Skip to content

Commit b2e0434

Browse files
rjeberhardankediaalai8
authored
Operator version 3.1.2 (#2154)
* Prepare for 3.1.1 * OWLS-86552 - Fix for multiple pod restarts during rolling update. ManagedServerUpAfterStep is executed after servers in all clusters started. (#2109) * Add PR reference * patch annotation with slashes fix - from PR 2089 * Update versions and release notes * Missing files * Restore 3.1.1 chart * Clarify Docker Hub, Docker Store and remove unnecessary references to Docker * Build schema * Fix broken link * Adjust wording * Review comments Co-authored-by: Anil Kedia <37935279+ankedia@users.noreply.github.com> Co-authored-by: anthony_lai <anthony.lai@oracle.com>
1 parent 26587ec commit b2e0434

File tree

100 files changed

+388
-382
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

100 files changed

+388
-382
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
Oracle is finding ways for organizations using WebLogic Server to run important workloads, to move those workloads into the cloud. By certifying on industry standards, such as Docker and Kubernetes, WebLogic now runs in a cloud neutral infrastructure. In addition, we've provided an open-source Oracle WebLogic Server Kubernetes Operator (the “operator”) which has several key features to assist you with deploying and managing WebLogic domains in a Kubernetes environment. You can:
44

55
* Create WebLogic domains in a Kubernetes persistent volume. This persistent volume can reside in an NFS file system or other Kubernetes volume types.
6-
* Create a WebLogic domain in a Docker image.
6+
* Create a WebLogic domain in a container image.
77
* Override certain aspects of the WebLogic domain configuration.
88
* Define WebLogic domains as a Kubernetes resource (using a Kubernetes custom resource definition).
99
* Start servers based on declarative startup parameters and desired states.
@@ -17,8 +17,8 @@ Oracle is finding ways for organizations using WebLogic Server to run important
1717
The fastest way to experience the operator is to follow the [Quick Start guide](https://oracle.github.io/weblogic-kubernetes-operator/quickstart/), or you can peruse our [documentation](https://oracle.github.io/weblogic-kubernetes-operator), read our [blogs](https://blogs.oracle.com/weblogicserver/updated-weblogic-kubernetes-support-with-operator-20), or try out the [samples](https://oracle.github.io/weblogic-kubernetes-operator/samples/).
1818

1919
***
20-
The [current release of the operator](https://github.com/oracle/weblogic-kubernetes-operator/releases) is 3.1.1.
21-
This release was published on December 17, 2020.
20+
The [current release of the operator](https://github.com/oracle/weblogic-kubernetes-operator/releases) is 3.1.2.
21+
This release was published on January 22, 2021.
2222
***
2323

2424
# Documentation

buildDockerImage.sh

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
#!/bin/bash
2-
# Copyright (c) 2020, Oracle Corporation and/or its affiliates.
2+
# Copyright (c) 2020, 2021, Oracle and/or its affiliates.
33
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.
44

55
usage() {
66
cat << EOF
77
88
Usage: buildDockerImage.sh [-t tag]
9-
Builds a Docker Image for the Oracle WebLogic Kubernetes Operator.
9+
Builds a container image for the Oracle WebLogic Kubernetes Operator.
1010
1111
Parameters:
1212
-t: image name and tag in 'name:tag' format
1313
14-
Copyright (c) 2020, Oracle Corporation and/or its affiliates.
14+
Copyright (c) 2020, 2021, Oracle and/or its affiliates.
1515
Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.
1616
1717
EOF
@@ -33,7 +33,7 @@ while getopts "t:" optname; do
3333
esac
3434
done
3535

36-
IMAGE_NAME=${name:-ghcr.io/oracle/weblogic-kubernetes-operator:3.1.1}
36+
IMAGE_NAME=${name:-ghcr.io/oracle/weblogic-kubernetes-operator:3.1.2}
3737
SCRIPTPATH="$( cd "$(dirname "$0")" > /dev/null 2>&1 ; pwd -P )"
3838

3939
# Proxy settings
@@ -84,5 +84,5 @@ cat << EOF
8484
8585
EOF
8686
else
87-
echo "WebLogic Kubernetes Operator Docker Image was NOT successfully created. Check the output and correct any reported problems with the docker build operation."
87+
echo "WebLogic Kubernetes Operator container image was NOT successfully created. Check the output and correct any reported problems with the docker build operation."
8888
fi

buildtime-reports/pom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
<parent>
99
<artifactId>operator-parent</artifactId>
1010
<groupId>oracle.kubernetes</groupId>
11-
<version>3.1.1</version>
11+
<version>3.1.2</version>
1212
</parent>
1313

