About image-based deployments for managed {sno}
When a host preinstalled with single-node OpenShift using an image-based installation arrives at a remote site, a technician can easily reconfigure and deploy the host in a matter of minutes.
For clusters with a hub-and-spoke architecture, to complete the deployment of a preinstalled host, you must first define site-specific configuration resources on the hub cluster for each host. These resources contain configuration information such as the properties of the bare-metal host, authentication details, and other deployment and networking information.
The Image Based Install (IBI) Operator creates a configuration ISO from these resources, and then boots the host with the configuration ISO attached. The host mounts the configuration ISO and runs the reconfiguration process. When the reconfiguration completes, the single-node OpenShift cluster is ready.
Note
You must create distinct configuration resources for each bare-metal host.
See the following high-level steps to deploy a preinstalled host in a cluster with a hub-and-spoke architecture:
-
Install the IBI Operator on the hub cluster.
-
Create site-specific configuration resources in the hub cluster for each host.
-
The IBI Operator creates a configuration ISO from these resources and boots the target host with the configuration ISO attached.
-
The host mounts the configuration ISO and runs the reconfiguration process. When the reconfiguration completes, the single-node OpenShift cluster is ready.
Note
Alternatively, you can manually deploy a preinstalled host for a cluster without using a hub cluster. You must define an ImageBasedConfig resource and an installation manifest, and provide these as inputs to the openshift-install installation program. For more information, see "Deploying a single-node OpenShift cluster using the openshift-install program".
Installing the Image Based Install Operator
The Image Based Install (IBI) Operator is part of the image-based deployment workflow for preinstalled single-node OpenShift on bare-metal hosts.
Note
The IBI Operator is part of the multicluster engine for Kubernetes Operator from MCE version 2.7.
-
You logged in as a user with
cluster-adminprivileges. -
You deployed a Red Hat Advanced Cluster Management (RHACM) hub cluster or you deployed the multicluster engine for Kubernetes Operator.
-
You reviewed the required versions of software components in the section "Software prerequisites for an image-based installation".
-
Set the
enabledspecification totruefor theimage-based-install-operatorcomponent in theMultiClusterEngineresource by running the following command:$ oc patch multiclusterengines.multicluster.openshift.io multiclusterengine --type json \ --patch '[{"op": "add", "path":"/spec/overrides/components/-", "value": {"name":"image-based-install-operator","enabled": true}}]'
-
Check that the Image Based Install Operator pod is running by running the following command:
$ oc get pods -A | grep image-basedExample outputmulticluster-engine image-based-install-operator-57fb8sc423-bxdj8 2/2 Running 0 5m
Deploying a managed single-node OpenShift cluster using the IBI Operator
Create the site-specific configuration resources in the hub cluster to initiate the image-based deployment of a preinstalled host.
When you create these configuration resources in the hub cluster, the Image Based Install (IBI) Operator generates a configuration ISO and attaches it to the target host to begin the site-specific configuration process. When the configuration process completes, the single-node OpenShift cluster is ready.
Note
For more information about the configuration resources that you must configure in the hub cluster, see "Cluster configuration resources for deploying a preinstalled host".
-
You preinstalled a host with single-node OpenShift using an image-based installation.
-
You logged in as a user with
cluster-adminprivileges. -
You deployed a Red Hat Advanced Cluster Management (RHACM) hub cluster or you deployed the multicluster engine for Kubernetes operator (MCE).
-
You installed the IBI Operator on the hub cluster.
-
You created a pull secret to authenticate pull requests. For more information, see "Using image pull secrets".
-
Create the
ibi-nsnamespace by running the following command:$ oc create namespace ibi-ns -
Create the
Secretresource for your image registry:-
Create a YAML file that defines the
Secretresource for your image registry:Examplesecret-image-registry.yamlfileapiVersion: v1 kind: Secret metadata: name: ibi-image-pull-secret namespace: ibi-ns stringData: .dockerconfigjson: <base64-docker-auth-code> type: kubernetes.io/dockerconfigjson- You must provide base64-encoded credential details. See the "Additional resources" section for more information about using image pull secrets.
