Questo contenuto non è disponibile nella lingua selezionata.

Chapter 9. Installing on IBM Cloud VPC


9.1. Preparing to install on IBM Cloud VPC

The installation workflows documented in this section are for IBM Cloud VPC infrastructure environments. IBM Cloud Classic is not supported at this time. For more information on the difference between Classic and VPC infrastructures, see IBM’s documentation.

9.1.1. Prerequisites

Important

IBM Cloud using installer-provisioned infrastructure is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

Before installing OpenShift Container Platform on IBM Cloud VPC, you must create a service account and configure an IBM Cloud account. See Configuring an IBM Cloud account for details about creating an account, enabling API services, configuring DNS, IBM Cloud account limits, and supported IBM Cloud VPC regions.

You must manually manage your cloud credentials when installing a cluster to IBM Cloud VPC. Do this by configuring the Cloud Credential Operator (CCO) for manual mode before you install the cluster. For more information, see Configuring IAM for IBM Cloud VPC.

You can install OpenShift Container Platform on IBM Cloud VPC using installer-provisioned infrastructure. This process involves using an installation program to provision the underlying infrastructure for your cluster. Installing OpenShift Container Platform on IBM Cloud VPC using user-provisioned infrastructure is not supported at this time.

See Installation process for more information about installer-provisioned installation processes.

9.1.3.1. Installing a cluster on installer-provisioned infrastructure

You can install a cluster on IBM Cloud VPC infrastructure that is provisioned by the OpenShift Container Platform installation program by using one of the following methods:

9.1.4. Next steps

9.2. Configuring an IBM Cloud account

Before you can install OpenShift Container Platform, you must configure an IBM Cloud account.

Important

IBM Cloud VPC using installer-provisioned infrastructure is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

9.2.1. Prerequisites

  • You have an IBM Cloud account with a subscription. You cannot install OpenShift Container Platform on a free or trial IBM Cloud account.

9.2.2. Quotas and limits on IBM Cloud VPC

The OpenShift Container Platform cluster uses a number of IBM Cloud VPC components, and the default quotas and limits affect your ability to install OpenShift Container Platform clusters. If you use certain cluster configurations, deploy your cluster in certain regions, or run multiple clusters from your account, you might need to request additional resources for your IBM Cloud account.

For a comprehensive list of the default IBM Cloud VPC quotas and service limits, see IBM Cloud’s documentation for Quotas and service limits.

Virtual Private Cloud (VPC)

Each OpenShift Container Platform cluster creates its own VPC. The default quota of VPCs per region is 10 and will allow 10 clusters. To have more than 10 clusters in a single region, you must increase this quota.

Application load balancer

By default, each cluster creates three application load balancers (ALBs):

  • Internal load balancer for the master API server
  • External load balancer for the master API server
  • Load balancer for the router

You can create additional

LoadBalancer
service objects to create additional ALBs. The default quota of VPC ALBs are 50 per region. To have more than 50 ALBs, you must increase this quota.

VPC ALBs are supported. Classic ALBs are not supported for IBM Cloud VPC.

Floating IP address

By default, the installation program distributes control plane and compute machines across all availability zones within a region to provision the cluster in a highly available configuration. In each availability zone, a public gateway is created and requires a separate floating IP address.

The default quota for a floating IP address is 20 addresses per availability zone. The default cluster configuration yields three floating IP addresses:

  • Two floating IP addresses in the
    us-east-1
    primary zone. The IP address associated with the bootstrap node is removed after installation.
  • One floating IP address in the
    us-east-2
    secondary zone.
  • One floating IP address in the
    us-east-3
    secondary zone.

IBM Cloud VPC can support up to 19 clusters per region in an account. If you plan to have more than 19 default clusters, you must increase this quota.

Virtual Server Instances (VSI)

By default, a cluster creates VSIs using

bx2-4x16
profiles, which includes the following resources by default:

  • 4 vCPUs
  • 16 GB RAM

The following nodes are created:

  • One
    bx2-4x16
    bootstrap machine, which is removed after the installation is complete
  • Three
    bx2-4x16
    control plane nodes
  • Three
    bx2-4x16
    compute nodes

For more information, see IBM Cloud’s documentation on supported profiles.

Expand
Table 9.1. VSI component quotas and limits
VSI componentDefault IBM Cloud VPC quotaDefault cluster configurationMaximum number of clusters

vCPU

200 vCPUs per region

28 vCPUs, or 24 vCPUs after bootstrap removal

8 per region

RAM

1600 GB per region

112 GB, or 96 GB after bootstrap removal

16 per region

Storage

18 TB per region

1050 GB, or 900 GB after bootstrap removal

19 per region

If you plan to exceed the resources stated in the table, you must increase your IBM Cloud account quota.

Block Storage Volumes

For each VPC machine, a block storage device is attached for its boot volume. The default cluster configuration creates seven VPC machines, resulting in seven block storage volumes. Additional Kubernetes persistent volume claims (PVCs) of the IBM Cloud VPC storage class create additional block storage volumes. The default quota of VPC block storage volumes are 300 per region. To have more than 300 volumes, you must increase this quota.

9.2.3. Configuring DNS resolution using Cloud Internet Services

IBM Cloud Internet Services (CIS) is used by the installation program to configure cluster DNS resolution and provide name lookup for the cluster to external resources. Only public DNS is supported with IBM Cloud VPC.

Note

IBM Cloud VPC does not support IPv6, so dual stack or IPv6 environments are not possible.

You must create a domain zone in CIS in the same account as your cluster. You must also ensure the zone is authoritative for the domain. You can do this using a root domain or subdomain.

Prerequisites

Procedure

  1. If you do not already have an existing domain and registrar, you must acquire them. For more information, see IBM’s documentation.
  2. Create a CIS instance to use with your cluster.

    1. Install the CIS plugin:

      $ ibmcloud plugin install cis
    2. Create the CIS instance:

      $ ibmcloud cis instance-create <instance_name> standard 
      1
      1
      At a minimum, a Standard plan is required for CIS to manage the cluster subdomain and its DNS records.
  3. Connect an existing domain to your CIS instance.

    1. Set the context instance for CIS:

      $ ibmcloud cis instance-set <instance_name> 
      1
      1
      The instance cloud resource name.
    2. Add the domain for CIS:

      $ ibmcloud cis domain-add <domain_name> 
      1
      1
      The fully qualified domain name. You can use either the root domain or subdomain value as the domain name, depending on which you plan to configure.
      Note

      A root domain uses the form

      openshiftcorp.com
      . A subdomain uses the form
      clusters.openshiftcorp.com
      .

  4. Open the CIS web console, navigate to the Overview page, and note your CIS name servers. These name servers will be used in the next step.
  5. Configure the name servers for your domains or subdomains at the domain’s registrar or DNS provider. For more information, see IBM Cloud’s documentation.

9.2.4. IBM Cloud VPC IAM Policies and API Key

To install OpenShift Container Platform into your IBM Cloud account, the installation program requires an IAM API key, which provides authentication and authorization to access IBM Cloud service APIs. You can use an existing IAM API key that contains the required policies or create a new one.

For an IBM Cloud IAM overview, see the IBM Cloud documentation.

9.2.4.1. Required access policies

You must assign the required access policies to your IBM Cloud account.

Expand
Table 9.2. Required access policies
Service typeServiceAccess policy scopePlatform accessService access

Account management

IAM Identity Service

All resources or a subset of resources [1]

Editor, Operator, Viewer, Administrator

Service ID creator

Account management [2]

Identity and Access Management

All resources

Editor, Operator, Viewer, Administrator

 

Account management

Resource group only

All resource groups in the account

Administrator

 

IAM services

Cloud Object Storage

All resources or a subset of resources [1]

Editor, Operator, Viewer, Administrator

Reader, Writer, Manager, Content Reader, Object Reader, Object Writer

IAM services

Internet Services

All resources or a subset of resources [1]

Editor, Operator, Viewer, Administrator

Reader, Writer, Manager

IAM services

VPC Infrastructure Services

All resources or a subset of resources [1]

Editor, Operator, Viewer, Administrator

Reader, Writer, Manager

  1. The policy access scope should be set based on how granular you want to assign access. The scope can be set to All resources or Resources based on selected attributes.
  2. Optional: This access policy is only required if you want the installation program to create a resource group. For more information on resource groups, see IBM Cloud’s documentation.

9.2.4.2. Access policy assignment

In IBM Cloud VPC IAM, access policies can be attached to different subjects:

  • Access group (Recommended)
  • Service ID
  • User

The recommended method is to define IAM access policies in an access group. This helps organize all the access required for OpenShift Container Platform and enables you to onboard users and service IDs to this group. You can also assign access to users and service IDs directly, if desired.

9.2.4.3. Creating an API key

You must create a user API key or a service ID API key for your IBM Cloud account.

Prerequisites

  • You have assigned the required access policies to your IBM Cloud account.
  • You have attached you IAM access policies to an access group, or other appropriate resource.

Procedure

  • Create an API key, depending on how you defined your IAM access policies.

    For example, if you assigned your access policies to a user, you must create a user API key. If you assigned your access policies to a service ID, you must create a service ID API key. If your access policies are assigned to an access group, you can use either API key type. For more information on IBM Cloud VPC API keys, see Understanding API keys.

9.2.5. Supported IBM Cloud VPC regions

You can deploy an OpenShift Container Platform cluster to the following regions:

  • au-syd
    (Sydney, Australia)
  • br-sao
    (Sao Paulo, Brazil)
  • ca-tor
    (Toronto, Canada)
  • eu-de
    (Frankfurt, Germany)
  • eu-gb
    (London, United Kingdom)
  • jp-osa
    (Osaka, Japan)
  • jp-tok
    (Tokyo, Japan)
  • us-east
    (Washington DC, United States)
  • us-south
    (Dallas, United States)

9.2.6. Next steps

9.3. Configuring IAM for IBM Cloud VPC

In environments where the cloud identity and access management (IAM) APIs are not reachable, you must put the Cloud Credential Operator (CCO) into manual mode before you install the cluster.

Important

IBM Cloud VPC using installer-provisioned infrastructure is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

The Cloud Credential Operator (CCO) manages cloud provider credentials as Kubernetes custom resource definitions (CRDs). You can configure the CCO to suit the security requirements of your organization by setting different values for the

credentialsMode
parameter in the
install-config.yaml
file.

Storing an administrator-level credential secret in the cluster

kube-system
project is not supported for IBM Cloud; therefore, you must set the
credentialsMode
parameter for the CCO to
Manual
when installing OpenShift Container Platform and manage your cloud credentials manually.

Using manual mode allows each cluster component to have only the permissions it requires, without storing an administrator-level credential in the cluster. You can also use this mode if your environment does not have connectivity to the cloud provider public IAM endpoint. However, you must manually reconcile permissions with new release images for every upgrade. You must also manually supply credentials for every component that requests them.

9.3.2. Configuring the Cloud Credential Operator utility

To create and manage cloud credentials from outside of the cluster when the Cloud Credential Operator (CCO) is operating in manual mode, extract and prepare the CCO utility (

ccoctl
) binary.

Note

The

ccoctl
utility is a Linux binary that must run in a Linux environment.

Prerequisites

  • You have access to an OpenShift Container Platform account with cluster administrator access.
  • You have installed the OpenShift CLI (
    oc
    ).

Procedure

  1. Obtain the OpenShift Container Platform release image by running the following command:

    $ RELEASE_IMAGE=$(./openshift-install version | awk '/release image/ {print $3}')
  2. Obtain the CCO container image from the OpenShift Container Platform release image by running the following command:

    $ CCO_IMAGE=$(oc adm release info --image-for='cloud-credential-operator' $RELEASE_IMAGE -a ~/.pull-secret)
    Note

    Ensure that the architecture of the

    $RELEASE_IMAGE
    matches the architecture of the environment in which you will use the
    ccoctl
    tool.

