@@ -214,10 +214,48 @@ content: |
214214 .. include:: /includes/k8s/k8s-persistent-volumes-om.rst
215215
216216 - ``true``
217+ ---
218+ title : " Allow external traffic to reach the |onprem| application."
219+ stepnum : 4
220+ level : 4
221+ ref : om-external-connectivity
222+ content : |
223+
224+ By default, the |k8s-op-short| does not create a |k8s| service to
225+ route traffic originating from outside of the |k8s| cluster to the
226+ |onprem| application.
227+
228+ To access the |onprem| application, you can:
229+
230+ - Configure the |k8s-op-short| to create a |k8s| service.
231+ - Create a |k8s| service manually. MongoDB recommends using a
232+ ``LoadBalancer`` |k8s| service if your cloud provider supports it.
233+ - If you're using OpenShift, use
234+ `Routes <https://docs.openshift.com/enterprise/3.0/architecture/core_concepts/routes.html>`__.
235+ - Use a third-party service, such as Istio.
236+
237+ The simplest method is to configure the |k8s-op-short| to create a
238+ |k8s| service to route external traffic to the |onprem| application:
239+
240+ a. Add the ``spec.``:opsmgrkube:`~spec.externalConnectivity` setting
241+ to the |k8s-obj| specification.
242+
243+ #. Add the following settings to the |k8s-obj| specification
244+ to configure the |k8s| service that routes external traffic to the
245+ |onprem| application:
246+
247+ - ``spec.externalConnectivity.``:opsmgrkube:`~spec.externalConnectivity.type`
248+ - (optional) ``spec.externalConnectivity.``:opsmgrkube:`~spec.externalConnectivity.port`
249+
250+ To learn how to create a |k8s| :k8sdocs:`service </concepts/services-networking/service/>`
251+ manually, see the |k8s| documentation.
252+
253+ To learn how to route external traffic to the |onprem| application
254+ using a different method, refer to the documentation for your solution.
217255
218256 ---
219257title : " (Optional) Configure any additional settings for an |onprem| deployment."
220- stepnum : 4
258+ stepnum : 5
221259level : 4
222260ref : add-k8s-values
223261content : |
@@ -251,13 +289,13 @@ content: |
251289
252290 ---
253291title : " Save this file with a ``.yaml`` file extension."
254- stepnum : 5
292+ stepnum : 6
255293level : 4
256294ref : save-object-spec
257295
258296---
259297title : " Create your |onprem| instance."
260- stepnum : 6
298+ stepnum : 7
261299level : 4
262300ref : start-k8s-instance
263301content : |
@@ -271,7 +309,7 @@ content: |
271309
272310 ---
273311title : " Track the status of your |onprem| instance."
274- stepnum : 7
312+ stepnum : 8
275313level : 4
276314ref : track-k8s-instance
277315content : |
@@ -333,45 +371,60 @@ content: |
333371 ConfigMap <create-k8s-project>`.
334372
335373 ---
336- title : " Access your |onprem| instance from a browser ."
337- stepnum : 8
374+ title : " Access the |onprem| application ."
375+ stepnum : 9
338376level : 4
339377ref : access-opsmgr-instance
340378content : |
341-
342- a. After the resource deploys successfully, find the external port to
343- your |onprem| instance.
344-
345- Invoke the following ``kubectl`` command on
346- ``<metadata.name>-svc-external : <metadata.name>`` :
347379
348- .. code-block:: sh
380+ The steps you take differ based on how you are routing traffic to the
381+ |onprem| application in |k8s|. If you configured the |k8s-op-short| to
382+ create a |k8s| service for you, or you created a |k8s| service
383+ manually, use one of the following methods to access the |onprem|
384+ application:
349385
350- kubectl get svc <metadata.name>-svc-external -n <namespace>
386+ .. tabs::
351387
352- The command returns the external port in the ``PORT(S)`` column. In
353- the following example output, the external port is ``30036``:
388+ .. tab:: External Traffic Routes Using LoadBalancer Service
389+ :tabid: om-loadbalancer-svc-access
354390
355- .. code-block:: sh
356- :copyable: false
391+ a. Query your cloud provider to get the |fqdn| of the load
392+ balancer service. See your cloud provider's documentation
393+ for details.
357394
358- NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
359- <metadata.name>-svc-external NodePort 100.66.92.110 <none> 8080:30036/TCP 1d
395+ #. Open a browser window and navigate to the |onprem|
396+ application using the |fqdn| and port number of your load
397+ balancer service.
398+
399+ .. code-block:: sh
400+ :copyable: false
401+
402+ http://ops.example.com:8080
360403
361- #. Set your firewall rules to allow access from the Internet to the
362- external port on the host.
404+ #. Log in to |onprem| using the :ref:`admin user credentials
405+ <om-rsrc-prereqs>`.
406+
407+ .. tab:: External Traffic Routed Using NodePort Service
408+ :tabid: om-nodeport-svc-access
363409
364- #. Open a browser window and navigate to the |onprem| application
365- using the |fqdn| and port number.
410+ a. Set your firewall rules to allow access from the Internet to
411+ the ``spec.externalConnectivity.``:opsmgrkube:`~spec.externalConnectivity.port`
412+ on the host on which your |k8s| cluster is running.
413+
414+ #. Open a browser window and navigate to the |onprem|
415+ application using the |fqdn| and the
416+ ``spec.externalConnectivity.``:opsmgrkube:`~spec.externalConnectivity.port`.
366417
367- .. code-block:: sh
368- :copyable: false
418+ .. code-block:: sh
419+ :copyable: false
369420
370- http://ops.example.com:30036
371-
372- #. Log in to |onprem| using the :ref:`admin user credentials
373- <om-rsrc-prereqs>`.
421+ http://ops.example.com:30036
422+
423+ #. Log in to |onprem| using the :ref:`admin user credentials <om-rsrc-prereqs>`.
374424
425+ To learn how to access the |onprem| application using a different
426+ traffic routing method, refer to the documentation for your solution.
427+
375428 ---
376429title : " Create credentials for the Kubernetes Operator."
377430stepnum : 9
0 commit comments