Skip to content

Latest commit

 

History

History
419 lines (319 loc) · 22.5 KB

File metadata and controls

419 lines (319 loc) · 22.5 KB

IBM® Cloud Infrastructure Center

IBM® Cloud Infrastructure Center is an advanced infrastructure management product, providing on-premises cloud deployments of IBM z/VM®-based and KVM based Linux® virtual machines on the IBM Z® and IBM LinuxONE platforms.

Before you get started with Ansible, familiarize yourself with the basics of Red Hat® OpenShift® and IBM Cloud Infrastructure Center. The following links provide basic information and an overview.

Red Hat OpenShift Container Platform installation and update

IBM Cloud Infrastructure Center

About this playbook

The current version of this playbook: version

The instruction of checkout to specific version

The playbook contains the following topics:

  1. How to use the IBM Cloud Infrastructure Center to install Red Hat OpenShift Container Platform via user-provisioned infrastructure (UPI)

  2. Enhance the existing UPI process, such as 

  • Red Hat OpenShift images can be automatically downloaded and uploaded.

  • Nodes’ IPs can be allocated instead of being fixed.

  • Worker nodes’ CSR can be automatically approved.

  • Additional scripts are provided:

    1. Add or remove a new Red Hat OpenShift compute node

    2. Configure the image registry

    3. Requirements pre-check before the installation

Note: This playbook supports IBM® Cloud Infrastructure Center version 1.1.5, 1.1.6 and RH OpenShift Container Platform version 4.10 and 4.11, 4.12 for z/VM and version 4.10, 4.11, 4.12 for KVM.

Installing Red Hat OpenShift on the IBM Cloud Infrastructure Center via user-provisioned infrastructure (UPI)

The User-Provisioned Infrastructure (UPI) process installs Red Hat OpenShift in steps, providing the opportunity for modifications or integration into the existing infrastructure.

Contrary to the fully-automated Installer-Provisioned Infrastructure (IPI) that creates everything in one go.

Creating the cloud (OpenStack) resources (e.g. Nova servers, Neutron ports, security groups) is the responsibility of the person deploying Red Hat OpenShift using the UPI.

The UPI installer is used to generate the ignition files and monitor the installation process.

This provides a greater flexibility at the cost of a more explicit and interactive process.

Below is a step-by-step guide how to do a UPI installation that mimics an automated IPI installation;

Check the Known Issues of this method of installation.

Workflow

ocp_upi_ansible

This is the overall workflow running Ansible playbook, mainly has the following steps:

After you performed the previous steps successfully, you get one ready OpenShift Container Platform on the IBM Cloud Infrastructure Center.

Quickstart

Prerequisites

  • You have installed the IBM Cloud Infrastructure Center

Prepare

1. Preparation of the servers

  • (Required) A Linux server, the machine that runs Ansible.
    • RHEL8 is the operation system version we tested
    • Ansible == 2.9
    • This server must not be any of the IBM Cloud Infrastructure Center nodes
    • You can use a single LPAR server or virtual machine
      • Disk with at least 20 GiB
  • (Optional) A Bastion server, a machine that is used to configure DNS and Load Balancer for the Red Hat OpenShift installation.
    • If you have external or existing DNS server, but no Load Balancer for the Red Hat Openshift installation, please set os_dns_domain property, and then use a separate YAML configure-haproxy to configure the HAProxy in bastion server.
    • If you have existing Load Balancer, but no DNS server for the Red Hat Openshift installation, you can use a separate YAML configure-dns to configure the DNS server in bastion server.
    • If you don't have any existing DNS server or Load Balancer for the Red Hat Openshift installation, you need to create one Linux server as the bastion server and run playbook to configure DNS server and Load Balancer. You can also use the same Linux server that runs Ansible.
    • If you want to deploy multiple Red Hat Openshift, please do not use the same bastion server to configure multiple Load Balancer, otherwise you may encounter x509 error.
    • The firewalld service should be enabled and running in bastion server.

2. Installation of packages on a Linux server

Packages:

  • Python3
  • Ansible
  • jq
  • wget
  • git
  • tar
  • gzip
  • firewalld
  • Python modules required in the playbooks. Namely:
    • openstackclient
    • openstacksdk
    • netaddr

Register:

Use the following command to register the Linux server, then automatically associate any available subscription matching that system:

sudo subscription-manager register --username <username> --password <password> --auto-attach

After registration, use the following command to enable ansible repository, or use a newer version of your installed systems.

