Puppet Deployment Guide
Installing and Configuring OpenShift Enterprise Using Puppet
Abstract
Chapter 1. Introduction to OpenShift Enterprise Copy linkLink copied to clipboard!
Chapter 2. Introduction to Puppet Copy linkLink copied to clipboard!
.pp
file extension.
Note
Chapter 3. Introduction to OpenShift Enterprise Puppet Deployments Copy linkLink copied to clipboard!
ose_version
parameter in a host's Puppet manifest to the OpenShift Enterprise release version. For example, the line in the manifest would be:
ose_version => '2.2',
ose_version => '2.2',
-
broker
- Installs the broker and Management Console applications.
-
node
- Installs the node component and cartridges.
-
msgserver
- Installs an ActiveMQ message broker.
-
datastore
- Installs MongoDB (not sharded/replicated).
-
nameserver
- Installs a BIND DNS server configured with a TSIG key for dynamic updates.
Note
- Collocation of
broker
andnode
roles. - Using
keepalived
and HAProxy for broker high availability (HA) load balancing. - Avahi and Route53 DNS plug-ins.
10gen-mms-agent
,jbossas
, andphpmyadmin
cartridges (not distributed with OpenShift Enterprise).
Chapter 4. System Prerequisites Copy linkLink copied to clipboard!
4.1. Installing Puppet Copy linkLink copied to clipboard!
puppetlabs-stdlib
module to version 4.3.2 or later with the following command:
puppet module upgrade puppetlabs-stdlib --version '>=4.3.2'
# puppet module upgrade puppetlabs-stdlib --version '>=4.3.2'
4.2. Configuring Repositories Copy linkLink copied to clipboard!
yum
repositories for OpenShift Enterprise. Before running Puppet, you must configure the appropriate subscriptions using either the Red Hat Subscription Manager (RHSM) or RHN Classic subscription method, or manually ensure that the appropriate yum
repositories for each host role are available.
If you are using RHSM or RHN Classic and configuring a host to have the broker
, msgserver
, or datastore
role, ensure that the Red Hat OpenShift Enterprise 2.2 Infrastructure
channel is enabled using your chosen subscription method. See the "Configuring Broker Host Entitlements" [6] section in the OpenShift Enterprise Deployment Guide for details.
yum
priorities and exclude directives are set appropriately by following the oo-admin-yum-validator
tool instructions in the "Configuring Yum on Broker Hosts" [7] section that follows in the same guide.
nameserver
role, only the Red Hat Enterprise Linux 6 Server base channel is required.
If you are using RHSM or RHN Classic and configuring a host to have the node
role, ensure that the Red Hat OpenShift Enterprise 2.2 Application Node
channel is enabled using your chosen subscription method. If you intend to install any premium cartridges, ensure the host has access to any relevant add-on subscriptions as well. See the "Configuring Node Host Entitlements" [8] section in the OpenShift Enterprise Deployment Guide for details.
yum
priorities and exclude directives are set appropriately by following the oo-admin-yum-validator
tool instructions in the "Configuring Yum on Node Hosts" [9] section that follows in the same guide.
4.3. Installing the OpenShift Origin Puppet Module Copy linkLink copied to clipboard!
puppet module install openshift/openshift_origin
# puppet module install openshift/openshift_origin
puppet-openshift_origin
repository onto the target system with the following:
git clone https://github.com/openshift/puppet-openshift_origin.git /etc/puppet/modules/openshift_origin
