Skip to content

Commit 324e733

Browse files
committed
Update istio documentation
1 parent 9fe32c9 commit 324e733

File tree

1 file changed

+43
-23
lines changed
  • documentation/staging/content/userguide/istio

1 file changed

+43
-23
lines changed

documentation/staging/content/userguide/istio/istio.md

Lines changed: 43 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -95,19 +95,27 @@ spec:
9595
istio:
9696
enabled: true
9797
readinessPort: 8888
98+
replicationChannelPort: 4564
99+
version: 1.7.3
98100
```
99101
100102
To enable Istio support, you must include the `istio` section
101103
and set `enabled: true` as shown. The `readinessPort` is optional
102104
and defaults to `8888` if not provided; it is used for a readiness health check.
105+
The `replicationChannelPort` is optional and defaults to `4564` if not provided;
106+
it is the port used in the network access point by the WebLogic Replication Service
107+
for all replication traffic. The `version` is optional and represents the Istio version
108+
run by the operator and WebLogic domains managed by the operator. If not provided, the
109+
operator will assume it's supporting Istio version 1.9 or earlier.
103110

104111
##### How Istio-enabled domains differ from regular domains
105112

106113
Istio enforces a number of requirements on Pods. When you enable Istio support in the Domain YAML file, the
107114
introspector job automatically creates configuration overrides with the necessary channels for the domain to satisfy Istio's requirements, including:
108115

109-
When deploying a domain with Istio sidecar injection enabled, the operator automatically adds the following network
110-
channels using configuration overrides.
116+
When deploying a domain with Istio sidecar injection enabled, to support Istio versions 1.9 or earlier, the introspector job
117+
automatically adds the following network channels using configuration overrides. **NOTE**: For supporting Istio versions 1.10 and later,
118+
see [Support for network changes in Istio v1.10 and later](#support-for-network-changes-in-istio-v110-and-later)
111119

112120
https://istio.io/latest/docs/ops/configuration/traffic-management/protocol-selection/
113121

@@ -150,32 +158,20 @@ with the pod's IP.
150158

151159
To learn more about changes to Istio networking beginning with Istio 1.10, see [Upcoming networking changes in Istio 1.10](https://istio.io/latest/blog/2021/upcoming-networking-changes/).
152160

153-
In order to support Istio v1.10 and later, as well as previous releases, the
154-
operator will:
161+
In order to support Istio v1.10 and later, you must specify the Istio `version` (in the `istio` configuration in the domain custom resource yaml) so that the introspector job will:
155162

156-
* Add an additional WebLogic HTTP protocol network channel for the readiness probe that is bound to the localhost network interface.
157-
* Add additional WebLogic network channels, bound to the localhost network interface, for each defined custom network channel.
158-
* Continue to automatically add the network channels described above in [How Istio-enabled domains differ from regular domains](#how-istio-enabled-domains-differ-from-regular-domains)
163+
* Add an additional WebLogic HTTP protocol network channel for the readiness probe that is bound to the server pod's network interface.
159164

160-
When adding additional WebLogic network channels for the readiness probe and any defined custom channels,
161-
the name of the additional channel will be appended with '-lhNN', where NN represents
162-
a two digit value for uniqueness.
165+
For example, the additional WebLogic HTTP protocol network channel for the readiness probe would be
166+
defined as follows:
163167

164-
For example, the additional WebLogic HTTP protocol network channel for the readiness probe would be
165-
defined as follows:
168+
|Name|Port|Listening address|Protocol|Exposed as a container port|
169+
|----|----|----|--------|-----|
170+
|`http-probe-ext`|From configuration Istio `readinessPort` | Server Pod's IP | `http`| No |
166171

167-
|Name|Port|Listening address|Protocol|Exposed as a container port|
168-
|----|----|----|--------|-----|
169-
|`http-probe-lh01`|From configuration Istio `readinessPort` | `127.0.0.1` | `http`| No |
172+
* Will not automatically add the network channels as described in [How Istio-enabled domains differ from regular domains](#how-istio-enabled-domains-differ-from-regular-domains).
170173

171-
As another example, for a custom WebLogic network channel defined as `T3Channel` with port `5556`
172-
and protocol `t3`, the additional channel would be defined as follows:
173-
174-
|Name|Port|Listening address|Protocol|Exposed as a container port|
175-
|----|----|----|--------|-----|
176-
|`T3Channel-lh01`| `5556` | `127.0.0.1` | `t3`| Yes |
177-
178-
### Apply the Domain YAML file
174+
#### Apply the Domain YAML file
179175

180176
After the Domain YAML file is modified, apply it by:
181177

@@ -280,6 +276,30 @@ Refer to [Determining the ingress IP and ports](https://istio.io/latest/docs/set
280276

281277
For more information about providing ingress using Istio, see the [Istio documentation](https://istio.io/docs/tasks/traffic-management/ingress/).
282278

279+
#### WebLogic Replication Traffic
280+
281+
To support replication traffic in an Istio service mesh, the introspector job will:
282+
283+
* Automatically create a network access point using the `replicationChannelPort` specified in the `istio` configuration in the domain custom resouorce yaml.
284+
285+
For example, the additional WebLogic HTTP protocol network channel for the readiness probe would be defined as follows:
286+
|Name|Port|Protocol|Exposed as a container port|
287+
|----|----|--------|-----|
288+
|`istiorepl`|From configuration Istio `replicationChannelPort` |`t3`| No |
289+
290+
* Configure each WebLogic cluster in the domain to use the network access point for all replication traffic.
291+
292+
For example, the following `replication-channel` attribute will be configured in each WebLogic cluster configuration:
293+
```
294+
<cluster>
295+
<name>cluster-1</name>
296+
<replication-channe>istiorepl</replication-channel>
297+
<cluster>
298+
```
299+
{{% notice note %}}
300+
The introspector job will not automatically inject a replication network access point if one is already configured for a WebLogic cluster.
301+
{{% /notice %}}
302+
283303
#### Traffic management
284304

285305
Istio provides traffic management capabilities, including the ability to

0 commit comments

Comments
 (0)