
$ az logout
$ rm ~/.azure/accessTokens.json
$ rm ~/.azure/azureProfile.json
Sign in to your Azure CLI.
$ az login
Set the subscription ID. Be sure to replace the placeholder with the appropriate value.
$ export SUBSCRIPTION_ID=<your-subscription-id>
$ az account set -s $SUBSCRIPTION_ID
The following sections of the sample instructions will guide you, step-by-step, through the process of setting up a WebLogic cluster on AKS - remaining as close as possible to a native Kubernetes experience. This lets you understand and customize each step. If you wish to have a more automated experience that abstracts some lower level details, you can skip to the Automation section.
# Change these parameters as needed for your own environment
export ORACLE_SSO_EMAIL=<replace with your oracle account email>
export ORACLE_SSO_PASSWORD=<replace with your oracle password>
# Specify a prefix to name resources, only allow lowercase letters and numbers, between 1 and 7 characters
export BASE_DIR=~
export NAME_PREFIX=wls
export WEBLOGIC_USERNAME=weblogic
export WEBLOGIC_PASSWORD=Secret123456
export domainUID=domain1
# Used to generate resource names.
export TIMESTAMP=`date +%s`
export AKS_CLUSTER_NAME="${NAME_PREFIX}aks${TIMESTAMP}"
export AKS_PERS_RESOURCE_GROUP="${NAME_PREFIX}resourcegroup${TIMESTAMP}"
export AKS_PERS_LOCATION=eastus
export AKS_PERS_STORAGE_ACCOUNT_NAME="${NAME_PREFIX}storage${TIMESTAMP}"
export AKS_PERS_SHARE_NAME="${NAME_PREFIX}-weblogic-${TIMESTAMP}"
export SECRET_NAME_DOCKER="${NAME_PREFIX}regcred"
export ACR_ACCOUNT_NAME="${NAME_PREFIX}acr${TIMESTAMP}"
Download the WebLogic Kubernetes Operator sample ZIP file. We will use several scripts in this zip file to create a WebLogic domain. This sample was tested with v4.1.7, but should work with the latest release.
$ cd $BASE_DIR
$ mkdir sample-scripts
$ curl -m 120 -fL https://github.com/oracle/weblogic-kubernetes-operator/releases/download/v4.1.7/sample-scripts.zip \
-o ${BASE_DIR}/sample-scripts/sample-scripts.zip
$ unzip ${BASE_DIR}/sample-scripts/sample-scripts.zip -d ${BASE_DIR}/sample-scripts
$ az extension add --name resource-graph
$ az group create --name $AKS_PERS_RESOURCE_GROUP --location $AKS_PERS_LOCATION
This sample doesn’t enable application routing. If you want to enable application routing, follow Managed nginx Ingress with the application routing add-on in AKS.
Run the following commands to create the AKS cluster instance.
$ az aks create \
--resource-group $AKS_PERS_RESOURCE_GROUP \
--name $AKS_CLUSTER_NAME \
--node-count 2 \
--generate-ssh-keys \
--nodepool-name nodepool1 \
--node-vm-size Standard_DS2_v2 \
--location $AKS_PERS_LOCATION \
--enable-managed-identity
Successful output will be a JSON object with the entry "type": "Microsoft.ContainerService/ManagedClusters"
.
After the deployment finishes, run the following command to connect to the AKS cluster. This command updates your local ~/.kube/config
so that subsequent kubectl
commands interact with the named AKS cluster.
$ az aks get-credentials --resource-group $AKS_PERS_RESOURCE_GROUP --name $AKS_CLUSTER_NAME
Successful output will look similar to:
Merged "wlsaks1596087429" as current context in /home/username/.kube/config
After your Kubernetes cluster is up and running, run the following commands to make sure kubectl
can access the Kubernetes cluster:
$ kubectl get nodes -o wide
Successful output will look like the following.
NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME
aks-nodepool1-15679926-vmss000000 Ready agent 118s v1.25.6 10.224.0.4 <none> Ubuntu 22.04.2 LTS 5.15.0-1041-azure containerd://1.7.1+azure-1
aks-nodepool1-15679926-vmss000001 Ready agent 2m8s v1.25.6 10.224.0.5 <none> Ubuntu 22.04.2 LTS 5.15.0-1041-azure containerd://1.7.1+azure-1
NOTE: If you run into VM size failure, see Troubleshooting - Virtual Machine size is not supported.