# git clone https://github.com/openshift/puppet-openshift_origin.git /etc/puppet/modules/openshift_origin
4.4. Generating a BIND TSIG Key Copy linkLink copied to clipboard!
Procedure 4.1. To Generate a BIND TSIG Key:
- The
dnssec-keygen
command, provided by the bind package, can be used to generate a TSIG key. Install the bind package on a host, if required:yum install bind
# yum install bind
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Note
The bind package is available in the Red Hat Enterprise Linux 6 Server base channel. - Configure the
$domain
environment variable to simplify the process in the following step, replacingCloud_Domain
with the domain name to suit your environment:domain=Cloud_Domain
# domain=Cloud_Domain# domain=Cloud_Domain
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Generate a TSIG key for your chosen cloud domain:
dnssec-keygen -a HMAC-MD5 -b 512 -n USER -r /dev/urandom -K /var/named $domain cat /var/named/K$domain.*.key | awk '{print $8}'
# dnssec-keygen -a HMAC-MD5 -b 512 -n USER -r /dev/urandom -K /var/named $domain # cat /var/named/K$domain.*.key | awk '{print $8}'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The format for the TSIG key returned by the last command should resembleCNk+wjszKi9da9nL/1gkMY7H+GuUng==
. This key is set in thebind_key
Puppet parameter in later sections. - If you want your OpenShift Enterprise hosts to be in a separate domain than the zone used for applications hosted on OpenShift Enterprise, you can create a second TSIG key at this time as well:
infra_domain=Infrastructure_Domain dnssec-keygen -a HMAC-MD5 -b 512 -n USER -r /dev/urandom -K /var/named $infra_domain cat /var/named/K$infra_domain.*.key | awk '{print $8}'
# infra_domain=Infrastructure_Domain# infra_domain=Infrastructure_Domain # dnssec-keygen -a HMAC-MD5 -b 512 -n USER -r /dev/urandom -K /var/named $infra_domain # cat /var/named/K$infra_domain.*.key | awk '{print $8}'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow This key can be set in thedns_infrastructure_key
Puppet parameter in later sections, if thedns_infrastructure_zone
parameter is set.
4.5. Updating the Host Name Copy linkLink copied to clipboard!
Procedure 4.2. Updating the Host Name
- Update the host name in the
/etc/sysconfig/network
file:NETWORKING=yes HOSTNAME=New_Hostname
NETWORKING=yes HOSTNAME=New_Hostname
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Also update the host name using the
hostname
command:hostname New_Hostname
# hostname New_Hostnamehostname New_Hostname
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 5. Puppet Configuration and Deployment Copy linkLink copied to clipboard!
openshift_origin
) that tells Puppet which OpenShift Enterprise components to install and configure on the host. If you are new to Puppet, you can learn more about how this works in the Puppet Labs® documentation [10].
configure_ose.pp
on each given host. For a comprehensive list of the installation parameters for OpenShift Enterprise you can specify with Puppet manifests, see Chapter 8, Puppet Parameters.
Important
ose_version
parameter is set to 2.2
in each host's Puppet manifest to enable OpenShift Enterprise support with the module.
After creating a Puppet manifest to your specifications for a given host, you can begin the deployment process by running the Puppet utility on the host and specifying the manifest file:
puppet apply --verbose configure_ose.pp
# puppet apply --verbose configure_ose.pp
Chapter 6. Example Puppet Configurations Copy linkLink copied to clipboard!
6.1. Configuring One Broker Host and One Node Host Copy linkLink copied to clipboard!
Example 6.1. Broker Host Configuration
Example 6.2. Node Host Configuration
6.2. Configuring High Availability Deployments Copy linkLink copied to clipboard!
broker
, msgserver
, and datastore
roles can be deployed in high availability (HA) configurations.
6.2.1. Configuring a High Availability Broker Copy linkLink copied to clipboard!
Example 6.3. Non-broker Host Configuration
Example 6.4. Broker Host Configuration
Example 6.5. Name Server Configuration
nameserver
role:
6.2.2. Configuring a High Availability Datastore Copy linkLink copied to clipboard!
datastore
instances into a MongoDB replica set. If you choose to use an HA datastore, you must provide at least three datastore hosts and the total number of hosts must be odd.
broker
role must have the following additional information:
Example 6.6. Broker Host Configuration
datastore
role must have the following information:
Example 6.7. Datastore Configuration
6.2.3. Configuring a High Availability Message Server Copy linkLink copied to clipboard!
Example 6.8. Message Server Configuration
broker
or node
role must have the following information as well, even if they are not message server hosts:
Example 6.9. Broker and Node Configuration
6.3. Configuring a Complete Environment Copy linkLink copied to clipboard!
- One host with the
nameserver
role. - Two hosts with the
broker
role. - Two hosts with the
msgserver
role. - Three hosts with the
datastore
role. - Multiple hosts with the
node
role.
ec2_public_ipv4
fact.