-
Create the
Secretresource for your image registry by running the following command:$ oc create -f secret-image-registry.yaml
-
-
Optional: Configure static networking for the host:
-
Create a
Secretresource containing the static network configuration innmstateformat:Examplehost-network-config-secret.yamlfileapiVersion: v1 kind: Secret metadata: name: host-network-config-secret namespace: ibi-ns type: Opaque stringData: nmstate: | interfaces: - name: ens1f0 type: ethernet state: up ipv4: enabled: true address: - ip: 192.168.200.25 prefix-length: 24 dhcp: false ipv6: enabled: false dns-resolver: config: server: - 192.168.15.47 - 192.168.15.48 routes: config: - destination: 0.0.0.0/0 metric: 150 next-hop-address: 192.168.200.254 next-hop-interface: ens1f0 table-id: 254- Specify the name for the
Secretresource. - Define the static network configuration in
nmstateformat. - Specify the name of the interface on the host. The name of the interface must match the actual NIC name as shown in the operating system. To use your MAC address for NIC matching, set the
identifierfield tomac-address. - You must specify
dhcp: falseto ensurenmstateassigns the static IP address to the interface. - Specify one or more DNS servers that the system will use to resolve domain names.
- In this example, the default route is configured through the
ens1f0interface to the next hop IP address192.168.200.254.
- Specify the name for the
-
-
Create the
BareMetalHostandSecretresources:-
Create a YAML file that defines the
BareMetalHostandSecretresources:Exampleibi-bmh.yamlfileapiVersion: metal3.io/v1alpha1 kind: BareMetalHost metadata: name: ibi-bmh namespace: ibi-ns spec: online: false bootMACAddress: 00:a5:12:55:62:64 bmc: address: redfish-virtualmedia+http://192.168.111.1:8000/redfish/v1/Systems/8a5babac-94d0-4c20-b282-50dc3a0a32b5 credentialsName: ibi-bmh-bmc-secret preprovisioningNetworkDataName: host-network-config-secret automatedCleaningMode: disabled externallyProvisioned: true --- apiVersion: v1 kind: Secret metadata: name: ibi-bmh-secret namespace: ibi-ns type: Opaque data: username: <user_name> password: <password>- Specify the name for the
BareMetalHostresource. - Specify if the host should be online.
- Specify the host boot MAC address.
- Specify the BMC address. You can only use bare-metal host drivers that support virtual media networking booting, for example redfish-virtualmedia and idrac-virtualmedia.
- Specify the name of the bare-metal host
Secretresource. - Optional: If you require static network configuration for the host, specify the name of the
Secretresource containing the configuration. - You must specify
automatedCleaningMode:disabledto prevent the provisioning service from deleting all preinstallation artifacts, such as the seed image, during disk inspection. - You must specify
externallyProvisioned: trueto enable the host to boot from the preinstalled disk, instead of the configuration ISO. - Specify the name for the
Secretresource. - Specify the username.
- Specify the password.
- Specify the name for the
-
Create the
BareMetalHostandSecretresources by running the following command:$ oc create -f ibi-bmh.yaml
-
-
Create the
ClusterImageSetresource:-
Create a YAML file that defines the
ClusterImageSetresource:Exampleibi-cluster-image-set.yamlfileapiVersion: hive.openshift.io/v1 kind: ClusterImageSet metadata: name: ibi-img-version-arch spec: releaseImage: ibi.example.com:path/to/release/images:version-arch- Specify the name for the
ClusterImageSetresource. - Specify the address for the release image to use for the deployment. If you use a different image registry compared to the image registry used during seed image generation, ensure that the OpenShift Container Platform version for the release image remains the same.