Our usage pattern for the operator involves creating Kubernetes “persistent volumes” to allow the WebLogic Server to persist its configuration and data separately from the Kubernetes Pods that run WebLogic Server workloads.
You will create an external data volume to access and persist data. There are several options for data sharing as described in Storage options for applications in Azure Kubernetes Service (AKS).
You will dynamically create and use a persistent volume with Azure Files NFS share. For details about this full featured cloud storage solution, see the Azure Files Documentation.
Create an Azure Storage Account.
Create a storage account using the Azure CLI. Make sure the following values are specified:
Option name | Value | Notes |
---|---|---|
name |
$AKS_PERS_STORAGE_ACCOUNT_NAME |
The storage account name can contain only lowercase letters and numbers, and must be between 3 and 24 characters in length. |
sku |
Premium_LRS |
Only Premium_LRS and Premium_ZRS work for NFS share, see the Azure Files NFS Share Documentation. |
https-only |
false |
You can’t mount an NFS file share unless you disable secure transfer. |
default-action |
Deny |
For security, we suggest that you deny access by default and choose to allow access from the AKS cluster network. |
$ az storage account create \
--resource-group $AKS_PERS_RESOURCE_GROUP \
--name $AKS_PERS_STORAGE_ACCOUNT_NAME \
--location $AKS_PERS_LOCATION \
--sku Premium_LRS \
--kind FileStorage \
--https-only false \
--default-action Deny
Successful output will be a JSON object with the entry "type": "Microsoft.Storage/storageAccounts"
.
Create an NFS share.
We strongly recommend NFS instead of SMB. NFS evolved from the UNIX operating system, and other variants such as GNU/Linux. For this reason, when using NFS with container technologies such as Docker, it is less likely to have problems for concurrent reads and file locking.
Please be sure to enable NFS v4.1. Versions lower than v4.1 will have problems.
To create the file share, you must use NoRootSquash
to allow the operator to change the ownership of the directory in the NFS share.
Otherwise, you will get an error like chown: changing ownership of '/shared': Operation not permitted
.
The following command creates an NFS share with 100GiB:
# Create NFS file share
$ az storage share-rm create \
--resource-group $AKS_PERS_RESOURCE_GROUP \
--storage-account $AKS_PERS_STORAGE_ACCOUNT_NAME \
--name ${AKS_PERS_SHARE_NAME} \
--enabled-protocol NFS \
--root-squash NoRootSquash \
--quota 100
The command provisions an NFS file share with NFS 4.1 or above.
Assign the AKS cluster Contributor role to access the storage account.
You must configure role assignment allowing access from AKS cluster to the storage account.
Get objectId
of the AKS cluster with the following command and save it with variable AKS_OBJECT_ID
:
$ AKS_OBJECT_ID=$(az aks show --name ${AKS_CLUSTER_NAME} --resource-group ${AKS_PERS_RESOURCE_GROUP} --query "identity.principalId" -o tsv)
Get Id of the storage account with the following command:
$ STORAGE_ACCOUNT_ID=$(az storage account show --name ${AKS_PERS_STORAGE_ACCOUNT_NAME} --resource-group ${AKS_PERS_RESOURCE_GROUP} --query "id" -o tsv)
Now, you are able to create a role assignment to grant the AKS cluster Contributor in the scope of the storage account. Then, the AKS cluster is able to access the file share.
