Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 6. Deploying OpenShift sandboxed containers on IBM Z and IBM LinuxONE
You can deploy OpenShift sandboxed containers on IBM Z® and IBM® LinuxONE.
OpenShift sandboxed containers deploys peer pods. The peer pod design circumvents the need for nested virtualization. For more information, see peer pod and Peer pods technical deep dive.
OpenShift sandboxed containers on IBM Z® and IBM® LinuxONE is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
Cluster requirements
- You have installed Red Hat OpenShift Container Platform 4.14 or later on the cluster where you are installing the OpenShift sandboxed containers Operator.
- Your cluster has at least one worker node.
6.1. Peer pod resource requirements
You must ensure that your cluster has sufficient resources.
Peer pod virtual machines (VMs) require resources in two locations:
- 
						The worker node. The worker node stores metadata, Kata shim resources (containerd-shim-kata-v2), remote-hypervisor resources (cloud-api-adaptor), and the tunnel setup between the worker nodes and the peer pod VM.
- The libvirt virtual machine instance. This is the actual peer pod VM running in the LPAR (KVM host).
				The CPU and memory resources used in the Kubernetes worker node are handled by the pod overhead included in the RuntimeClass (kata-remote) definition used for creating peer pods.
			
				The total number of peer pod VMs running in the cloud is defined as Kubernetes Node extended resources. This limit is per node and is set by the limit attribute in the peerpodConfig custom resource (CR).
			
				The peerpodConfig CR, named peerpodconfig-openshift, is created when you create the kataConfig CR and enable peer pods, and is located in the openshift-sandboxed-containers-operator namespace.
			
				The following peerpodConfig CR example displays the default spec values:
			
- 1
- The default limit is 10 VMs per node.
				The extended resource is named kata.peerpods.io/vm, and enables the Kubernetes scheduler to handle capacity tracking and accounting.
			
You can edit the limit per node based on the requirements for your environment after you install the OpenShift sandboxed containers Operator.
				A mutating webhook adds the extended resource kata.peerpods.io/vm to the pod specification. It also removes any resource-specific entries from the pod specification, if present. This enables the Kubernetes scheduler to account for these extended resources, ensuring the peer pod is only scheduled when resources are available.
			
The mutating webhook modifies a Kubernetes pod as follows:
- 
						The mutating webhook checks the pod for the expected RuntimeClassNamevalue, specified in theTARGET_RUNTIME_CLASSenvironment variable. If the value in the pod specification does not match the value in theTARGET_RUNTIME_CLASS, the webhook exits without modifying the pod.
- If the - RuntimeClassNamevalues match, the webhook makes the following changes to the pod spec:- 
								The webhook removes every resource specification from the resourcesfield of all containers and init containers in the pod.
- 
								The webhook adds the extended resource (kata.peerpods.io/vm) to the spec by modifying the resources field of the first container in the pod. The extended resourcekata.peerpods.io/vmis used by the Kubernetes scheduler for accounting purposes.
 
- 
								The webhook removes every resource specification from the 
The mutating webhook excludes specific system namespaces in OpenShift Container Platform from mutation. If a peer pod is created in those system namespaces, then resource accounting using Kubernetes extended resources does not work unless the pod spec includes the extended resource.
As a best practice, define a cluster-wide policy to only allow peer pod creation in specific namespaces.
6.2. Deploying OpenShift sandboxed containers on IBM Z and IBM LinuxONE
You can deploy OpenShift sandboxed containers on IBM Z® and IBM® LinuxONE by using the command line interface (CLI) to perform the following tasks:
- Install the OpenShift sandboxed containers Operator.
- Optional: Change the number of virtual machines running on each worker node.
- Configure the libvirt volume.
- Optional: Create a custom peer pod VM image.
- Create the peer pods secret.
- Create the peer pods config map.
- Create the peer pod VM image config map.
- Create the KVM host secret.
- 
						Create the KataConfigcustom resource.
- Configure the OpenShift sandboxed containers workload objects.
6.2.1. Installing the OpenShift sandboxed containers Operator
You can install the OpenShift sandboxed containers Operator by using the CLI.
Prerequisites
- 
							You have installed the OpenShift CLI (oc).
- 
							You have access to the cluster as a user with the cluster-adminrole.
Procedure
- Create an - osc-namespace.yamlmanifest file:- apiVersion: v1 kind: Namespace metadata: name: openshift-sandboxed-containers-operator - apiVersion: v1 kind: Namespace metadata: name: openshift-sandboxed-containers-operator- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the namespace by running the following command: - oc apply -f osc-namespace.yaml - $ oc apply -f osc-namespace.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create an - osc-operatorgroup.yamlmanifest file:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the operator group by running the following command: - oc apply -f osc-operatorgroup.yaml - $ oc apply -f osc-operatorgroup.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create an - osc-subscription.yamlmanifest file:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the subscription by running the following command: - oc apply -f osc-subscription.yaml - $ oc apply -f osc-subscription.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Verify that the Operator is correctly installed by running the following command: - oc get csv -n openshift-sandboxed-containers-operator - $ oc get csv -n openshift-sandboxed-containers-operator- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - This command can take several minutes to complete. 
- Watch the process by running the following command: - watch oc get csv -n openshift-sandboxed-containers-operator - $ watch oc get csv -n openshift-sandboxed-containers-operator- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Example output - NAME DISPLAY VERSION REPLACES PHASE openshift-sandboxed-containers openshift-sandboxed-containers-operator 1.8.1 1.7.0 Succeeded - NAME DISPLAY VERSION REPLACES PHASE openshift-sandboxed-containers openshift-sandboxed-containers-operator 1.8.1 1.7.0 Succeeded- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
6.2.2. Modifying the number of peer pod VMs per node
					You can change the limit of peer pod virtual machines (VMs) per node by editing the peerpodConfig custom resource (CR).
				
