Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 4. Deploying OpenShift sandboxed containers on Azure
You can deploy OpenShift sandboxed containers on Microsoft Azure Cloud Computing Services.
OpenShift sandboxed containers deploys peer pods. The peer pod design circumvents the need for nested virtualization. For more information, see peer pod and Peer pods technical deep dive.
Cluster requirements
- You have installed Red Hat OpenShift Container Platform 4.14 or later on the cluster where you are installing the OpenShift sandboxed containers Operator.
- Your cluster has at least one worker node.
4.1. Peer pod resource requirements
You must ensure that your cluster has sufficient resources.
Peer pod virtual machines (VMs) require resources in two locations:
- 
						The worker node. The worker node stores metadata, Kata shim resources (containerd-shim-kata-v2), remote-hypervisor resources (cloud-api-adaptor), and the tunnel setup between the worker nodes and the peer pod VM.
- The cloud instance. This is the actual peer pod VM running in the cloud.
				The CPU and memory resources used in the Kubernetes worker node are handled by the pod overhead included in the RuntimeClass (kata-remote) definition used for creating peer pods.
			
				The total number of peer pod VMs running in the cloud is defined as Kubernetes Node extended resources. This limit is per node and is set by the limit attribute in the peerpodConfig custom resource (CR).
			
				The peerpodConfig CR, named peerpodconfig-openshift, is created when you create the kataConfig CR and enable peer pods, and is located in the openshift-sandboxed-containers-operator namespace.
			
				The following peerpodConfig CR example displays the default spec values:
			
- 1
- The default limit is 10 VMs per node.
				The extended resource is named kata.peerpods.io/vm, and enables the Kubernetes scheduler to handle capacity tracking and accounting.
			
You can edit the limit per node based on the requirements for your environment after you install the OpenShift sandboxed containers Operator.
				A mutating webhook adds the extended resource kata.peerpods.io/vm to the pod specification. It also removes any resource-specific entries from the pod specification, if present. This enables the Kubernetes scheduler to account for these extended resources, ensuring the peer pod is only scheduled when resources are available.
			
The mutating webhook modifies a Kubernetes pod as follows:
- 
						The mutating webhook checks the pod for the expected RuntimeClassNamevalue, specified in theTARGET_RUNTIME_CLASSenvironment variable. If the value in the pod specification does not match the value in theTARGET_RUNTIME_CLASS, the webhook exits without modifying the pod.
- If the - RuntimeClassNamevalues match, the webhook makes the following changes to the pod spec:- 
								The webhook removes every resource specification from the resourcesfield of all containers and init containers in the pod.
- 
								The webhook adds the extended resource (kata.peerpods.io/vm) to the spec by modifying the resources field of the first container in the pod. The extended resourcekata.peerpods.io/vmis used by the Kubernetes scheduler for accounting purposes.
 