$ az role assignment create \
--assignee-object-id "${AKS_OBJECT_ID}" \
--assignee-principal-type "ServicePrincipal" \
--role "Contributor" \
--scope "${STORAGE_ACCOUNT_ID}"
Successful output will be a JSON object with string like:
{
"condition": null,
"conditionVersion": null,
"createdBy": "d6fe7d09-3330-45b6-ae32-4dd5e3310835",
"createdOn": "2023-05-11T04:13:04.922943+00:00",
"delegatedManagedIdentityResourceId": null,
"description": null,
"id": "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/wlsresourcegroup1683777168/providers/Microsoft.Storage/storageAccounts/wlsstorage1683777168/providers/Microsoft.Authorization/roleAssignments/93dae12d-21c8-4844-99cd-e8b088356af6",
"name": "93dae12d-21c8-4844-99cd-e8b088356af6",
"principalId": "95202c6f-2073-403c-b9a7-7d2f1cbb4541",
"principalName": "3640cbf2-4db7-43b8-bcf6-1e51d3e90478",
"principalType": "ServicePrincipal",
"resourceGroup": "wlsresourcegroup1683777168",
"roleDefinitionId": "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c",
"roleDefinitionName": "Contributor",
"scope": "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/wlsresourcegroup1683777168/providers/Microsoft.Storage/storageAccounts/wlsstorage1683777168",
"type": "Microsoft.Authorization/roleAssignments",
"updatedBy": "d6fe7d09-3330-45b6-ae32-4dd5e3310835",
"updatedOn": "2023-05-11T04:13:04.922943+00:00"
}
Configure network security.
You must configure the network security allowing access from AKS cluster to the file share.
First, you must get the virtual network name and the subnet name of the AKS cluster.
Run the following commands to get network information:
# get the resource group name of the AKS managed resources
$ aksMCRGName=$(az aks show --name $AKS_CLUSTER_NAME --resource-group $AKS_PERS_RESOURCE_GROUP -o tsv --query "nodeResourceGroup")
$ echo ${aksMCRGName}
# get network name of AKS cluster
$ aksNetworkName=$(az graph query -q "Resources \
| where type =~ 'Microsoft.Network/virtualNetworks' \
| where resourceGroup =~ '${aksMCRGName}' \
| project name = name" --query "data[0].name" -o tsv)
$ echo ${aksNetworkName}
# get subnet name of AKS agent pool
$ aksSubnetName=$(az network vnet subnet list --resource-group ${aksMCRGName} --vnet-name ${aksNetworkName} -o tsv --query "[*].name")
$ echo ${aksSubnetName}
# get subnet id of the AKS agent pool
$ aksSubnetId=$(az network vnet subnet list --resource-group ${aksMCRGName} --vnet-name ${aksNetworkName} -o tsv --query "[*].id")
$ echo ${aksSubnetId}
You must enable the service endpoint Microsoft.Storage
for the subnet using the following command:
$ az network vnet subnet update \
--resource-group $aksMCRGName \
--name ${aksSubnetName} \
--vnet-name ${aksNetworkName} \
--service-endpoints Microsoft.Storage
It takes several minutes to enable the service endpoint; successful output will be a JSON object with string like:
"serviceEndpoints": [
{
"locations": [
"eastus",
"westus"
],
"provisioningState": "Succeeded",
"service": "Microsoft.Storage"
}
Now you must create a network rule to allow access from AKS cluster. The following command enables access from AKS subnet to the storage account:
$ az storage account network-rule add \
--resource-group $AKS_PERS_RESOURCE_GROUP \
--account-name $AKS_PERS_STORAGE_ACCOUNT_NAME \
--subnet ${aksSubnetId}
Successful output will be a JSON object with virtual network rule like:
"virtualNetworkRules": [
{
"action": "Allow",
"state": "Succeeded",
"virtualNetworkResourceId": "${aksSubnetId}"
}
]
Use the below command to generate configuration files.
cat >azure-csi-nfs-${TIMESTAMP}.yaml <<EOF
# Copyright (c) 2018, 2023, Oracle and/or its affiliates.
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: azurefile-csi-nfs
provisioner: file.csi.azure.com
parameters:
protocol: nfs
resourceGroup: ${AKS_PERS_RESOURCE_GROUP}
storageAccount: ${AKS_PERS_STORAGE_ACCOUNT_NAME}
shareName: ${AKS_PERS_SHARE_NAME}
reclaimPolicy: Delete
volumeBindingMode: Immediate
allowVolumeExpansion: true
EOF
cat >pvc-${TIMESTAMP}.yaml <<EOF
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: wls-azurefile-${TIMESTAMP}
spec:
accessModes:
- ReadWriteMany
storageClassName: azurefile-csi-nfs
resources:
requests:
storage: 5Gi
EOF
Use the kubectl
command to create the Storage Class and persistent volume claim to the default
namespace.