Note: Our scenario is only tested for Ansible 2.9.20 on RHEL8.6.

sudo subscription-manager repos --enable=ansible-2.9-for-rhel-8-s390x-rpms
yum install ansible-2.9.20

Installation:

Install the packages from the repository in the Linux server:

sudo dnf install python3 jq wget git firewalld tar gzip redhat-rpm-config gcc libffi-devel python3-devel openssl-devel cargo -y

Make sure that python points to Python3

sudo alternatives --set python /usr/bin/python3

Upgrade the pip package and dnf:

sudo -H pip3 install --upgrade pip

Then create the requirements file and use pip3 to install the python modules:

Note: The requirements.txt are tested for python-openstackclient=5.5.0.

cat <<'EOF' >> requirements.txt 
# The order of packages is significant, because pip processes them in the order
# of appearance. Changing the order has an impact on the overall integration
# process, which may cause wedges in the gate later.
pbr==5.4.5
cliff==3.1.0
iso8601==0.1.12
openstacksdk==0.46.0
osc-lib==2.0.0
oslo.i18n==4.0.1
oslo.utils==3.42.1
python-keystoneclient==4.0.0
python-cinderclient==7.0.0
python-novaclient==17.0.0
stevedore==1.32.0
dogpile-cache
stevedore==1.32.0
netaddr==0.7.19
python-openstackclient==5.2.2
cryptography==3.2.1
EOF

sudo pip3 install -r requirements.txt --ignore-installed

Install two collections from ansible galaxy:

ansible-galaxy collection install openstack.cloud:1.10.0
ansible-galaxy collection install ansible.posix:1.5.1

Verification:

openstack
(openstack)

3. Setting the IBM Cloud Infrastructure Center environment variables on your Linux server

Check’ setting environment variables for more details.

  1. If your Linux server does not have SSH key, use the following command-line SSH to generate a key pair:
ssh-keygen -t rsa
  1. Copy the key to the IBM Cloud Infrastructure Center management node and bastion server:
ssh-copy-id user@host
  1. Test the new key:
ssh user@host

The login should now complete without asking for a password.

  1. Copy the icicrc file from the IBM Cloud Infrastructure Center management node to your user's /opt/ibm/icic/icicrc directory:
mkdir -p /opt/ibm/icic
scp user@host:/opt/ibm/icic/icicrc /opt/ibm/icic/
  1. Copy the icic.crt file from the IBM Cloud Infrastructure Center management node to your certs directory /etc/pki/tls/certs/:
scp user@host:/etc/pki/tls/certs/icic.crt /etc/pki/tls/certs/
  1. Run the source icicrc to set the environment variables:
source /opt/ibm/icic/icicrc
 Please input the username: admin
 Please input the password of admin:
  1. Verify the Linux server is connected to the IBM Cloud Infrastructure Center successfully.
openstack project list
+----------------------------------+-------------+
| ID                               | Name        |
+----------------------------------+-------------+
| 9c301e5e7b3a4e48a45e21690357c1be | icicvm      |
| 9deef79a109440c3b84e522296285904 | service     |
| bb7cf9dc985046048ccd39059ebfd6bc | ibm-default |
+----------------------------------+-------------+
  1. Verify that all components in the IBM Cloud Infrastructure Center all components are working as desired.
  • Login to the IBM Cloud Infrastructure Center command line and confirm all the IBM Cloud Infrastructure Center services are in status running.
icic-services status
  • Login to the IBM Cloud Infrastructure Center web console and select Home > Environment Checker, click the Run Environment Checker button to confirm the cluster does not have any failed messages.

If you meet any not running service or failed message, check the IBM Cloud Infrastructure Center Troubleshooting document to fix before running the ansible playbook.

  1. Subnet DNS

Note: This step is required for KVM, z/VM is optional.

During deployment, the OpenShift nodes will need to be able to resolve public name records to download the OpenShift images and so on. They will also need to resolve the OpenStack API endpoint.

The default resolvers are often set up by the OpenStack administrator in Neutron. However, some deployments do not have default DNS servers set, meaning the servers are not able to resolve any records when they boot.

If you are in this situation, you can add resolvers to your Neutron subnet. These will be put into /etc/resolv.conf on your servers post-boot.

For example, if you want to use your own or external bastion server: 198.51.100.86, you can run this command to add resolvers to your specified subnet, but be aware that if your subnet already has one DNS nameserver, please remove the old and reset bastion ip as primary DNS nameserver:

$ openstack subnet set --no-dns-nameservers <use_network_subnet>
$ openstack subnet set --dns-nameserver 198.51.100.86 <use_network_subnet>

For the multiple Openshift Container Platform, user can create multiple subnets or tenant network to deploy it.

