Questo contenuto non è disponibile nella lingua selezionata.
Red Hat OpenStack Platform Hardware Bare Metal Certification Policy Guide
For Use with Red Hat OpenStack Platform 17
Abstract
Making open source more inclusive Copia collegamentoCollegamento copiato negli appunti!
Red Hat is committed to replacing problematic language in our code and documentation. We are beginning with these four terms: master, slave, blacklist, and whitelist. Due to the enormity of this endeavor, these changes will be gradually implemented over upcoming releases. For more details on making our language more inclusive, see our CTO Chris Wright’s message.
Chapter 1. Introduction to Red Hat OpenStack bare-metal hardware certification policies Copia collegamentoCollegamento copiato negli appunti!
The Red Hat OpenStack Platform (RHOSP) bare-metal hardware certification policy guide is intended for hardware vendors who want to certify their bare-metal servers with Red Hat. The RHOSP bare-metal certification tests ensures that you can orchestrate your servers automatically without manual intervention.
Through this program, if the servers meet the requirements you can certify your servers for the IPI component by deploying it on the Red Hat OpenStack Platform.
1.1. Audience Copia collegamentoCollegamento copiato negli appunti!
This guide is intended for Partners who offer their own infrastructure hardware like system servers, or management controllers for use with Red Hat OpenStack Platform in a supported customer environment.
1.2. Overview of the program Copia collegamentoCollegamento copiato negli appunti!
The Red Hat OpenStack Platform (RHOSP) bare-metal hardware certification creates value for customers, because the systems can be managed and automatically deployed and redeployed with Red Hat OpenStack bare-metal hardware without manual intervention.
The certification process, through a series of tests, validates that a certified solution meets the requirements of an enterprise cloud, and is jointly supported by Red Hat and your organization.
The RHOSP bare-metal hardware certification program policies include multiple tests each with a series of subtests and checks, which are explained in the document.
Chapter 2. Certification prerequisites Copia collegamentoCollegamento copiato negli appunti!
A strong working knowledge of Red Hat Enterprise Linux and Red Hat OpenStack is required. A Red Hat Certified Engineer and a Red Hat OpenStack Platform Certified Engineer accreditation is preferred and suggested before participating.
2.1. Partner eligibility criteria Copia collegamentoCollegamento copiato negli appunti!
Ensure to meet the following requirements before applying for a Red Hat bare-metal hardware certification:
- You are part of the Red Hat Hardware Certification program.
- You are in a support relationship with Red Hat by means of the TSANet network or a custom support agreement.
2.2. Certification targets Copia collegamentoCollegamento copiato negli appunti!
The certification targets provide details and requirements about the components and products relevant to the certification.
Specific information for each of the certification components is provided when applicable.
2.2.1. Server Copia collegamentoCollegamento copiato negli appunti!
Ensure that the server must have the following certifications:
- Red Hat Enterprise Linux System
Red Hat OpenStack Platform Compute Node
Each certification is keyed to the specific Cloud Platform product version and its associated ironic revision. You can certify your server for RHOSP, if your hardware is compatible with the ironic drivers for that platform.
- The server must have a baseboard management controller (BMC) installed.
2.2.2. Red Hat Cloud Platform Products Copia collegamentoCollegamento copiato negli appunti!
Bare-metal certification
Through this program you can certify BMC and bare-metal servers on Red Hat OpenStack Platform 17.1.
2.2.3. Baseboard management controllers (BMC) Copia collegamentoCollegamento copiato negli appunti!
A BMC is a specialized microcontroller on a server’s motherboard that manages the interface between systems management software and physical hardware. The bare metal service in Red Hat Platforms provisions systems in a cluster by using the BMC to control power, network booting, and automate node deployment and termination.
BMC can be certified as a component for use in leveraging components, across multiple server systems. Similar to Red Hat Hardware Certification programs, Red Hat leverages partners' internal quality testing to streamline the certification process without adding risk to customer environments.