$ kubectl apply -f azure-csi-nfs-${TIMESTAMP}.yaml
$ kubectl apply -f pvc-${TIMESTAMP}.yaml
Use the following command to verify:
$ kubectl get sc
Example of kubectl get sc
output:
$ kubectl get sc
NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE
azurefile file.csi.azure.com Delete Immediate true 30m
azurefile-csi file.csi.azure.com Delete Immediate true 30m
azurefile-csi-nfs file.csi.azure.com Delete Immediate true 24m
azurefile-csi-premium file.csi.azure.com Delete Immediate true 30m
azurefile-premium file.csi.azure.com Delete Immediate true 30m
...
$ kubectl get pvc
Example of kubectl get pvc
output:
$ kubectl get pvc
NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE
wls-azurefile-1693900684 Bound pvc-1f615766-0f21-4c88-80e1-93c9bdabb3eb 5Gi RWX azurefile-csi-nfs 46s
Your AKS cluster must be connected to a container registry so it can pull and interact with container images. The WebLogic Kubernetes Operator assumes that the docker images in the container registry have the correct structure so they are ready to run as WebLogic Docker images. The WebLogic Image Toolkit you used when satisfying the preconditions produces images that meet this requirement. In particular the image wdt-domain-image:WLS-v1
. The steps in this section show you how to create an Azure Container Registry, connect it to your existing AKS cluster, and push the wdt-domain-image:WLS-v1
to this registry.
Create the Azure Container Registry in your existing resource group.
az acr create --resource-group $AKS_PERS_RESOURCE_GROUP --name ${ACR_ACCOUNT_NAME} --sku Basic --admin-enabled
Successful output will be a JSON object that includes the property.
"id": "/subscriptions/<your subscription id>/resourceGroups/<your resource group>/providers/Microsoft.ContainerRegistry/registries/<your aks cluster name>"
Obtain the credentials to the Azure Container Registry and perform the docker login
.
export LOGIN_SERVER=$(az acr show \
--name ${ACR_ACCOUNT_NAME} \
--query 'loginServer' \
--output tsv)
export USER_NAME=$(az acr credential show \
--name ${ACR_ACCOUNT_NAME} \
--query 'username' \
--output tsv)
export PASSWORD=$(az acr credential show \
--name ${ACR_ACCOUNT_NAME} \
--query 'passwords[0].value' \
--output tsv)
docker login $LOGIN_SERVER -u $USER_NAME -p $PASSWORD
Push the wdt-domain-image:WLS-v1
image created while satisfying the preconditions to this registry.
docker push ${LOGIN_SERVER}/wdt-domain-image:WLS-v1
Set an environment variable for use in a later script.
# An example of Domain_Creation_Image_tag: xxx.azurecr.io/wdt-domain-image:WLS-v1
export Domain_Creation_Image_tag=${LOGIN_SERVER}/wdt-domain-image:WLS-v1
Connect the Azure Container Registry to your existing AKS cluster.
az aks update --name ${AKS_CLUSTER_NAME} --resource-group $AKS_PERS_RESOURCE_GROUP --attach-acr ${ACR_ACCOUNT_NAME}
The WebLogic Kubernetes Operator is an adapter to integrate WebLogic Server and Kubernetes, allowing Kubernetes to serve as a container infrastructure hosting WLS instances. The operator runs as a Kubernetes Pod and stands ready to perform actions related to running WLS on Kubernetes.
Kubernetes Operators use Helm to manage Kubernetes applications. The operator’s Helm chart is located in the kubernetes/charts/weblogic-operator
directory. Please install the operator by running the corresponding command.
$ helm repo add weblogic-operator https://oracle.github.io/weblogic-kubernetes-operator/charts --force-update
$ helm repo update
$ helm install weblogic-operator weblogic-operator/weblogic-operator
The output will show something similar to the following:
$ helm install weblogic-operator weblogic-operator/weblogic-operator
NAME: weblogic-operator
LAST DEPLOYED: Tue Jan 18 17:07:56 2022
NAMESPACE: default
STATUS: deployed
REVISION: 1
TEST SUITE: None
Verify the operator with the following command; the STATUS
must be Running
. The READY
must be 1/1
.