- 
								The webhook removes every resource specification from the 
The mutating webhook excludes specific system namespaces in OpenShift Container Platform from mutation. If a peer pod is created in those system namespaces, then resource accounting using Kubernetes extended resources does not work unless the pod spec includes the extended resource.
As a best practice, define a cluster-wide policy to only allow peer pod creation in specific namespaces.
4.2. Deploying OpenShift sandboxed containers by using the web console
You can deploy OpenShift sandboxed containers on Azure by using the OpenShift Container Platform web console to perform the following tasks:
- Install the OpenShift sandboxed containers Operator.
- Create the peer pods secret.
- Create the peer pods config map.
- Create the Azure secret.
- 
						Create the KataConfigcustom resource.
- Configure the OpenShift sandboxed containers workload objects.
4.2.1. Installing the OpenShift sandboxed containers Operator
You can install the OpenShift sandboxed containers Operator by using the OpenShift Container Platform web console.
Prerequisites
- 
							You have access to the cluster as a user with the cluster-adminrole.
Procedure
- 
							In the web console, navigate to Operators OperatorHub. 
- 
							In the Filter by keyword field, type OpenShift sandboxed containers.
- Select the OpenShift sandboxed containers Operator tile and click Install.
- On the Install Operator page, select stable from the list of available Update Channel options.
- Verify that Operator recommended Namespace is selected for Installed Namespace. This installs the Operator in the mandatory - openshift-sandboxed-containers-operatornamespace. If this namespace does not yet exist, it is automatically created.Note- Attempting to install the OpenShift sandboxed containers Operator in a namespace other than - openshift-sandboxed-containers-operatorcauses the installation to fail.
- Verify that Automatic is selected for Approval Strategy. Automatic is the default value, and enables automatic updates to OpenShift sandboxed containers when a new z-stream release is available.
- Click Install.
- 
							Navigate to Operators Installed Operators to verify that the Operator is installed. 
4.2.2. Creating the peer pods secret
When the peer pods secret is empty and the Cloud Credential Operator (CCO) is installed, the OpenShift sandboxed containers Operator uses the CCO to retrieve the secret. If you have uninstalled the CCO, you must create the peer pods secret for OpenShift sandboxed containers manually or the peer pods will fail to operate.
The secret stores credentials for creating the pod virtual machine (VM) image and peer pod instances.
By default, the OpenShift sandboxed containers Operator creates the secret based on the credentials used to create the cluster. However, you can manually create a secret that uses different credentials.
Prerequisites
- You have installed and configured the Azure CLI tool.
Procedure
- Retrieve the Azure subscription ID by running the following command: - AZURE_SUBSCRIPTION_ID=$(az account list --query "[?isDefault].id" \ -o tsv) && echo "AZURE_SUBSCRIPTION_ID: \"$AZURE_SUBSCRIPTION_ID\"" - $ AZURE_SUBSCRIPTION_ID=$(az account list --query "[?isDefault].id" \ -o tsv) && echo "AZURE_SUBSCRIPTION_ID: \"$AZURE_SUBSCRIPTION_ID\""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Generate the RBAC content by running the following command: - az ad sp create-for-rbac --role Contributor --scopes /subscriptions/$AZURE_SUBSCRIPTION_ID \ --query "{ client_id: appId, client_secret: password, tenant_id: tenant }"- $ az ad sp create-for-rbac --role Contributor --scopes /subscriptions/$AZURE_SUBSCRIPTION_ID \ --query "{ client_id: appId, client_secret: password, tenant_id: tenant }"- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Example output - { "client_id": `AZURE_CLIENT_ID`, "client_secret": `AZURE_CLIENT_SECRET`, "tenant_id": `AZURE_TENANT_ID` }- { "client_id": `AZURE_CLIENT_ID`, "client_secret": `AZURE_CLIENT_SECRET`, "tenant_id": `AZURE_TENANT_ID` }- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- 
							Record the RBAC output to use in the secretobject.
- 
							In the OpenShift Container Platform web console, navigate to Operators Installed Operators. 
- Click the OpenShift sandboxed containers Operator tile.
- Click the Import icon (+) on the top right corner.
- In the Import YAML window, paste the following YAML manifest: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Click Save to apply the changes.
- 
							Navigate to Workloads Secrets to verify the peer pods secret. 
4.2.3. Creating the peer pods config map
You must create the peer pods config map for OpenShift sandboxed containers.
Procedure
- Obtain the following values from your Azure instance: - Retrieve and record the Azure resource group: - AZURE_RESOURCE_GROUP=$(oc get infrastructure/cluster -o jsonpath='{.status.platformStatus.azure.resourceGroupName}') && echo "AZURE_RESOURCE_GROUP: \"$AZURE_RESOURCE_GROUP\""- $ AZURE_RESOURCE_GROUP=$(oc get infrastructure/cluster -o jsonpath='{.status.platformStatus.azure.resourceGroupName}') && echo "AZURE_RESOURCE_GROUP: \"$AZURE_RESOURCE_GROUP\""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Retrieve and record the Azure VNet name: - AZURE_VNET_NAME=$(az network vnet list --resource-group ${AZURE_RESOURCE_GROUP} --query "[].{Name:name}" --output tsv)- $ AZURE_VNET_NAME=$(az network vnet list --resource-group ${AZURE_RESOURCE_GROUP} --query "[].{Name:name}" --output tsv)- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - This value is used to retrieve the Azure subnet ID. 
- Retrieve and record the Azure subnet ID: - AZURE_SUBNET_ID=$(az network vnet subnet list --resource-group ${AZURE_RESOURCE_GROUP} --vnet-name $AZURE_VNET_NAME --query "[].{Id:id} | [? contains(Id, 'worker')]" --output tsv) && echo "AZURE_SUBNET_ID: \"$AZURE_SUBNET_ID\""- $ AZURE_SUBNET_ID=$(az network vnet subnet list --resource-group ${AZURE_RESOURCE_GROUP} --vnet-name $AZURE_VNET_NAME --query "[].{Id:id} | [? contains(Id, 'worker')]" --output tsv) && echo "AZURE_SUBNET_ID: \"$AZURE_SUBNET_ID\""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Retrieve and record the Azure network security group (NSG) ID: - AZURE_NSG_ID=$(az network nsg list --resource-group ${AZURE_RESOURCE_GROUP} --query "[].{Id:id}" --output tsv) && echo "AZURE_NSG_ID: \"$AZURE_NSG_ID\""- $ AZURE_NSG_ID=$(az network nsg list --resource-group ${AZURE_RESOURCE_GROUP} --query "[].{Id:id}" --output tsv) && echo "AZURE_NSG_ID: \"$AZURE_NSG_ID\""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Retrieve and record the Azure region: - AZURE_REGION=$(az group show --resource-group ${AZURE_RESOURCE_GROUP} --query "{Location:location}" --output tsv) && echo "AZURE_REGION: \"$AZURE_REGION\""- $ AZURE_REGION=$(az group show --resource-group ${AZURE_RESOURCE_GROUP} --query "{Location:location}" --output tsv) && echo "AZURE_REGION: \"$AZURE_REGION\""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
 