Red Hat recommends partners using component leveraging features in bare-metal hardware certifications conduct their testing with the specific server system, BMC, and Red Hat cloud platform product to validate each combination. However, you do not need to submit individual certification results to Red Hat for every combination.
2.2.4. Bare Metal Drivers Copia collegamentoCollegamento copiato negli appunti!
- IPI component certification
- BMCs must use supported Red Hat OpenStack Platform Bare Metal Drivers provided in the corresponding Red Hat Cloud platform product. You cannot certify a BMC that requires an ironic driver that is not included in the Red Hat product.
Chapter 3. Overview of Bare Metal certification Copia collegamentoCollegamento copiato negli appunti!
The bare-metal certification overview provides details about product publication in the catalog, product release, certification duration, and recertification.
3.1. Publication in the catalog Copia collegamentoCollegamento copiato negli appunti!
When you certify your server for bare-metal hardware on Red Hat OpenStack Platform, it is published in the Red Hat Ecosystem Catalog as Bare Metal. The Bare Metal Management feature also appears as a certified component of your server.
3.2. Red Hat product releases Copia collegamentoCollegamento copiato negli appunti!
You have access to and are encouraged to test with pre-released Red Hat software. You can begin your engagement with the Red Hat Certification team before Red Hat software is generally available (GA) to customers to expedite the certification process for your product. However, conduct official certification testing only on the GA releases of Red Hat OpenShift Container Platform bare-metal hardware.
3.3. Certification duration Copia collegamentoCollegamento copiato negli appunti!
Certifications are valid starting with the specific major and minor releases of Red Hat OpenStack Platform software as tested and listed on the Red Hat Ecosystem Catalog. They continue to be valid through the last minor release of the major release. This allows customers to count on certifications from the moment they are listed until the end of the product’s lifecycle.
3.4. Recertification workflow Copia collegamentoCollegamento copiato negli appunti!
You do not need to recertify after a new major or minor release of RHOSP if you have not made changes to your product. However, it is your responsibility to certify your product again any time you make significant changes to it.
Red Hat recommends that you run the certification tests on your product periodically to ensure its quality, functionality, and performance with the supported versions of RHOSP.
To recertify your product, open a supplemental certification.
Chapter 4. Certification testing Copia collegamentoCollegamento copiato negli appunti!
The certification testing briefs about the prerequisites for testing, understanding the certification process, and its requirements.
4.1. Prerequistes for certification testing Copia collegamentoCollegamento copiato negli appunti!
- Bare-metal certification
- The corresponding RHEL server certification is successfully completed and posted.
- The corresponding Red Hat OpenStack Platform Compute Node certification is successfully completed and posted.
- The corresponding bare-metal driver is on the supported Drivers List for the corresponding Red Hat OpenStack Platform release.
4.2. Certification workflow Copia collegamentoCollegamento copiato negli appunti!
The Red Hat Bare Metal Hardware certification process includes the following requirements and steps:
Figure 4.1. Red Hat OpenStack Platform Bare Metal Hardware Certification Process
4.3. Certification requirements Copia collegamentoCollegamento copiato negli appunti!
Ensure you follow the Red Hat OpenStack bare metal hardware guide. Additional details for the certification requirements include:
- The Host Under Test (HUT) must already be RHEL certified. Additionally, the tests must run on a previously certified server, and all the tests prescribed in the test plan must be executed in a single run.
- If you have a failed test, take the corrective action and execute all the tests in a single run. Open a support case if necessary for guidance.
Chapter 5. Leveraging certification Copia collegamentoCollegamento copiato negli appunti!
Leveraging allows you to request credit for previous successful certification tests when similar or substantially similar BMCs are used across a family of server systems. It is based on your internal qualification testing of the specific BMC on each system, confirming that any variations are not material and the solution matches a previously certified one.