  3. Extract the

    ccoctl
    binary from the CCO container image within the OpenShift Container Platform release image by running the following command:

    $ oc image extract $CCO_IMAGE --file="/usr/bin/ccoctl" -a ~/.pull-secret
  4. Change the permissions to make

    ccoctl
    executable by running the following command:

    $ chmod 775 ccoctl

Verification

  • To verify that

    ccoctl
    is ready to use, display the help file by running the following command:

    $ ccoctl --help

    Output of ccoctl --help

    OpenShift credentials provisioning tool
    
    Usage:
      ccoctl [command]
    
    Available Commands:
      alibabacloud Manage credentials objects for alibaba cloud
      aws          Manage credentials objects for AWS cloud
      gcp          Manage credentials objects for Google cloud
      help         Help about any command
      ibmcloud     Manage credentials objects for IBM Cloud
      nutanix      Manage credentials objects for Nutanix
    
    Flags:
      -h, --help   help for ccoctl
    
    Use "ccoctl [command] --help" for more information about a command.

9.3.3. Next steps

9.4. Installing a cluster on IBM Cloud VPC with customizations

In OpenShift Container Platform version 4.11, you can install a customized cluster on infrastructure that the installation program provisions on IBM Cloud VPC. To customize the installation, you modify parameters in the

install-config.yaml
file before you install the cluster.

Important

IBM Cloud VPC using installer-provisioned infrastructure is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

9.4.1. Prerequisites

9.4.2. Internet access for OpenShift Container Platform

In OpenShift Container Platform 4.11, you require access to the internet to install your cluster.

You must have internet access to:

  • Access OpenShift Cluster Manager Hybrid Cloud Console to download the installation program and perform subscription management. If the cluster has internet access and you do not disable Telemetry, that service automatically entitles your cluster.
  • Access Quay.io to obtain the packages that are required to install your cluster.
  • Obtain the packages that are required to perform cluster updates.
Important

If your cluster cannot have direct internet access, you can perform a restricted network installation on some types of infrastructure that you provision. During that process, you download the required content and use it to populate a mirror registry with the installation packages. With some installation types, the environment that you install your cluster in will not require internet access. Before you update the cluster, you update the content of the mirror registry.

9.4.3. Generating a key pair for cluster node SSH access

During an OpenShift Container Platform installation, you can provide an SSH public key to the installation program. The key is passed to the Red Hat Enterprise Linux CoreOS (RHCOS) nodes through their Ignition config files and is used to authenticate SSH access to the nodes. The key is added to the

~/.ssh/authorized_keys
list for the
core
user on each node, which enables password-less authentication.

After the key is passed to the nodes, you can use the key pair to SSH in to the RHCOS nodes as the user

core
. To access the nodes through SSH, the private key identity must be managed by SSH for your local user.

If you want to SSH in to your cluster nodes to perform installation debugging or disaster recovery, you must provide the SSH public key during the installation process. The

./openshift-install gather
command also requires the SSH public key to be in place on the cluster nodes.

Important

Do not skip this procedure in production environments, where disaster recovery and debugging is required.

Note

You must use a local key, not one that you configured with platform-specific approaches such as AWS key pairs.

Procedure

  1. If you do not have an existing SSH key pair on your local machine to use for authentication onto your cluster nodes, create one. For example, on a computer that uses a Linux operating system, run the following command:

    $ ssh-keygen -t ed25519 -N '' -f <path>/<file_name> 
    1
    1
    Specify the path and file name, such as ~/.ssh/id_ed25519, of the new SSH key. If you have an existing key pair, ensure your public key is in the your ~/.ssh directory.
    Note

    If you plan to install an OpenShift Container Platform cluster that uses FIPS validated or Modules In Process cryptographic libraries on the

    x86_64
    architecture, do not create a key that uses the
    ed25519
    algorithm. Instead, create a key that uses the
    rsa
    or
    ecdsa
    algorithm.

  2. View the public SSH key:

    $ cat <path>/<file_name>.pub

    For example, run the following to view the

    ~/.ssh/id_ed25519.pub
    public key:

    $ cat ~/.ssh/id_ed25519.pub
  3. Add the SSH private key identity to the SSH agent for your local user, if it has not already been added. SSH agent management of the key is required for password-less SSH authentication onto your cluster nodes, or if you want to use the

    ./openshift-install gather
    command.

    Note

    On some distributions, default SSH private key identities such as

    ~/.ssh/id_rsa
    and
    ~/.ssh/id_dsa
    are managed automatically.

    1. If the

      ssh-agent
      process is not already running for your local user, start it as a background task:

      $ eval "$(ssh-agent -s)"

      Example output

      Agent pid 31874

      Note

      If your cluster is in FIPS mode, only use FIPS-compliant algorithms to generate the SSH key. The key must be either RSA or ECDSA.

  4. Add your SSH private key to the

    ssh-agent
    :

    $ ssh-add <path>/<file_name> 
    1
    1
    Specify the path and file name for your SSH private key, such as ~/.ssh/id_ed25519

    Example output

    Identity added: /home/<you>/<path>/<file_name> (<computer_name>)

Next steps

  • When you install OpenShift Container Platform, provide the SSH public key to the installation program.

9.4.4. Obtaining the installation program

Before you install OpenShift Container Platform, download the installation file on a local computer.

Prerequisites

  • You have a computer that runs Linux or macOS, with 500 MB of local disk space.

Procedure

  1. Access the Infrastructure Provider page on the OpenShift Cluster Manager site. If you have a Red Hat account, log in with your credentials. If you do not, create an account.
  2. Select your infrastructure provider.
  3. Navigate to the page for your installation type, download the installation program that corresponds with your host operating system and architecture, and place the file in the directory where you will store the installation configuration files.

    Important

    The installation program creates several files on the computer that you use to install your cluster. You must keep the installation program and the files that the installation program creates after you finish installing the cluster. Both files are required to delete the cluster.

    Important

    Deleting the files created by the installation program does not remove your cluster, even if the cluster failed during installation. To remove your cluster, complete the OpenShift Container Platform uninstallation procedures for your specific cloud provider.

  4. Extract the installation program. For example, on a computer that uses a Linux operating system, run the following command:

    $ tar -xvf openshift-install-linux.tar.gz
  5. Download your installation pull secret from the Red Hat OpenShift Cluster Manager. This pull secret allows you to authenticate with the services that are provided by the included authorities, including Quay.io, which serves the container images for OpenShift Container Platform components.

9.4.5. Exporting the IBM Cloud VPC API key

You must set the IBM Cloud VPC API key you created as a global variable; the installation program ingests the variable during startup to set the API key.

Prerequisties

  • You have created either a user API key or service ID API key for your IBM Cloud account.

Procedure

  • Export your IBM Cloud VPC API key as a global variable:

    $ export IC_API_KEY=<api_key>
Important

You must set the variable name exactly as specified; the installation program expects the variable name to be present during startup.

9.4.6. Creating the installation configuration file

You can customize the OpenShift Container Platform cluster you install on IBM Cloud.

Prerequisites

  • Obtain the OpenShift Container Platform installation program and the pull secret for your cluster.
  • Obtain service principal permissions at the subscription level.

Procedure

  1. Create the

    install-config.yaml
    file.

    1. Change to the directory that contains the installation program and run the following command:

      $ ./openshift-install create install-config --dir <installation_directory> 
      1
      1
      For <installation_directory>, specify the directory name to store the files that the installation program creates.

      When specifying the directory:

      • Verify that the directory has the
        execute
        permission. This permission is required to run Terraform binaries under the installation directory.
      • Use an empty directory. Some installation assets, such as bootstrap X.509 certificates, have short expiration intervals, therefore you must not reuse an installation directory. If you want to reuse individual files from another cluster installation, you can copy them into your directory. However, the file names for the installation assets might change between releases. Use caution when copying installation files from an earlier OpenShift Container Platform version.
    2. At the prompts, provide the configuration details for your cloud:

      1. Optional: Select an SSH key to use to access your cluster machines.

        Note

        For production OpenShift Container Platform clusters on which you want to perform installation debugging or disaster recovery, specify an SSH key that your

        ssh-agent
        process uses.

      2. Select ibmcloud as the platform to target.
      3. Select the region to deploy the cluster to.
      4. Select the base domain to deploy the cluster to. The base domain corresponds to the public DNS zone that you created for your cluster.
      5. Enter a descriptive name for your cluster.
      6. Paste the pull secret from the Red Hat OpenShift Cluster Manager.
  2. Modify the
    install-config.yaml
    file. You can find more information about the available parameters in the "Installation configuration parameters" section.
  3. Back up the

    install-config.yaml
    file so that you can use it to install multiple clusters.

    Important

    The

    install-config.yaml
    file is consumed during the installation process. If you want to reuse the file, you must back it up now.

9.4.6.1. Installation configuration parameters

Before you deploy an OpenShift Container Platform cluster, you provide parameter values to describe your account on the cloud platform that hosts your cluster and optionally customize your cluster’s platform. When you create the

install-config.yaml
installation configuration file, you provide values for the required parameters through the command line. If you customize your cluster, you can modify the
install-config.yaml
file to provide more details about the platform.

Note

After installation, you cannot modify these parameters in the

install-config.yaml
file.

9.4.6.1.1. Required configuration parameters

Required installation configuration parameters are described in the following table:

Expand
Table 9.3. Required parameters
ParameterDescriptionValues

apiVersion

The API version for the

install-config.yaml
content. The current version is
v1
. The installer may also support older API versions.

String

baseDomain

The base domain of your cloud provider. The base domain is used to create routes to your OpenShift Container Platform cluster components. The full DNS name for your cluster is a combination of the

baseDomain
and
metadata.name
parameter values that uses the
<metadata.name>.<baseDomain>
format.

A fully-qualified domain or subdomain name, such as

example.com
.

metadata

Kubernetes resource

ObjectMeta
, from which only the
name
parameter is consumed.

Object

metadata.name

The name of the cluster. DNS records for the cluster are all subdomains of

{{.metadata.name}}.{{.baseDomain}}
.

String of lowercase letters, hyphens (

-
), and periods (
.
), such as
dev
.

platform

The configuration for the specific platform upon which to perform the installation:

alibabacloud
,
aws
,
baremetal
,
azure
,
gcp
,
ibmcloud
,
nutanix
,
openstack
,
ovirt
,
vsphere
, or
{}
. For additional information about
platform.<platform>
parameters, consult the table for your specific platform that follows.

Object

pullSecret

Get a pull secret from the Red Hat OpenShift Cluster Manager to authenticate downloading container images for OpenShift Container Platform components from services such as Quay.io.

{
   "auths":{
      "cloud.openshift.com":{
         "auth":"b3Blb=",
         "email":"you@example.com"
      },
      "quay.io":{
         "auth":"b3Blb=",
         "email":"you@example.com"
      }
   }
}
9.4.6.1.2. Network configuration parameters

You can customize your installation configuration based on the requirements of your existing network infrastructure. For example, you can expand the IP address block for the cluster network or provide different IP address blocks than the defaults.

Only IPv4 addresses are supported.

Note

Globalnet is not supported with Red Hat OpenShift Data Foundation disaster recovery solutions. For regional disaster recovery scenarios, ensure that you use a nonoverlapping range of private IP addresses for the cluster and service networks in each cluster.

Expand
Table 9.4. Network parameters
ParameterDescriptionValues

networking

The configuration for the cluster network.

Object

Note

You cannot modify parameters specified by the

networking
object after installation.

networking.networkType

The cluster network provider Container Network Interface (CNI) cluster network provider to install.

Either

OpenShiftSDN
or
OVNKubernetes
.
OpenShiftSDN
is a CNI provider for all-Linux networks.
OVNKubernetes
is a CNI provider for Linux networks and hybrid networks that contain both Linux and Windows servers. The default value is
OpenShiftSDN
.

networking.clusterNetwork

The IP address blocks for pods.

The default value is

10.128.0.0/14
with a host prefix of
/23
.

If you specify multiple IP address blocks, the blocks must not overlap.

An array of objects. For example:

networking:
  clusterNetwork:
  - cidr: 10.128.0.0/14
    hostPrefix: 23

networking.clusterNetwork.cidr

Required if you use

networking.clusterNetwork
. An IP address block.

An IPv4 network.

An IP address block in Classless Inter-Domain Routing (CIDR) notation. The prefix length for an IPv4 block is between

0
and
32
.

networking.clusterNetwork.hostPrefix

The subnet prefix length to assign to each individual node. For example, if

hostPrefix
is set to
23
then each node is assigned a
/23
subnet out of the given
cidr
. A
hostPrefix
value of
23
provides 510 (2^(32 - 23) - 2) pod IP addresses.

A subnet prefix.