- 
							In the OpenShift Container Platform web console, navigate to Operators Installed Operators. 
- Select the OpenShift sandboxed containers Operator from the list of operators.
- Click the Import icon (+) in the top right corner.
- In the Import YAML window, paste the following YAML manifest: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- The"Standard_B2als_v2"instance size is the default value if an instance size is not defined in the workload.
- 2
- Lists all of the instance sizes you can specify when creating the pod. This allows you to define smaller instance sizes for workloads that need less memory and fewer CPUs or larger instance sizes for larger workloads.
- 3
- Specify theAZURE_SUBNET_IDvalue that you retrieved.
- 4
- Specify theAZURE_NSG_IDvalue that you retrieved.
- 5
- Optional: By default, this value is populated when you run theKataConfigCR, using an Azure image ID based on your cluster credentials. If you create your own Azure image, specify the correct image ID.
- 6
- Specify theAZURE_REGIONvalue you retrieved.
- 7
- Specify theAZURE_RESOURCE_GROUPvalue you retrieved.
 
- Click Save to apply the changes.
- 
							Navigate to Workloads ConfigMaps to view the new config map. 
4.2.4. Creating the Azure secret
You must create the SSH key secret, which is required by the Azure virtual machine (VM) creation API. Azure only requires the SSH public key. Confidential Containers disables SSH in VMs, so the keys have no effect in the VMs.
Procedure
- Generate an SSH key pair by running the following command: - ssh-keygen -f ./id_rsa -N "" - $ ssh-keygen -f ./id_rsa -N ""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- 
							In the OpenShift Container Platform web console, navigate to Workloads Secrets. 
- On the Secrets page, verify that you are in the openshift-sandboxed-containers-operator project.
- Click Create and select Key/value secret.
- 
							In the Secret name field, enter ssh-key-secret.
- 
							In the Key field, enter id_rsa.pub.
- In the Value field, paste your public SSH key.
- Click Create.
- Delete the SSH keys you created: - shred --remove id_rsa.pub id_rsa - $ shred --remove id_rsa.pub id_rsa- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
4.2.5. Creating the KataConfig custom resource
					You must create the KataConfig custom resource (CR) to install kata-remote as a RuntimeClass on your worker nodes.
				
					The kata-remote runtime class is installed on all worker nodes by default. If you want to install kata-remote on specific nodes, you can add labels to those nodes and then define the label in the KataConfig CR.
				
					OpenShift sandboxed containers installs kata-remote as a secondary, optional runtime on the cluster and not as the primary runtime.
				