Leveraging can reduce the amount of official testing needed for certification. You can request leveraging when the solution includes a previously certified BMC with the same firmware branch and equal or fewer features.
It is your responsibility to verify that any differences in BMC-to-server interaction do not affect the certification.
Chapter 6. Pass-Through certification Copia collegamentoCollegamento copiato negli appunti!
A Pass-Through Certification refers to the ability of a third-party system or component to be granted certification for hardware previously certified by the original hardware manufacturer. Pass-Through can reduce the overall amount of testing that is required to be performed and submitted to Red Hat to achieve certification for the third-party hardware.
System manufacturers can extend a certification granted to their own systems to another vendor’s system where the original vendor:
- Has permission from the third-party,
- Has the mechanics to ensure the third party does not alter the hardware in such a way that it would no longer be considered a subset of the original model certified by Red Hat, and
- Extends their responsibilities of support and representative hardware to include situations involving third-party hardware.
The third-party cannot then extend their Pass-Through Certification to another vendor.
While both vendors are required to be members of the Red Hat Hardware Certification Program, only the original vendor may request Pass-Through Certifications. Vendors may also utilize the Pass-Through process, where the same vendor has multiple names for the same hardware.
Chapter 7. Supplemental certification Copia collegamentoCollegamento copiato negli appunti!
Open supplemental certifications in the following scenarios:
- First time certification
The bare-metal supplemental certification can be automatically created during a different certification process, for example, when you applied for the Red Hat Enterprise Linux System certification.
If it was not automatically created, or if you need to apply for the certification at a later date, open a new supplemental certification above the Red Hat OpenStack Compute Node certification.
- Recertification
Open a supplemental certification to update an existing RHOSP bare-metal certification.
You may want to recertify your product, for example, to certify the same system on different versions of a Red Hat platform or because your product has received a significant update.
You are responsible for initiating these certifications and notifying Red Hat of any material changes to your product.
Chapter 8. IPI certification tests Copia collegamentoCollegamento copiato negli appunti!
The certification includes self-check, supportable, director_undercloud and bare metal tests.
8.1. Self check test Copia collegamentoCollegamento copiato negli appunti!
The self-check test confirms that all required software packages for certification are installed and unaltered, ensuring the test environment is ready for certification. Certification packages must not be modified for testing or any other purpose.
Success Criteria
The test environment includes all necessary certification packages and the packages have not been modified.
8.2. Supportable test Copia collegamentoCollegamento copiato negli appunti!
The supportable test, also known as baremetal/supportable, ensures that the test environment is compliant with Red Hat’s support policy. The test confirms that the test node (an OpenStack deployment under test) consists only of components supported by Red Hat (Red Hat OpenStack Platform, Red Hat Enterprise Linux).
An OpenStack deployment under test refers to the node where the plugin or application under test is installed.
Supportability tests must be run on both the control node and the compute node.
This test is required for all OpenStack software certifications.
Compute Node Considerations:
- If your kernel is not updated, ensure that you update the kernel test section to verify that the compute uses the GA kernel to prevent review exit. Review will need to account for the status of RHEL certification.
- Driver Update Programs (DUPs) are acceptable on the compute node but will cause the test to exit review. Review needs to confirm the DUP that aligns with the one used in the corresponding RHEL certification.
The baremetal/supportable tests include the following subtests:
8.2.1. Kernel subtest Copia collegamentoCollegamento copiato negli appunti!
The kernel subtest checks the kernel module running on the test environment. The version of the kernel can be either the original General Availability (GA) version or any subsequent kernel update released for the RHEL major and minor releases.
The kernel subtest also ensures that the kernel is not tainted when running in the environment.
Success criteria
- The running kernel is a Red Hat kernel.
- The running kernel is released by Red Hat for use with the RHEL version.
- The running kernel is not tainted.
- The running kernel has not been modified.