$ kubectl get pods -w
NAME READY STATUS RESTARTS AGE
weblogic-operator-69794f8df7-bmvj9 1/1 Running 0 86s
weblogic-operator-webhook-868db5875b-55v7r 1/1 Running 0 86s
You will have to press Ctrl-C to exit this command due to the -w
flag.
Now that you have created the AKS cluster, installed the operator, and verified that the operator is ready to go, you can ask the operator to create a WLS domain.
You will use the $BASE_DIR/sample-scripts/create-weblogic-domain-credentials/create-weblogic-credentials.sh
script to create the domain WebLogic administrator credentials as a Kubernetes secret. Please run:
cd $BASE_DIR/sample-scripts/create-weblogic-domain-credentials
$ ./create-weblogic-credentials.sh -u ${WEBLOGIC_USERNAME} -p ${WEBLOGIC_PASSWORD} -d domain1
secret/domain1-weblogic-credentials created
secret/domain1-weblogic-credentials labeled
The secret domain1-weblogic-credentials has been successfully created in the default namespace.
You will use the kubernetes/samples/scripts/create-kubernetes-secrets/create-docker-credentials-secret.sh
script to create the Docker credentials as a Kubernetes secret. Please run:
$ cd $BASE_DIR/sample-scripts/create-kubernetes-secrets
$ ./create-docker-credentials-secret.sh -s ${SECRET_NAME_DOCKER} -e ${ORACLE_SSO_EMAIL} -p ${ORACLE_SSO_PASSWORD} -u ${ORACLE_SSO_EMAIL}
secret/wlsregcred created
The secret wlsregcred has been successfully created in the default namespace.
Verify secrets with the following command:
$ kubectl get secret
NAME TYPE DATA AGE
domain1-weblogic-credentials Opaque 2 2m32s
sh.helm.release.v1.weblogic-operator.v1 helm.sh/release.v1 1 5m32s
weblogic-operator-secrets Opaque 1 5m31s
weblogic-webhook-secrets Opaque 2 5m31s
wlsregcred kubernetes.io/dockerconfigjson 1 38s
NOTE: If the NAME
column in your output is missing any of the values shown above, please review your execution of the preceding steps in this sample to ensure that you correctly followed all of them.
Run the following command to enable the operator to monitor the namespace.
kubectl label namespace default weblogic-operator=enabled
Now, you deploy a sample-domain1
domain resource and an associated sample-domain1-cluster-1
cluster resource using a single YAML resource file which defines both resources. The domain resource and cluster resource tells the operator how to deploy a WebLogic domain. They do not replace the traditional WebLogic configuration files, but instead cooperate with those files to describe the Kubernetes artifacts of the corresponding domain.
Run the following command to generate resource files.
cd $BASE_DIR/sample-scripts/create-weblogic-domain-on-azure-kubernetes-service
bash create-domain-on-aks-generate-yaml.sh
After running above commands, you will get three files: domain-resource.yaml
, admin-lb.yaml
, cluster-lb.yaml
.
The domain resource references the cluster resource, a WebLogic Server installation image, the secrets you defined, PV and PVC configuration details, and a sample domain creation image
, which contains a traditional WebLogic configuration and a WebLogic application. For detailed information, see Domain and cluster resources.
Run the following command to apply the two sample resources.
$ kubectl apply -f domain-resource.yaml
Create the load balancer services using the following commands:
$ kubectl apply -f admin-lb.yaml
service/domain1-admin-server-external-lb created
$ kubectl apply -f cluster-lb.yaml
service/domain1-cluster-1-external-lb created
After a short time, you will see the Administration Server and Managed Servers running.
Use the following command to check server pod status:
$ kubectl get pods --watch
It may take you up to 20 minutes to deploy all pods, please wait and make sure everything is ready.
You can tail the logs of the Administration Server with this command:
kubectl logs -f domain1-admin-server
The final example of pod output is as following:
$ kubectl get pods
NAME READY STATUS RESTARTS AGE
domain1-admin-server 1/1 Running 0 12m
domain1-managed-server1 1/1 Running 0 10m
domain1-managed-server2 1/1 Running 0 10m
weblogic-operator-7796bc7b8-qmhzw 1/1 Running 0 48m
weblogic-operator-webhook-b5b586bc5-ksfg9 1/1 Running 0 48m
If Kubernetes advertises the WebLogic pod as Running
you can be assured the WebLogic Server actually is running because the operator ensures that the Kubernetes health checks are actually polling the WebLogic health check mechanism.