						Creating the KataConfig CR automatically reboots the worker nodes. The reboot can take from 10 to more than 60 minutes. The following factors might increase the reboot time:
					
- A larger OpenShift Container Platform deployment with a greater number of worker nodes.
- Activation of the BIOS and Diagnostics utility.
- Deployment on a hard disk drive rather than an SSD.
- Deployment on physical nodes such as bare metal, rather than on virtual nodes.
- A slow CPU and network.
Prerequisites
- 
							You have access to the cluster as a user with the cluster-adminrole.
- Optional: You have installed the Node Feature Discovery Operator if you want to enable node eligibility checks.
Procedure
- 
							In the OpenShift Container Platform web console, navigate to Operators Installed Operators. 
- Select the OpenShift sandboxed containers Operator.
- On the KataConfig tab, click Create KataConfig.
- Enter the following details: - 
									Name: Optional: The default name is example-kataconfig.
- 
									Labels: Optional: Enter any relevant, identifying attributes to the KataConfigresource. Each label represents a key-value pair.
- enablePeerPods: Select for public cloud, IBM Z®, and IBM® LinuxONE deployments.
- kataConfigPoolSelector. Optional: To install - kata-remoteon selected nodes, add a match expression for the labels on the selected nodes:- Expand the kataConfigPoolSelector area.
- In the kataConfigPoolSelector area, expand matchExpressions. This is a list of label selector requirements.
- Click Add matchExpressions.
- In the Key field, enter the label key the selector applies to.
- 
											In the Operator field, enter the key’s relationship to the label values. Valid operators are In,NotIn,Exists, andDoesNotExist.
- Expand the Values area and then click Add value.
- 
											In the Value field, enter trueorfalsefor key label value.
 
- 
									logLevel: Define the level of log data retrieved for nodes with the kata-remoteruntime class.
 
- 
									Name: Optional: The default name is 
- Click Create. The - KataConfigCR is created and installs the- kata-remoteruntime class on the worker nodes.- Wait for the - kata-remoteinstallation to complete and the worker nodes to reboot before verifying the installation.
Verification
- 
							On the KataConfig tab, click the KataConfigCR to view its details.
- Click the YAML tab to view the - statusstanza.- The - statusstanza contains the- conditionsand- kataNodeskeys. The value of- status.kataNodesis an array of nodes, each of which lists nodes in a particular state of- kata-remoteinstallation. A message appears each time there is an update.
- Click Reload to refresh the YAML. - When all workers in the - status.kataNodesarray display the values- installedand- conditions.InProgress: Falsewith no specified reason, the- kata-remoteis installed on the cluster.
Additional resources
Verifying the pod VM image
					After kata-remote is installed on your cluster, the OpenShift sandboxed containers Operator creates a pod VM image, which is used to create peer pods. This process can take a long time because the image is created on the cloud instance. You can verify that the pod VM image was created successfully by checking the config map that you created for the cloud provider.
				
Procedure
- 
							Navigate to Workloads ConfigMaps. 
- Click the provider config map to view its details.
- Click the YAML tab.
- Check the - statusstanza of the YAML file.- If the - AZURE_IMAGE_IDparameter is populated, the pod VM image was created successfully.
Troubleshooting
- Retrieve the events log by running the following command: - oc get events -n openshift-sandboxed-containers-operator --field-selector involvedObject.name=osc-podvm-image-creation - $ oc get events -n openshift-sandboxed-containers-operator --field-selector involvedObject.name=osc-podvm-image-creation- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Retrieve the job log by running the following command: - oc logs -n openshift-sandboxed-containers-operator jobs/osc-podvm-image-creation - $ oc logs -n openshift-sandboxed-containers-operator jobs/osc-podvm-image-creation- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
If you cannot resolve the issue, submit a Red Hat Support case and attach the output of both logs.
4.2.6. Configuring workload objects
					You must configure OpenShift sandboxed containers workload objects by setting kata-remote as the runtime class for the following pod-templated objects:
				