- Specify the name for the
-
Create the
ClusterImageSetresource by running the following command:$ oc apply -f ibi-cluster-image-set.yaml
-
-
Create the
ImageClusterInstallresource:-
Create a YAML file that defines the
ImageClusterInstallresource:Exampleibi-image-cluster-install.yamlfileapiVersion: extensions.hive.openshift.io/v1alpha1 kind: ImageClusterInstall metadata: name: ibi-image-install namespace: ibi-ns spec: bareMetalHostRef: name: ibi-bmh namespace: ibi-ns clusterDeploymentRef: name: ibi-cluster-deployment hostname: ibi-host imageSetRef: name: ibi-img-version-arch machineNetworks: - cidr: 10.0.0.0/24 #- cidr: fd01::/64 proxy: httpProxy: "http://proxy.example.com:8080" #httpsProxy: "http://proxy.example.com:8080" #noProxy: "no_proxy.example.com"- Specify the name for the
ImageClusterInstallresource. - Specify the
BareMetalHostresource that you want to target for the image-based installation. - Specify the name of the
ClusterDeploymentresource that you want to use for the image-based installation of the target host. - Specify the hostname for the cluster.
- Specify the name of the
ClusterImageSetresource you used to define the container release images to use for deployment. - Specify the public Classless Inter-Domain Routing (CIDR) of the external network. For dual-stack networking, you can specify both IPv4 and IPv6 CIDRs using a list format. The first CIDR in the list is the primary address family and must match the primary address family of the seed cluster.
- Optional: Specify a proxy to use for the cluster deployment.
Important
If your cluster deployment requires a proxy configuration, you must do the following:
-
Create a seed image from a seed cluster featuring a proxy configuration. The proxy configurations do not have to match.
-
Configure the
machineNetworkfield in your installation manifest.
-
- Specify the name for the
-
Create the
ImageClusterInstallresource by running the following command:$ oc create -f ibi-image-cluster-install.yaml
-
-
Create the
ClusterDeploymentresource:-
Create a YAML file that defines the
ClusterDeploymentresource:Exampleibi-cluster-deployment.yamlfileapiVersion: hive.openshift.io/v1 kind: ClusterDeployment metadata: name: ibi-cluster-deployment namespace: ibi-ns spec: baseDomain: example.com clusterInstallRef: group: extensions.hive.openshift.io kind: ImageClusterInstall name: ibi-image-install version: v1alpha1 clusterName: ibi-cluster platform: none: {} pullSecretRef: name: ibi-image-pull-secret- Specify the name for the
ClusterDeploymentresource. - Specify the namespace for the
ClusterDeploymentresource. - Specify the base domain that the cluster should belong to.
- Specify the name of the
ImageClusterInstallin which you defined the container images to use for the image-based installation of the target host. - Specify a name for the cluster.
- Specify the secret to use for pulling images from your image registry.
- Specify the name for the
-
Create the
ClusterDeploymentresource by running the following command:$ oc apply -f ibi-cluster-deployment.yaml
-
-
Create the
ManagedClusterresource:-
Create a YAML file that defines the
ManagedClusterresource:Exampleibi-managed.yamlfileapiVersion: cluster.open-cluster-management.io/v1 kind: ManagedCluster metadata: name: sno-ibi spec: hubAcceptsClient: true- Specify the name for the
ManagedClusterresource. - Specify
trueto enable RHACM to manage the cluster.
- Specify the name for the
-
Create the
ManagedClusterresource by running the following command:$ oc apply -f ibi-managed.yaml
-
-
Check the status of the
ImageClusterInstallin the hub cluster to monitor the progress of the target host installation by running the following command:$ oc get imageclusterinstallExample outputNAME REQUIREMENTSMET COMPLETED BAREMETALHOSTREF target-0 HostValidationSucceeded ClusterInstallationSucceeded ibi-bmhWarning
If the
ImageClusterInstallresource is deleted, the IBI Operator reattaches theBareMetalHostresource and reboots the machine. -
When the installation completes, you can retrieve the
kubeconfigsecret to log in to the managed cluster by running the following command:$ oc extract secret/<cluster_name>-admin-kubeconfig -n <cluster_namespace> --to - > <directory>/<cluster_name>-kubeconfig-
<cluster_name>is the name of the cluster. -
<cluster_namespace>is the namespace of the cluster. -
<directory>is the directory in which to create the file.