Procedure
- Check the current limit by running the following command: - oc get peerpodconfig peerpodconfig-openshift -n openshift-sandboxed-containers-operator \ -o jsonpath='{.spec.limit}{"\n"}'- $ oc get peerpodconfig peerpodconfig-openshift -n openshift-sandboxed-containers-operator \ -o jsonpath='{.spec.limit}{"\n"}'- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Modify the - limitattribute of the- peerpodConfigCR by running the following command:- oc patch peerpodconfig peerpodconfig-openshift -n openshift-sandboxed-containers-operator \ --type merge --patch '{"spec":{"limit":"<value>"}}'- $ oc patch peerpodconfig peerpodconfig-openshift -n openshift-sandboxed-containers-operator \ --type merge --patch '{"spec":{"limit":"<value>"}}'- 1 - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Replace <value> with the limit you want to define.
 
6.2.3. Configuring the libvirt volume
You must configure the libvirt volume on your KVM host. Peer pods use the libvirt provider of the Cloud API Adaptor to create and manage virtual machines.
Prerequisites
- You have installed the OpenShift sandboxed containers Operator on your OpenShift Container Platform cluster by using the OpenShift Container Platform web console or the command line.
- You have administrator privileges for your KVM host.
- 
							You have installed podmanon your KVM host.
- 
							You have installed virt-customizeon your KVM host.
Procedure
- Log in to the KVM host.
- Set the name of the libvirt pool by running the following command: - export LIBVIRT_POOL=<libvirt_pool> - $ export LIBVIRT_POOL=<libvirt_pool>- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - You need the - LIBVIRT_POOLvalue to create the secret for the libvirt provider.
- Set the name of the libvirt pool by running the following command: - export LIBVIRT_VOL_NAME=<libvirt_volume> - $ export LIBVIRT_VOL_NAME=<libvirt_volume>- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - You need the - LIBVIRT_VOL_NAMEvalue to create the secret for the libvirt provider.
- Set the path of the default storage pool location, by running the following command: - export LIBVIRT_POOL_DIRECTORY=<target_directory> - $ export LIBVIRT_POOL_DIRECTORY=<target_directory>- 1 - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- To ensure libvirt has read and write access permissions, use a subdirectory of the libvirt storage directory. The default is/var/lib/libvirt/images/.
 