Recommended Order of Deployment:
- Name server host.
- Message server hosts.
- Datastore hosts, ensuring the primary host is fully deployed before adding additional nodes to your replica set.
- Broker hosts.
- Node hosts.
Example 6.10. Name Server Configuration
Example 6.11. Message Server Configuration (ActiveMQ)
Example 6.12. Datastore Configuration
datastore
node ose-mongo01.example.com
.
Example 6.13. Node Configuration
node_ip_address
using the public IP address so that all applications on these gears are publicly accessible.
Example 6.14. Broker Configuration
Chapter 7. Manual Post-Deployment Tasks Copy linkLink copied to clipboard!
- Set up DNS entries for hosts. If you installed BIND using the Puppet module, then any other components installed with the module on the same host received DNS entries. Other hosts must all be defined manually, including at least your node hosts. The
oo-register-dns
command on a broker host may prove useful for this. - Copy the
rsync
public key to enable moving gears. The brokerrsync
public key must go on nodes, but it is difficult to script the task generically. Nodes should not have password-less access to brokers to copy the.pub
key, so this must be performed manually on each node host:scp root@broker:/etc/openshift/rsync_id_rsa.pub /root/.ssh/ cat /root/.ssh/rsync_id_rsa.pub >> /root/.ssh/authorized_keys rm /root/.ssh/rsync_id_rsa.pub
# scp root@broker:/etc/openshift/rsync_id_rsa.pub /root/.ssh/ (The above step will ask for the root password of the broker machine.) # cat /root/.ssh/rsync_id_rsa.pub >> /root/.ssh/authorized_keys # rm /root/.ssh/rsync_id_rsa.pub
Copy to Clipboard Copied! Toggle word wrap Toggle overflow If you skip this step, each gear move requires typingroot
passwords for each of the node hosts involved. - Copy SSH host keys between the node hosts. All node hosts must identify with the same host keys, so that when gears are moved between hosts,
ssh
, andgit
do not give developers spurious warnings about the host keys changing. Copy/etc/ssh/ssh_*
from one node host to all of the rest. Alternatively, if using the same image for all hosts, keep the keys from the image. - Create districts. Nodes must belong to a district in order to work properly. Adding a node to a district after the node already has hosted applications running on it is very difficult, so it is important to do during the initial deployment. For a discussion of what districts are, see the OpenShift Enterprise Administration Guide [12].On a broker host, run the following command to define a new district:
oo-admin-ctl-district -c create -n District_Name -p Gear_Profile
# oo-admin-ctl-district -c create -n District_Name -p Gear_Profileoo-admin-ctl-district -c create -n District_Name -p Gear_Profileoo-admin-ctl-district -c create -n District_Name -p Gear_Profileoo-admin-ctl-district -c create -n District_Name -p Gear_Profile
Copy to Clipboard Copied! Toggle word wrap Toggle overflow To perform a blank assignment of all nodes to a district, run:oo-admin-ctl-district -c add-node -n District_Name -a
# oo-admin-ctl-district -c add-node -n District_Name -aoo-admin-ctl-district -c add-node -n District_Name -aoo-admin-ctl-district -c add-node -n District_Name -a
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Otherwise add nodes one at a time with:oo-admin-ctl-district -c add-node -n District_Name -i Node_Hostname
# oo-admin-ctl-district -c add-node -n District_Name -i Node_Hostnameoo-admin-ctl-district -c add-node -n District_Name -i Node_Hostnameoo-admin-ctl-district -c add-node -n District_Name -i Node_Hostnameoo-admin-ctl-district -c add-node -n District_Name -i Node_Hostname
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Import cartridge manfiests. Run the following command on a broker host to import the cartridge manifests for all cartridges installed on nodes:
oo-admin-ctl-cartridge -c import-profile --activate --obsolete
# oo-admin-ctl-cartridge -c import-profile --activate --obsolete
Copy to Clipboard Copied! Toggle word wrap Toggle overflow This registers the cartridges with the broker and makes them available to developers for new hosted applications.