The default value is

23
.

networking.serviceNetwork

The IP address block for services. The default value is

172.30.0.0/16
.

The OpenShift SDN and OVN-Kubernetes network providers support only a single IP address block for the service network.

An array with an IP address block in CIDR format. For example:

networking:
  serviceNetwork:
   - 172.30.0.0/16

networking.machineNetwork

The IP address blocks for machines.

If you specify multiple IP address blocks, the blocks must not overlap.

An array of objects. For example:

networking:
  machineNetwork:
  - cidr: 10.0.0.0/16

networking.machineNetwork.cidr

Required if you use

networking.machineNetwork
. An IP address block. The default value is
10.0.0.0/16
for all platforms other than libvirt. For libvirt, the default value is
192.168.126.0/24
.

An IP network block in CIDR notation.

For example,

10.0.0.0/16
.

Note

Set the

networking.machineNetwork
to match the CIDR that the preferred NIC resides in.

9.4.6.1.3. Optional configuration parameters

Optional installation configuration parameters are described in the following table:

Expand
Table 9.5. Optional parameters
ParameterDescriptionValues

additionalTrustBundle

A PEM-encoded X.509 certificate bundle that is added to the nodes' trusted certificate store. This trust bundle may also be used when a proxy has been configured.

String

capabilities

Controls the installation of optional core cluster components. You can reduce the footprint of your OpenShift Container Platform cluster by disabling optional components.

String array

capabilities.baselineCapabilitySet

Selects an initial set of optional capabilities to enable. Valid values are

None
,
v4.11
and
vCurrent
.
v4.11
enables the
baremetal
Operator, the
marketplace
Operator, and the
openshift-samples
content.
vCurrent
installs the recommended set of capabilities for the current version of OpenShift Container Platform. The default value is
vCurrent
.

String

capabilities.additionalEnabledCapabilities

Extends the set of optional capabilities beyond what you specify in

baselineCapabilitySet
. Valid values are
baremetal
,
marketplace
and
openshift-samples
. You may specify multiple capabilities in this parameter.

String array

cgroupsV2

Enables Linux control groups version 2 (cgroups v2) on specific nodes in your cluster. The OpenShift Container Platform process for enabling cgroups v2 disables all cgroup version 1 controllers and hierarchies. The OpenShift Container Platform cgroups version 2 feature is in Developer Preview and is not supported by Red Hat at this time.

true

compute

The configuration for the machines that comprise the compute nodes.

Array of

MachinePool
objects.

compute.architecture

Determines the instruction set architecture of the machines in the pool. Currently, clusters with varied architectures are not supported. All pools must specify the same architecture. Valid values are

amd64
(the default).

String

compute.hyperthreading

Whether to enable or disable simultaneous multithreading, or

hyperthreading
, on compute machines. By default, simultaneous multithreading is enabled to increase the performance of your machines' cores.

Important

If you disable simultaneous multithreading, ensure that your capacity planning accounts for the dramatically decreased machine performance.

Enabled
or
Disabled

compute.name

Required if you use

compute
. The name of the machine pool.

worker

compute.platform

Required if you use

compute
. Use this parameter to specify the cloud provider to host the worker machines. This parameter value must match the
controlPlane.platform
parameter value.

alibabacloud
,
aws
,
azure
,
gcp
,
ibmcloud
,
nutanix
,
openstack
,
ovirt
,
vsphere
, or
{}

compute.replicas

The number of compute machines, which are also known as worker machines, to provision.

A positive integer greater than or equal to

2
. The default value is
3
.

controlPlane

The configuration for the machines that comprise the control plane.

Array of

MachinePool
objects.

controlPlane.architecture

Determines the instruction set architecture of the machines in the pool. Currently, clusters with varied architectures are not supported. All pools must specify the same architecture. Valid values are

amd64
(the default).

String

controlPlane.hyperthreading

Whether to enable or disable simultaneous multithreading, or

hyperthreading
, on control plane machines. By default, simultaneous multithreading is enabled to increase the performance of your machines' cores.

Important

If you disable simultaneous multithreading, ensure that your capacity planning accounts for the dramatically decreased machine performance.

Enabled
or
Disabled

controlPlane.name

Required if you use

controlPlane
. The name of the machine pool.

master

controlPlane.platform

Required if you use

controlPlane
. Use this parameter to specify the cloud provider that hosts the control plane machines. This parameter value must match the
compute.platform
parameter value.

alibabacloud
,
aws
,
azure
,
gcp
,
ibmcloud
,
nutanix
,
openstack
,
ovirt
,
vsphere
, or
{}

controlPlane.replicas

The number of control plane machines to provision.

The only supported value is

3
, which is the default value.

credentialsMode

The Cloud Credential Operator (CCO) mode. If no mode is specified, the CCO dynamically tries to determine the capabilities of the provided credentials, with a preference for mint mode on the platforms where multiple modes are supported.

Note

Not all CCO modes are supported for all cloud providers. For more information on CCO modes, see the Cloud Credential Operator entry in the Cluster Operators reference content.

Note

If your AWS account has service control policies (SCP) enabled, you must configure the

credentialsMode
parameter to
Mint
,
Passthrough
or
Manual
.

Mint
,
Passthrough
,
Manual
or an empty string (
""
).

fips

Enable or disable FIPS mode. The default is

false
(disabled). If FIPS mode is enabled, the Red Hat Enterprise Linux CoreOS (RHCOS) machines that OpenShift Container Platform runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with RHCOS instead.

Important

To enable FIPS mode for your cluster, you must run the installation program from a Red Hat Enterprise Linux (RHEL) computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see Installing the system in FIPS mode. The use of FIPS validated or Modules In Process cryptographic libraries is only supported on OpenShift Container Platform deployments on the

x86_64
architecture.

Note

If you are using Azure File storage, you cannot enable FIPS mode.

false
or
true

imageContentSources

Sources and repositories for the release-image content.

Array of objects. Includes a

source
and, optionally,
mirrors
, as described in the following rows of this table.

imageContentSources.source

Required if you use

imageContentSources
. Specify the repository that users refer to, for example, in image pull specifications.

String

imageContentSources.mirrors

Specify one or more repositories that may also contain the same images.

Array of strings

publish

How to publish or expose the user-facing endpoints of your cluster, such as the Kubernetes API, OpenShift routes.

Internal
or
External
. To deploy a private cluster, which cannot be accessed from the internet, set
publish
to
Internal
. The default value is
External
.

sshKey

The SSH key to authenticate access to your cluster machines.

Note

For production OpenShift Container Platform clusters on which you want to perform installation debugging or disaster recovery, specify an SSH key that your

ssh-agent
process uses.

For example,

sshKey: ssh-ed25519 AAAA..
.

9.4.6.1.4. Additional IBM Cloud VPC configuration parameters

Additional IBM Cloud VPC configuration parameters are described in the following table:

Expand
Table 9.6. Additional IBM Cloud VPC parameters
ParameterDescriptionValues

platform.ibmcloud.resourceGroupName

The name of an existing resource group to install your cluster to. This resource group must only be used for this specific cluster because the cluster components assume ownership of all of the resources in the resource group. If undefined, a new resource group is created for the cluster. [1]

String, for example

existing_resource_group
.

platform.ibmcloud.dedicatedHosts.profile

The new dedicated host to create. If you specify a value for

platform.ibmcloud.dedicatedHosts.name
, this parameter is not required.

Valid IBM Cloud VPC dedicated host profile, such as

cx2-host-152x304
. [2]

platform.ibmcloud.dedicatedHosts.name

An existing dedicated host. If you specify a value for

platform.ibmcloud.dedicatedHosts.profile
, this parameter is not required.

String, for example

my-dedicated-host-name
.

platform.ibmcloud.type

The instance type for all IBM Cloud VPC machines.

Valid IBM Cloud VPC instance type, such as

bx2-8x32
. [2]

  1. Whether you define an existing resource group, or if the installer creates one, determines how the resource group is treated when the cluster is uninstalled. If you define a resource group, the installer removes all of the installer-provisioned resources, but leaves the resource group alone; if a resource group is created as part of the installation, the installer removes all of the installer provisioned resources and the resource group.
  2. To determine which profile best meets your needs, see Instance Profiles in the IBM documentation.

9.4.6.2. Sample customized install-config.yaml file for IBM Cloud VPC

You can customize the

install-config.yaml
file to specify more details about your OpenShift Container Platform cluster’s platform or modify the values of the required parameters.

Important

This sample YAML file is provided for reference only. You must obtain your

install-config.yaml
file by using the installation program and modify it.

apiVersion: v1
baseDomain: example.com 
1

controlPlane: 
2
 
3

  hyperthreading: Enabled 
4

  name: master
  platform:
    ibmcloud: {}
  replicas: 3
compute: 
5
 
6

- hyperthreading: Enabled 
7

  name: worker
  platform:
    ibmcloud: {}
  replicas: 3
metadata:
  name: test-cluster 
8

networking:
  clusterNetwork:
  - cidr: 10.128.0.0/14
    hostPrefix: 23
  machineNetwork:
  - cidr: 10.0.0.0/16
  networkType: OpenShiftSDN
  serviceNetwork:
  - 172.30.0.0/16
platform:
  ibmcloud:
    region: us-south 
9

credentialsMode: Manual
publish: External
pullSecret: '{"auths": ...}' 
10

fips: false 
11

sshKey: ssh-ed25519 AAAA... 
12
1 8 9 10
Required. The installation program prompts you for this value.
2 5
If you do not provide these parameters and values, the installation program provides the default value.
3 6
The controlPlane section is a single mapping, but the compute section is a sequence of mappings. To meet the requirements of the different data structures, the first line of the compute section must begin with a hyphen, -, and the first line of the controlPlane section must not. Only one control plane pool is used.
4 7
Whether to enable or disable simultaneous multithreading, or hyperthreading. By default, simultaneous multithreading is enabled to increase the performance of your machines' cores. You can disable it by setting the parameter value to Disabled. If you disable simultaneous multithreading in some cluster machines, you must disable it in all cluster machines.
Important

If you disable simultaneous multithreading, ensure that your capacity planning accounts for the dramatically decreased machine performance. Use larger machine types, such as

n1-standard-8
, for your machines if you disable simultaneous multithreading.

11
Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the Red Hat Enterprise Linux CoreOS (RHCOS) machines that OpenShift Container Platform runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with RHCOS instead.
Important

To enable FIPS mode for your cluster, you must run the installation program from a Red Hat Enterprise Linux (RHEL) computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see Installing the system in FIPS mode. The use of FIPS Validated or Modules in Process cryptographic libraries is only supported on OpenShift Container Platform deployments on the

x86_64
architecture.

12
You can optionally provide the sshKey value that you use to access the machines in your cluster.
Note

For production OpenShift Container Platform clusters on which you want to perform installation debugging or disaster recovery, specify an SSH key that your

ssh-agent
process uses.

9.4.6.3. Configuring the cluster-wide proxy during installation

Production environments can deny direct access to the internet and instead have an HTTP or HTTPS proxy available. You can configure a new OpenShift Container Platform cluster to use a proxy by configuring the proxy settings in the

install-config.yaml
file.

Prerequisites

  • You have an existing
    install-config.yaml
    file.
  • You reviewed the sites that your cluster requires access to and determined whether any of them need to bypass the proxy. By default, all cluster egress traffic is proxied, including calls to hosting cloud provider APIs. You added sites to the

    Proxy
    object’s
    spec.noProxy
    field to bypass the proxy if necessary.

    Note

    The

    Proxy
    object
    status.noProxy
    field is populated with the values of the
    networking.machineNetwork[].cidr
    ,
    networking.clusterNetwork[].cidr
    , and
    networking.serviceNetwork[]
    fields from your installation configuration.

    For installations on Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, and Red Hat OpenStack Platform (RHOSP), the

    Proxy
    object
    status.noProxy
    field is also populated with the instance metadata endpoint (
    169.254.169.254
    ).