Get the addresses of the Administration Server and Managed Servers (please wait for the external IP addresses to be assigned):
$ kubectl get svc --watch
The final example of service output is as following:
$ kubectl get svc --watch
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
domain1-admin-server ClusterIP None <none> 7001/TCP 13m
domain1-admin-server-external-lb LoadBalancer 10.0.30.252 4.157.147.131 7001:31878/TCP 37m
domain1-cluster-1-lb LoadBalancer 10.0.26.96 4.157.147.212 8001:32318/TCP 37m
domain1-cluster-cluster-1 ClusterIP 10.0.157.174 <none> 8001/TCP 10m
domain1-managed-server1 ClusterIP None <none> 8001/TCP 10m
domain1-managed-server2 ClusterIP None <none> 8001/TCP 10m
kubernetes ClusterIP 10.0.0.1 <none> 443/TCP 60m
weblogic-operator-webhook-svc ClusterIP 10.0.41.121 <none> 8083/TCP,8084/TCP 49m
In the example, the URL to access the Administration Server is: http://4.157.147.131/console
.
The user name and password that you enter for the Administration Console must match the ones you specified for the domain1-weblogic-credentials
secret in the Create secrets step.
If the WLS Administration Console is still not available, use kubectl get events --sort-by='.metadata.creationTimestamp'
to troubleshoot.
$ kubectl get events --sort-by='.metadata.creationTimestamp'
To deploy a sample application on WLS, you may skip to the section Deploy sample application. The next section includes a script that automates all of the preceding steps.
If you want to automate the above steps of creating AKS cluster and WLS domain, you can use the script kubernetes/samples/scripts/create-weblogic-domain-on-azure-kubernetes-service/create-domain-on-aks.sh
.
The sample script will create a WLS domain home on the AKS cluster, including:
For input values, you can edit kubernetes/samples/scripts/create-weblogic-domain-on-azure-kubernetes-service/create-domain-on-aks-inputs.sh
directly. The following values must be specified:
Name in YAML file | Example value | Notes |
---|---|---|
dockerEmail |
yourDockerEmail |
Oracle Single Sign-On (SSO) account email, used to pull the WebLogic Server Docker image. |
dockerPassword |
yourDockerPassword |
Password for Oracle SSO account, used to pull the WebLogic Server Docker image, in clear text. |
weblogicUserName |
weblogic |
Uername for WebLogic user account. |
weblogicAccountPassword |
Secret123456 |
Password for WebLogic user account. |
cd kubernetes/samples/scripts/create-weblogic-domain-on-azure-kubernetes-service
$ ./create-domain-on-aks.sh
The script will print the Administration Server address after a successful deployment.
To interact with the cluster using kubectl
, use az aks get-credentials
as shown in the script output.
You now have created an AKS cluster with Azure Files NFS share to contain the WLS domain configuration files. Using those artifacts, you have used the operator to create a WLS domain.
Now that you have WLS running in AKS, you can test the cluster by deploying the simple sample application included in the repository.
First, package the application with the following command:
$ curl -m 120 -fL https://github.com/oracle/weblogic-kubernetes-operator/archive/refs/tags/v4.1.7.zip -o ${BASE_DIR}/v4.1.7.zip
$ unzip v4.1.7.zip "weblogic-kubernetes-operator-4.1.7/integration-tests/src/test/resources/bash-scripts/build-war-app.sh" "weblogic-kubernetes-operator-4.1.7/integration-tests/src/test/resources/apps/testwebapp/*"
$ cd $BASE_DIR/weblogic-kubernetes-operator-4.1.7/integration-tests/src/test/resources/bash-scripts
$ bash build-war-app.sh -s ../apps/testwebapp/ -d /tmp/testwebapp
Successful output will look similar to the following:
Found source at ../apps/testwebapp/
build /tmp/testwebapp/testwebapp.war with command jar -cvf /tmp/testwebapp/testwebapp.war *
added manifest
ignoring entry META-INF/
ignoring entry META-INF/MANIFEST.MF
adding: META-INF/maven/(in = 0) (out= 0)(stored 0%)
adding: META-INF/maven/com.oracle.weblogic/(in = 0) (out= 0)(stored 0%)
adding: META-INF/maven/com.oracle.weblogic/testwebapp/(in = 0) (out= 0)(stored 0%)
adding: META-INF/maven/com.oracle.weblogic/testwebapp/pom.properties(in = 117) (out= 113)(deflated 3%)
adding: META-INF/maven/com.oracle.weblogic/testwebapp/pom.xml(in = 1210) (out= 443)(deflated 63%)
adding: WEB-INF/(in = 0) (out= 0)(stored 0%)
adding: WEB-INF/web.xml(in = 951) (out= 428)(deflated 54%)
adding: WEB-INF/weblogic.xml(in = 1140) (out= 468)(deflated 58%)
adding: index.jsp(in = 1001) (out= 459)(deflated 54%)
-rw-r--r-- 1 user user 3528 Jul 5 14:25 /tmp/testwebapp/testwebapp.war
Now, you are able to deploy the sample application in /tmp/testwebapp/testwebapp.war
to the cluster. This sample uses WLS RESTful API /management/weblogic/latest/edit/appDeployments to deploy the sample application.