4. Download this playbook on your Linux server

All the configuration files, logs and installation state are kept in a single directory:

git clone https://github.com/IBM/z_ansible_collections_samples.git
cp -r z_ansible_collections_samples/z_infra_provisioning/cloud_infra_center/ocp_upi ocp_upi
cd ocp_upi

5. Configure your settings in inventory.yaml

Update your settings based on the samples. The following propeties are required:

Property Default Description
use_network_name <network name from icic> openstack network list -c Name -f value
use_network_subnet <subnet id from network name in icic> openstack network list -c Subnets -f value
vm_type kvm The operation system of OpenShift Container Platform,
supported: kvm or zvm
disk_type dasd The disk storage of OpenShift Container Platform,
supported: dasd or scsi
openshift_version 4.12 The product version of OpenShift Container Platform,
such as 4.10,4.11 or 4.12.
And the rhcos is not updated for every single minor version. User can get available openshift_version from here
openshift_minor_version 3 The minor version of Openshift Container Platform,
such as 3.Support to use latest tag to install the latest minor version underopenshift_version
And User can inspect what minor releases are available by checking here to see whats there
auto_allocated_ip true (Boolean) true or false, if false,
IPs will be allocated from allocation_pool_start and allocation_pool_end
os_flavor_bootstrap medium openstack flavor list, Minimum flavor disk size >= 35 GiB
os_flavor_master medium openstack flavor list, Minimum flavor disk size >= 35 GiB
os_flavor_worker medium openstack flavor list, Minimum flavor disk size >= 35 GiB
os_control_nodes_number 3 (Integer) Number of Red Hat Openshift provisioned control server nodes
os_compute_nodes_number 3 (Integer) Number of Red Hat Openshift provisioned compute server nodes
create_server_zone '' The zone you can select which host instances are launched on and which roles can boot instances on this host, the value format is ZONE:HOST:NODE, HOST and NODE are optional parameters, in such cases, use the ZONE::NODE, ZONE:HOST or ZONE.
Default value is '', which means to use the default availability zone.
[ ZONE is Zone Name column from openstack availability zone list; HOST is Host Name column from openstack host list; NODE is Hypervisor Hostname column from openstack hypervisor list]
pullsecret <pull-secret> Get from cloud.redhat.com
sshkey <ssh-key> The SSH public key for the core user in RHEL CoreOS
os_dns_domain <external DNS ip addr> or <bastion ip addr> If you want to use your external or existing DNS server set os_dns_domain to use it, others set bastion machine ip address
cluster_name <cluster-name> The name of the cluster, such as openshift.
base_domain <cluster-base-domain> The base domain of the cluster, the base domain is used to create routes to your OpenShift Container Platform cluster components, such as example.com

If you need the Ansible playbook to help configure DNS server or HAProxy server on bastion server, you need to configure correct bastion properties.

Property
Default
Description
ansible_ssh_host <linux server ip addr> 'x.x.x.x'
required when use bastion server, give the IP address of bastion server.
bastion_private_ip_address <bastion ip addr> IP address of your bastion node
required when use bastion server, give the IP address of bastion server.
dns_forwarder <upstream DNS ip addr> For nameserver where requests should be forwarded for resolution.
required when use bastion server

Others are optional, you can enable them and update value if you need more specified settings.

Property
Default
Description
allocation_pool_start <ip range start> 'x.x.x.x'
allocation_pool_end <ip range end> 'x.x.x.x'
os_bootstrap_ip <bootstrap ip addr> 'x.x.x.x,
required when auto_allocated_ip is false
os_master_ip <master ip list> '[x.x.x.x, x.x.x.x, x.x.x.x],
required when auto_allocated_ip is false
os_infra_ip <infra ip list> '[x.x.x.x, x.x.x.x, x.x.x.x],
required when auto_allocated_ip is false
volume_type_id <storage template id> The bootable volume type from backend storage provider. Get it from openstack volume type list -c ID -f value
use_proxy false (Boolean) true or false, if true then Openshft Container Platform will use the proxy setting, get detail from doc.openshift.com
http_proxy <http-proxy> http://<username>:<pswd>@<ip>:<port>, a proxy URL to use for creating HTTP connections outside the cluster.
required when use_proxy is true
https_proxy <https-proxy> http://<username>:<pswd>@<ip>:<port>, a proxy URL to use for creating HTTPS connections outside the cluster
required when use_proxy is true
no_proxy <https-proxy> A comma-separated list of destination domain names, domains, IP addresses, or other network CIDRs to exclude proxying. Preface a domain with . to include all subdomains of that domain. Use * to bypass proxy for all destinations.
Such as: '127.0.0.1,169.254.169.254,172.26.0.0/17,172.30.0.0/16,10.0.0.0/16,10.128.0.0/14,localhost,.api-int.,.example.com.'
use_localreg false (Boolean) true or false, if true then Openshift Container Platform will use local packages to download
localreg_mirror <local-mirror-registry> The name of local mirror registry to use for mirroring the required container images of OpenShift Container Platform for disconnected installations. Following guide to setup mirror registry, and we offer temporary script to setup registry and mirror images, you can get scripts from mirror-registry, please update the correct PULL_SECRET and VERSION in 01-mirror-registry.sh script before use it.
local_openshift_install <local-openshift-install-url> This is always the latest installer download link, use an SSH or HTTP client to store the Openshift installation package, and put the link here
local_openshift_client <local-openshift-client-url> This is always the latest client download link, use an SSH or HTTP client to store the Openshift client package, and put the link here
local_rhcos_image <local-rhcos-image-url> This is all rhcos images download link, download the name that corresponds with KVM or z/VM images, and use an SSH or HTTP client to store it, put the link here
additional_certs {{ lookup('file', '/opt/registry/certs/domain.crt') | indent (width=2) }} The local mirror registry repo additionally need SSL certificated to be accessed, those can be added cert file via the additional_certs variable.
create_server_timeout 10 Default is 10 minutes that used to create instances and volumes from backend storage provider