1414
<artifactId>buildtime-reports</artifactId>

docs-source/content/_index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
Oracle is finding ways for organizations using WebLogic Server to run important workloads, to move those workloads into the cloud. By certifying on industry standards, such as Docker and Kubernetes, WebLogic now runs in a cloud neutral infrastructure. In addition, we've provided an open source Oracle WebLogic Server Kubernetes Operator (the “operator”) which has several key features to assist you with deploying and managing WebLogic domains in a Kubernetes environment. You can:
44

55
* Create WebLogic domains in a Kubernetes PersistentVolume. This PersistentVolume can reside in an NFS file system or other Kubernetes volume types.
6-
* Create a WebLogic domain in a Docker image.
6+
* Create a WebLogic domain in a container image.
77
* Override certain aspects of the WebLogic domain configuration.
88
* Define WebLogic domains as a Kubernetes resource (using a Kubernetes custom resource definition).
99
* Start servers based on declarative startup parameters and desired states.
@@ -23,8 +23,8 @@ using the operator to deploy and run a WebLogic domain container-packaged web ap
2323
***
2424
#### Current production release
2525

26-
The [current release of the operator](https://github.com/oracle/weblogic-kubernetes-operator/releases) is 3.1.1.
27-
This release was published on December 17, 2020. See the operator prerequisites and supported environments [here]({{< relref "/userguide/introduction/introduction#operator-prerequisites" >}}).
26+
The [current release of the operator](https://github.com/oracle/weblogic-kubernetes-operator/releases) is 3.1.2.
27+
This release was published on January 22, 2021. See the operator prerequisites and supported environments [here]({{< relref "/userguide/introduction/introduction#operator-prerequisites" >}}).
2828

2929
***
3030

docs-source/content/developerguide/building.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,13 +28,12 @@ $ mvn javadoc:aggregate
2828

2929
The Javadoc is also available in the GitHub repository [here](https://oracle.github.io/weblogic-kubernetes-operator/apidocs/index.html).
3030

31-
#### Building the operator Docker image
31+
#### Building the operator container image
3232

33-
Log in to the Docker Store so that you will be able to pull the base image and create the Docker image as follows. These commands should be executed in the project root directory:
33+
These commands should be executed in the project root directory:
3434

3535
```
36-
$ docker login
37-
$ docker build --build-arg VERSION=<version> -t weblogic-kubernetes-operator:some-tag --no-cache=true .
36+
$ ./buildDockerImage.sh -t weblogic-kubernetes-operator:some-tag
3837
```
3938

4039
Replace `<version>` with the version of the project found in the `pom.xml` file in the project root directory.
@@ -51,7 +50,7 @@ You may need to create a directory called `/operator` on your machine. Please b
5150

5251
#### Running the operator in a Kubernetes cluster
5352

54-
If you're not running Kubernetes on your development machine, you'll need to make the Docker image available to a registry visible to your Kubernetes cluster. Either `docker push` the image to a private registry or upload your image to a machine running Docker and Kubernetes as follows:
53+
If you're not running Kubernetes on your development machine, you'll need to make the container image available to a registry visible to your Kubernetes cluster. Either `docker push` the image to a private registry or upload your image to a machine running Docker and Kubernetes as follows:
5554