- Create a libvirt pool by running the following command: - virsh pool-define-as $LIBVIRT_POOL --type dir --target "$LIBVIRT_POOL_DIRECTORY" - $ virsh pool-define-as $LIBVIRT_POOL --type dir --target "$LIBVIRT_POOL_DIRECTORY"- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Start the libvirt pool by running the following command: - virsh pool-start $LIBVIRT_POOL - $ virsh pool-start $LIBVIRT_POOL- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create a libvirt volume for the pool by running the following command: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
6.2.4. Creating a custom peer pod VM image
You can create a custom peer pod virtual machine (VM) image instead of using the default Operator-built image.
You build an Open Container Initiative (OCI) container with the peer pod QCOW2 image. Later, you add the container registry URL and the image path to the peer pod VM image config map.
Procedure
- Create a - Dockerfile.podvm-ocifile:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Build a container with the pod VM QCOW2 image by running the following command: - docker build -t podvm-libvirt \ --build-arg PODVM_IMAGE_SRC=<podvm_image_source> \ --build-arg PODVM_IMAGE_PATH=<podvm_image_path> \ -f Dockerfile.podvm-oci . - $ docker build -t podvm-libvirt \ --build-arg PODVM_IMAGE_SRC=<podvm_image_source> \- 1 - --build-arg PODVM_IMAGE_PATH=<podvm_image_path> \- 2 - -f Dockerfile.podvm-oci .- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
6.2.5. Creating the peer pods secret
When the peer pods secret is empty and the Cloud Credential Operator (CCO) is installed, the OpenShift sandboxed containers Operator uses the CCO to retrieve the secret. If you have uninstalled the CCO, you must create the peer pods secret for OpenShift sandboxed containers manually or the peer pods will fail to operate.
The secret stores credentials for creating the pod virtual machine (VM) image and peer pod instances.
By default, the OpenShift sandboxed containers Operator creates the secret based on the credentials used to create the cluster. However, you can manually create a secret that uses different credentials.
Prerequisites
- 
							LIBVIRT_POOL. Use the value you set when you configured libvirt on the KVM host.
- 
							LIBVIRT_VOL_NAME. Use the value you set when you configured libvirt on the KVM host.
- LIBVIRT_URI. This value is the default gateway IP address of the libvirt network. Check your libvirt network setup to obtain this value.Note- If libvirt uses the default bridge virtual network, you can obtain the - LIBVIRT_URIby running the following commands:- virtint=$(bridge_line=$(virsh net-info default | grep Bridge); echo "${bridge_line//Bridge:/}" | tr -d [:blank:]) LIBVIRT_URI=$( ip -4 addr show $virtint | grep -oP '(?<=inet\s)\d+(\.\d+){3}') LIBVIRT_GATEWAY_URI="qemu+ssh://root@${LIBVIRT_URI}/system?no_verify=1"- $ virtint=$(bridge_line=$(virsh net-info default | grep Bridge); echo "${bridge_line//Bridge:/}" | tr -d [:blank:]) $ LIBVIRT_URI=$( ip -4 addr show $virtint | grep -oP '(?<=inet\s)\d+(\.\d+){3}') $ LIBVIRT_GATEWAY_URI="qemu+ssh://root@${LIBVIRT_URI}/system?no_verify=1"- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- 
							REDHAT_OFFLINE_TOKEN. You have generated this token to download the RHEL image at Red Hat API Tokens.
Procedure
- Create a - peer-pods-secret.yamlmanifest file according to the following example:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the secret by running the following command: - oc apply -f peer-pods-secret.yaml - $ oc apply -f peer-pods-secret.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
6.2.6. Creating the peer pods config map
You must create the peer pods config map for OpenShift sandboxed containers.
Procedure
- Create a - peer-pods-cm.yamlmanifest file according to the following example:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the config map by running the following command: - oc apply -f peer-pods-cm.yaml - $ oc apply -f peer-pods-cm.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
6.2.7. Creating the peer pod VM image config map
You must create the config map for the peer pod VM image.
Procedure
- Create a - libvirt-podvm-image-cm.yamlmanifest according to the following example:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Specify the latest version of the Cloud API Adaptor source.
- 2
- Specify your RHEL activation key.
- 3
- Optional: Specify the following values if you created a container image:- 
											image_repo_url: Container registry URL.
- 
											image_tag: Image tag.
- 
											image_path: Image path. Default:/image/podvm.qcow2.
 
- 
											
- 4
- SE_BOOT: "true"enables IBM Secure Execution for an Operator-built image. Set to- falseif you created a container image.
- 5
- Specify the RHEL image operating system version. IBM Z® Secure Execution supports RHEL 9.5 and later versions.
 
- Create the config map by running the following command: - oc apply -f libvirt-podvm-image-cm.yaml - $ oc apply -f libvirt-podvm-image-cm.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - The libvirt pod VM image config map is created for your libvirt provider. 
6.2.8. Creating the KVM host secret
You must create the secret for your KVM host.
Procedure
- Generate an SSH key pair by running the following command: - ssh-keygen -f ./id_rsa -N "" - $ ssh-keygen -f ./id_rsa -N ""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Copy the public SSH key to your KVM host: - ssh-copy-id -i ./id_rsa.pub <KVM_HOST_IP> - $ ssh-copy-id -i ./id_rsa.pub <KVM_HOST_IP>- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the - Secretobject by running the following command:- oc create secret generic ssh-key-secret \ -n openshift-sandboxed-containers-operator \ --from-file=id_rsa.pub=./id_rsa.pub \ --from-file=id_rsa=./id_rsa - $ oc create secret generic ssh-key-secret \ -n openshift-sandboxed-containers-operator \ --from-file=id_rsa.pub=./id_rsa.pub \ --from-file=id_rsa=./id_rsa- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Delete the SSH keys you created: - shred --remove id_rsa.pub id_rsa - $ shred --remove id_rsa.pub id_rsa- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
6.2.9. Creating the KataConfig custom resource
					You must create the KataConfig custom resource (CR) to install kata-remote as a runtime class on your worker nodes.
				