Replace ${WEBLOGIC_USERNAME}
and ${WEBLOGIC_PASSWORD}
with the values you specified in Create secrets or Automation:
$ ADMIN_SERVER_IP=$(kubectl get svc domain1-admin-server-external-lb -o=jsonpath='{.status.loadBalancer.ingress[0].ip}')
$ curl --user ${WEBLOGIC_USERNAME}:${WEBLOGIC_PASSWORD} -H X-Requested-By:MyClient -H Accept:application/json -s -v \
-H Content-Type:multipart/form-data \
-F "model={
name: 'testwebapp',
targets: [ { identity: [ 'clusters', 'cluster-1' ] } ]
}" \
-F "sourcePath=@/tmp/testwebapp/testwebapp.war" \
-H "Prefer:respond-async" \
-X POST http://${ADMIN_SERVER_IP}:7001/management/weblogic/latest/edit/appDeployments
After the successful deployment, you will find output similar to the following:
Now, you can go to the application through the domain1-cluster-1-lb
external IP.
$ CLUSTER_IP=$(kubectl get svc domain1-cluster-1-lb -o=jsonpath='{.status.loadBalancer.ingress[0].ip}')
$ curl http://${CLUSTER_IP}:8001/testwebapp/
The test application will list the server host and server IP on the output, like the following:
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<link rel="stylesheet" href="/testwebapp/res/styles.css;jsessionid=9uiMDakndtPlZTyDB9A-OKZEFBBAPyIs_9bG3qC4uA3PYaI8DsH1!-1450005246" type="text/css">
<title>Test WebApp</title>
</head>
<body>
<li>InetAddress: domain1-managed-server1/10.244.1.8
<li>InetAddress.hostname: domain1-managed-server1
</body>
</html>
There are several approaches to validate the NFS volume:
Use kubectl exec
to enter the admin server pod to check file system status:
kubectl exec -it domain1-admin-server -- df -h
You will find output like the following, with filesystem ${AKS_PERS_STORAGE_ACCOUNT_NAME}.file.core.windows.net:/${AKS_PERS_STORAGE_ACCOUNT_NAME}/${AKS_PERS_SHARE_NAME}
, size 100G
, and mounted on /shared
:
Filesystem Size Used Avail Use% Mounted on
...
wlsstorage1612795811.file.core.windows.net:/wlsstorage1612795811/wls-weblogic-1612795811 100G 76M 100G 1% /shared
...
The output from the create-domain-on-aks.sh
script includes a statement about the Azure resources created by the script. To delete the cluster and free all related resources, simply delete the resource groups. The output will list the resource groups, such as.
The following Azure Resouces have been created:
Resource groups: wlsresourcegroup6091605169, MC_wlsresourcegroup6091605169_wlsakscluster6091605169_eastus
Given the above output, the following Azure CLI commands will delete the resource groups.
$ az group delete --yes --no-wait --name wlsresourcegroup6091605169
If you created the AKS cluster step by step, run the following commands to clean up resources.
$ az group delete --yes --no-wait --name $AKS_PERS_RESOURCE_GROUP
For troubleshooting advice, see Troubleshooting.