此内容没有您所选择的语言版本。

Chapter 13. Provisioning virtual machines on OpenShift Virtualization


OpenShift Virtualization addresses the needs of development teams that have adopted or want to adopt Red Hat OpenShift Container Platform but possess existing virtual machine (VM) workloads that cannot be easily containerized. This technology provides a unified development platform where developers can build, modify, and deploy applications residing in application containers and VMs in a shared environment. These capabilities support rapid application modernization across the open hybrid cloud.

You can create a compute resource for OpenShift Virtualization so that you can provision and manage virtual machines in OpenShift Container Platform by using Satellite.

Note that template provisioning is not supported for this release.

Important

The OpenShift Virtualization compute resource is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

Prerequisites

  • You can use synchronized content repositories for Red Hat Enterprise Linux. For more information, see Synchronizing repositories in Managing content.
  • Provide an activation key for host registration. For more information, see Creating an activation key in Managing content.
  • You must have cluster-admin permissions for the OpenShift Container Platform cluster.
  • A Capsule Server managing a network on the OpenShift Container Platform cluster. Ensure that no other DHCP services run on this network to avoid conflicts with Capsule Server. For more information about network service configuration for Capsule Servers, see Preparing networking in Provisioning hosts.
  • Ensure the provisioning user has the required permissions to provision hosts. For more information, see Appendix D, Permissions required to provision hosts.
Warning

By default, deleting a host entry associated with a virtual machine does not destroy the virtual machine on the compute resource.

To change the default behavior, navigate to Administer > Settings > Provisioning and set Destroy associated VM on host delete to Yes.

Use this procedure to add OpenShift Virtualization as a compute resource in Satellite.

Procedure

  1. Enter the following satellite-installer command to enable the OpenShift Virtualization plugin for Satellite:

    # satellite-installer --enable-foreman-plugin-kubevirt
    Copy to Clipboard Toggle word wrap
  2. Obtain a token to use for HTTP and HTTPs authentication:

    1. Log in to the OpenShift Container Platform cluster and list the secrets that contain tokens:

      $ oc get secrets
      Copy to Clipboard Toggle word wrap
    2. Obtain the token for your secret:

      $ oc get secrets MY_SECRET -o jsonpath='{.data.token}' | base64 -d | xargs
      Copy to Clipboard Toggle word wrap
    3. Record the token to use later in this procedure.
  3. In the Satellite web UI, navigate to Infrastructure > Compute Resources, and click Create Compute Resource.
  4. In the Name field, enter a name for the new compute resource.
  5. From the Provider list, select OpenShift Virtualization.
  6. In the Description field, enter a description for the compute resource.
  7. In the Hostname field, enter the FQDN, hostname, or IP address of the OpenShift Container Platform cluster.
  8. In the API Port field, enter the port number that you want to use for provisioning requests from Satellite to OpenShift Virtualization.
  9. In the Namespace field, enter the user name of the OpenShift Container Platform cluster.
  10. In the Token field, enter the bearer token for HTTP and HTTPs authentication.
  11. Optional: In the X509 Certification Authorities field, enter a certificate to enable client certificate authentication for API server calls.
返回顶部
Red Hat logoGithubredditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。 了解我们当前的更新.

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

Theme

© 2025 Red Hat