8.2.2. Kernel modules subtest Copia collegamentoCollegamento copiato negli appunti!
The kernel modules subtest verifies that loaded kernel modules are released by Red Hat, either as part of the kernel’s package or added through a Red Hat Driver Update. The kernel module subtest also ensures that kernel modules do not identify as Technology Preview.
Success criteria
- The kernel modules are released by Red Hat and supported.
8.2.3. Hardware Health subtest Copia collegamentoCollegamento copiato negli appunti!
The Hardware Health subtest checks the system’s health by testing if the hardware is supported, meets the requirements, and has any known hardware vulnerabilities. The subtest does the following:
Checks that the Red Hat Enterprise Linux (RHEL) kernel does not identify hardware as unsupported. When the kernel identifies unsupported hardware, it will display an unsupported hardware message in the system logs and/or trigger an unsupported kernel taint. This subtest prevents customers from possible production risks which may arise from running Red Hat products on unsupported configurations and environments.
In hypervisor, partitioning, cloud instances, and other virtual machine situations, the kernel may trigger an unsupported hardware message or taint based on the hardware data presented to RHEL by the virtual machine (VM).
Checks that the system under test (SUT) meets the minimum hardware requirements.
- RHEL 8, 9 and 10: Minimum system RAM should be 1.5GB, per CPU logical core count.
- Checks if the kernel has reported any known hardware vulnerabilities, if those vulnerabilities have mitigations and if those mitigations have resolved the vulnerability. Many mitigations are automatic to ensure that customers do not need to take active steps to resolve vulnerabilities. In some cases this is not possible; where most of these remaining cases require changes to the configuration of the system BIOS/firmware which may not be modifiable by customers in all situations.
- Confirms the system does not have any offline CPUs.
- Confirms if Simultaneous Multithreading (SMT) is available, enabled, and active in the system.
Failing any of these tests will result in a WARN from the test suite and should be verified by the partner to have correct and intended behavior.
Success criteria
- The kernel does not have the UNSUPPORTEDHARDWARE taint bit set.
- The kernel does not report an unsupported hardware system message.
- The kernel should not report any vulnerabilities with mitigations as vulnerable.
- The kernel does not report the logic core to installed memory ratio as out of range.
- The kernel does not report CPUs in an offline state.
8.2.4. Installed RPMs subtest Copia collegamentoCollegamento copiato negli appunti!
The installed RPMs subtest verifies that RPM packages installed on the system are released by Red Hat and not modified. Modified packages may introduce risks and impact the supportability of the customer’s environment. You might install non-Red Hat packages if necessary, but you must add them to your product’s documentation, and they must not modify or conflict with any Red Hat packages.
Red Hat will review the output of this test if you install non-Red Hat packages.
Success criteria
- The installed Red Hat RPMs are not modified.
- The installed non-Red Hat RPMs are necessary and documented.
- The installed non-Red Hat RPMs do not conflict with Red Hat RPMs or software. For example, you may develop custom packages to manage CPU affinity of interrupt requests (IRQs) for network interfaces. However, such packages might conflict with Red Hat’s tuned package, which already provides similar functionality for performance tuning.
8.2.5. System report subtest Copia collegamentoCollegamento copiato negli appunti!
Red Hat uses a tool called sos to collect configuration and diagnostics information from a RHEL system. The sos tool assists customers in troubleshooting a RHEL system and following the recommended practices.
The System Report subtest ensures that the sos tool functions as expected on the image or system and captures a basic sosreport.
Success Criteria
The RHCERT tool captures a basic sosreport on the OpenStack deployment under test.
8.2.6. SELinux subtest Copia collegamentoCollegamento copiato negli appunti!
Confirms that SELinux is running in enforcing mode on the OpenStack deployment-under test.
Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Red Hat Enterprise Linux.
SELinux policy is administratively-defined, enforced system-wide, and is not set at user discretion, reducing vulnerability to privilege escalation attacks helping limit the damage made by configuration mistakes. If a process becomes compromised, the attacker only has access to the normal functions of that process, and the files that the process has been configured to.
