This document describes a production-grade, fully free and open-source architecture for deploying WSO2 (API Manager / Micro Integrator / IS) on on‑prem VMware infrastructure, without using VMware Tanzu.
This stack is widely used in banks and regulated environments and avoids vendor lock‑in.
- Replace VMware Tanzu with free & open-source components
- Support HA, scalability, and security
- Suitable for on‑prem / air‑gapped environments
- Production-ready for WSO2 APIM
RKE2 (Rancher Kubernetes Engine 2)
- CNCF‑compliant upstream Kubernetes
- CIS hardened by default
- Ideal for on‑prem VMware
Alternatives:
- kubeadm (pure upstream)
- k3s (lightweight, non‑critical)
Rancher (Open Source)
- Multi‑cluster management
- RBAC and audit logs
- Certificate lifecycle management
- Upgrade orchestration
MetalLB
- Provides LoadBalancer IPs on‑prem
- Works well with VMware networks
NGINX Ingress Controller
- Stable for WSO2 Gateway traffic
- Supports:
- TLS termination
- Sticky sessions
- WebSockets
- Large payloads
- Custom timeouts
⚠ Avoid Traefik for WSO2 APIM due to timeout and WebSocket issues.
- cert-manager
- Internal CA or enterprise PKI
- Automatic certificate rotation
Supports:
- mTLS (Gateway ↔ Backend)
- OAuth endpoints
- External HTTPS access
Harbor (Open Source)
- CNCF project (originally VMware)
- Role‑based access control
- Vulnerability scanning
- Air‑gapped support
Used for:
- WSO2 Docker images
- Custom integrations
- GitLab CI or Jenkins
- ArgoCD
- Git‑based deployment
- Audit‑friendly
- Easy rollback
| Function | Tool |
|---|---|
| Metrics | Prometheus |
| Dashboards | Grafana |
| Logs | Loki |
| Tracing | Jaeger |
WSO2 exposes:
- Prometheus metrics
- Structured logs
- JMX
VMware ESXi
│
├─ RKE2 Kubernetes Cluster
│ ├─ Rancher
│ ├─ cert-manager
│ ├─ MetalLB
│ ├─ NGINX Ingress
│ ├─ Prometheus / Grafana
│ └─ ArgoCD
│
├─ Harbor Registry
│
└─ WSO2 Platform
├─ API Manager (Control Plane)
├─ API Gateway
├─ Traffic Manager
├─ Key Manager
└─ Analytics (optional)
- Increase proxy timeouts
- Enable sticky sessions for Publisher & DevPortal
- Use separate Ingress for Gateway vs Portal
- Use external HA DB
- PostgreSQL / Oracle / MSSQL
- Do NOT use in‑cluster DB for production
- HPA for Gateway
- Fixed replicas for Control Plane
- Separate namespaces per environment
| Area | Tanzu | Open Source |
|---|---|---|
| License Cost | Very High | Free |
| Kubernetes | TKG | RKE2 |
| Ingress | NSX ALB | NGINX |
| Registry | Paid | Harbor |
| Flexibility | Limited | High |
| Lock‑in | High | None |
For on‑prem WSO2 deployments:
RKE2 + Rancher + MetalLB + NGINX + Harbor
This stack provides:
- Enterprise stability
- Zero license cost
- Full control and auditability
- Create HA WSO2 Helm values
- Tune NGINX Ingress for APIM
- Define DB topology
- Prepare DR strategy
Prepared for on‑prem enterprise WSO2 deployments