Note
Chapter 8. Puppet Parameters Copy linkLink copied to clipboard!
Note
Choose from the following roles to be configured on the host.
broker
- Installs the broker and Management Console applications.
node
- Installs the node component and cartridges.
msgserver
- Installs an ActiveMQ message broker.
datastore
- Installs MongoDB (not sharded/replicated).
nameserver
- Installs a BIND DNS server configured with a TSIG key for dynamic updates.
['broker','node','msgserver','datastore','nameserver']
This sets the method for providing packages to the installation process. Currently, the only supported option for OpenShift Enterprise is none
, meaning installation sources must already set up when the module executes (for example, using RHSM or RHN Classic).
The network domain, or cloud domain, under which applications and hosts will be placed.
'example.com'
These parameters supply the FQDN of the hosts containing the respective components. Used for configuring the host’s name at installation and for configuring the broker application to reach the required services.
domain
(for example, broker.example.com
), except nameserver=ns1.example.com
.
Note
IP addresses of the first three MongoDB servers in a replica set. Add datastoreX_ip_addr
parameters for larger clusters.
undef
IP of a name server instance or current IP if installing on this node. This is used by every host to configure its primary name server.
When the name server is remote, use this to specify the key for updates. This is the Key:
field from the .private
key file generated by the dnssec-keygen
command. This field is required on all node hosts.
When using a BIND key, use this algorithm for the BIND key.
'HMAC-MD5'
When the name server is remote, this Kerberos keytab together with a Kerberos principal can be used instead of the dnssec
key for updates.
When the name server is remote, this Kerberos principal together with a Kerberos keytab can be used instead of the dnssec
key for updates.
This and the aws_secret_key
parameter are Amazon AWS security credentials. The aws_access_key_id
is a string which identifies an access credential.
This is the secret portion of Amazon AWS security credentials indicated by the aws_access_key_id
parameter.
This is the ID string for an AWS Hosted zone which will contain the OpenShift Enterprise application records.
List of upstream DNS servers to use when installing a nameserver on this node.
['8.8.8.8']
This is used for node hosts to record its broker. It is also the default for the name server IP if none is given.
The virtual IP address that will front-end the broker cluster.
undef
The host name that represents the broker API cluster. This name is associated to the broker_virtual_ip_address
parameter and added to BIND for DNS resolution.
'changeme'
This is used for node hosts to give a public IP, if different from the one on its NIC.
The following resource limits must be the same within a given district.
