Deploying an API Connect cluster or subsystems on s390x

To deploy an API Connect cluster on s390x, deploy the API Manager and API Portal subsystems on s390x, and deploy the API Gateway and API Analytics subsystems on amd64.

Before you begin

The following limitations apply to this deployment:

  • The 2 data center deployment configuration is not supported.

  • You can't customize internal certificates.

Deployment procedure

  1. Deploy the API Manager and API Portal subsystems on the s390x cluster. Do one of the following:

  2. Copy the ingress issuers to the amd64 cluster by following the steps in the next section, "Copying the ingress issuers to the amd64 cluster".

  3. Deploy the API Gateway subsystem on an amd64 cluster. For more information, see Deploying the API Gateway subsystem by using the CLI.

  4. Deploy the API Analytics subsystem on an amd64 cluster. For more information, see Deploying the API Analytics subsystem by using the CLI.

Copying the ingress issuer certificates to the amd64 cluster

After you deploy the API Manager and API Portal subsystems on the s390x cluster, export the ingress issuer certificates and copy them to the amd64 cluster. This process ensures that the subsystems you deploy next on the amd64 cluster can communicate with the subsystems on the s390x cluster.

  1. Verify that the Cloud Pak for Integration and API Connect operators are installed on the amd64 cluster.

  2. Export the API Manager ingress CA secret from the namespace of the s390x cluster where the API Manager subsystem is running. Run the following command on the s390x cluster, where <apiconnect_cluster_name> is the name of the API Connect cluster instance:

    oc get secret <apiconnect_cluster_name>-ingress-ca -o json| jq 'del(.metadata.creationTimestamp,.metadata.namespace,.metadata.resourceVersion,.metadata.uid,.metadata.selfLink)' > ingress-secret.json
    Important: If you intend to deploy the API Gateway and API Analytics subsystems to different namespaces, then repeat steps 3-6 in each target namespace.
  3. Apply ingress-secret.json to the target namespace on the amd64 cluster:

    oc apply -f ingress-secret.json -n <namespace>
  4. Create a file named ingress-issuer.yaml as in the following example. Replace <apiconnect_cluster_name> with the name of the API Connect cluster instance.

    apiVersion: cert-manager.io/v1
    kind: Issuer
    metadata:
      name: <apiconnect_cluster_name>-ingress-issuer
    spec:
      ca:
        secretName: <apiconnectCluster_name>-ingress-ca
    ---
    apiVersion: cert-manager.io/v1
    kind: Issuer
    metadata:
      name: <apiconnect-cluster_name>-self-signed
    spec:
      selfSigned: {}
  5. Apply the ingress-issuer.yaml to the target namespace on the amd64 cluster:

    oc apply -f ingress-issuer.yaml -n <namespace>
  6. Validate that the issuers are in the READY state by running the following command:

    oc get issuer -n <namespace>

    The response should be similar to the following example:

    NAME                                      READY
    my-api-connect-cluster-name-ingress-issuer   True
    my-api-connect-cluster-name-self-signed      True