Creation of the cluster

  1. Step1:
ansible-playbook -i inventory.yaml 01-preparation.yaml
  1. Step2:

Note: This step is optional. You can skip this step if you want to use your external or existing DNS and Load Balancer, you can refer Add-DNS-HAProxy to update it.

Use this playbook to configure the DNS server and HAProxy, please add -K parameter if you use the non-root user, and enter the password for your user.

ansible-playbook -i inventory.yaml bastion.yaml
or
ansible-playbook -i inventory.yaml bastion.yaml -K

If you use your external or existing DNS server, but no Load Balancer, you can refer Add-DNS-HAProxy to update DNS server part, and use this playbook to configure HAProxy in your bastion server.

ansible-playbook -i inventory.yaml configure-haproxy.yaml
  1. Step3:
ansible-playbook -i inventory.yaml 02-create-cluster-control.yaml
  1. Step4:
ansible-playbook -i inventory.yaml 03-create-cluster-compute.yaml

After above steps, you will get one ready OpenShift Container Platform on the IBM Cloud Infrastructure Center.

Something is wrong/trouble shooting?

Any above steps failed, clean up environment and then rerun the installation steps.

  • Failed on 01-preparation.yaml ,bastion.yaml and 02-create-cluster-control.yaml.

    • use: ansible-playbook -i inventory.yaml 04-destroy.yaml
  • Failed on 03-create-cluster-compute.yaml.

    • use: ansible-playbook -i inventory.yaml destroy-computes.yaml

Day2 Operation

Add compute node

Use this playbook to add a new compute node as allocated IP:

ansible-playbook -i inventory.yaml add-new-compute-node.yaml 

Use this playbook to add a new compute node as fixed IP:

ansible-playbook -i inventory.yaml add-new-compute-node.yaml -e ip=x.x.x.x

Use this playbook to add multiple compute nodes as allocated IP, and update bastion info automatically:

ansible-playbook -i inventory.yaml add-new-compute-node.yaml -e worker_number=3 -e update_bastion=true

Use this playbook to add multiple compute nodes as fixed IP, separate the IP list with commas, and update bastion info automatically:

ansible-playbook -i inventory.yaml add-new-compute-node.yaml -e ip=x.x.x.x,x.x.x.x -e worker_number=2 -e update_bastion=true

Please notice:

If you use your own bastion server, you can refer Add-DNS-HAProxy to update bastion info.

Uninstall Red Hat OpenShift Container Platform

ansible-playbook -i inventory.yaml 04-destroy.yaml

Remove RHCOS images

In order to save image space, our playbook will not delete the uploaded image automatically, user can use this individual playbook to remove it. ansible-playbook -i inventory.yaml destroy-images.yaml

And we store the SHA256 value into image properties to verify downloading images, the SHA256 comes from the gz packages.

| owner_specified.openstack.object | images/rhcos                                                                     |
| owner_specified.openstack.sha256 | fc265b2d5b6c9f6d175e8b15f672aba78f6e4707875f9accaa2cb74e3d90d27b

Copyright

© Copyright IBM Corporation 2023

License

Licensed under Apache License, Version 2.0.

Support

Support for all playbooks, roles, and filters are provided by the community and all issues are tracked through a Git issue. The repository admins and content owners will engage directly with users on issues reported on the Git issue.

Playbooks are contributed both by IBM as well as the broader Ansible community including IBM partners and the Z community. Therefore, it may be helpful to review who contributed a sample as well as its requirements. You can view who the contributor was by looking at the playbooks commit history as well as notes in the playbook.