You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Initial check-in for traefik version update
* Modified the doc and sample artifacts files
* Foramt the document
* More doc changes
* Renamed setup.sh to setupLoadBalancer.sh to be more specific as per suggestion on OWLS-77806
* Addressed doc comments on PR review
* More doc review comments
* Minor hypelink name change
* More doc changes
* Fixed the broken links
* Updated copyright inforrmation
* Doc review comments
* More doc changes
* Minor typo
* Modified the mii sample wraper scripts
* Update Mii Sample script
* Resync develop branch. Modified more scripts and yaml files for mii-sample
* update MII sample generation/test instructions
* Missing modification
* Modified traefik ingress syntax
* Modifoe md files from docs-source directory
* More doc review comment
* Fixed the indention issue in inline ingress file
* More doc review resolution
* Minor doc update
* Move the istio istallatiion to RESULTS_ROOT directory
Co-authored-by: ANTARYAMI.PANIGRAHI@ORACLE.COM <anpanigr@anpanigr-2.subnet1ad3phx.devweblogicphx.oraclevcn.com>
Co-authored-by: Tom Barnes <tom.barnes@oracle.com>
Copy file name to clipboardExpand all lines: docs-source/content/samples/simple/domains/model-in-image/prerequisites.md
+27-30Lines changed: 27 additions & 30 deletions
Original file line number
Diff line number
Diff line change
@@ -53,8 +53,8 @@ weight: 1
53
53
- Option 1: To create the ingresses, use the following YAML file to create a file called `/tmp/mii-sample/ingresses/myingresses.yaml` and then call `kubectl apply -f /tmp/mii-sample/ingresses/myingresses.yaml`:
- Option 2: Run `kubectl apply -f` on each of the ingress YAML files that are already included in the sample source `/tmp/mii-sample/ingresses` directory:
You can also install the Traefik operator with a custom`values.yaml` file. For more detailed information, see the [Traefik GitHub Project](https://github.com/containous/traefik-helm-chart/blob/master/traefik/values.yaml).
## Configure Traefik as a load balancer for WLS domains
36
-
In this section we'll demonstrate how to use Traefik to handle traffic to backend WLS domains.
22
+
## Configure Traefik as a load balancer for WebLogic domains
23
+
This section describes how to use Traefik to handle traffic to backend WebLogic domains.
37
24
38
-
### 1. Install WLS domains
39
-
Now we need to prepare some domains for Traefik load balancing.
25
+
### 1. Install WebLogic domains
26
+
First, we need to prepare two domains for Traefik load balancing.
40
27
41
-
Create two WLS domains:
42
-
- One domain with name `domain1`under namespace `default`.
43
-
- One domain with name `domain2`under namespace `test1`.
28
+
Create two WebLogic domains:
29
+
- One domain with `domain1`as the domain UID and namespace `weblogic-domain1`.
30
+
- One domain with `domain2`as the domain UID and namespace `weblogic-domain2`.
44
31
- Each domain has a web application installed with the URL context `testwebapp`.
32
+
- Each domain has a WebLogic cluster `cluster-1` where each Managed Server listens on port `8001`.
45
33
46
-
### 2. Install the Traefik Ingress
47
-
#### Install a host-routing Ingress
34
+
### 2. Web request routing
35
+
The following sections describe how to route an application web request to the WebLogic domain through a Traefik frontend.
36
+
37
+
#### Host-based routing
38
+
This sample demonstrates how to access an application on two WebLogic domains using host-based routing. Install a host-based routing Traefik [IngressRoute](https://docs.traefik.io/routing/providers/kubernetes-crd/#kind-ingressroute).
48
39
```
49
40
$ kubectl create -f samples/host-routing.yaml
41
+
ingressroute.traefik.containo.us/traefik-hostrouting-1 created
42
+
ingressroute.traefik.containo.us/traefik-hostrouting-2 created
50
43
```
51
-
Now you can send requests to different WLS domains with the unique entry point of Traefik with different hostnames.
44
+
Now you can send requests to different WebLogic domains with the unique Traefik entry point of different host names as defined in the route section of the `host-routing.yaml` file.
This sample demonstrates how to access an application on two WebLogic domains using path-based routing. Install a path-based routing Traefik [IngressRoute](https://docs.traefik.io/routing/providers/kubernetes-crd/#kind-ingressroute) and [Middleware](https://docs.traefik.io/middlewares/overview/).
54
+
57
55
```
58
56
$ kubectl create -f samples/path-routing.yaml
57
+
ingressroute.traefik.containo.us/traefik-pathrouting-1 created
58
+
middleware.traefik.containo.us/middleware-domain1 created
59
+
ingressroute.traefik.containo.us/traefik-pathrouting-2 created
60
+
middleware.traefik.containo.us/middleware-domain2 created
59
61
```
60
-
Now you can send requests to different WLS domains with the unique entry point of Traefik with different paths.
62
+
Now you can send requests to different WebLogic domains with the unique Traefik entry point of different paths, as defined in the route section of the `path-routing.yaml` file.
61
63
```
62
-
$ curl http://${HOSTNAME}:30305/domain1/
63
-
$ curl http://${HOSTNAME}:30305/domain2/
64
+
# Get the ingress controller web port
65
+
$ export LB_PORT=$(kubectl -n traefik get service traefik-operator -o jsonpath='{.spec.ports[?(@.name=="web")].nodePort}')
66
+
$ curl http://${HOSTNAME}:${LB_PORT}/domain1/
67
+
$ curl http://${HOSTNAME}:${LB_PORT}/domain2/
64
68
```
65
-
#### Install a TLS-enabled Ingress
66
-
This sample demonstrates accessing the two WLS domains using an HTTPS endpoint and the WLS domains are protected by different TLS certificates.
67
-
68
-
To make this sample work, you need to enable the TLS endpoint in the Traefik operator. If you use the `values.yaml` file in the same folder as this README, the TLS endpoint is already enabled.
69
+
#### Host-based secured routing
70
+
This sample demonstrates how to access an application on two WebLogic domains using an HTTPS endpoint. Install a TLS-enabled Traefik [IngressRoute](https://docs.traefik.io/routing/providers/kubernetes-crd/#kind-ingressroute).
69
71
70
-
First, you need to create two secrets with TLS certificates, one with the common name `domain1.org`, the other with the common name `domain2.org`. We use `openssl` to generate self-signed certificates for demonstration purposes. Note that the TLS secret needs to be in the same namespace as the WLS domain.
72
+
First, you need to create two secrets with TLS certificates, one with the common name `domain1.org`, the other with the common name `domain2.org`. We use `openssl` to generate self-signed certificates for demonstration purposes. Note that the TLS secret needs to be in the same namespace as the WebLogic domain.
## Install and uninstall the Traefik operator with setup.sh
96
-
Alternatively, you can run the helper script `setup.sh`, under the `kubernetes/samples/charts/util` folder, to install and uninstall Traefik.
99
+
## Install and uninstall the Traefik operator with setupLoadBalancer.sh
100
+
Alternatively, you can run the helper script `setupLoadBalancer.sh`, under the `kubernetes/samples/charts/util` folder, to install and uninstall Traefik.
0 commit comments