5655
```
5756
# on your build machine

docs-source/content/developerguide/integration-tests.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ weight: 4
66
---
77

88

9-
The project includes integration tests that can be run against a Kubernetes cluster. If you want to use these tests, you will need to provide your own Kubernetes cluster. The Kubernetes cluster must meet the version number requirements and have Helm installed. Ensure that the operator Docker image is in a Docker registry visible to the Kubernetes cluster.
9+
The project includes integration tests that can be run against a Kubernetes cluster. If you want to use these tests, you will need to provide your own Kubernetes cluster. The Kubernetes cluster must meet the version number requirements and have Helm installed. Ensure that the operator container image is in a Docker registry visible to the Kubernetes cluster.
1010

1111

1212
You will need to obtain the `kube.config` file for an administrative user and make it available on the machine running the build. To run the tests, update the `KUBECONFIG` environment variable to point to your config file and then execute:

docs-source/content/faq/cannot-pull-image.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ description: "My domain will not start and I see errors like `ImagePullBackoff`
88

99
> My domain will not start and I see errors like `ImagePullBackoff` or `Cannot pull image`
1010
11-
When you see these kinds of errors, it means that Kubernetes cannot find your Docker image.
11+
When you see these kinds of errors, it means that Kubernetes cannot find your container image.
1212
The most common causes are:
1313

1414
* The `image` value in your Domain is set incorrectly, meaning Kubernetes will be
@@ -17,7 +17,7 @@ The most common causes are:
1717
configured Kubernetes with the necessary credentials, for example in an `imagePullSecret`.
1818
* You built the image on a machine that is not where your `kubelet` is running and Kubernetes
1919
cannot see the image, meaning you need to copy the image to the worker nodes or put it in
20-
a Docker registry that is accessible the to all of the worker nodes.
20+
a container registry that is accessible the to all of the worker nodes.
2121

2222
Let's review what happens when Kubernetes starts a pod.
2323

@@ -26,39 +26,39 @@ Let's review what happens when Kubernetes starts a pod.
2626
The definition of the pod contains a list of container specifications. Each container
2727
specification contains the name (and optionally, tag) of the image that should be used
2828
to run that container. In the example above, there is a container called `c1` which is
29-
configured to use the Docker image `some.registry.com/owner/domain1:1.0`. This image
29+
configured to use the container image `some.registry.com/owner/domain1:1.0`. This image
3030
name is in the format `registry address / owner / name : tag`, so in this case the
3131
registry is `some.registry.com`, the owner is `owner`, the image name is `domain`
3232
and the tag is `1.0`. Tags are a lot like version numbers, but they are not required
3333
to be numbers or to be in any particular sequence or format. If you omit the tag, it
3434
is assumed to be `latest`.
3535

3636
{{% notice note %}}
37-
The Docker tag `latest` is confusing - it does not actually mean the latest version of
37+
The tag `latest` is confusing - it does not actually mean the latest version of
3838
the image that was created or published in the registry; it just literally means
3939
whichever version the owner decided to call "latest". Docker and Kubernetes make
4040
some assumptions about latest, and it is generally recommended to avoid using it and instead
4141
specify the actual version or tag that you really want.
4242
{{% /notice %}}
4343

4444
First, Kubernetes will check to see if the requested image is available in the local
45-
Docker image store on whichever worker node the pod was scheduled on. If it is there,
45+
container image store on whichever worker node the pod was scheduled on. If it is there,
4646
then it will use that image to start the container. If it is not there, then Kubernetes
47-
will attempt to pull the image from a remote Docker registry.
47+
will attempt to pull the image from a remote container registry.
4848

4949
{{% notice note %}}
5050
There is another setting called `imagePullPolicy` that can be used to force Kubernetes
51-
to always pull the image, even if it is already present in the local Docker image
51+
to always pull the image, even if it is already present in the local container image
5252
store.
5353
{{% /notice %}}
5454

5555
If the image is available in the remote registry and it is public, that is it does not
56-
require authentication, then Kubernetes will pull the image to the local Docker image
56+
require authentication, then Kubernetes will pull the image to the local container image
5757
store and start the container.
5858

5959
#### Images that require authentication
6060

61-
If the remote Docker registry requires authentication, then you will need to provide
61+
If the remote container registry requires authentication, then you will need to provide
6262
the authentication details in a Kubernetes `docker-registry` secret and tell Kubernetes
6363
to use that secret when pulling the image.
6464

@@ -76,7 +76,7 @@ kubectl create secret docker-registry secret1 \
7676
In this command, you would replace `secret1` with the name of the secret; the `docker-server`
7777
is set to the registry name, without the `https://` prefix; the `docker-username`, `docker-password`
7878
and `docker-email` are set to match the credentials you use to authenticate to the remote
79-
Docker registry; and the `namespace` must be set to the same namespace where you intend to
79+
container registry; and the `namespace` must be set to the same namespace where you intend to
8080
use the image.
8181

8282
{{% notice note %}}
@@ -122,9 +122,9 @@ kubectl patch serviceaccount default \
122122
```
123123

