Skip to content

Automates most of the manual steps of deploying OCP4.x cluster on vSphere

Notifications You must be signed in to change notification settings

walidshaari/ocp4-vsphere-upi-automation

 
 

Repository files navigation

OCP4 on VMware vSphere UPI Automation

The goal of this repo is to make deploying and redeploying a new OpenShift v4 cluster a snap. Using the same repo and with minor tweaks, it can be applied to any version of OpenShift higher than the current version of 4.4.

As it stands right now, the repo works for several installation usecases:

  • DHCP with OVA template
  • DHCP with PXE boot (needs helper node)
  • Static IPs for nodes (lack of isolated network to let helper run DHCP server)
  • w/o Cluster-wide Proxy (HTTP and SSL/TLS with certs supported)
  • Restricted network (with or without DHCP)
  • No Cloud Provider (Useful for mixed clusters with both virtual and physical Nodes)

This repo is most ideal for Home Lab and Proof-of-Concept scenarios. Having said that, if prerequistes (below) can be met and if the vCenter service account can be locked down to access only certain resources and perform only certain actions, the same repo can then be used for DEV or higher environments. Refer to this link for more details on required permissions for a vCenter service account.

Quickstart

This is a concise summary of everything you need to do to use the repo. Rest of the document goes into details of every step.

  1. Setup helper node
  2. Edit group_vars/all.yml, the following must be changed while the rest can remain the same
    • pull secret
    • ip and mac addresses, host/domain names
    • enable/disable fips mode
    • vcenter details
      • datastore name
      • datacenter name
      • username and passwords of admin/service accounts
    • enable/disable registry/proxy/ntp with their details, as required
  3. Customize ansible.cfg and use/copy/modify staging inventory file as required
  4. Run one of the several install options

Infrastructure Prerequisites

  1. vSphere ESXi and vCenter 6.7 installed. For vCenter 6.5 please see a cautionary note below:
  2. A datacenter created with a vSphere host added to it, a datastore exists and has adequate capacity
  3. The playbook(s) assumes you are running a helper node in the same network to provide all the necessary services such as [DHCP/DNS/HAProxy as LB]. Also, the MAC addresses for the machines should match between helper repo and this. If not using the helper node, the minimum expectation is that the webserver and tftp server (for PXE boot) are running on the same external host, which we will then treat as a helper node.
  4. The necessary services such as [DNS/LB(Load Balancer] must be up and running before this repo can be used
  5. Ansible (preferably latest) on the machine where this repo is cloned.
    • Before you install Ansible, install the epel-release, run yum -y install epel-release

For vSphere 6.5, the files relating to interaction with VMware/vCenter such as this may need to have vmware_deploy_ovf module to include cluster, resource-pool parameters and their values set to work correctly.

Installation Steps

Set Global Variables

Pre-populated entries in group_vars/all.yml are ready to be used unless you need to customize further. Any updates described below refer to group_vars/all.yml unless otherwise specified.

  1. Get the pull secret from here. Update the file on the line with pull_secret by providing the entire pull secret as a single line replacing the provided/incomplete pull secret
  2. Get the vCenter details:
    1. IP address
    2. Service account username (can be the same as admin)
    3. Service account password (can be the same as admin)
    4. Admin account username
    5. Admin account password
    6. Datacenter name (created in the prerequisites mentioned above)
    7. Datastore name
    8. Absolute path of the vCenter folder to use (optional). If this field is not populated, its is auto-populated and points to /${vcenter.datacenter}/vm/${config.cluster_name}
  3. Downloadable link to govc (vSphere CLI, pre-populated)
  4. OpenShift cluster
    1. base domain (pre-populated with example.com)
    2. cluster name (pre-populated with ocp4)
  5. HTTP URL of the bootstrap.ign file (pre-populated with a example config pointing to helper node)
  6. Furnish any proxy details with the section like below.
    • If proxy.enabled is set to False anything defined under proxy and the proxy setup is ignored
    • The cert_content shown below is only for illustration to show the format
    • When there is no certificate, leave the variable cert_content value empty
    proxy:
       enabled: true
       http_proxy: http://helper.ocp4.example.com:3129
       https_proxy: http://helper.ocp4.example.com:3129
       no_proxy: example.com
       cert_content: |
          -----BEGIN CERTIFICATE-----
             <certficate content>
          -----END CERTIFICATE-----
    
  7. When doing the restrcited network install and following instructions from restricted.md, furnish details related to the registry with a section like below. If registry.enabled is set to False anything defined under registry and the registry setup is ignored
    registry:
       enabled: true
       product_repo: openshift-release-dev
       product_release_name: ocp-release
       product_release_version: 4.4.0-x86_64
       username: ansible
       password: ansible
       email: [email protected]
       cert_content: 
       host: helper.ocp4.example.com
       port: 5000
       repo: ocp4/openshift4
    
  8. If you wish to install without enabling the Kubernetes vSphere Cloud Provider (Useful for mixed installs with both Virtual Nodes and Bare Metal Nodes), change the provider: to none in all.yaml.
    config:
      provider: none
      base_domain: example.com
      ...
    