Procedure

  1. Edit your

    install-config.yaml
    file and add the proxy settings. For example:

    apiVersion: v1
    baseDomain: my.domain.com
    proxy:
      httpProxy: http://<username>:<pswd>@<ip>:<port> 
    1
    
      httpsProxy: https://<username>:<pswd>@<ip>:<port> 
    2
    
      noProxy: example.com 
    3
    
    additionalTrustBundle: | 
    4
    
        -----BEGIN CERTIFICATE-----
        <MY_TRUSTED_CA_CERT>
        -----END CERTIFICATE-----
    1
    A proxy URL to use for creating HTTP connections outside the cluster. The URL scheme must be http.
    2
    A proxy URL to use for creating HTTPS connections outside the cluster.
    3
    A comma-separated list of destination domain names, IP addresses, or other network CIDRs to exclude from proxying. Preface a domain with . to match subdomains only. For example, .y.com matches x.y.com, but not y.com. Use * to bypass the proxy for all destinations.
    4
    If provided, the installation program generates a config map that is named user-ca-bundle in the openshift-config namespace that contains one or more additional CA certificates that are required for proxying HTTPS connections. The Cluster Network Operator then creates a trusted-ca-bundle config map that merges these contents with the Red Hat Enterprise Linux CoreOS (RHCOS) trust bundle, and this config map is referenced in the trustedCA field of the Proxy object. The additionalTrustBundle field is required unless the proxy’s identity certificate is signed by an authority from the RHCOS trust bundle.
    Note

    The installation program does not support the proxy

    readinessEndpoints
    field.

    Note

    If the installer times out, restart and then complete the deployment by using the

    wait-for
    command of the installer. For example:

    $ ./openshift-install wait-for install-complete --log-level debug
  2. Save the file and reference it when installing OpenShift Container Platform.

The installation program creates a cluster-wide proxy that is named

cluster
that uses the proxy settings in the provided
install-config.yaml
file. If no proxy settings are provided, a
cluster
Proxy
object is still created, but it will have a nil
spec
.

Note

Only the

Proxy
object named
cluster
is supported, and no additional proxies can be created.

9.4.7. Manually creating IAM for IBM Cloud VPC

Installing the cluster requires that the Cloud Credential Operator (CCO) operate in manual mode. While the installation program configures the CCO for manual mode, you must specify the identity and access management secrets for you cloud provider.

You can use the Cloud Credential Operator (CCO) utility (

ccoctl
) to create the required IBM Cloud VPC resources.

Prerequisites

  • You have configured the
    ccoctl
    binary.
  • You have an existing
    install-config.yaml
    file.

Procedure

  1. Edit the

    install-config.yaml
    configuration file so that it contains the
    credentialsMode
    parameter set to
    Manual
    .

    Example install-config.yaml configuration file

    apiVersion: v1
    baseDomain: cluster1.example.com
    credentialsMode: Manual 
    1
    
    compute:
    - architecture: amd64
      hyperthreading: Enabled
    ...

    1
    This line is added to set the credentialsMode parameter to Manual.
  2. To generate the manifests, run the following command from the directory that contains the installation program:

    $ openshift-install create manifests --dir <installation_directory>
  3. From the directory that contains the installation program, obtain the OpenShift Container Platform release image that your

    openshift-install
    binary is built to use:

    $ RELEASE_IMAGE=$(./openshift-install version | awk '/release image/ {print $3}')
  4. Extract the

    CredentialsRequest
    objects from the OpenShift Container Platform release image:

    $ oc adm release extract --cloud=ibmcloud --credentials-requests $RELEASE_IMAGE \
        --to=<path_to_credential_requests_directory> 
    1
    1
    The directory where the credential requests will be stored.

    This command creates a YAML file for each

    CredentialsRequest
    object.

    Sample CredentialsRequest object

      apiVersion: cloudcredential.openshift.io/v1
      kind: CredentialsRequest
      metadata:
        labels:
          controller-tools.k8s.io: "1.0"
        name: openshift-image-registry-ibmcos
        namespace: openshift-cloud-credential-operator
      spec:
        secretRef:
          name: installer-cloud-credentials
          namespace: openshift-image-registry
        providerSpec:
          apiVersion: cloudcredential.openshift.io/v1
          kind: IBMCloudProviderSpec
          policies:
          - attributes:
            - name: serviceName
              value: cloud-object-storage
            roles:
            - crn:v1:bluemix:public:iam::::role:Viewer
            - crn:v1:bluemix:public:iam::::role:Operator
            - crn:v1:bluemix:public:iam::::role:Editor
            - crn:v1:bluemix:public:iam::::serviceRole:Reader
            - crn:v1:bluemix:public:iam::::serviceRole:Writer
          - attributes:
            - name: resourceType
              value: resource-group
            roles:
            - crn:v1:bluemix:public:iam::::role:Viewer

  5. Create the service ID for each credential request, assign the policies defined, create an API key in IBM Cloud VPC, and generate the secret:

    $ ccoctl ibmcloud create-service-id \
        --credentials-requests-dir <path_to_store_credential_request_templates> \ 
    1
    
        --name <cluster_name> \ 
    2
    
        --output-dir <installation_directory> \
        --resource-group-name <resource_group_name> 
    3
    1
    The directory where the credential requests are stored.
    2
    The name of the OpenShift Container Platform cluster.
    3
    Optional: The name of the resource group used for scoping the access policies.
    Note

    If your cluster uses Technology Preview features that are enabled by the

    TechPreviewNoUpgrade
    feature set, you must include the
    --enable-tech-preview
    parameter.

    If an incorrect resource group name is provided, the installation fails during the bootstrap phase. To find the correct resource group name, run the following command:

    $ grep resourceGroupName <installation_directory>/manifests/cluster-infrastructure-02-config.yml

Verification

  • Ensure that the appropriate secrets were generated in your cluster’s
    manifests
    directory.

9.4.8. Deploying the cluster

You can install OpenShift Container Platform on a compatible cloud platform.

Important

You can run the

create cluster
command of the installation program only once, during initial installation.

Prerequisites

  • Configure an account with the cloud platform that hosts your cluster.
  • Obtain the OpenShift Container Platform installation program and the pull secret for your cluster.

Procedure

  • Change to the directory that contains the installation program and initialize the cluster deployment:

    $ ./openshift-install create cluster --dir <installation_directory> \ 
    1
    
        --log-level=info 
    2
    1
    For <installation_directory>, specify the location of your customized ./install-config.yaml file.
    2
    To view different installation details, specify warn, debug, or error instead of info.
    Note

    If the cloud provider account that you configured on your host does not have sufficient permissions to deploy the cluster, the installation process stops, and the missing permissions are displayed.

Verification

When the cluster deployment completes successfully:

  • The terminal displays directions for accessing your cluster, including a link to the web console and credentials for the
    kubeadmin
    user.
  • Credential information also outputs to
    <installation_directory>/.openshift_install.log
    .
Important

Do not delete the installation program or the files that the installation program creates. Both are required to delete the cluster.

Example output

...
INFO Install complete!
INFO To access the cluster as the system:admin user when using 'oc', run 'export KUBECONFIG=/home/myuser/install_dir/auth/kubeconfig'
INFO Access the OpenShift web-console here: https://console-openshift-console.apps.mycluster.example.com
INFO Login to the console with user: "kubeadmin", and password: "password"
INFO Time elapsed: 36m22s

Important
  • The Ignition config files that the installation program generates contain certificates that expire after 24 hours, which are then renewed at that time. If the cluster is shut down before renewing the certificates and the cluster is later restarted after the 24 hours have elapsed, the cluster automatically recovers the expired certificates. The exception is that you must manually approve the pending
    node-bootstrapper
    certificate signing requests (CSRs) to recover kubelet certificates. See the documentation for Recovering from expired control plane certificates for more information.
  • It is recommended that you use Ignition config files within 12 hours after they are generated because the 24-hour certificate rotates from 16 to 22 hours after the cluster is installed. By using the Ignition config files within 12 hours, you can avoid installation failure if the certificate update runs during installation.

9.4.9. Installing the OpenShift CLI by downloading the binary

You can install the OpenShift CLI (

oc
) to interact with OpenShift Container Platform from a command-line interface. You can install
oc
on Linux, Windows, or macOS.

Important

If you installed an earlier version of

oc
, you cannot use it to complete all of the commands in OpenShift Container Platform 4.11. Download and install the new version of
oc
.

Installing the OpenShift CLI on Linux

You can install the OpenShift CLI (

oc
) binary on Linux by using the following procedure.

Procedure

  1. Navigate to the OpenShift Container Platform downloads page on the Red Hat Customer Portal.
  2. Select the architecture in the Product Variant drop-down menu.
  3. Select the appropriate version in the Version drop-down menu.
  4. Click Download Now next to the OpenShift v4.11 Linux Client entry and save the file.
  5. Unpack the archive:

    $ tar xvf <file>
  6. Place the

    oc
    binary in a directory that is on your
    PATH
    .

    To check your

    PATH
    , execute the following command:

    $ echo $PATH

Verification

  • After you install the OpenShift CLI, it is available using the

    oc
    command:

    $ oc <command>
Installing the OpenShift CLI on Windows

You can install the OpenShift CLI (

oc
) binary on Windows by using the following procedure.

Procedure

  1. Navigate to the OpenShift Container Platform downloads page on the Red Hat Customer Portal.
  2. Select the appropriate version in the Version drop-down menu.
  3. Click Download Now next to the OpenShift v4.11 Windows Client entry and save the file.
  4. Unzip the archive with a ZIP program.
  5. Move the

    oc
    binary to a directory that is on your
    PATH
    .

    To check your

    PATH
    , open the command prompt and execute the following command:

    C:\> path

Verification

  • After you install the OpenShift CLI, it is available using the

    oc
    command:

    C:\> oc <command>
Installing the OpenShift CLI on macOS

You can install the OpenShift CLI (

oc
) binary on macOS by using the following procedure.

Procedure

  1. Navigate to the OpenShift Container Platform downloads page on the Red Hat Customer Portal.
  2. Select the appropriate version in the Version drop-down menu.
  3. Click Download Now next to the OpenShift v4.11 macOS Client entry and save the file.

    Note

    For macOS arm64, choose the OpenShift v4.11 macOS arm64 Client entry.

  4. Unpack and unzip the archive.
  5. Move the

    oc
    binary to a directory on your PATH.

    To check your

    PATH
    , open a terminal and execute the following command:

    $ echo $PATH

Verification

  • After you install the OpenShift CLI, it is available using the

    oc
    command:

    $ oc <command>

9.4.10. Logging in to the cluster by using the CLI

You can log in to your cluster as a default system user by exporting the cluster

kubeconfig
file. The
kubeconfig
file contains information about the cluster that is used by the CLI to connect a client to the correct cluster and API server. The file is specific to a cluster and is created during OpenShift Container Platform installation.

Prerequisites

  • You deployed an OpenShift Container Platform cluster.
  • You installed the
    oc
    CLI.

Procedure

  1. Export the

    kubeadmin
    credentials:

    $ export KUBECONFIG=<installation_directory>/auth/kubeconfig 
    1
    1
    For <installation_directory>, specify the path to the directory that you stored the installation files in.
  2. Verify you can run

    oc
    commands successfully using the exported configuration:

    $ oc whoami

    Example output

    system:admin

9.4.11. Telemetry access for OpenShift Container Platform

In OpenShift Container Platform 4.11, the Telemetry service, which runs by default to provide metrics about cluster health and the success of updates, requires internet access. If your cluster is connected to the internet, Telemetry runs automatically, and your cluster is registered to OpenShift Cluster Manager Hybrid Cloud Console.

After you confirm that your OpenShift Cluster Manager Hybrid Cloud Console inventory is correct, either maintained automatically by Telemetry or manually by using OpenShift Cluster Manager, use subscription watch to track your OpenShift Container Platform subscriptions at the account or multi-cluster level.

9.4.12. Next steps

9.5. Installing a cluster on IBM Cloud VPC with network customizations

In OpenShift Container Platform version 4.11, you can install a cluster with a customized network configuration on infrastructure that the installation program provisions on IBM Cloud VPC. By customizing your network configuration, your cluster can coexist with existing IP address allocations in your environment and integrate with existing MTU and VXLAN configurations. To customize the installation, you modify parameters in the

install-config.yaml
file before you install the cluster.

You must set most of the network configuration parameters during installation, and you can modify only

kubeProxy
configuration parameters in a running cluster.

Important

IBM Cloud VPC using installer-provisioned infrastructure is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

9.5.1. Prerequisites

9.5.2. Internet access for OpenShift Container Platform

In OpenShift Container Platform 4.11, you require access to the internet to install your cluster.