- 
							Podobjects
- 
							ReplicaSetobjects
- 
							ReplicationControllerobjects
- 
							StatefulSetobjects
- 
							Deploymentobjects
- 
							DeploymentConfigobjects
Do not deploy workloads in an Operator namespace. Create a dedicated namespace for these resources.
You can define whether the workload should be deployed using the default instance size, which you defined in the config map, by adding an annotation to the YAML file.
If you do not want to define the instance size manually, you can add an annotation to use an automatic instance size, based on the memory available.
Prerequisites
- 
							You have created the KataConfigcustom resource (CR).
Procedure
- 
							In the OpenShift Container Platform web console, navigate to Workloads workload type, for example, Pods. 
- On the workload type page, click an object to view its details.
- Click the YAML tab.
- Add - spec.runtimeClassName: kata-remoteto the manifest of each pod-templated workload object as in the following example:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Add an annotation to the pod-templated object to use a manually defined instance size or an automatic instance size: - To use a manually defined instance size, add the following annotation: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Specify the instance size that you defined in the config map.
 
- To use an automatic instance size, add the following annotations: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Define the amount of memory available for the workload to use. The workload will run on an automatic instance size based on the amount of memory available. 
 
- Click Save to apply the changes. - OpenShift Container Platform creates the workload object and begins scheduling it. 
Verification
- 
							Inspect the spec.runtimeClassNamefield of a pod-templated object. If the value iskata-remote, then the workload is running on OpenShift sandboxed containers, using peer pods.
4.3. Deploying OpenShift sandboxed containers by using the command line
You can deploy OpenShift sandboxed containers on Azure by using the command line interface (CLI) to perform the following tasks:
- Install the OpenShift sandboxed containers Operator.
- Optional: Change the number of virtual machines running on each worker node.
- Create the peer pods secret.
- Create the peer pods config map.
- Create the Azure secret.
- 
						Create the KataConfigcustom resource.
- Configure the OpenShift sandboxed containers workload objects.
4.3.1. Installing the OpenShift sandboxed containers Operator
You can install the OpenShift sandboxed containers Operator by using the CLI.
Prerequisites
- 
							You have installed the OpenShift CLI (oc).
- 
							You have access to the cluster as a user with the cluster-adminrole.
Procedure
- Create an - osc-namespace.yamlmanifest file:- apiVersion: v1 kind: Namespace metadata: name: openshift-sandboxed-containers-operator - apiVersion: v1 kind: Namespace metadata: name: openshift-sandboxed-containers-operator- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the namespace by running the following command: - oc apply -f osc-namespace.yaml - $ oc apply -f osc-namespace.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create an - osc-operatorgroup.yamlmanifest file:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the operator group by running the following command: - oc apply -f osc-operatorgroup.yaml - $ oc apply -f osc-operatorgroup.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create an - osc-subscription.yamlmanifest file:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the subscription by running the following command: - oc apply -f osc-subscription.yaml - $ oc apply -f osc-subscription.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Verify that the Operator is correctly installed by running the following command: - oc get csv -n openshift-sandboxed-containers-operator - $ oc get csv -n openshift-sandboxed-containers-operator- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - This command can take several minutes to complete. 
- Watch the process by running the following command: - watch oc get csv -n openshift-sandboxed-containers-operator - $ watch oc get csv -n openshift-sandboxed-containers-operator- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Example output - NAME DISPLAY VERSION REPLACES PHASE openshift-sandboxed-containers openshift-sandboxed-containers-operator 1.8.1 1.7.0 Succeeded - NAME DISPLAY VERSION REPLACES PHASE openshift-sandboxed-containers openshift-sandboxed-containers-operator 1.8.1 1.7.0 Succeeded- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
4.3.2. Modifying the number of peer pod VMs per node
					You can change the limit of peer pod virtual machines (VMs) per node by editing the peerpodConfig custom resource (CR).
				
Procedure
- Check the current limit by running the following command: - oc get peerpodconfig peerpodconfig-openshift -n openshift-sandboxed-containers-operator \ -o jsonpath='{.spec.limit}{"\n"}'- $ oc get peerpodconfig peerpodconfig-openshift -n openshift-sandboxed-containers-operator \ -o jsonpath='{.spec.limit}{"\n"}'- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Modify the - limitattribute of the- peerpodConfigCR by running the following command:- oc patch peerpodconfig peerpodconfig-openshift -n openshift-sandboxed-containers-operator \ --type merge --patch '{"spec":{"limit":"<value>"}}'- $ oc patch peerpodconfig peerpodconfig-openshift -n openshift-sandboxed-containers-operator \ --type merge --patch '{"spec":{"limit":"<value>"}}'- 1 - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Replace <value> with the limit you want to define.
 