- node_profile
- This is the specific node’s gear profile. Default:
'small'
- node_quota_files
- The max number of files allowed in each gear. Default:
'80000'
- node_quota_blocks
- The max storage capacity allowed in each gear (1 block = 1024 bytes). Default:
'1048576'
- node_max_active_gears
- This is used for limiting or guiding gear placement. For no overcommit, this must be:
(Total System Memory - 1G) / memory_limit_in_bytes
(Total System Memory - 1G) / memory_limit_in_bytes
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Default:'100'
- node_no_overcommit_active
- This enforces the
node_max_active_gears
parameter in a more stringent manner than normal. However, it also adds overhead to gear creation, so it should only be set totrue
when required. For example, in the case of enforcing single tenancy on a node.Default:false
- node_limits_nproc
- The max number of processes. Default:
'250'
- node_tc_max_bandwidth
- mbit/sec, total bandwidth allowed for all gears. Default:
'800'
- node_tc_user_share
- mbit/sec, one user is allotted. Default:
'2'
- node_cpu_shares
- The CPU share percentage for each gear. Default:
'128'
- node_cpu_cfs_quota_us
- Default:
'100000'
- node_memory_limit_in_bytes
- Gear memory limit in bytes. Default:
'536870912'
(512MB) - node_memsw_limit_in_bytes
- Gear max memory limit including swap (512M + 100M swap). Default:
'641728512'
- node_memory_oom_control
- Kill processes when hitting out of memory. Default:
'1'
- node_throttle_cpu_shares
- The CPU share percentage each gear receives at throttle. Default:
'128'
- node_throttle_cpu_cfs_quota_us
- Default:
'30000'
- node_throttle_apply_period
- Default:
120
- node_throttle_apply_percent
- Default:
'30'
- node_throttle_restore_percent
- Default:
'70'
- node_boosted_cpu_cfs_quota_us
- Default:
'200000'
- node_boosted_cpu_shares
- The CPU share percentage each gear receives while boosted. Default:
'30000'
Enabling this configures NTP. It is important that the time be synchronized across hosts because MCollective messages have a TTL of 60 seconds and may be dropped if the clocks are too far out of sync. However, NTP is not necessary if the clock will be kept in sync by some other means.
true
If the configure_ntp
parameter is set to true
(default), this parameter allows users to specify an array of NTP servers used for clock synchronization.
['time.apple.com iburst', 'pool.ntp.org iburst', 'clock.redhat.com iburst']
Note
iburst
after every NTP server definition to speed up the initial synchronization.
Set to true
to cluster ActiveMQ for high availability and scalability of OpenShift Enterprise message queues.
false
An array of ActiveMQ server host names. Required when the msgserver_cluster
parameter is set to true
.
undef
An array of ActiveMQ server host names. Required when the msgserver_cluster
is set to true
.
$msgserver_cluster_members
Password used by ActiveMQ’s amquser
. The amquser
is used to authenticate ActiveMQ inter-cluster communication. Only used when the msgserver_cluster
is set to true
.
'changeme'
This is the password for the admin
user for the ActiveMQ Admin Console, which is not needed by OpenShift Enterprise, but might be useful in troubleshooting.
This is the user and password shared between broker and node for communicating over the MCollective topic channels in ActiveMQ. Must be the same on all broker and node hosts.
'mcollective'
/ 'marionette'
This is the user name and password of the administrative user that will be created in the MongoDB datastore. These credentials are not used by in this module or by OpenShift Enterprise, but an administrative user must be added to MongoDB in order for it to enforce authentication.
'admin'
/ 'mongopass'
Note
CONF_NO_DATASTORE_AUTH_FOR_LOCALHOST
is enabled.
This is the user name and password of the normal user that will be created for the broker to connect to the MongoDB datastore. The broker application’s MongoDB plug-in is also configured with these values.
'openshift'
/ 'mongopass'
This is the name of the database in MongoDB in which the broker will store data.
'openshift_broker'
The TCP port used for MongoDB to listen on.
'27017'
Enables or disables MongoDB replica sets for database high availability.
false
The MongoDB replica set name when the mongodb_replicasets
parameter is set to true
.
'openshift'
Set the host as the primary with true
or secondary with false
. Must be set on one and only one host within the mongodb_replicasets_members
array.
undef
The IP address of the primary host within the MongoDB replica set.
undef
An array of [host:port]
of replica set hosts.
undef
The file containing the mongodb_key
used to authenticate MongoDB replica set members.
'/etc/mongodb.keyfile'
The key used by members of a MongoDB replica set to authenticate one another.
'changeme'
This user and password are entered in the /etc/openshift/htpasswd
file as a test user. Red Hat recommends removing the user after installation or using a different authentication method.