Success Criteria
SELinux is configured and running in enforcing mode on the OpenStack deployment under test.
8.3. Director_undercloud test Copia collegamentoCollegamento copiato negli appunti!
The Director_undercloud test, also known as openstack/director, ensures that the deployment-under-test is originally installed using Red Hat OpenStack Platform Director. This test is required for all OpenStack software certifications.
Red Hat OpenStack Platform Director is the supported toolset for installing and managing a Red Hat OpenStack Platform environment in production. It helps in easy installation of a lean and robust OpenStack cloud. It is specifically targeted for enterprise cloud environments where updates, upgrades, and infrastructure control are critical for underlying OpenStack operations.
Success Criteria
The deployment under test is originally installed using Red Hat OpenStack Platform Director.
8.4. Bare Metal test Copia collegamentoCollegamento copiato negli appunti!
The following sub-tests comprise the bare metal test. The tests perform enrolling, inspection and deployments to validate the bare metal node.
8.4.1. Bare Metal InstackStackrc validation Copia collegamentoCollegamento copiato negli appunti!
Validates the instackenv.json and stackrc files.
Success Criteria
-
Checks if the
instackenv.jsonandstackrcfiles exist in the specified location and validate the content ofinstackenv.jsonfile, and - Requires validation check if the file is a valid json file and the specified BMC IPs are reachable.
8.4.2. Bare Metal driver validation Copia collegamentoCollegamento copiato negli appunti!
Compares the drivers configured on the HUT with the drivers supported by Red Hat. If a driver mismatch occurs the subtest generates a Review state and exits.The drivers supported by Red Hat are part of the test suite
Success Criteria
-
The specified driver should match with the driver in
instackenv.jsonfile, and -
If the drivers do not match the test will exit with a Review state. In this scenario, the Red Hat certification team will manually check the
instackenv.jsonfile and the specified driver to validate if the drivers are supported drivers.
8.4.3. Bare Metal undercloud validation Copia collegamentoCollegamento copiato negli appunti!
Checks if tests are running from the undercloud node. If the tests are not running from this node, the test fails and you need to rerun the test.
Success Criteria
Testing undercloud artifacts to check if the test ran from the undercloud node.
The undercloud node is the valid node.
8.4.4. Bare Metal enrolling test Copia collegamentoCollegamento copiato negli appunti!
Checks if the bare-metal driver is successfully able to enroll the hardware node using the BMC IP. The enrollment process requires driver to communicate properly with BMC IP. The BMC changes the Power state and Provisioning state of the enrolled nodes to off and available.
The test also checks if the stack overcloud exists and if the nodes are already added. It deletes the stack and nodes if they exist, and then tries to enroll nodes based on the instackenv.json file. The test is failed if any of the stages fail.
Success Criteria
Enrolled nodes are expected to be in Power and Provisioning state.
8.4.5. Bare Metal inspecting test Copia collegamentoCollegamento copiato negli appunti!
Once the operator sets the required driver_info fields, BareMetalInspectingTest allows Bare Metal service to discover required node properties.
Success Criteria
Node properties should be correctly populated so that BMC can gather hardware details based on the instructions provided by the driver.
8.4.6. Bare Metal deploying test Copia collegamentoCollegamento copiato negli appunti!
Once the inspection is completed successfully,the Bare Metal Deploying Test will try to nova boot two virtual machines by creating and assigning a custom flavor to the nodes. This helps to check if BMCs can provide instances with the required boot images, and then try to boot up the instances.
Success Criteria
Start of VMs' with Active status attached to them.
8.4.7. Bare Metal redeploying test Copia collegamentoCollegamento copiato negli appunti!
Tries to redeploy nova instances.
Success Criteria
All the stages covered previously should pass in the redeploy too. The test enrolls and inspects the hardware instances, deploys the instances based on the enroll and inspect stages.