The goal of this repo is to make deploying and redeploying a new OpenShift v4 cluster a snap. Using the same repo and with minor tweaks, it can be applied to any version of OpenShift higher than the current version of 4.4.
As it stands right now, the repo works for several installation usecases:
- DHCP with OVA template
- DHCP with PXE boot (needs helper node)
- Static IPs for nodes (lack of isolated network to let helper run DHCP server)
- w/o Cluster-wide Proxy (HTTP and SSL/TLS with certs supported)
- Restricted network (with or without DHCP)
- No Cloud Provider (Useful for mixed clusters with both virtual and physical Nodes)
This repo is most ideal for Home Lab and Proof-of-Concept scenarios. Having said that, if prerequistes (below) can be met and if the vCenter service account can be locked down to access only certain resources and perform only certain actions, the same repo can then be used for DEV or higher environments. Refer to this link for more details on required permissions for a vCenter service account.
This is a concise summary of everything you need to do to use the repo. Rest of the document goes into details of every step.
- Setup helper node
- Edit
group_vars/all.yml
, the following must be changed while the rest can remain the same- pull secret
- ip and mac addresses, host/domain names
- enable/disable fips mode
- vcenter details
- datastore name
- datacenter name
- username and passwords of admin/service accounts
- enable/disable registry/proxy/ntp with their details, as required
- Customize
ansible.cfg
and use/copy/modifystaging
inventory file as required - Run one of the several install options
- vSphere ESXi and vCenter 6.7 installed. For vCenter 6.5 please see a cautionary note below:
- A datacenter created with a vSphere host added to it, a datastore exists and has adequate capacity
- The playbook(s) assumes you are running a helper node in the same network to provide all the necessary services such as [DHCP/DNS/HAProxy as LB]. Also, the MAC addresses for the machines should match between helper repo and this. If not using the helper node, the minimum expectation is that the webserver and tftp server (for PXE boot) are running on the same external host, which we will then treat as a helper node.
- The necessary services such as [DNS/LB(Load Balancer] must be up and running before this repo can be used
- Ansible (preferably latest) on the machine where this repo is cloned.
- Before you install Ansible, install the
epel-release
, runyum -y install epel-release
- Before you install Ansible, install the
For vSphere 6.5, the files relating to interaction with VMware/vCenter such as this may need to have
vmware_deploy_ovf
module to includecluster
,resource-pool
parameters and their values set to work correctly.
Pre-populated entries in group_vars/all.yml are ready to be used unless you need to customize further. Any updates described below refer to group_vars/all.yml unless otherwise specified.
- Get the pull secret from here. Update the file on the line with
pull_secret
by providing the entire pull secret as a single line replacing the provided/incomplete pull secret - Get the vCenter details:
- IP address
- Service account username (can be the same as admin)
- Service account password (can be the same as admin)
- Admin account username
- Admin account password
- Datacenter name (created in the prerequisites mentioned above)
- Datastore name
- Absolute path of the vCenter folder to use (optional). If this field is not populated, its is auto-populated and points to
/${vcenter.datacenter}/vm/${config.cluster_name}
- Downloadable link to
govc
(vSphere CLI, pre-populated) - OpenShift cluster
- base domain (pre-populated with example.com)
- cluster name (pre-populated with ocp4)
- HTTP URL of the bootstrap.ign file (pre-populated with a example config pointing to helper node)
- Furnish any proxy details with the section like below.
- If
proxy.enabled
is set toFalse
anything defined under proxy and the proxy setup is ignored - The
cert_content
shown below is only for illustration to show the format - When there is no certificate, leave the variable
cert_content
value empty
proxy: enabled: true http_proxy: http://helper.ocp4.example.com:3129 https_proxy: http://helper.ocp4.example.com:3129 no_proxy: example.com cert_content: | -----BEGIN CERTIFICATE----- <certficate content> -----END CERTIFICATE-----
- If
- When doing the restrcited network install and following instructions from restricted.md, furnish details related to the registry with a section like below. If
registry.enabled
is set toFalse
anything defined underregistry
and the registry setup is ignoredregistry: enabled: true product_repo: openshift-release-dev product_release_name: ocp-release product_release_version: 4.4.0-x86_64 username: ansible password: ansible email: user@awesome.org cert_content: host: helper.ocp4.example.com port: 5000 repo: ocp4/openshift4
- If you wish to install without enabling the Kubernetes vSphere Cloud Provider (Useful for mixed installs with both Virtual Nodes and Bare Metal Nodes), change the
provider:
tonone
in all.yaml.config: provider: none base_domain: example.com ...