'demo'
/ 'changeme'
Salt and private keys used when generating secure authentication tokens for application-to-broker communication. Requests like scale up or down and Jenkins builds use these authentication tokens. This value must be the same on all broker nodes.
Relative path to the product logo URL.
ose_version
parameter is undefined, the default is /assets/logo-origin.svg
. If the ose_version
parameter is defined, the deafult is /assets/logo-enterprise-horizontal.svg
.
OpenShift instance name.
ose_version
parameter is undefined, the default is OpenShift Origin
. If the ose_version
parameter is defined, the deafult is OpenShift Enterprise
.
This setting is applied on a per-scalable-application basis. When set to true
, OpenShift Enterprise allows multiple instances of the HAProxy gear for a given scalable application to be established on the same node. Otherwise, on a per-scalable-application basis, a maximum of one HAProxy gear can be created for every node in the deployment. The latter is the default behavior, which protects scalable applications from single points of failure at the node level.
false
Session secrets used to encode cookies used by the broker and Management Console applications. These values must be the same on all broker nodes.
undef
List of all gear sizes that will be used in this OpenShift Enterprise installation.
['small']
Default gear size if one is not specified.
'small'
List of all gear sizes that newly created users will be able to create.
['small']
Default max number of domains a user is allowed to use.
'10'
Default max number of gears a user is allowed to use.
'100'
DNS plug-in used by the broker to register application DNS entries. Only one option is supported with OpenShift Enterprise:
-
nsupdate
- An nsupdate-based plug-in. Supports TSIG and GSS-TSIG based authentication. Uses the
bind_key
parameter for TSIG and thebind_krb_keytab
andbind_krb_principal
parameters for GSS-TSIG.
'nsupdate'
Authentication setup for users of the OpenShift service. Options:
-
mongo
- Stores user names and passwords in MongoDB.
-
kerberos
- Kerberos-based authentication. Uses the
broker_krb_service_name
,broker_krb_auth_realms
,broker_krb_keytab
parameters. -
htpasswd
- Stores user names and passwords in the
/etc/openshift/htpasswd
file. -
ldap
- LDAP-based authentication. Uses the
broker_ldap_uri
parameter.
'htpasswd'
The KrbServiceName
value for a mod_auth_kerb
configuration.
The KrbAuthRealms
value for a mod_auth_kerb
configuration.
The Krb5KeyTab
value of mod_auth_kerb
is not configurable. The keytab is expected to be at /var/www/openshift/broker/httpd/conf.d/http.keytab
.
The URI to the LDAP server, for example:
ldap://ldap.example.com:389/ou=People,dc=my-domain,dc=com?uid?sub?(objectClass=*)
LDAP DN (Distinguished name) of the user to bind to the directory with. For example:
cn=administrator,cn=Users,dc=domain,dc=com
Password of the bind user set in the broker_ldap_bind_dn
parameter.
The kernel.shmmax
sysctl
setting for the /etc/sysctl.conf
file.
shmmax = shmall * PAGE_SIZE - PAGE_SIZE = getconf PAGE_SIZE - shmall = cat /proc/sys/kernel/shmall
shmmax = shmall * PAGE_SIZE
- PAGE_SIZE = getconf PAGE_SIZE
- shmall = cat /proc/sys/kernel/shmall
shmmax
to a value higher than 80% of total available RAM on the system (expressed in BYTES).
kernel.shmmax = 68719476736
The kernel.shmall
sysctl
setting for the /etc/sysctl.conf
file. Defaults to 2097152 BYTES
ceil(shmmax/PAGE_SIZE)
ceil(shmmax/PAGE_SIZE)
kernel.shmall = 4294967296
Specify the container type to use on the node. Currently, the selinux
plug-in is the default and only supported option for OpenShift Enterprise.