You must have internet access to:

  • Access OpenShift Cluster Manager Hybrid Cloud Console to download the installation program and perform subscription management. If the cluster has internet access and you do not disable Telemetry, that service automatically entitles your cluster.
  • Access Quay.io to obtain the packages that are required to install your cluster.
  • Obtain the packages that are required to perform cluster updates.
Important

If your cluster cannot have direct internet access, you can perform a restricted network installation on some types of infrastructure that you provision. During that process, you download the required content and use it to populate a mirror registry with the installation packages. With some installation types, the environment that you install your cluster in will not require internet access. Before you update the cluster, you update the content of the mirror registry.

9.5.3. Generating a key pair for cluster node SSH access

During an OpenShift Container Platform installation, you can provide an SSH public key to the installation program. The key is passed to the Red Hat Enterprise Linux CoreOS (RHCOS) nodes through their Ignition config files and is used to authenticate SSH access to the nodes. The key is added to the

~/.ssh/authorized_keys
list for the
core
user on each node, which enables password-less authentication.

After the key is passed to the nodes, you can use the key pair to SSH in to the RHCOS nodes as the user

core
. To access the nodes through SSH, the private key identity must be managed by SSH for your local user.

If you want to SSH in to your cluster nodes to perform installation debugging or disaster recovery, you must provide the SSH public key during the installation process. The

./openshift-install gather
command also requires the SSH public key to be in place on the cluster nodes.

Important

Do not skip this procedure in production environments, where disaster recovery and debugging is required.

Note

You must use a local key, not one that you configured with platform-specific approaches such as AWS key pairs.

Procedure

  1. If you do not have an existing SSH key pair on your local machine to use for authentication onto your cluster nodes, create one. For example, on a computer that uses a Linux operating system, run the following command:

    $ ssh-keygen -t ed25519 -N '' -f <path>/<file_name> 
    1
    1
    Specify the path and file name, such as ~/.ssh/id_ed25519, of the new SSH key. If you have an existing key pair, ensure your public key is in the your ~/.ssh directory.
    Note

    If you plan to install an OpenShift Container Platform cluster that uses FIPS validated or Modules In Process cryptographic libraries on the

    x86_64
    architecture, do not create a key that uses the
    ed25519
    algorithm. Instead, create a key that uses the
    rsa
    or
    ecdsa
    algorithm.

  2. View the public SSH key:

    $ cat <path>/<file_name>.pub

    For example, run the following to view the

    ~/.ssh/id_ed25519.pub
    public key:

    $ cat ~/.ssh/id_ed25519.pub
  3. Add the SSH private key identity to the SSH agent for your local user, if it has not already been added. SSH agent management of the key is required for password-less SSH authentication onto your cluster nodes, or if you want to use the

    ./openshift-install gather
    command.

    Note

    On some distributions, default SSH private key identities such as

    ~/.ssh/id_rsa
    and
    ~/.ssh/id_dsa
    are managed automatically.

    1. If the

      ssh-agent
      process is not already running for your local user, start it as a background task:

      $ eval "$(ssh-agent -s)"

      Example output

      Agent pid 31874

      Note

      If your cluster is in FIPS mode, only use FIPS-compliant algorithms to generate the SSH key. The key must be either RSA or ECDSA.

  4. Add your SSH private key to the

    ssh-agent
    :

    $ ssh-add <path>/<file_name> 
    1
    1
    Specify the path and file name for your SSH private key, such as ~/.ssh/id_ed25519

    Example output

    Identity added: /home/<you>/<path>/<file_name> (<computer_name>)

Next steps

  • When you install OpenShift Container Platform, provide the SSH public key to the installation program.

9.5.4. Obtaining the installation program

Before you install OpenShift Container Platform, download the installation file on a local computer.

Prerequisites

  • You have a computer that runs Linux or macOS, with 500 MB of local disk space.

Procedure

  1. Access the Infrastructure Provider page on the OpenShift Cluster Manager site. If you have a Red Hat account, log in with your credentials. If you do not, create an account.
  2. Select your infrastructure provider.
  3. Navigate to the page for your installation type, download the installation program that corresponds with your host operating system and architecture, and place the file in the directory where you will store the installation configuration files.

    Important

    The installation program creates several files on the computer that you use to install your cluster. You must keep the installation program and the files that the installation program creates after you finish installing the cluster. Both files are required to delete the cluster.

    Important

    Deleting the files created by the installation program does not remove your cluster, even if the cluster failed during installation. To remove your cluster, complete the OpenShift Container Platform uninstallation procedures for your specific cloud provider.

  4. Extract the installation program. For example, on a computer that uses a Linux operating system, run the following command:

    $ tar -xvf openshift-install-linux.tar.gz
  5. Download your installation pull secret from the Red Hat OpenShift Cluster Manager. This pull secret allows you to authenticate with the services that are provided by the included authorities, including Quay.io, which serves the container images for OpenShift Container Platform components.

9.5.5. Exporting the IBM Cloud VPC API key

You must set the IBM Cloud VPC API key you created as a global variable; the installation program ingests the variable during startup to set the API key.

Prerequisties

  • You have created either a user API key or service ID API key for your IBM Cloud account.

Procedure

  • Export your IBM Cloud VPC API key as a global variable:

    $ export IC_API_KEY=<api_key>
Important

You must set the variable name exactly as specified; the installation program expects the variable name to be present during startup.

9.5.6. Creating the installation configuration file

You can customize the OpenShift Container Platform cluster you install on IBM Cloud.

Prerequisites

  • Obtain the OpenShift Container Platform installation program and the pull secret for your cluster.
  • Obtain service principal permissions at the subscription level.

Procedure

  1. Create the

    install-config.yaml
    file.

    1. Change to the directory that contains the installation program and run the following command:

      $ ./openshift-install create install-config --dir <installation_directory> 
      1
      1
      For <installation_directory>, specify the directory name to store the files that the installation program creates.

      When specifying the directory:

      • Verify that the directory has the
        execute
        permission. This permission is required to run Terraform binaries under the installation directory.
      • Use an empty directory. Some installation assets, such as bootstrap X.509 certificates, have short expiration intervals, therefore you must not reuse an installation directory. If you want to reuse individual files from another cluster installation, you can copy them into your directory. However, the file names for the installation assets might change between releases. Use caution when copying installation files from an earlier OpenShift Container Platform version.
    2. At the prompts, provide the configuration details for your cloud:

      1. Optional: Select an SSH key to use to access your cluster machines.

        Note

        For production OpenShift Container Platform clusters on which you want to perform installation debugging or disaster recovery, specify an SSH key that your

        ssh-agent
        process uses.

      2. Select ibmcloud as the platform to target.
      3. Select the region to deploy the cluster to.
      4. Select the base domain to deploy the cluster to. The base domain corresponds to the public DNS zone that you created for your cluster.
      5. Enter a descriptive name for your cluster.
      6. Paste the pull secret from the Red Hat OpenShift Cluster Manager.
  2. Modify the
    install-config.yaml
    file. You can find more information about the available parameters in the "Installation configuration parameters" section.
  3. Back up the

    install-config.yaml
    file so that you can use it to install multiple clusters.

    Important

    The

    install-config.yaml
    file is consumed during the installation process. If you want to reuse the file, you must back it up now.

9.5.6.1. Installation configuration parameters

Before you deploy an OpenShift Container Platform cluster, you provide parameter values to describe your account on the cloud platform that hosts your cluster and optionally customize your cluster’s platform. When you create the

install-config.yaml
installation configuration file, you provide values for the required parameters through the command line. If you customize your cluster, you can modify the
install-config.yaml
file to provide more details about the platform.

Note

After installation, you cannot modify these parameters in the

install-config.yaml
file.

9.5.6.1.1. Required configuration parameters

Required installation configuration parameters are described in the following table:

Expand
Table 9.7. Required parameters
ParameterDescriptionValues

apiVersion

The API version for the

install-config.yaml
content. The current version is
v1
. The installer may also support older API versions.

String

baseDomain

The base domain of your cloud provider. The base domain is used to create routes to your OpenShift Container Platform cluster components. The full DNS name for your cluster is a combination of the

baseDomain
and
metadata.name
parameter values that uses the
<metadata.name>.<baseDomain>
format.

A fully-qualified domain or subdomain name, such as

example.com
.

metadata

Kubernetes resource

ObjectMeta
, from which only the
name
parameter is consumed.

Object

metadata.name

The name of the cluster. DNS records for the cluster are all subdomains of

{{.metadata.name}}.{{.baseDomain}}
.

String of lowercase letters, hyphens (

-
), and periods (
.
), such as
dev
.

platform

The configuration for the specific platform upon which to perform the installation:

alibabacloud
,
aws
,
baremetal
,
azure
,
gcp
,
ibmcloud
,
nutanix
,
openstack
,
ovirt
,
vsphere
, or
{}
. For additional information about
platform.<platform>
parameters, consult the table for your specific platform that follows.

Object

pullSecret

Get a pull secret from the Red Hat OpenShift Cluster Manager to authenticate downloading container images for OpenShift Container Platform components from services such as Quay.io.

{
   "auths":{
      "cloud.openshift.com":{
         "auth":"b3Blb=",
         "email":"you@example.com"
      },
      "quay.io":{
         "auth":"b3Blb=",
         "email":"you@example.com"
      }
   }
}
9.5.6.1.2. Network configuration parameters

You can customize your installation configuration based on the requirements of your existing network infrastructure. For example, you can expand the IP address block for the cluster network or provide different IP address blocks than the defaults.

Only IPv4 addresses are supported.

Note

Globalnet is not supported with Red Hat OpenShift Data Foundation disaster recovery solutions. For regional disaster recovery scenarios, ensure that you use a nonoverlapping range of private IP addresses for the cluster and service networks in each cluster.

Expand
Table 9.8. Network parameters
ParameterDescriptionValues

networking

The configuration for the cluster network.

Object

Note

You cannot modify parameters specified by the

networking
object after installation.

networking.networkType

The cluster network provider Container Network Interface (CNI) cluster network provider to install.

Either

OpenShiftSDN
or
OVNKubernetes
.
OpenShiftSDN
is a CNI provider for all-Linux networks.
OVNKubernetes
is a CNI provider for Linux networks and hybrid networks that contain both Linux and Windows servers. The default value is
OpenShiftSDN
.

networking.clusterNetwork

The IP address blocks for pods.

The default value is

10.128.0.0/14
with a host prefix of
/23
.

If you specify multiple IP address blocks, the blocks must not overlap.

An array of objects. For example:

networking:
  clusterNetwork:
  - cidr: 10.128.0.0/14
    hostPrefix: 23

networking.clusterNetwork.cidr

Required if you use

networking.clusterNetwork
. An IP address block.

An IPv4 network.

An IP address block in Classless Inter-Domain Routing (CIDR) notation. The prefix length for an IPv4 block is between

0
and
32
.

networking.clusterNetwork.hostPrefix

The subnet prefix length to assign to each individual node. For example, if

hostPrefix
is set to
23
then each node is assigned a
/23
subnet out of the given
cidr
. A
hostPrefix
value of
23
provides 510 (2^(32 - 23) - 2) pod IP addresses.

A subnet prefix.

The default value is

23
.

networking.serviceNetwork

The IP address block for services. The default value is

172.30.0.0/16
.

The OpenShift SDN and OVN-Kubernetes network providers support only a single IP address block for the service network.

An array with an IP address block in CIDR format. For example:

networking:
  serviceNetwork:
   - 172.30.0.0/16

networking.machineNetwork

The IP address blocks for machines.

If you specify multiple IP address blocks, the blocks must not overlap.

An array of objects. For example:

networking:
  machineNetwork:
  - cidr: 10.0.0.0/16

networking.machineNetwork.cidr

Required if you use

networking.machineNetwork
. An IP address block. The default value is
10.0.0.0/16
for all platforms other than libvirt. For libvirt, the default value is
192.168.126.0/24
.

An IP network block in CIDR notation.

For example,

10.0.0.0/16
.

Note

Set the

networking.machineNetwork
to match the CIDR that the preferred NIC resides in.

9.5.6.1.3. Optional configuration parameters

Optional installation configuration parameters are described in the following table:

Expand
Table 9.9. Optional parameters
ParameterDescriptionValues

additionalTrustBundle

A PEM-encoded X.509 certificate bundle that is added to the nodes' trusted certificate store. This trust bundle may also be used when a proxy has been configured.