					Creating the KataConfig CR triggers the OpenShift sandboxed containers Operator to do the following:
				
- 
							Create a RuntimeClassCR namedkata-remotewith a default configuration. This enables users to configure workloads to usekata-remoteas the runtime by referencing the CR in theRuntimeClassNamefield. This CR also specifies the resource overhead for the runtime.
					OpenShift sandboxed containers installs kata-remote as a secondary, optional runtime on the cluster and not as the primary runtime.
				
						Creating the KataConfig CR automatically reboots the worker nodes. The reboot can take from 10 to more than 60 minutes. Factors that impede reboot time are as follows:
					
- A larger OpenShift Container Platform deployment with a greater number of worker nodes.
- Activation of the BIOS and Diagnostics utility.
- Deployment on a hard disk drive rather than an SSD.
- Deployment on physical nodes such as bare metal, rather than on virtual nodes.
- A slow CPU and network.
Prerequisites
- 
							You have access to the cluster as a user with the cluster-adminrole.
Procedure
- Create an - example-kataconfig.yamlmanifest file according to the following example:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Optional: If you have applied node labels to installkata-remoteon specific nodes, specify the key and value, for example,osc: 'true'.
 
- Create the - KataConfigCR by running the following command:- oc apply -f example-kataconfig.yaml - $ oc apply -f example-kataconfig.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - The new - KataConfigCR is created and installs- kata-remoteas a runtime class on the worker nodes.- Wait for the - kata-remoteinstallation to complete and the worker nodes to reboot before verifying the installation.
- Monitor the installation progress by running the following command: - watch "oc describe kataconfig | sed -n /^Status:/,/^Events/p" - $ watch "oc describe kataconfig | sed -n /^Status:/,/^Events/p"- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - When the status of all workers under - kataNodesis- installedand the condition- InProgressis- Falsewithout specifying a reason, the- kata-remoteis installed on the cluster.
- Verify that you have built the peer pod image and uploaded it to the libvirt volume by running the following command: - oc describe configmap peer-pods-cm -n openshift-sandboxed-containers-operator - $ oc describe configmap peer-pods-cm -n openshift-sandboxed-containers-operator- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Example output - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Monitor the - kata-ocmachine config pool progress to ensure that it is in the- UPDATEDstate, when- UPDATEDMACHINECOUNTequals- MACHINECOUNT, by running the following command:- watch oc get mcp/kata-oc - $ watch oc get mcp/kata-oc- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Verify the daemon set by running the following command: - oc get -n openshift-sandboxed-containers-operator ds/peerpodconfig-ctrl-caa-daemon - $ oc get -n openshift-sandboxed-containers-operator ds/peerpodconfig-ctrl-caa-daemon- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Verify the runtime classes by running the following command: - oc get runtimeclass - $ oc get runtimeclass- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Example output - NAME HANDLER AGE kata kata 152m kata-remote kata-remote 152m - NAME HANDLER AGE kata kata 152m kata-remote kata-remote 152m- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
6.2.10. Configuring workload objects
					You must configure OpenShift sandboxed containers workload objects by setting kata-remote as the runtime class for the following pod-templated objects:
				
- 
							Podobjects
- 
							ReplicaSetobjects
- 
							ReplicationControllerobjects
- 
							StatefulSetobjects
- 
							Deploymentobjects
- 
							DeploymentConfigobjects
Do not deploy workloads in an Operator namespace. Create a dedicated namespace for these resources.
Prerequisites
- 
							You have created the KataConfigcustom resource (CR).
Procedure
- Add - spec.runtimeClassName: kata-remoteto the manifest of each pod-templated workload object as in the following example:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - OpenShift Container Platform creates the workload object and begins scheduling it. 
Verification
- 
							Inspect the spec.runtimeClassNamefield of a pod-templated object. If the value iskata-remote, then the workload is running on OpenShift sandboxed containers, using peer pods.