'selinux'
Specify one or more plug-ins to use to register HTTP and WebSocket connections for applications. Options:
-
apache-vhost
- A Virtual Host-based plug-in for HTTP and HTTPS. Suited for installations with less application create and delete activity. Easier to customize. If
apache-mod-rewrite
is also selected,apache-vhost
is be ignored. -
nodejs-websocket
- A WebSocket proxy listening on ports 8000 and 8443.
-
haproxy-sni-proxy
- A TLS proxy using SNI routing on ports 2303 through 2308.
-
apache-mod-rewrite
- Deprecated in OpenShift Enterprise 2.2. A
mod_rewrite
-based plug-in for HTTP and HTTPS requests. Suited for installations with many create, delete, and scale actions. Cannot be used at the same time as theapache-vhost
plug-in.
['apache-vhost','nodejs-websocket']
List of user names who have UIDs in the range of OpenShift Enterprise gears but must be excluded from gear setups.
[]
External facing network device. Used for routing and traffic control setup.
'eth0'
Public and private keys used for gears on the default domain. Both values must be defined or default self-signed keys will be generated.
Name of supplementary UNIX group to add a gear to.
Enable or disable the OpenShift Enterprise node Watchman service.
true
Number of restarts to attempt before waiting RETRY_PERIOD
.
'3'
Number of seconds to wait before accepting another gear restart.
'300'
Number of seconds to wait before resetting retries.
'28800'
Number of seconds a gear must remain inconsistent with its state before Watchman attempts to reset state.
'900'
Wait at least this number of seconds since last check before checking gear state on the node. Use this to reduce the impact of Watchman’s GearStatePlugin
on the system.
'0'
Define a custom MOTD to be displayed to users who connect to their gears directly. If undefined, uses the default MOTD included with the node package.
undef
Set development mode and extra logging.
false
Install a Getty shell which displays DNS, IP, and login information. Used for the all-in-one VM installation.
Set up DNS entries for this host in a locally-installed BIND DNS instance.
false
The name of a zone to create which will contain OpenShift Enterprise infrastructure hosts. If this is unset, then no infrastructure zone or other artifacts will be created.
''
A dnssec
symmetric key which grants update access to the infrastructure zone resource records. This is ignored unless the dns_infrastructure_zone
parameter is set.
''
When using a BIND key, use this algorithm for the infrastructure BIND key. This is ignored unless the dns_infrastructure_zone
parameter is set.
'HMAC-MD5'
An array of hashes containing host name and IP address pairs to populate the infrastructure zone. This is ignored unless the dns_infrastructure_zone
parameter is set.
dns_infrastructure_zone
parameter. Matching FQDNs are placed in the dns_infrastructure_zone
. Host names anchored with a dot (.
) are added verbatim.
[]
Indicate whether or not this module configures the firewall for you.
List of cartridges to be installed on the node. Options:
- cron
- diy
- haproxy
- mongodb
- nodejs
- perl
- php
- postgresql
- python
- ruby
- jenkins
- jenkins-client
- mysql
- jbossews
- jbosseap (requires add-on subscription)
['cron','diy','haproxy','mongodb','nodejs','perl','php','postgresql','python','ruby','jenkins','jenkins-client','mysql']
Indicate whether or not this module will configure the resolv.conf
file and network for you.
true
Set this to the X.Y release version (for example, 2.2
) of OpenShift Enterprise to ensure an OpenShift Enterprise supported configuration is used.
README_OSE.asciidoc
distributed with the openshift_origin
Puppet module for more details.
undef
Set this to true
to allow OpenShift Enterprise unsupported configurations. Only appropriate for proof of concept environments.
ose_version
parameter is set.
false
Appendix A. Revision History Copy linkLink copied to clipboard!
Revision History | |||
---|---|---|---|
Revision 1.0-2 | Tue Mar 10 2015 | ||
| |||
Revision 1.0-1 | Tue Nov 11 2014 | ||
| |||
Revision 1.0-0 | Mon Nov 10 2014 | ||
|