  9. If you wish to enable custom NTP servers on your nodes, set ntp.custom to True and define ntp.ntp_server_list to fit your requirements.
    ntp:
      custom: True
      ntp_server_list:
      - 0.rhel.pool.ntp.org
      - 1.rhel.pool.ntp.org
    

The step #5 needn't exist at the time of running the setup/installation step, so provide an accurate guess of where and at what context path bootstrap.ign will eventually be served

Set Ansible Inventory and Configuration

Now configure ansible.cfg and staging inventory file based on your environment before picking one of the 5 different install options listed below.

Update the staging inventory file

Under the webservers.hosts entry, use one of two options below :

  1. localhost : if the ansible-playbook is being run on the same host as the webserver that would eventually host bootstrap.ign file
  2. the IP address or FQDN of the machine that would run the webserver.

Update the ansible.cfg based on your needs

  • Running the playbook as a root user
    • If the localhost runs the webserver
      [defaults]
      host_key_checking = False 
      
    • If the remote host runs the webserver
      [defaults]
      host_key_checking = False
      remote_user = root
      ask_pass = True 
      
  • Running the playbook as a non-root user
    • If the localhost runs the webserver
      [defaults]
      host_key_checking = False 
      
      [privilege_escalation]
      become_ask_pass = True
      
    • If the remote host runs the webserver
      [defaults]
      host_key_checking = False 
      remote_user = root
      ask_pass = True
      
      [privilege_escalation]
      become_ask_pass = True
      

Run Installation Playbook

# Option 1: DHCP + use of OVA template
ansible-playbook -i staging dhcp_ova.yml

# Option 2: DHCP + PXE boot
ansible-playbook -i staging dhcp_pxe.yml

# Option 3: ISO + Static IPs
ansible-playbook -i staging static_ips.yml

# Refer to restricted.md file for more details
# Option 4: DHCP + use of OVA template in a Restricted Network
ansible-playbook -i staging restricted_dhcp_ova.yml

# Option 5: Static IPs + use of ISO images in a Restricted Network
ansible-playbook -i staging restricted_static_ips.yml

Miscellaneous

  • If you are re-running the installation playbook make sure to blow away any existing VMs (in ocp4 folder) listed below:

    1. bootstrap
    2. masters
    3. workers
    4. rhcos-vmware template (if not using the extra param as shown below)
  • If a template by the name rhcos-vmware already exists in vCenter, you want to reuse it and skip the OVA download from Red Hat and upload into vCenter, use the following extra param.

    -e skip_ova=true
  • If you would rather want to clean all folders bin, downloads, install-dir and re-download all the artifacts, append the following to the command you chose in the first step

    -e clean=true

Expected Outcome

  1. Necessary Linux packages installed for the installation
  2. SSH key-pair generated, with key ~/.ssh/ocp4 and public key ~/.ssh/ocp4.pub
  3. Necessary folders [bin, downloads, downloads/ISOs, install-dir] created
  4. OpenShift client, install and .ova binaries downloaded to the downloads folder
  5. Unzipped versions of the binaries installed in the bin folder
  6. In the install-dir folder:
    1. append-bootstrap.ign file with the HTTP URL of the boostrap.ign file
    2. master.ign and worker.ign
    3. base64 encoded files (append-bootstrap.64, master.64, worker.64) for (append-bootstrap.ign, master.ign, worker.ign) respectiviely. This step assumes you have base64 installed and in your $PATH
  7. The bootstrap.ign is copied over to the web server in the designated location
  8. A folder is created in the vCenter under the mentioned datacenter and the template is imported
  9. The template file is edited to carry certain default settings and runtime parameters common to all the VMs
  10. VMs (bootstrap, master0-2, worker0-2) are generated in the designated folder and (in state of) poweredon

Final Check:

If everything goes well you should be able to log into all of the machines using the following command:

# Assuming you are able to resolve bootstrap.ocp4.example.com on this machine
# Replace the bootstrap hostname with any of the master or worker hostnames
ssh -i ~/.ssh/ocp4 [email protected]

Once logged in, on bootstrap node run the following command to understand if/how the masters are (being) setup:

journalctl -b -f -u bootkube.service

Once the bootkube.service is complete, the bootstrap VM can safely be poweredoff and the VM deleted. Finish by checking on the OpenShift with the following commands:

# In the root folder of this repo run the following commands
export KUBECONFIG=$(pwd)/install-dir/auth/kubeconfig
export PATH=$(pwd)/bin:$PATH

# OpenShift Client Commands
oc whoami 
oc get co 

Debugging

To check if the proxy information has been picked up:

 # On Master
 cat /etc/systemd/system/machine-config-daemon-host.service.d/10-default-env.conf

 # On Bootstrap
 cat /etc/systemd/system.conf.d/10-default-env.conf

To check if the registry information has been picked up:

# On Master or Bootstrap
cat /etc/containers/registries.conf
cat /root/.docker/config.json

To check if your certs have been picked up:

# On Master
cat /etc/pki/ca-trust/source/anchors/openshift-config-user-ca-bundle.crt

# On Bootstrap
cat /etc/pki/ca-trust/source/anchors/ca.crt

About

Automates most of the manual steps of deploying OCP4.x cluster on vSphere

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Shell 100.0%