4.3.3. Creating the peer pods secret
When the peer pods secret is empty and the Cloud Credential Operator (CCO) is installed, the OpenShift sandboxed containers Operator uses the CCO to retrieve the secret. If you have uninstalled the CCO, you must create the peer pods secret for OpenShift sandboxed containers manually or the peer pods will fail to operate.
The secret stores credentials for creating the pod virtual machine (VM) image and peer pod instances.
By default, the OpenShift sandboxed containers Operator creates the secret based on the credentials used to create the cluster. However, you can manually create a secret that uses different credentials.
Prerequisites
- You have installed and configured the Azure CLI tool.
Procedure
- Retrieve the Azure subscription ID by running the following command: - AZURE_SUBSCRIPTION_ID=$(az account list --query "[?isDefault].id" \ -o tsv) && echo "AZURE_SUBSCRIPTION_ID: \"$AZURE_SUBSCRIPTION_ID\"" - $ AZURE_SUBSCRIPTION_ID=$(az account list --query "[?isDefault].id" \ -o tsv) && echo "AZURE_SUBSCRIPTION_ID: \"$AZURE_SUBSCRIPTION_ID\""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Generate the RBAC content by running the following command: - az ad sp create-for-rbac --role Contributor --scopes /subscriptions/$AZURE_SUBSCRIPTION_ID \ --query "{ client_id: appId, client_secret: password, tenant_id: tenant }"- $ az ad sp create-for-rbac --role Contributor --scopes /subscriptions/$AZURE_SUBSCRIPTION_ID \ --query "{ client_id: appId, client_secret: password, tenant_id: tenant }"- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Example output - { "client_id": `AZURE_CLIENT_ID`, "client_secret": `AZURE_CLIENT_SECRET`, "tenant_id": `AZURE_TENANT_ID` }- { "client_id": `AZURE_CLIENT_ID`, "client_secret": `AZURE_CLIENT_SECRET`, "tenant_id": `AZURE_TENANT_ID` }- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- 
							Record the RBAC output to use in the secretobject.
- Create a - peer-pods-secret.yamlmanifest file according to the following example:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the secret by running the following command: - oc apply -f peer-pods-secret.yaml - $ oc apply -f peer-pods-secret.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
4.3.4. Creating the peer pods config map
You must create the peer pods config map for OpenShift sandboxed containers.
Procedure
- Obtain the following values from your Azure instance: - Retrieve and record the Azure resource group: - AZURE_RESOURCE_GROUP=$(oc get infrastructure/cluster -o jsonpath='{.status.platformStatus.azure.resourceGroupName}') && echo "AZURE_RESOURCE_GROUP: \"$AZURE_RESOURCE_GROUP\""- $ AZURE_RESOURCE_GROUP=$(oc get infrastructure/cluster -o jsonpath='{.status.platformStatus.azure.resourceGroupName}') && echo "AZURE_RESOURCE_GROUP: \"$AZURE_RESOURCE_GROUP\""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Retrieve and record the Azure VNet name: - AZURE_VNET_NAME=$(az network vnet list --resource-group ${AZURE_RESOURCE_GROUP} --query "[].{Name:name}" --output tsv)- $ AZURE_VNET_NAME=$(az network vnet list --resource-group ${AZURE_RESOURCE_GROUP} --query "[].{Name:name}" --output tsv)- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - This value is used to retrieve the Azure subnet ID. 
- Retrieve and record the Azure subnet ID: - AZURE_SUBNET_ID=$(az network vnet subnet list --resource-group ${AZURE_RESOURCE_GROUP} --vnet-name $AZURE_VNET_NAME --query "[].{Id:id} | [? contains(Id, 'worker')]" --output tsv) && echo "AZURE_SUBNET_ID: \"$AZURE_SUBNET_ID\""- $ AZURE_SUBNET_ID=$(az network vnet subnet list --resource-group ${AZURE_RESOURCE_GROUP} --vnet-name $AZURE_VNET_NAME --query "[].{Id:id} | [? contains(Id, 'worker')]" --output tsv) && echo "AZURE_SUBNET_ID: \"$AZURE_SUBNET_ID\""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Retrieve and record the Azure network security group (NSG) ID: - AZURE_NSG_ID=$(az network nsg list --resource-group ${AZURE_RESOURCE_GROUP} --query "[].{Id:id}" --output tsv) && echo "AZURE_NSG_ID: \"$AZURE_NSG_ID\""- $ AZURE_NSG_ID=$(az network nsg list --resource-group ${AZURE_RESOURCE_GROUP} --query "[].{Id:id}" --output tsv) && echo "AZURE_NSG_ID: \"$AZURE_NSG_ID\""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Retrieve and record the Azure region: - AZURE_REGION=$(az group show --resource-group ${AZURE_RESOURCE_GROUP} --query "{Location:location}" --output tsv) && echo "AZURE_REGION: \"$AZURE_REGION\""- $ AZURE_REGION=$(az group show --resource-group ${AZURE_RESOURCE_GROUP} --query "{Location:location}" --output tsv) && echo "AZURE_REGION: \"$AZURE_REGION\""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
 