String

capabilities

Controls the installation of optional core cluster components. You can reduce the footprint of your OpenShift Container Platform cluster by disabling optional components.

String array

capabilities.baselineCapabilitySet

Selects an initial set of optional capabilities to enable. Valid values are

None
,
v4.11
and
vCurrent
.
v4.11
enables the
baremetal
Operator, the
marketplace
Operator, and the
openshift-samples
content.
vCurrent
installs the recommended set of capabilities for the current version of OpenShift Container Platform. The default value is
vCurrent
.

String

capabilities.additionalEnabledCapabilities

Extends the set of optional capabilities beyond what you specify in

baselineCapabilitySet
. Valid values are
baremetal
,
marketplace
and
openshift-samples
. You may specify multiple capabilities in this parameter.

String array

cgroupsV2

Enables Linux control groups version 2 (cgroups v2) on specific nodes in your cluster. The OpenShift Container Platform process for enabling cgroups v2 disables all cgroup version 1 controllers and hierarchies. The OpenShift Container Platform cgroups version 2 feature is in Developer Preview and is not supported by Red Hat at this time.

true

compute

The configuration for the machines that comprise the compute nodes.

Array of

MachinePool
objects.

compute.architecture

Determines the instruction set architecture of the machines in the pool. Currently, clusters with varied architectures are not supported. All pools must specify the same architecture. Valid values are

amd64
(the default).

String

compute.hyperthreading

Whether to enable or disable simultaneous multithreading, or

hyperthreading
, on compute machines. By default, simultaneous multithreading is enabled to increase the performance of your machines' cores.

Important

If you disable simultaneous multithreading, ensure that your capacity planning accounts for the dramatically decreased machine performance.

Enabled
or
Disabled

compute.name

Required if you use

compute
. The name of the machine pool.

worker

compute.platform

Required if you use

compute
. Use this parameter to specify the cloud provider to host the worker machines. This parameter value must match the
controlPlane.platform
parameter value.

alibabacloud
,
aws
,
azure
,
gcp
,
ibmcloud
,
nutanix
,
openstack
,
ovirt
,
vsphere
, or
{}

compute.replicas

The number of compute machines, which are also known as worker machines, to provision.

A positive integer greater than or equal to

2
. The default value is
3
.

controlPlane

The configuration for the machines that comprise the control plane.

Array of

MachinePool
objects.

controlPlane.architecture

Determines the instruction set architecture of the machines in the pool. Currently, clusters with varied architectures are not supported. All pools must specify the same architecture. Valid values are

amd64
(the default).

String

controlPlane.hyperthreading

Whether to enable or disable simultaneous multithreading, or

hyperthreading
, on control plane machines. By default, simultaneous multithreading is enabled to increase the performance of your machines' cores.

Important

If you disable simultaneous multithreading, ensure that your capacity planning accounts for the dramatically decreased machine performance.

Enabled
or
Disabled

controlPlane.name

Required if you use

controlPlane
. The name of the machine pool.

master

controlPlane.platform

Required if you use

controlPlane
. Use this parameter to specify the cloud provider that hosts the control plane machines. This parameter value must match the
compute.platform
parameter value.

alibabacloud
,
aws
,
azure
,
gcp
,
ibmcloud
,
nutanix
,
openstack
,
ovirt
,
vsphere
, or
{}

controlPlane.replicas

The number of control plane machines to provision.

The only supported value is

3
, which is the default value.

credentialsMode

The Cloud Credential Operator (CCO) mode. If no mode is specified, the CCO dynamically tries to determine the capabilities of the provided credentials, with a preference for mint mode on the platforms where multiple modes are supported.

Note

Not all CCO modes are supported for all cloud providers. For more information on CCO modes, see the Cloud Credential Operator entry in the Cluster Operators reference content.

Note

If your AWS account has service control policies (SCP) enabled, you must configure the

credentialsMode
parameter to
Mint
,
Passthrough
or
Manual
.

Mint
,
Passthrough
,
Manual
or an empty string (
""
).

fips

Enable or disable FIPS mode. The default is

false
(disabled). If FIPS mode is enabled, the Red Hat Enterprise Linux CoreOS (RHCOS) machines that OpenShift Container Platform runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with RHCOS instead.

Important

To enable FIPS mode for your cluster, you must run the installation program from a Red Hat Enterprise Linux (RHEL) computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see Installing the system in FIPS mode. The use of FIPS validated or Modules In Process cryptographic libraries is only supported on OpenShift Container Platform deployments on the

x86_64
architecture.

Note

If you are using Azure File storage, you cannot enable FIPS mode.

false
or
true

imageContentSources

Sources and repositories for the release-image content.

Array of objects. Includes a

source
and, optionally,
mirrors
, as described in the following rows of this table.

imageContentSources.source

Required if you use

imageContentSources
. Specify the repository that users refer to, for example, in image pull specifications.

String

imageContentSources.mirrors

Specify one or more repositories that may also contain the same images.

Array of strings

publish

How to publish or expose the user-facing endpoints of your cluster, such as the Kubernetes API, OpenShift routes.

Internal
or
External
. To deploy a private cluster, which cannot be accessed from the internet, set
publish
to
Internal
. The default value is
External
.

sshKey

The SSH key to authenticate access to your cluster machines.

Note

For production OpenShift Container Platform clusters on which you want to perform installation debugging or disaster recovery, specify an SSH key that your

ssh-agent
process uses.

For example,

sshKey: ssh-ed25519 AAAA..
.

9.5.6.1.4. Additional IBM Cloud VPC configuration parameters

Additional IBM Cloud VPC configuration parameters are described in the following table:

Expand
Table 9.10. Additional IBM Cloud VPC parameters
ParameterDescriptionValues

platform.ibmcloud.resourceGroupName

The name of an existing resource group to install your cluster to. This resource group must only be used for this specific cluster because the cluster components assume ownership of all of the resources in the resource group. If undefined, a new resource group is created for the cluster. [1]

String, for example

existing_resource_group
.

platform.ibmcloud.dedicatedHosts.profile

The new dedicated host to create. If you specify a value for

platform.ibmcloud.dedicatedHosts.name
, this parameter is not required.

Valid IBM Cloud VPC dedicated host profile, such as

cx2-host-152x304
. [2]

platform.ibmcloud.dedicatedHosts.name

An existing dedicated host. If you specify a value for

platform.ibmcloud.dedicatedHosts.profile
, this parameter is not required.

String, for example

my-dedicated-host-name
.

platform.ibmcloud.type

The instance type for all IBM Cloud VPC machines.

Valid IBM Cloud VPC instance type, such as

bx2-8x32
. [2]

  1. Whether you define an existing resource group, or if the installer creates one, determines how the resource group is treated when the cluster is uninstalled. If you define a resource group, the installer removes all of the installer-provisioned resources, but leaves the resource group alone; if a resource group is created as part of the installation, the installer removes all of the installer provisioned resources and the resource group.
  2. To determine which profile best meets your needs, see Instance Profiles in the IBM documentation.

9.5.6.2. Sample customized install-config.yaml file for IBM Cloud VPC

You can customize the

install-config.yaml
file to specify more details about your OpenShift Container Platform cluster’s platform or modify the values of the required parameters.

Important

This sample YAML file is provided for reference only. You must obtain your

install-config.yaml
file by using the installation program and modify it.

apiVersion: v1
baseDomain: example.com 
1

controlPlane: 
2
 
3

  hyperthreading: Enabled 
4

  name: master
  platform:
    ibmcloud: {}
  replicas: 3
compute: 
5
 
6

- hyperthreading: Enabled 
7

  name: worker
  platform:
    ibmcloud: {}
  replicas: 3
metadata:
  name: test-cluster 
8

networking:
networking: 
9

  clusterNetwork:
  - cidr: 10.128.0.0/14
    hostPrefix: 23
  machineNetwork:
  - cidr: 10.0.0.0/16
  networkType: OpenShiftSDN
  serviceNetwork:
  - 172.30.0.0/16
platform:
  ibmcloud:
    region: us-south 
10

credentialsMode: Manual
publish: External
pullSecret: '{"auths": ...}' 
11

fips: false 
12

sshKey: ssh-ed25519 AAAA... 
13
1 8 10 11
Required. The installation program prompts you for this value.
2 5 9
If you do not provide these parameters and values, the installation program provides the default value.
3 6
The controlPlane section is a single mapping, but the compute section is a sequence of mappings. To meet the requirements of the different data structures, the first line of the compute section must begin with a hyphen, -, and the first line of the controlPlane section must not. Only one control plane pool is used.
4 7
Whether to enable or disable simultaneous multithreading, or hyperthreading. By default, simultaneous multithreading is enabled to increase the performance of your machines' cores. You can disable it by setting the parameter value to Disabled. If you disable simultaneous multithreading in some cluster machines, you must disable it in all cluster machines.
Important

If you disable simultaneous multithreading, ensure that your capacity planning accounts for the dramatically decreased machine performance. Use larger machine types, such as

n1-standard-8
, for your machines if you disable simultaneous multithreading.

12
Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the Red Hat Enterprise Linux CoreOS (RHCOS) machines that OpenShift Container Platform runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with RHCOS instead.
Important

To enable FIPS mode for your cluster, you must run the installation program from a Red Hat Enterprise Linux (RHEL) computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see Installing the system in FIPS mode. The use of FIPS Validated or Modules in Process cryptographic libraries is only supported on OpenShift Container Platform deployments on the

x86_64
architecture.

13
You can optionally provide the sshKey value that you use to access the machines in your cluster.
Note

For production OpenShift Container Platform clusters on which you want to perform installation debugging or disaster recovery, specify an SSH key that your

ssh-agent
process uses.

9.5.6.3. Configuring the cluster-wide proxy during installation

Production environments can deny direct access to the internet and instead have an HTTP or HTTPS proxy available. You can configure a new OpenShift Container Platform cluster to use a proxy by configuring the proxy settings in the

install-config.yaml
file.

Prerequisites

  • You have an existing
    install-config.yaml
    file.
  • You reviewed the sites that your cluster requires access to and determined whether any of them need to bypass the proxy. By default, all cluster egress traffic is proxied, including calls to hosting cloud provider APIs. You added sites to the

    Proxy
    object’s
    spec.noProxy
    field to bypass the proxy if necessary.

    Note

    The

    Proxy
    object
    status.noProxy
    field is populated with the values of the
    networking.machineNetwork[].cidr
    ,
    networking.clusterNetwork[].cidr
    , and
    networking.serviceNetwork[]
    fields from your installation configuration.

    For installations on Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, and Red Hat OpenStack Platform (RHOSP), the

    Proxy
    object
    status.noProxy
    field is also populated with the instance metadata endpoint (
    169.254.169.254
    ).

Procedure

  1. Edit your

    install-config.yaml
    file and add the proxy settings. For example:

    apiVersion: v1
    baseDomain: my.domain.com
    proxy:
      httpProxy: http://<username>:<pswd>@<ip>:<port> 
    1
    
      httpsProxy: https://<username>:<pswd>@<ip>:<port> 
    2
    
      noProxy: example.com 
    3
    
    additionalTrustBundle: | 
    4
    
        -----BEGIN CERTIFICATE-----
        <MY_TRUSTED_CA_CERT>
        -----END CERTIFICATE-----
    1
    A proxy URL to use for creating HTTP connections outside the cluster. The URL scheme must be http.
    2
    A proxy URL to use for creating HTTPS connections outside the cluster.
    3
    A comma-separated list of destination domain names, IP addresses, or other network CIDRs to exclude from proxying. Preface a domain with . to match subdomains only. For example, .y.com matches x.y.com, but not y.com. Use * to bypass the proxy for all destinations.
    4
    If provided, the installation program generates a config map that is named user-ca-bundle in the openshift-config namespace that contains one or more additional CA certificates that are required for proxying HTTPS connections. The Cluster Network Operator then creates a trusted-ca-bundle config map that merges these contents with the Red Hat Enterprise Linux CoreOS (RHCOS) trust bundle, and this config map is referenced in the trustedCA field of the Proxy object. The additionalTrustBundle field is required unless the proxy’s identity certificate is signed by an authority from the RHCOS trust bundle.
    Note

    The installation program does not support the proxy

    readinessEndpoints
    field.