- If you wish to enable custom NTP servers on your nodes, set
ntp.custom
toTrue
and definentp.ntp_server_list
to fit your requirements.ntp: custom: True ntp_server_list: - 0.rhel.pool.ntp.org - 1.rhel.pool.ntp.org
The step #5 needn't exist at the time of running the setup/installation step, so provide an accurate guess of where and at what context path bootstrap.ign will eventually be served
Now configure ansible.cfg
and staging
inventory file based on your environment before picking one of the 5 different install options listed below.
Under the webservers.hosts
entry, use one of two options below :
- localhost : if the
ansible-playbook
is being run on the same host as the webserver that would eventually host bootstrap.ign file - the IP address or FQDN of the machine that would run the webserver.
- Running the playbook as a root user
- If the localhost runs the webserver
[defaults] host_key_checking = False
- If the remote host runs the webserver
[defaults] host_key_checking = False remote_user = root ask_pass = True
- If the localhost runs the webserver
- Running the playbook as a non-root user
- If the localhost runs the webserver
[defaults] host_key_checking = False [privilege_escalation] become_ask_pass = True
- If the remote host runs the webserver
[defaults] host_key_checking = False remote_user = root ask_pass = True [privilege_escalation] become_ask_pass = True
- If the localhost runs the webserver
# Option 1: DHCP + use of OVA template
ansible-playbook -i staging dhcp_ova.yml
# Option 2: DHCP + PXE boot
ansible-playbook -i staging dhcp_pxe.yml
# Option 3: ISO + Static IPs
ansible-playbook -i staging static_ips.yml
# Refer to restricted.md file for more details
# Option 4: DHCP + use of OVA template in a Restricted Network
ansible-playbook -i staging restricted_dhcp_ova.yml
# Option 5: Static IPs + use of ISO images in a Restricted Network
ansible-playbook -i staging restricted_static_ips.yml
-
If you are re-running the installation playbook make sure to blow away any existing VMs (in
ocp4
folder) listed below:- bootstrap
- masters
- workers
rhcos-vmware
template (if not using the extra param as shown below)
-
If a template by the name
rhcos-vmware
already exists in vCenter, you want to reuse it and skip the OVA download from Red Hat and upload into vCenter, use the following extra param.-e skip_ova=true
-
If you would rather want to clean all folders
bin
,downloads
,install-dir
and re-download all the artifacts, append the following to the command you chose in the first step-e clean=true
- Necessary Linux packages installed for the installation
- SSH key-pair generated, with key
~/.ssh/ocp4
and public key~/.ssh/ocp4.pub
- Necessary folders [bin, downloads, downloads/ISOs, install-dir] created
- OpenShift client, install and .ova binaries downloaded to the downloads folder
- Unzipped versions of the binaries installed in the bin folder
- In the install-dir folder:
- append-bootstrap.ign file with the HTTP URL of the boostrap.ign file
- master.ign and worker.ign
- base64 encoded files (append-bootstrap.64, master.64, worker.64) for (append-bootstrap.ign, master.ign, worker.ign) respectiviely. This step assumes you have base64 installed and in your $PATH
- The bootstrap.ign is copied over to the web server in the designated location
- A folder is created in the vCenter under the mentioned datacenter and the template is imported
- The template file is edited to carry certain default settings and runtime parameters common to all the VMs
- VMs (bootstrap, master0-2, worker0-2) are generated in the designated folder and (in state of) poweredon
If everything goes well you should be able to log into all of the machines using the following command:
# Assuming you are able to resolve bootstrap.ocp4.example.com on this machine
# Replace the bootstrap hostname with any of the master or worker hostnames
ssh -i ~/.ssh/ocp4 core@bootstrap.ocp4.example.com
Once logged in, on bootstrap node run the following command to understand if/how the masters are (being) setup:
journalctl -b -f -u bootkube.service
Once the bootkube.service
is complete, the bootstrap VM can safely be poweredoff
and the VM deleted. Finish by checking on the OpenShift with the following commands:
# In the root folder of this repo run the following commands
export KUBECONFIG=$(pwd)/install-dir/auth/kubeconfig
export PATH=$(pwd)/bin:$PATH
# OpenShift Client Commands
oc whoami
oc get co
To check if the proxy information has been picked up:
# On Master
cat /etc/systemd/system/machine-config-daemon-host.service.d/10-default-env.conf
# On Bootstrap
cat /etc/systemd/system.conf.d/10-default-env.conf
To check if the registry information has been picked up:
# On Master or Bootstrap
cat /etc/containers/registries.conf
cat /root/.docker/config.json
To check if your certs have been picked up:
# On Master
cat /etc/pki/ca-trust/source/anchors/openshift-config-user-ca-bundle.crt
# On Bootstrap
cat /etc/pki/ca-trust/source/anchors/ca.crt