- Create a - peer-pods-cm.yamlmanifest file according to the following example:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- The"Standard_B2als_v2"instance size is the default value if an instance size is not defined in the workload.
- 2
- Lists all of the instance sizes you can specify when creating the pod. This allows you to define smaller instance sizes for workloads that need less memory and fewer CPUs or larger instance sizes for larger workloads.
- 3
- Specify theAZURE_SUBNET_IDvalue that you retrieved.
- 4
- Specify theAZURE_NSG_IDvalue that you retrieved.
- 5
- Optional: By default, this value is populated when you run theKataConfigCR, using an Azure image ID based on your cluster credentials. If you create your own Azure image, specify the correct image ID.
- 6
- Specify theAZURE_REGIONvalue you retrieved.
- 7
- Specify theAZURE_RESOURCE_GROUPvalue you retrieved.
 
- Create the config map by running the following command: - oc apply -f peer-pods-cm.yaml - $ oc apply -f peer-pods-cm.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
4.3.5. Creating the Azure secret
You must create the SSH key secret, which is required by the Azure virtual machine (VM) creation API. Azure only requires the SSH public key. Confidential Containers disables SSH in VMs, so the keys have no effect in the VMs.
Procedure
- Generate an SSH key pair by running the following command: - ssh-keygen -f ./id_rsa -N "" - $ ssh-keygen -f ./id_rsa -N ""- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the - Secretobject by running the following command:- oc create secret generic ssh-key-secret \ -n openshift-sandboxed-containers-operator \ --from-file=id_rsa.pub=./id_rsa.pub \ --from-file=id_rsa=./id_rsa - $ oc create secret generic ssh-key-secret \ -n openshift-sandboxed-containers-operator \ --from-file=id_rsa.pub=./id_rsa.pub \ --from-file=id_rsa=./id_rsa- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Delete the SSH keys you created: - shred --remove id_rsa.pub id_rsa - $ shred --remove id_rsa.pub id_rsa- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
4.3.6. Creating the KataConfig custom resource
					You must create the KataConfig custom resource (CR) to install kata-remote as a runtime class on your worker nodes.
				
					Creating the KataConfig CR triggers the OpenShift sandboxed containers Operator to do the following:
				
- 
							Create a RuntimeClassCR namedkata-remotewith a default configuration. This enables users to configure workloads to usekata-remoteas the runtime by referencing the CR in theRuntimeClassNamefield. This CR also specifies the resource overhead for the runtime.
					OpenShift sandboxed containers installs kata-remote as a secondary, optional runtime on the cluster and not as the primary runtime.
				
						Creating the KataConfig CR automatically reboots the worker nodes. The reboot can take from 10 to more than 60 minutes. Factors that impede reboot time are as follows:
					
- A larger OpenShift Container Platform deployment with a greater number of worker nodes.
- Activation of the BIOS and Diagnostics utility.
- Deployment on a hard disk drive rather than an SSD.
- Deployment on physical nodes such as bare metal, rather than on virtual nodes.
- A slow CPU and network.
Prerequisites
- 
							You have access to the cluster as a user with the cluster-adminrole.
Procedure
- Create an - example-kataconfig.yamlmanifest file according to the following example:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Optional: If you have applied node labels to installkata-remoteon specific nodes, specify the key and value, for example,osc: 'true'.
 
