Ce contenu n'est pas disponible dans la langue sélectionnée.
Chapter 2. Preparing to deploy Red Hat Process Automation Manager in your OpenShift environment
Before deploying Red Hat Process Automation Manager in your OpenShift environment, you need to complete several preparatory tasks. You do not need to repeat these tasks if you want to deploy additional images, for example, for new versions of processes or for other processes.
2.1. Ensuring the availability of image streams Copier lienLien copié sur presse-papiers!
You must ensure that the image streams that are required for the deployment are available in your OpenShift environment. Some versions of the OpenShift environment include the necessary image streams. You must check if they are available. If they are not available, you must install the rhpam71-image-streams.yaml file.
Procedure
Run the following commands:
oc get imagestreamtag -n openshift | grep rhpam71-businesscentral oc get imagestreamtag -n openshift | grep rhpam71-kieserver
$ oc get imagestreamtag -n openshift | grep rhpam71-businesscentral $ oc get imagestreamtag -n openshift | grep rhpam71-kieserverCopy to Clipboard Copied! Toggle word wrap Toggle overflow If the outputs of both commands are not empty, the required image streams are available and no further action is required.
If the output of one or both of the commands is empty, download the
rhpam-7.1.0-openshift-templates.zipproduct deliverable file from the Software Downloads page. Extract therhpam71-image-streams.yamlfile from it. Complete one of the following actions:Run the following command:
oc create -f rhpam71-image-streams.yaml
$ oc create -f rhpam71-image-streams.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
Using the OpenShift Web UI, select Add to Project
Import YAML / JSON, then choose the file or paste its contents.
2.2. Creating the secrets for Process Server Copier lienLien copié sur presse-papiers!
OpenShift uses objects called Secrets to hold sensitive information, such as passwords or keystores. See the Secrets chapter in the OpenShift documentation for more information.
You must create an SSL certificate for Process Server and provide it to your OpenShift environment as a secret.
Procedure
Generate an SSL keystore with a private and public key for SSL encryption for Process Server. In a production environment, generate a valid signed certificate that matches the expected URL of the Process Server. Save the keystore in a file named
keystore.jks. Record the name of the certificate and the password of the keystore file.See Generate a SSL Encryption Key and Certificate for more information on how to create a keystore with self-signed or purchased SSL certificates.
Use the
occommand to generate a secret namedkieserver-app-secretfrom the new keystore file:oc create secret generic kieserver-app-secret --from-file=keystore.jks
$ oc create secret generic kieserver-app-secret --from-file=keystore.jksCopy to Clipboard Copied! Toggle word wrap Toggle overflow
2.3. Creating the secrets for Business Central Copier lienLien copié sur presse-papiers!
If you are planning to deploy Business Central or Business Central Monitoring in your OpenShift environment, you must create an SSL certificate for Business Central and provide it to your OpenShift environment as a secret. Do not use the same certificate and keystore for Business Central and for Process Server.
Procedure
Generate an SSL keystore with a private and public key for SSL encryption for Business Central. In a production environment, generate a valid signed certificate that matches the expected URL of the Business Central. Save the keystore in a file named
keystore.jks. Record the name of the certificate and the password of the keystore file.See Generate a SSL Encryption Key and Certificate for more information on how to create a keystore with self-signed or purchased SSL certificates.
Use the
occommand to generate a secret namedbusinesscentral-app-secretfrom the new keystore file:oc create secret generic businesscentral-app-secret --from-file=keystore.jks
$ oc create secret generic businesscentral-app-secret --from-file=keystore.jksCopy to Clipboard Copied! Toggle word wrap Toggle overflow
2.4. Changing GlusterFS configuration Copier lienLien copié sur presse-papiers!
Check whether your OpenShift environment uses GlusterFS to provide permanent storage volumes. If it uses GlusterFS, to ensure optimal performance, tune your GlusterFS storage by changing the storage class configuration.
Procedure
To check whether your environment uses GlusterFS, run the following command:
oc get storageclass
oc get storageclassCopy to Clipboard Copied! Toggle word wrap Toggle overflow In the results, check whether the
(default)marker is on the storage class that listsglusterfs. For example, in the following output the default storage class isgluster-container, which does listglusterfs:NAME PROVISIONER AGE gluster-block gluster.org/glusterblock 8d gluster-container (default) kubernetes.io/glusterfs 8d
NAME PROVISIONER AGE gluster-block gluster.org/glusterblock 8d gluster-container (default) kubernetes.io/glusterfs 8dCopy to Clipboard Copied! Toggle word wrap Toggle overflow If the result has a default storage class that does not list
glusterfsor if the result is empty, you do not need to make any changes. In this case, skip the rest of this procedure.To save the configuration of the default storage class into a YAML file, run the following command:
oc get storageclass <class-name> -o yaml >storage_config.yaml
oc get storageclass <class-name> -o yaml >storage_config.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Where
class-nameis the name of the default storage class. For example:oc get storageclass gluster-container -o yaml >storage_config.yaml
oc get storageclass gluster-container -o yaml >storage_config.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the
storage_config.yamlfile:Remove the lines with the following keys:
-
creationTimestamp -
resourceVersion -
selfLink -
uid
-
On the line with the
volumeoptionskey, add the following two options:features.cache-invalidation on, performance.nl-cache on. For example:volumeoptions: client.ssl off, server.ssl off, features.cache-invalidation on, performance.nl-cache on
volumeoptions: client.ssl off, server.ssl off, features.cache-invalidation on, performance.nl-cache onCopy to Clipboard Copied! Toggle word wrap Toggle overflow
To remove the existing default storage class, run the following command:
oc delete storageclass <class-name>
oc delete storageclass <class-name>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Where
class-nameis the name of the default storage class. For example:oc delete storageclass gluster-container
oc delete storageclass gluster-containerCopy to Clipboard Copied! Toggle word wrap Toggle overflow To re-create the storage class using the new configuration, run the following command:
oc create -f storage_config.yaml
oc create -f storage_config.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow