Deploying the API Analytics subsystem by using the CLI
You can deploy individual API Connect subsystems by using the subsystem Kubernetes resource (CR). This procedure uses the CLI.
There are four subsystems that can be installed:
API Manager: For more information, see Deploying the API Manager subsystem by using the CLI
API Analytics: Deployed by using this procedure
API Portal: For more information, see Deploying the API Portal subsystem by using the CLI
API Gateway: For more information, see Deploying the API Gateway subsystem by using the CLI
Deploying Analytics involves three main tasks:
Installing a certificate manager
Install the cert-manager Operator for Red Hat OpenShift. Follow the steps for Installing the cert-manager Operator for Red Hat OpenShift using the web console in the Red Hat OpenShift documentation.
Setting up the certificates
Change to the namespace where you want to install the subsystem:
oc project <namespace>If you have installed the API Manager subsystem in another namespace, extract the API Manager
ingress-cacertificates.oc -n <api manager namespace> get secret ingress-ca -o yaml > ingress-ca.yamlEdit the
ingress-ca.yamlfile and remove the following properties:metadata.creationTimestampmetadata.namespacemetadata.resourceVersionmetadata.uidmetadata.selfLinkKeep this file. You will need to apply it in the namespaces of your other subsystems so that they can communicate with the API Manager subsystem.
Apply the file to the API Analytics namespace:
oc apply -f ingress-ca.yamlCreate a file that is called
api-analytics-certs.yamland paste in the following contents:apiVersion: cert-manager.io/v1 kind: Issuer metadata: name: selfsigning-issuer labels: { app.kubernetes.io/instance: "api-manager", app.kubernetes.io/managed-by: "ibm-apiconnect", app.kubernetes.io/name: "selfsigning-issuer" } spec: selfSigned: {} --- apiVersion: cert-manager.io/v1 kind: Issuer metadata: name: ingress-issuer labels: { app.kubernetes.io/instance: "api-manager", app.kubernetes.io/managed-by: "ibm-apiconnect", app.kubernetes.io/name: "ingress-issuer" } spec: ca: secretName: ingress-caApply the file to your namespace:
oc apply -f api-analytics-certs.yamlVerify that the command installation succeeded:
oc get issuersAll issuers created successfully:
NAME READY ingress-issuer True selfsigning-issuer True
Deploying API Analytics
Create a
AnalyticsClusterYAML file. For example, you can create a file that is calledapi-analytics.yamlwith the following example configuration. All fields in the example are required. Update the values as applicable for your configuration.apiVersion: analytics.apiconnect.ibm.com/v1beta1 kind: AnalyticsCluster metadata: name: api-analytics annotations: apiconnect-operator/cp4i: "false" spec: version: 10.0.8.7 license: accept: false use: production license: L-HTFS-UAXYM3 profile: n1xc2.m16 microServiceSecurity: certManager certManagerIssuer: name: selfsigning-issuer kind: Issuer ingestion: endpoint: annotations: cert-manager.io/issuer: ingress-issuer hosts: - name: ai.$STACK_HOST secretName: analytics-ai-endpoint clientSubjectDN: CN=analytics-ingestion-client,O=cert-manager storage: type: shared shared: volumeClaimTemplate: storageClassName: <storage-class> volumeSize: 50GiChange the value of
spec.license.accepttotrueif you accept the license agreement. For more information, see Licensing.In
metadata.annotations, do not removeapiconnect-operator/cp4i: "false". This annotation guarantees that API Gateway does not attempt to integrate with Cloud Pak for Integration identity and access management. It does not prevent you from managing the instance in the Platform UI.For
spec.license.useenterproductionornonproductionto match the type of license that you purchased.For
spec.license.licenseenter the license ID for the API Connect program that you purchased. To get the available license IDs, see API Connect licenses in the API Connect documentation.For
spec.profileenter the type of installation profile that you want. For more information, see Analytics component deployment profile limits.For
spec.versionenter the API Connect product version or channel to be installed.For
<storage-class>, specify the RWO block storage class to use for persistence storage. For more information about selecting storage classes for Cloud Pak for Integration, see Storage considerations. To review API Connect storage support, see the "Supported storage types" section in Deployment requirements, in the API Connect documentation.Replace
$STACK_HOSTwith the desired ingress subdomain for the API Connect stack. This variable is used when specifying endpoints. Domain names that are used for endpoints cannot contain the underscore "_" character. The host on OpenShift is typically prefixed byapps. Such asapps.subnet.example.com.If you want to enable additional analytics features, you can set them as described in Enabling additional analytics features.
Optional: Three replica deployments only: Enable dedicated storage. If you want to use dedicated storage, update the
spec.storagesection of the yaml file as follows:storage: type: dedicated shared: volumeClaimTemplate: storageClassName: <storage-class> volumeSize: 50Gi master: volumeClaimTemplate: storageClassName: <storage-class>For more information about dedicated storage, see Dedicated storage and scaling up.
Apply the YAML file to the cluster:
oc apply -f api-analytics.yamlCheck the status of API Analytics by running the following command in the project (namespace) where it was deployed:
oc get AnalyticsClusterThe installation is complete when the READY status changes to
True, and the SUMMARY reports that all services are online:NAME READY SUMMARY VERSION RECONCILED VERSION AGE api-analytics True 6/1 <version> <version-build> 7m17s
What's next?
Install other subsystems as needed.
When you have completed the installation of all required API Connect subsystems, you can proceed to defining your API Connect configuration by using the API Connect Cloud Manager; refer to the Cloud Manager configuration checklist.