Supported Providers

Last modified: April 16, 2024

1 Introduction

Mendix for Private Cloud depends on external services to deploy and run Mendix apps. This document covers which providers and services are officially supported by the Mendix Operator.

2 Kubernetes Cluster Types

2.1 Supported Cluster Types

We currently support deploying to the following Kubernetes cluster types:

2.1.1 Supported Versions

Mendix for Private Cloud Operator v2.*.* is the latest version which officially supports:

  • Kubernetes versions 1.19 through 1.28
  • OpenShift 4.6 through 4.13

Mendix for Private Cloud Operator v1.12.* is an LTS release which officially supports older Kubernetes versions:

  • Kubernetes versions 1.13 through 1.21
  • OpenShift 3.11 through 4.7

2.2 Cluster Requirements

To install the Mendix Operator, the cluster administrator will need permissions to do the following:

  • Create Custom Resource Definitions
  • Create roles in the target namespace or project
  • Create role bindings in the target namespace or project

The cluster should have at least 2 CPU cores and 2 GB memory available. This is enough to run one simple app - but does not include additional resources required by Kubernetes core components.

In OpenShift, the cluster administrator must have a system:admin role.

2.2.1 CPU requirements

Mendix Operator runs on CPUs with the x86-64 achitecture.

2.3 Unsupported Cluster Types

It is not possible to use Mendix for Private Cloud in OpenShift Online (all editions, including Starter and Pro) or OpenShift Developer Sandbox because they don’t allow the installation of Custom Resource Definitions.

Kubernetes included with Docker Desktop is not officially supported.

3 Container Registries

Mendix for Private Cloud builds container images for every app and pushes them to the registry. It needs credentials to access the registry and permissions to push images into the registry.

Images are pulled from the registry by Kubernetes, not by Mendix for Private Cloud. The configuration script for Mendix for Private Cloud can configure Kubernetes image pull secrets and use the same credentials it uses for pushing images (for all registries except EKS). For large-scale or enterprise deployments, it may be better to configure image pulls on a cluster-wide level, or to configure separate, read-only image pull credentials.

3.1 Local Registry

A local, self-hosted, registry is supported for non-production use with the following bring-your-own infrastructure clusters:

  • MicroK8s
  • k3s
  • minikube

To use a local registry, it must be available from Kubernetes pods (for pushing images) and from the cluster itself (for pulling images). In most cases, the push URL and pull URL will be different.

It is possible to have username/password authentication or to push without authentication.

3.2 Externally Hosted Registry

Externally hosted OCI compliant registries are supported if they allow username/password authentication. This includes:

When using ACR in combination with Azure Kubernetes Service, it is possible to set up native authentication for pulling images from ACR.

3.3 OpenShift Image Registry

The local image registry can be used in an OpenShift cluster. It is not possible to use an OpenShift registry in a non-OpenShift cluster.

Image pull authentication will be configured out of the box.

OpenShift 4 registries don’t need any configuration and will be configured automatically.

For an OpenShift 3 registry, the pull URL should be set to docker-registry.default.svc:5000. The push URL should be set to <registry ip>:5000 where <registry ip> can be obtained by running oc get svc docker-registry -n default.

The OpenShift registry must be installed and enabled for use.

3.4 Amazon Elastic Container Registry (ECR)

Amazon ECR can only be used together with EKS clusters.

To use an ECR registry, the Mendix Operator will need an AWS Identity and Access Management (IAM) account with permissions to push and pull images.

The EKS cluster should be configured so that it can pull images from ECR.

3.5 Google Artifact Registry

Google Cloud Platform provides the artifact registry.

Mendix Operator supports registry authentication with workload identity. The Mendix Operator will need a kubernetes service account bound to a google service account with permissions to authenticate to a registry.

4 Databases

The following databases are supported, and provide the features listed.

Database Data Persists Provisioned by Operator
Ephemeral No Yes
Standard PostgreSQL Yes Yes
Microsoft SQL Server Yes Yes
Dedicated JDBC Yes No

4.1 Ephemeral Database

The ephemeral database plan uses an in-memory database running directly in a Mendix Runtime container. It doesn’t require any external database or provider and is great for quick tests or apps that don’t require any file storage.

4.2 Standard PostgreSQL Database

This refers to a PostgreSQL database which is automatically provisioned by the Operator. If you are connecting to an existing database, you should use the Dedicated JDBC database option described below.

The following standard PostgreSQL databases are supported:

  • PostgreSQL 9.6
  • PostgreSQL 10
  • PostgreSQL 11
  • PostgreSQL 12
  • PostgreSQL 13
  • PostgreSQL 14
  • PostgreSQL 15

A standard PostgreSQL database is an unmodified PostgreSQL database installed from a Helm chart or from an installation package.

The following managed PostgreSQL databases are supported:

Amazon PostgreSQL instances require additional firewall configuration to allow connections from the Kubernetes cluster.

Amazon Aurora PostgreSQL instances require additional firewall configuration to allow connections from the Kubernetes cluster.

Azure PostgreSQL databases require additional firewall configuration to allow connections from the Kubernetes cluster.