124124
{{% notice note %}}
125-
You can provide multiple `imagePullSecrets` if you need to pull Docker images from multiple
126-
remote Docker registries or if your images require different authentication credentials.
127-
For more information, see [Docker Image Protection]({{<relref "/security/domain-security/image-protection#weblogic-domain-in-docker-image-protection">}}).
125+
You can provide multiple `imagePullSecrets` if you need to pull container images from multiple
126+
remote container registries or if your images require different authentication credentials.
127+
For more information, see [Container Image Protection]({{<relref "/security/domain-security/image-protection#weblogic-domain-in-container-image-protection">}}).
128128
{{% /notice %}}
129129

130130
#### Pushing the image to a repository
@@ -151,8 +151,8 @@ a remote repository, then the Docker steps are:
151151

152152
#### Manually copying the image to your worker nodes
153153

154-
If you are not able to use a remote Docker registry, for example if your Kubernetes cluster is
155-
in a secure network with no external access, then you can manually copy the Docker images to the
154+
If you are not able to use a remote container registry, for example if your Kubernetes cluster is
155+
in a secure network with no external access, then you can manually copy the container images to the
156156
cluster instead.
157157

158158
On the machine where you created the image, export it into a TAR file using this command:

docs-source/content/faq/domain-secret-mismatch.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -32,28 +32,28 @@ This can happen in a variety of ways, depending on the [domain home source type]
3232

3333
##### Rolling to an image containing new or unrelated domain directory
3434

35-
The error occurs while rolling pods have containers based on a new Docker image that contains an entirely new or unrelated domain directory.
35+
The error occurs while rolling pods have containers based on a new container image that contains an entirely new or unrelated domain directory.
3636

3737
The problem is that WebLogic cannot support server instances being part of the same WebLogic domain if the server instances do
3838
not all share the same domain-specific encryption key. Additionally, operator introspection
3939
currently happens only when starting servers following a total shutdown. Therefore, the `boot.properites` files generated from
4040
introspecting the image containing the original domain directory will be invalid when used with a container started with
41-
the updated Docker image containing the new or unrelated domain directory.
41+
the updated container image containing the new or unrelated domain directory.
4242

43-
The solution is to follow either the recommended [CI/CD guidelines](https://oracle.github.io/weblogic-kubernetes-operator/userguide/cicd/) so that the original and new Docker images contain domain directories
43+
The solution is to follow either the recommended [CI/CD guidelines](https://oracle.github.io/weblogic-kubernetes-operator/userguide/cicd/) so that the original and new container images contain domain directories
4444
with consistent domain-specific encryption keys and bootstrapping security details, or to [perform a total shutdown](https://oracle.github.io/weblogic-kubernetes-operator/userguide/managing-domains/domain-lifecycle/startup/#starting-and-stopping-servers) of the domain so
4545
that introspection reoccurs as servers are restarted.
4646

4747
##### Full domain shutdown and restart
4848

4949
The error occurs while starting servers after a full domain shutdown.
5050

51-
If your development model generates new Docker images
51+
If your development model generates new container images
5252
with new and unrelated domain directories and then tags those images with the same tag, then different Kubernetes worker nodes
53-
may have different images under the same tag in their individual, local Docker repositories.
53+
may have different images under the same tag in their individual, local container repositories.
5454

5555
The simplest solution is to set `imagePullPolicy` to `Always`; however, the better solution would be to design your development
56-
pipeline to generate new Docker image tags on every build and to never reuse an existing tag.
56+
pipeline to generate new container image tags on every build and to never reuse an existing tag.
5757

5858
#### Domain in PV
5959

@@ -67,4 +67,4 @@ Because all servers will already be stopped, there is no requirement that the ne
6767
the previous contents of the domain directory. When starting servers again, the operator will perform its introspection
6868
of the domain directory. However, you may want to preserve the domain directory security configuration including the domain-specific
6969
encryption key and, in that case, you should follow a similar pattern as is described in the [CI/CD guidelines](https://oracle.github.io/weblogic-kubernetes-operator/userguide/cicd/) for the domain
70-
in a Docker image model to preserve the original security-related domain directory files.
70+
in a container image model to preserve the original security-related domain directory files.

docs-source/content/faq/namespace-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ elkIntegrationEnabled: false
4343
externalDebugHttpPort: 30999
4444
externalRestEnabled: false
4545
externalRestHttpsPort: 31001
46-
image: ghcr.io/oracle/weblogic-kubernetes-operator:3.1.1
46+
image: ghcr.io/oracle/weblogic-kubernetes-operator:3.1.2
4747
imagePullPolicy: IfNotPresent
4848
internalDebugHttpPort: 30999
4949
istioEnabled: false

0 commit comments

Comments
 (0)