    Note

    If the installer times out, restart and then complete the deployment by using the

    wait-for
    command of the installer. For example:

    $ ./openshift-install wait-for install-complete --log-level debug
  2. Save the file and reference it when installing OpenShift Container Platform.

The installation program creates a cluster-wide proxy that is named

cluster
that uses the proxy settings in the provided
install-config.yaml
file. If no proxy settings are provided, a
cluster
Proxy
object is still created, but it will have a nil
spec
.

Note

Only the

Proxy
object named
cluster
is supported, and no additional proxies can be created.

9.5.7. Manually creating IAM for IBM Cloud VPC

Installing the cluster requires that the Cloud Credential Operator (CCO) operate in manual mode. While the installation program configures the CCO for manual mode, you must specify the identity and access management secrets for you cloud provider.

You can use the Cloud Credential Operator (CCO) utility (

ccoctl
) to create the required IBM Cloud VPC resources.

Prerequisites

  • You have configured the
    ccoctl
    binary.
  • You have an existing
    install-config.yaml
    file.

Procedure

  1. Edit the

    install-config.yaml
    configuration file so that it contains the
    credentialsMode
    parameter set to
    Manual
    .

    Example install-config.yaml configuration file

    apiVersion: v1
    baseDomain: cluster1.example.com
    credentialsMode: Manual 
    1
    
    compute:
    - architecture: amd64
      hyperthreading: Enabled
    ...

    1
    This line is added to set the credentialsMode parameter to Manual.
  2. To generate the manifests, run the following command from the directory that contains the installation program:

    $ openshift-install create manifests --dir <installation_directory>
  3. From the directory that contains the installation program, obtain the OpenShift Container Platform release image that your

    openshift-install
    binary is built to use:

    $ RELEASE_IMAGE=$(./openshift-install version | awk '/release image/ {print $3}')
  4. Extract the

    CredentialsRequest
    objects from the OpenShift Container Platform release image:

    $ oc adm release extract --cloud=ibmcloud --credentials-requests $RELEASE_IMAGE \
        --to=<path_to_credential_requests_directory> 
    1
    1
    The directory where the credential requests will be stored.

    This command creates a YAML file for each

    CredentialsRequest
    object.

    Sample CredentialsRequest object

      apiVersion: cloudcredential.openshift.io/v1
      kind: CredentialsRequest
      metadata:
        labels:
          controller-tools.k8s.io: "1.0"
        name: openshift-image-registry-ibmcos
        namespace: openshift-cloud-credential-operator
      spec:
        secretRef:
          name: installer-cloud-credentials
          namespace: openshift-image-registry
        providerSpec:
          apiVersion: cloudcredential.openshift.io/v1
          kind: IBMCloudProviderSpec
          policies:
          - attributes:
            - name: serviceName
              value: cloud-object-storage
            roles:
            - crn:v1:bluemix:public:iam::::role:Viewer
            - crn:v1:bluemix:public:iam::::role:Operator
            - crn:v1:bluemix:public:iam::::role:Editor
            - crn:v1:bluemix:public:iam::::serviceRole:Reader
            - crn:v1:bluemix:public:iam::::serviceRole:Writer
          - attributes:
            - name: resourceType
              value: resource-group
            roles:
            - crn:v1:bluemix:public:iam::::role:Viewer

  5. Create the service ID for each credential request, assign the policies defined, create an API key in IBM Cloud VPC, and generate the secret:

    $ ccoctl ibmcloud create-service-id \
        --credentials-requests-dir <path_to_store_credential_request_templates> \ 
    1
    
        --name <cluster_name> \ 
    2
    
        --output-dir <installation_directory> \
        --resource-group-name <resource_group_name> 
    3
    1
    The directory where the credential requests are stored.
    2
    The name of the OpenShift Container Platform cluster.
    3
    Optional: The name of the resource group used for scoping the access policies.
    Note

    If your cluster uses Technology Preview features that are enabled by the

    TechPreviewNoUpgrade
    feature set, you must include the
    --enable-tech-preview
    parameter.

    If an incorrect resource group name is provided, the installation fails during the bootstrap phase. To find the correct resource group name, run the following command:

    $ grep resourceGroupName <installation_directory>/manifests/cluster-infrastructure-02-config.yml

Verification

  • Ensure that the appropriate secrets were generated in your cluster’s
    manifests
    directory.

9.5.8. Network configuration phases

There are two phases prior to OpenShift Container Platform installation where you can customize the network configuration.

Phase 1

You can customize the following network-related fields in the

install-config.yaml
file before you create the manifest files:

  • networking.networkType
  • networking.clusterNetwork
  • networking.serviceNetwork
  • networking.machineNetwork

    For more information on these fields, refer to Installation configuration parameters.

    Note

    Set the

    networking.machineNetwork
    to match the CIDR that the preferred NIC resides in.

    Important

    The CIDR range

    172.17.0.0/16
    is reserved by libVirt. You cannot use this range or any range that overlaps with this range for any networks in your cluster.

Phase 2
After creating the manifest files by running openshift-install create manifests, you can define a customized Cluster Network Operator manifest with only the fields you want to modify. You can use the manifest to specify advanced network configuration.

You cannot override the values specified in phase 1 in the

install-config.yaml
file during phase 2. However, you can further customize the cluster network provider during phase 2.

9.5.9. Specifying advanced network configuration

You can use advanced network configuration for your cluster network provider to integrate your cluster into your existing network environment. You can specify advanced network configuration only before you install the cluster.

Important

Customizing your network configuration by modifying the OpenShift Container Platform manifest files created by the installation program is not supported. Applying a manifest file that you create, as in the following procedure, is supported.

Prerequisites

  • You have created the
    install-config.yaml
    file and completed any modifications to it.

Procedure

  1. Change to the directory that contains the installation program and create the manifests:

    $ ./openshift-install create manifests --dir <installation_directory> 
    1
    1
    <installation_directory> specifies the name of the directory that contains the install-config.yaml file for your cluster.
  2. Create a stub manifest file for the advanced network configuration that is named

    cluster-network-03-config.yml
    in the
    <installation_directory>/manifests/
    directory:

    apiVersion: operator.openshift.io/v1
    kind: Network
    metadata:
      name: cluster
    spec:
  3. Specify the advanced network configuration for your cluster in the

    cluster-network-03-config.yml
    file, such as in the following example:

    Specify a different VXLAN port for the OpenShift SDN network provider

    apiVersion: operator.openshift.io/v1
    kind: Network
    metadata:
      name: cluster
    spec:
      defaultNetwork:
        openshiftSDNConfig:
          vxlanPort: 4800

  4. Optional: Back up the
    manifests/cluster-network-03-config.yml
    file. The installation program consumes the
    manifests/
    directory when you create the Ignition config files.

9.5.10. Cluster Network Operator configuration

The configuration for the cluster network is specified as part of the Cluster Network Operator (CNO) configuration and stored in a custom resource (CR) object that is named

cluster
. The CR specifies the fields for the
Network
API in the
operator.openshift.io
API group.

The CNO configuration inherits the following fields during cluster installation from the

Network
API in the
Network.config.openshift.io
API group and these fields cannot be changed:

clusterNetwork
IP address pools from which pod IP addresses are allocated.
serviceNetwork
IP address pool for services.
defaultNetwork.type
Cluster network provider, such as OpenShift SDN or OVN-Kubernetes.

You can specify the cluster network provider configuration for your cluster by setting the fields for the

defaultNetwork
object in the CNO object named
cluster
.

9.5.10.1. Cluster Network Operator configuration object

The fields for the Cluster Network Operator (CNO) are described in the following table:

Expand
Table 9.11. Cluster Network Operator configuration object
FieldTypeDescription

metadata.name

string

The name of the CNO object. This name is always

cluster
.

spec.clusterNetwork

array

A list specifying the blocks of IP addresses from which pod IP addresses are allocated and the subnet prefix length assigned to each individual node in the cluster. For example:

spec:
  clusterNetwork:
  - cidr: 10.128.0.0/19
    hostPrefix: 23
  - cidr: 10.128.32.0/19
    hostPrefix: 23

You can customize this field only in the

install-config.yaml
file before you create the manifests. The value is read-only in the manifest file.

spec.serviceNetwork

array

A block of IP addresses for services. The OpenShift SDN and OVN-Kubernetes Container Network Interface (CNI) network providers support only a single IP address block for the service network. For example:

spec:
  serviceNetwork:
  - 172.30.0.0/14

You can customize this field only in the

install-config.yaml
file before you create the manifests. The value is read-only in the manifest file.

spec.defaultNetwork

object

Configures the Container Network Interface (CNI) cluster network provider for the cluster network.

spec.kubeProxyConfig

object

The fields for this object specify the kube-proxy configuration. If you are using the OVN-Kubernetes cluster network provider, the kube-proxy configuration has no effect.

defaultNetwork object configuration

The values for the

defaultNetwork
object are defined in the following table:

Expand
Table 9.12. defaultNetwork object
FieldTypeDescription

type

string

Either

OpenShiftSDN
or
OVNKubernetes
. The cluster network provider is selected during installation. This value cannot be changed after cluster installation.

Note

OpenShift Container Platform uses the OpenShift SDN Container Network Interface (CNI) cluster network provider by default.

openshiftSDNConfig

object

This object is only valid for the OpenShift SDN cluster network provider.

ovnKubernetesConfig

object

This object is only valid for the OVN-Kubernetes cluster network provider.

Configuration for the OpenShift SDN CNI cluster network provider

The following table describes the configuration fields for the OpenShift SDN Container Network Interface (CNI) cluster network provider.

Expand
Table 9.13. openshiftSDNConfig object
FieldTypeDescription

mode

string

Configures the network isolation mode for OpenShift SDN. The default value is

NetworkPolicy
.

The values

Multitenant
and
Subnet
are available for backwards compatibility with OpenShift Container Platform 3.x but are not recommended. This value cannot be changed after cluster installation.

mtu

integer

The maximum transmission unit (MTU) for the VXLAN overlay network. This is detected automatically based on the MTU of the primary network interface. You do not normally need to override the detected MTU.

If the auto-detected value is not what you expect it to be, confirm that the MTU on the primary network interface on your nodes is correct. You cannot use this option to change the MTU value of the primary network interface on the nodes.

If your cluster requires different MTU values for different nodes, you must set this value to

50
less than the lowest MTU value in your cluster. For example, if some nodes in your cluster have an MTU of
9001
, and some have an MTU of
1500
, you must set this value to
1450
.

This value cannot be changed after cluster installation.

vxlanPort

integer

The port to use for all VXLAN packets. The default value is

4789
. This value cannot be changed after cluster installation.

If you are running in a virtualized environment with existing nodes that are part of another VXLAN network, then you might be required to change this. For example, when running an OpenShift SDN overlay on top of VMware NSX-T, you must select an alternate port for the VXLAN, because both SDNs use the same default VXLAN port number.

On Amazon Web Services (AWS), you can select an alternate port for the VXLAN between port

9000
and port
9999
.

Example OpenShift SDN configuration

defaultNetwork:
  type: OpenShiftSDN
  openshiftSDNConfig:
    mode: NetworkPolicy
    mtu: 1450
    vxlanPort: 4789

Configuration for the OVN-Kubernetes CNI cluster network provider

The following table describes the configuration fields for the OVN-Kubernetes CNI cluster network provider.

Expand
Table 9.14. ovnKubernetesConfig object
FieldTypeDescription

mtu

integer

The maximum transmission unit (MTU) for the Geneve (Generic Network Virtualization Encapsulation) overlay network. This is detected automatically based on the MTU of the primary network interface. You do not normally need to override the detected MTU.

If the auto-detected value is not what you expect it to be, confirm that the MTU on the primary network interface on your nodes is correct. You cannot use this option to change the MTU value of the primary network interface on the nodes.

If your cluster requires different MTU values for different nodes, you must set this value to

100
less than the lowest MTU value in your cluster. For example, if some nodes in your cluster have an MTU of
9001
, and some have an MTU of
1500
, you must set this value to
1400
.

genevePort

integer

The port to use for all Geneve packets. The default value is

6081
. This value cannot be changed after cluster installation.

policyAuditConfig

object

Specify a configuration object for customizing network policy audit logging. If unset, the defaults audit log settings are used.

gatewayConfig

object

Optional: Specify a configuration object for customizing how egress traffic is sent to the node gateway.

