@@ -214,10 +214,48 @@ content: |
214
214
.. include:: /includes/k8s/k8s-persistent-volumes-om.rst
215
215
216
216
- ``true``
217
+ ---
218
+ title : " Allow external traffic to reach the |onprem| application."
219
+ stepnum : 4
220
+ level : 4
221
+ ref : om-external-connectivity
222
+ content : |
223
+
224
+ By default, the |k8s-op-short| does not create a |k8s| service to
225
+ route traffic originating from outside of the |k8s| cluster to the
226
+ |onprem| application.
227
+
228
+ To access the |onprem| application, you can:
229
+
230
+ - Configure the |k8s-op-short| to create a |k8s| service.
231
+ - Create a |k8s| service manually. MongoDB recommends using a
232
+ ``LoadBalancer`` |k8s| service if your cloud provider supports it.
233
+ - If you're using OpenShift, use
234
+ `Routes <https://docs.openshift.com/enterprise/3.0/architecture/core_concepts/routes.html>`__.
235
+ - Use a third-party service, such as Istio.
236
+
237
+ The simplest method is to configure the |k8s-op-short| to create a
238
+ |k8s| service to route external traffic to the |onprem| application:
239
+
240
+ a. Add the ``spec.``:opsmgrkube:`~spec.externalConnectivity` setting
241
+ to the |k8s-obj| specification.
242
+
243
+ #. Add the following settings to the |k8s-obj| specification
244
+ to configure the |k8s| service that routes external traffic to the
245
+ |onprem| application:
246
+
247
+ - ``spec.externalConnectivity.``:opsmgrkube:`~spec.externalConnectivity.type`
248
+ - (optional) ``spec.externalConnectivity.``:opsmgrkube:`~spec.externalConnectivity.port`
249
+
250
+ To learn how to create a |k8s| :k8sdocs:`service </concepts/services-networking/service/>`
251
+ manually, see the |k8s| documentation.
252
+
253
+ To learn how to route external traffic to the |onprem| application
254
+ using a different method, refer to the documentation for your solution.
217
255
218
256
---
219
257
title : " (Optional) Configure any additional settings for an |onprem| deployment."
220
- stepnum : 4
258
+ stepnum : 5
221
259
level : 4
222
260
ref : add-k8s-values
223
261
content : |
@@ -251,13 +289,13 @@ content: |
251
289
252
290
---
253
291
title : " Save this file with a ``.yaml`` file extension."
254
- stepnum : 5
292
+ stepnum : 6
255
293
level : 4
256
294
ref : save-object-spec
257
295
258
296
---
259
297
title : " Create your |onprem| instance."
260
- stepnum : 6
298
+ stepnum : 7
261
299
level : 4
262
300
ref : start-k8s-instance
263
301
content : |
@@ -271,7 +309,7 @@ content: |
271
309
272
310
---
273
311
title : " Track the status of your |onprem| instance."
274
- stepnum : 7
312
+ stepnum : 8
275
313
level : 4
276
314
ref : track-k8s-instance
277
315
content : |
@@ -333,45 +371,60 @@ content: |
333
371
ConfigMap <create-k8s-project>`.
334
372
335
373
---
336
- title : " Access your |onprem| instance from a browser ."
337
- stepnum : 8
374
+ title : " Access the |onprem| application ."
375
+ stepnum : 9
338
376
level : 4
339
377
ref : access-opsmgr-instance
340
378
content : |
341
-
342
- a. After the resource deploys successfully, find the external port to
343
- your |onprem| instance.
344
-
345
- Invoke the following ``kubectl`` command on
346
- ``<metadata.name>-svc-external : <metadata.name>`` :
347
379
348
- .. code-block:: sh
380
+ The steps you take differ based on how you are routing traffic to the
381
+ |onprem| application in |k8s|. If you configured the |k8s-op-short| to
382
+ create a |k8s| service for you, or you created a |k8s| service
383
+ manually, use one of the following methods to access the |onprem|
384
+ application:
349
385
350
- kubectl get svc <metadata.name>-svc-external -n <namespace>
386
+ .. tabs::
351
387
352
- The command returns the external port in the ``PORT(S)`` column. In
353
- the following example output, the external port is ``30036``:
388
+ .. tab:: External Traffic Routes Using LoadBalancer Service
389
+ :tabid: om-loadbalancer-svc-access
354
390
355
- .. code-block:: sh
356
- :copyable: false
391
+ a. Query your cloud provider to get the |fqdn| of the load
392
+ balancer service. See your cloud provider's documentation
393
+ for details.
357
394
358
- NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
359
- <metadata.name>-svc-external NodePort 100.66.92.110 <none> 8080:30036/TCP 1d
395
+ #. Open a browser window and navigate to the |onprem|
396
+ application using the |fqdn| and port number of your load
397
+ balancer service.
398
+
399
+ .. code-block:: sh
400
+ :copyable: false
401
+
402
+ http://ops.example.com:8080
360
403
361
- #. Set your firewall rules to allow access from the Internet to the
362
- external port on the host.
404
+ #. Log in to |onprem| using the :ref:`admin user credentials
405
+ <om-rsrc-prereqs>`.
406
+
407
+ .. tab:: External Traffic Routed Using NodePort Service
408
+ :tabid: om-nodeport-svc-access
363
409
364
- #. Open a browser window and navigate to the |onprem| application
365
- using the |fqdn| and port number.
410
+ a. Set your firewall rules to allow access from the Internet to
411
+ the ``spec.externalConnectivity.``:opsmgrkube:`~spec.externalConnectivity.port`
412
+ on the host on which your |k8s| cluster is running.
413
+
414
+ #. Open a browser window and navigate to the |onprem|
415
+ application using the |fqdn| and the
416
+ ``spec.externalConnectivity.``:opsmgrkube:`~spec.externalConnectivity.port`.
366
417
367
- .. code-block:: sh
368
- :copyable: false
418
+ .. code-block:: sh
419
+ :copyable: false
369
420
370
- http://ops.example.com:30036
371
-
372
- #. Log in to |onprem| using the :ref:`admin user credentials
373
- <om-rsrc-prereqs>`.
421
+ http://ops.example.com:30036
422
+
423
+ #. Log in to |onprem| using the :ref:`admin user credentials <om-rsrc-prereqs>`.
374
424
425
+ To learn how to access the |onprem| application using a different
426
+ traffic routing method, refer to the documentation for your solution.
427
+
375
428
---
376
429
title : " Create credentials for the Kubernetes Operator."
377
430
stepnum : 9
0 commit comments