Some managed PostgreSQL databases might have restrictions or require additional configuration.

4.3 Microsoft SQL Server

This refers to a SQL Server database which is automatically provisioned by the Operator. If you are connecting to an existing database, you should use the Dedicated JDBC database option described below.

The following Microsoft SQL Server editions are supported:

  • SQL Server 2017
  • SQL Server 2019

The following managed Microsoft SQL Server databases are supported:

Amazon and Azure SQL servers require additional firewall configuration to allow connections from the Kubernetes cluster.

Some managed SQL Server databases might have restrictions or require additional configuration.

4.4 Dedicated JDBC database

This allows you to use an existing database (schema) database configuration parameters directly as supported by the Mendix Runtime.

5 File storage

5.1 Ephemeral File Storage

The ephemeral file storage plan will store files directly in the Mendix Runtime container. It doesn’t require any external file storage provider and is great for quick tests or stateless apps that don’t require any file storage.

5.2 MinIO

The latest version of MinIO is supported if it is running in server mode.

5.3 Amazon S3

Amazon S3 is supported. Mendix for Private Cloud supports multiple ways of managing and accessing S3 buckets: from creating a new S3 bucket and IAM account per environment to sharing an account and bucket by all environments in a namespace.

A complete list of supported S3 modes and their required IAM permissions for each one is available in storage plan configuration details.

5.4 Azure Blob Storage

An existing Azure Blob Storage container can be attached to Mendix app environments.

Unlike MinIO and S3, Mendix for Private Cloud doesn’t manage Azure Blob Storage containers or accounts.

5.5 Google Cloud Storage

Google Cloud Storage is supported with Cloud Storage Interoperability mode.

Mendix Operator will need the endpoint, access key, and secret key to access the storage that can be configured in the interoperability setting.

5.6 Ceph

Ceph is supported with the S3-compatible interface Ceph Object Gateway. The Mendix Operator will need the endpoint, access key, and secret key to access the storage. Please check the Ceph documentation for information on how to get the credentials.

6 Networking

6.1 OpenShift Route

OpenShift routes are supported only in OpenShift.

The only configuration option currently supported is turning TLS on or off. When TLS is turned on, Edge termination (where TLS termination occurs at the router, before the traffic gets routed to the pods) will be used, with automatic redirection from HTTP to HTTPS.

The following configuration options are available in OpenShift:

  • Turn TLS on and off
  • Add route annotations
  • Provide the name of an existing TLS certificate secret to use instead of the default router certificate
  • Provide a custom domain name (for example, mendix.example.com) to use instead of the default OpenShift route domain

It is also possible to provide a custom TLS configuration for individual environments, overriding the default configuration (only available in Standalone Mendix Operator installations):

  • Turn TLS on and off
  • Specify the name of an existing TLS certificate secret to use
  • Provide the TLS Certificate and Private Key values directly in the environment specification

6.2 Ingress

Mendix for Private Cloud is compatible with the following ingress controllers:

For ingress, it is possible to do the following:

  • Turn TLS on and off
  • Add ingress annotations
  • Add service annotations
  • Specify the ingress class, path and path type
  • Provide the name of an existing TLS secret to use
  • Provide a domain name (for example, mendix.example.com)

For each environment, the URL will be automatically generated based on the domain name. For example, if the domain name is set to mendix.example.com, then apps will have URLs such as myapp1-dev.mendix.example.com, myapp1-prod.mendix.example.com and so on.

The DNS server should be configured to route all subdomains (the * subdomain, for example, *.mendix.example.com) to the ingress/load balancer.

It is also possible to provide a custom TLS configuration for individual environments, overriding the default configuration (only available in Standalone Mendix Operator installations):

  • Turn TLS on and off
  • Specify the name of an existing TLS certificate secret to use
  • Provide the TLS Certificate and Private Key values directly in the environment specification

There are multiple ways of managing TLS certificates:

  • The Ingress controller can have a default certificate with a wildcard domain (for example, *.mendix.example.com). For Ingress controllers which support for Let’s Encrypt, the Ingress controller can also request and manage TLS certificates automatically.
  • Providing a TLS certificate secret for each environment.
  • Using cert-manager or a similar solution by using Ingress annotations. This service can be used to automatically request TLS certificates and create secrets for the Ingress controller.

Starting from Mendix Operator v1.11.0, Mendix app environments can use a Linkerd Service Mesh. Linkerd can be used to monitor and re-encrypt HTTP (or HTTPs) traffic between the Ingress Controller and the Pod running a Mendix app.

6.3 Service Only

Mendix for Private Cloud can create Services without an Ingress. In this way, the Ingress objects can be managed separately from Mendix for Private Cloud.

Mendix for Private Cloud can create Services that are compatible with:

6.4 Service Mesh Support

Starting with Mendix Operator v2.5.0, the following service meshes can be enabled for the entire Mendix for Private Cloud namespace:

If service mesh sidecar injection is enabled, all communication between pods in the Mendix for Private Cloud namespace will happen through the service mesh.

Mendix Operator v1.11.0 added support for service mesh sidecar injection, but only for app environment pods.