- Create the - KataConfigCR by running the following command:- oc apply -f example-kataconfig.yaml - $ oc apply -f example-kataconfig.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - The new - KataConfigCR is created and installs- kata-remoteas a runtime class on the worker nodes.- Wait for the - kata-remoteinstallation to complete and the worker nodes to reboot before verifying the installation.
- Monitor the installation progress by running the following command: - watch "oc describe kataconfig | sed -n /^Status:/,/^Events/p" - $ watch "oc describe kataconfig | sed -n /^Status:/,/^Events/p"- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - When the status of all workers under - kataNodesis- installedand the condition- InProgressis- Falsewithout specifying a reason, the- kata-remoteis installed on the cluster.
- Verify the daemon set by running the following command: - oc get -n openshift-sandboxed-containers-operator ds/peerpodconfig-ctrl-caa-daemon - $ oc get -n openshift-sandboxed-containers-operator ds/peerpodconfig-ctrl-caa-daemon- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Verify the runtime classes by running the following command: - oc get runtimeclass - $ oc get runtimeclass- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Example output - NAME HANDLER AGE kata kata 152m kata-remote kata-remote 152m - NAME HANDLER AGE kata kata 152m kata-remote kata-remote 152m- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
Verifying the pod VM image
					After kata-remote is installed on your cluster, the OpenShift sandboxed containers Operator creates a pod VM image, which is used to create peer pods. This process can take a long time because the image is created on the cloud instance. You can verify that the pod VM image was created successfully by checking the config map that you created for the cloud provider.
				
Procedure
- Obtain the config map you created for the peer pods: - oc get configmap peer-pods-cm -n openshift-sandboxed-containers-operator -o yaml - $ oc get configmap peer-pods-cm -n openshift-sandboxed-containers-operator -o yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Check the - statusstanza of the YAML file.- If the - AZURE_IMAGE_IDparameter is populated, the pod VM image was created successfully.
Troubleshooting
- Retrieve the events log by running the following command: - oc get events -n openshift-sandboxed-containers-operator --field-selector involvedObject.name=osc-podvm-image-creation - $ oc get events -n openshift-sandboxed-containers-operator --field-selector involvedObject.name=osc-podvm-image-creation- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Retrieve the job log by running the following command: - oc logs -n openshift-sandboxed-containers-operator jobs/osc-podvm-image-creation - $ oc logs -n openshift-sandboxed-containers-operator jobs/osc-podvm-image-creation- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
If you cannot resolve the issue, submit a Red Hat Support case and attach the output of both logs.
4.3.7. Configuring workload objects
					You must configure OpenShift sandboxed containers workload objects by setting kata-remote as the runtime class for the following pod-templated objects:
				
- 
							Podobjects
- 
							ReplicaSetobjects
- 
							ReplicationControllerobjects
- 
							StatefulSetobjects
- 
							Deploymentobjects
- 
							DeploymentConfigobjects
Do not deploy workloads in an Operator namespace. Create a dedicated namespace for these resources.
You can define whether the workload should be deployed using the default instance size, which you defined in the config map, by adding an annotation to the YAML file.
If you do not want to define the instance size manually, you can add an annotation to use an automatic instance size, based on the memory available.
Prerequisites
- 
							You have created the KataConfigcustom resource (CR).
Procedure
- Add - spec.runtimeClassName: kata-remoteto the manifest of each pod-templated workload object as in the following example:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Add an annotation to the pod-templated object to use a manually defined instance size or an automatic instance size: - To use a manually defined instance size, add the following annotation: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Specify the instance size that you defined in the config map.
 
- To use an automatic instance size, add the following annotations: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Define the amount of memory available for the workload to use. The workload will run on an automatic instance size based on the amount of memory available. 
 
- Apply the changes to the workload object by running the following command: - oc apply -f <object.yaml> - $ oc apply -f <object.yaml>- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - OpenShift Container Platform creates the workload object and begins scheduling it. 
Verification
- 
							Inspect the spec.runtimeClassNamefield of a pod-templated object. If the value iskata-remote, then the workload is running on OpenShift sandboxed containers, using peer pods.