Note

While migrating egress traffic, you can expect some disruption to workloads and service traffic until the Cluster Network Operator (CNO) successfully rolls out the changes.

Note

IPsec for the OVN-Kubernetes network provider is not supported when installing a cluster on IBM Cloud.

Expand
Table 9.15. policyAuditConfig object
FieldTypeDescription

rateLimit

integer

The maximum number of messages to generate every second per node. The default value is

20
messages per second.

maxFileSize

integer

The maximum size for the audit log in bytes. The default value is

50000000
or 50 MB.

destination

string

One of the following additional audit log targets:

libc
The libc syslog() function of the journald process on the host.
udp:<host>:<port>
A syslog server. Replace <host>:<port> with the host and port of the syslog server.
unix:<file>
A Unix Domain Socket file specified by <file>.
null
Do not send the audit logs to any additional target.

syslogFacility

string

The syslog facility, such as

kern
, as defined by RFC5424. The default value is
local0
.

Expand
Table 9.16. gatewayConfig object
FieldTypeDescription

routingViaHost

boolean

Set this field to

true
to send egress traffic from pods to the host networking stack. For highly-specialized installations and applications that rely on manually configured routes in the kernel routing table, you might want to route egress traffic to the host networking stack. By default, egress traffic is processed in OVN to exit the cluster and is not affected by specialized routes in the kernel routing table. The default value is
false
.

This field has an interaction with the Open vSwitch hardware offloading feature. If you set this field to

true
, you do not receive the performance benefits of the offloading because egress traffic is processed by the host networking stack.

Example OVN-Kubernetes configuration with IPSec enabled

defaultNetwork:
  type: OVNKubernetes
  ovnKubernetesConfig:
    mtu: 1400
    genevePort: 6081

kubeProxyConfig object configuration

The values for the

kubeProxyConfig
object are defined in the following table:

Expand
Table 9.17. kubeProxyConfig object
FieldTypeDescription

iptablesSyncPeriod

string

The refresh period for

iptables
rules. The default value is
30s
. Valid suffixes include
s
,
m
, and
h
and are described in the Go time package documentation.

Note

Because of performance improvements introduced in OpenShift Container Platform 4.3 and greater, adjusting the

iptablesSyncPeriod
parameter is no longer necessary.

proxyArguments.iptables-min-sync-period

array

The minimum duration before refreshing

iptables
rules. This field ensures that the refresh does not happen too frequently. Valid suffixes include
s
,
m
, and
h
and are described in the Go time package. The default value is:

kubeProxyConfig:
  proxyArguments:
    iptables-min-sync-period:
    - 0s

9.5.11. Deploying the cluster

You can install OpenShift Container Platform on a compatible cloud platform.

Important

You can run the

create cluster
command of the installation program only once, during initial installation.

Prerequisites

  • Configure an account with the cloud platform that hosts your cluster.
  • Obtain the OpenShift Container Platform installation program and the pull secret for your cluster.

Procedure

  • Change to the directory that contains the installation program and initialize the cluster deployment:

    $ ./openshift-install create cluster --dir <installation_directory> \ 
    1
    
        --log-level=info 
    2
    1
    For <installation_directory>, specify the location of your customized ./install-config.yaml file.
    2
    To view different installation details, specify warn, debug, or error instead of info.
    Note

    If the cloud provider account that you configured on your host does not have sufficient permissions to deploy the cluster, the installation process stops, and the missing permissions are displayed.

Verification

When the cluster deployment completes successfully:

  • The terminal displays directions for accessing your cluster, including a link to the web console and credentials for the
    kubeadmin
    user.
  • Credential information also outputs to
    <installation_directory>/.openshift_install.log
    .
Important

Do not delete the installation program or the files that the installation program creates. Both are required to delete the cluster.

Example output

...
INFO Install complete!
INFO To access the cluster as the system:admin user when using 'oc', run 'export KUBECONFIG=/home/myuser/install_dir/auth/kubeconfig'
INFO Access the OpenShift web-console here: https://console-openshift-console.apps.mycluster.example.com
INFO Login to the console with user: "kubeadmin", and password: "password"
INFO Time elapsed: 36m22s

Important
  • The Ignition config files that the installation program generates contain certificates that expire after 24 hours, which are then renewed at that time. If the cluster is shut down before renewing the certificates and the cluster is later restarted after the 24 hours have elapsed, the cluster automatically recovers the expired certificates. The exception is that you must manually approve the pending
    node-bootstrapper
    certificate signing requests (CSRs) to recover kubelet certificates. See the documentation for Recovering from expired control plane certificates for more information.
  • It is recommended that you use Ignition config files within 12 hours after they are generated because the 24-hour certificate rotates from 16 to 22 hours after the cluster is installed. By using the Ignition config files within 12 hours, you can avoid installation failure if the certificate update runs during installation.

9.5.12. Installing the OpenShift CLI by downloading the binary

You can install the OpenShift CLI (

oc
) to interact with OpenShift Container Platform from a command-line interface. You can install
oc
on Linux, Windows, or macOS.

Important

If you installed an earlier version of

oc
, you cannot use it to complete all of the commands in OpenShift Container Platform 4.11. Download and install the new version of
oc
.

Installing the OpenShift CLI on Linux

You can install the OpenShift CLI (

oc
) binary on Linux by using the following procedure.

Procedure

  1. Navigate to the OpenShift Container Platform downloads page on the Red Hat Customer Portal.
  2. Select the architecture in the Product Variant drop-down menu.
  3. Select the appropriate version in the Version drop-down menu.
  4. Click Download Now next to the OpenShift v4.11 Linux Client entry and save the file.
  5. Unpack the archive:

    $ tar xvf <file>
  6. Place the

    oc
    binary in a directory that is on your
    PATH
    .

    To check your

    PATH
    , execute the following command:

    $ echo $PATH

Verification

  • After you install the OpenShift CLI, it is available using the

    oc
    command:

    $ oc <command>
Installing the OpenShift CLI on Windows

You can install the OpenShift CLI (

oc
) binary on Windows by using the following procedure.

Procedure

  1. Navigate to the OpenShift Container Platform downloads page on the Red Hat Customer Portal.
  2. Select the appropriate version in the Version drop-down menu.
  3. Click Download Now next to the OpenShift v4.11 Windows Client entry and save the file.
  4. Unzip the archive with a ZIP program.
  5. Move the

    oc
    binary to a directory that is on your
    PATH
    .

    To check your

    PATH
    , open the command prompt and execute the following command:

    C:\> path

Verification

  • After you install the OpenShift CLI, it is available using the

    oc
    command:

    C:\> oc <command>
Installing the OpenShift CLI on macOS

You can install the OpenShift CLI (

oc
) binary on macOS by using the following procedure.

Procedure

  1. Navigate to the OpenShift Container Platform downloads page on the Red Hat Customer Portal.
  2. Select the appropriate version in the Version drop-down menu.
  3. Click Download Now next to the OpenShift v4.11 macOS Client entry and save the file.

    Note

    For macOS arm64, choose the OpenShift v4.11 macOS arm64 Client entry.

  4. Unpack and unzip the archive.
  5. Move the

    oc
    binary to a directory on your PATH.

    To check your

    PATH
    , open a terminal and execute the following command:

    $ echo $PATH

Verification

  • After you install the OpenShift CLI, it is available using the

    oc
    command:

    $ oc <command>

9.5.13. Logging in to the cluster by using the CLI

You can log in to your cluster as a default system user by exporting the cluster

kubeconfig
file. The
kubeconfig
file contains information about the cluster that is used by the CLI to connect a client to the correct cluster and API server. The file is specific to a cluster and is created during OpenShift Container Platform installation.

Prerequisites

  • You deployed an OpenShift Container Platform cluster.
  • You installed the
    oc
    CLI.

Procedure

  1. Export the

    kubeadmin
    credentials:

    $ export KUBECONFIG=<installation_directory>/auth/kubeconfig 
    1
    1
    For <installation_directory>, specify the path to the directory that you stored the installation files in.
  2. Verify you can run

    oc
    commands successfully using the exported configuration:

    $ oc whoami

    Example output

    system:admin

9.5.14. Telemetry access for OpenShift Container Platform

In OpenShift Container Platform 4.11, the Telemetry service, which runs by default to provide metrics about cluster health and the success of updates, requires internet access. If your cluster is connected to the internet, Telemetry runs automatically, and your cluster is registered to OpenShift Cluster Manager Hybrid Cloud Console.

After you confirm that your OpenShift Cluster Manager Hybrid Cloud Console inventory is correct, either maintained automatically by Telemetry or manually by using OpenShift Cluster Manager, use subscription watch to track your OpenShift Container Platform subscriptions at the account or multi-cluster level.

9.5.15. Next steps

9.6. Uninstalling a cluster on IBM Cloud VPC

You can remove a cluster that you deployed to IBM Cloud VPC.

9.6.1. Removing a cluster that uses installer-provisioned infrastructure

You can remove a cluster that uses installer-provisioned infrastructure from your cloud.

Note

After uninstallation, check your cloud provider for any resources not removed properly, especially with User Provisioned Infrastructure (UPI) clusters. There might be resources that the installer did not create or that the installer is unable to access.

Prerequisites

  • You have a copy of the installation program that you used to deploy the cluster.
  • You have the files that the installation program generated when you created your cluster.
  • You have configured the
    ccoctl
    binary.
  • You have installed the IBM Cloud CLI and installed or updated the VPC infrastructure service plugin. For more information see "Prerequisites" in the IBM Cloud VPC CLI documentation.

Procedure

  1. If the following conditions are met, this step is required:

    • The installer created a resource group as part of the installation process.
    • You or one of your applications created persistent volume claims (PVCs) after the cluster was deployed.

    In which case, the PVCs are not removed when uninstalling the cluster, which might prevent the resource group from being successfully removed. To prevent a failure:

    1. Log in to the IBM Cloud using the CLI.
    2. To list the PVCs, run the following command:

      $ ibmcloud is volumes --resource-group-name <infrastructure_id>

      For more information about listing volumes, see the IBM Cloud VPC CLI documentation.

    3. To delete the PVCs, run the following command:

      $ ibmcloud is volume-delete --force <volume_id>

      For more information about deleting volumes, see the IBM Cloud VPC CLI documentation.

  2. Export the IBM Cloud API key that was created as part of the installation process.

    $ export IC_API_KEY=<api_key>
    Note

    You must set the variable name exactly as specified. The installation program expects the variable name to be present to remove the service IDs that were created when the cluster was installed.

  3. On the computer that you used to install the cluster, go to the directory that contains the installation program, and run the following command:

    $ ./openshift-install destroy cluster \
    --dir <installation_directory> --log-level info 
    1
     
    2
    1
    For <installation_directory>, specify the path to the directory that you stored the installation files in.
    2
    To view different details, specify warn, debug, or error instead of info.
    Note

    You must specify the directory that contains the cluster definition files for your cluster. The installation program requires the

    metadata.json
    file in this directory to delete the cluster.

  4. Remove the manual CCO credentials that were created for the cluster:

    $ ccoctl ibmcloud delete-service-id \
        --credentials-requests-dir <path_to_credential_requests_directory> \
        --name <cluster_name>
    Note

    If your cluster uses Technology Preview features that are enabled by the

    TechPreviewNoUpgrade
    feature set, you must include the
    --enable-tech-preview
    parameter.

  5. Optional: Delete the
    <installation_directory>
    directory and the OpenShift Container Platform installation program.
Red Hat logoGithubredditYoutubeTwitter

Formazione

Prova, acquista e vendi

Community

Informazioni sulla documentazione di Red Hat

Aiutiamo gli utenti Red Hat a innovarsi e raggiungere i propri obiettivi con i nostri prodotti e servizi grazie a contenuti di cui possono fidarsi. Esplora i nostri ultimi aggiornamenti.

Rendiamo l’open source più inclusivo

Red Hat si impegna a sostituire il linguaggio problematico nel codice, nella documentazione e nelle proprietà web. Per maggiori dettagli, visita il Blog di Red Hat.

Informazioni su Red Hat

Forniamo soluzioni consolidate che rendono più semplice per le aziende lavorare su piattaforme e ambienti diversi, dal datacenter centrale all'edge della rete.

Theme

© 2026 Red Hat
Torna in cima