-
Cluster configuration resources for deploying a preinstalled host
To complete a deployment for a preinstalled host at a remote site, you must configure the following site-specifc cluster configuration resources in the hub cluster for each bare-metal host.
| Resource | Description |
|---|---|
|
Namespace for the managed single-node OpenShift cluster. |
|
Describes the physical host and its properties, such as the provisioning and hardware configuration. |
|
Credentials for the host BMC. |
|
Optional: Describes static network configuration for the target host. |
|
Credentials for the image registry. The secret for the image registry must be of type |
|
References the bare-metal host, deployment, and image set resources. |
|
Describes the release images to use for the cluster. |
|
Describes networking, authentication, and platform-specific settings. |
|
Describes cluster details to enable Red Hat Advanced Cluster Management (RHACM) to register and manage. |
|
Optional: Describes additional configurations for the cluster deployment, such as adding a bundle of trusted certificates for the host to ensure trusted communications for cluster services. |
ImageClusterInstall resource API specifications
The following content describes the API specifications for the ImageClusterInstall resource. This resource is the endpoint for the Image Based Install Operator.
| Specification | Type | Description |
|---|---|---|
|
|
Specify the name of the |
|
|
Specify the hostname for the cluster. |
|
|
Specify your SSH key to provide SSH access to the target host. |
| Specification | Type | Description |
|---|---|---|
|
|
Specify the name of the |
|
|
After the deployment completes, this specification is automatically populated with metadata information about the cluster, including the |
|
|
Specifies the sources or repositories for the release-image content, for example:
|
|
|
Specify a |
|
|
Specify the |
|
|
Specify the public Classless Inter-Domain Routing (CIDR) of the external network. For dual-stack networking, you can specify both IPv4 and IPv6 CIDRs using a list format. The first CIDR in the list is the primary address family and must match the primary address family of the seed cluster. |
|
|
Specifies proxy settings for the cluster, for example:
|
|
|
Specify a |
ConfigMap resources for extra manifests
You can optionally create a ConfigMap resource to define additional manifests in an image-based deployment for managed single-node OpenShift clusters.
After you create the ConfigMap resource, reference it in the ImageClusterInstall resource. During deployment, the IBI Operator includes the extra manifests in the deployment.
Creating a ConfigMap resource to add extra manifests in an image-based deployment
You can use a ConfigMap resource to add extra manifests to the image-based deployment for single-node OpenShift clusters.
The following example adds an single-root I/O virtualization (SR-IOV) network to the deployment.
Note
Filenames for extra manifests must not exceed 30 characters. Longer filenames might cause deployment failures.
-
You preinstalled a host with single-node OpenShift using an image-based installation.
-
You logged in as a user with
cluster-adminprivileges.
-
Create the
SriovNetworkNodePolicyandSriovNetworkresources:-
Create a YAML file that defines the resources:
Examplesriov-extra-manifest.yamlfileapiVersion: sriovnetwork.openshift.io/v1 kind: SriovNetworkNodePolicy metadata: name: "example-sriov-node-policy" namespace: openshift-sriov-network-operator spec: deviceType: vfio-pci isRdma: false nicSelector: pfNames: [ens1f0] nodeSelector: node-role.kubernetes.io/master: "" mtu: 1500 numVfs: 8 priority: 99 resourceName: example-sriov-node-policy --- apiVersion: sriovnetwork.openshift.io/v1 kind: SriovNetwork metadata: name: "example-sriov-network" namespace: openshift-sriov-network-operator spec: ipam: |- { } linkState: auto networkNamespace: sriov-namespace resourceName: example-sriov-node-policy spoofChk: "on" trust: "off" -
Create the
ConfigMapresource by running the following command:$ oc create configmap sr-iov-extra-manifest --from-file=sriov-extra-manifest.yaml -n ibi-ns- Specify the namespace that has the
ImageClusterInstallresource.Example outputconfigmap/sr-iov-extra-manifest createdNote
If you add more than one extra manifest, and the manifests must be applied in a specific order, you must prefix the filenames of the manifests with numbers that represent the required order. For example,
00-namespace.yaml,01-sriov-extra-manifest.yaml, and so on.
- Specify the namespace that has the
-
-
Reference the
ConfigMapresource in thespec.extraManifestsRefsfield of theImageClusterInstallresource:#... spec: extraManifestsRefs: - name: sr-iov-extra-manifest #...
Creating a ConfigMap resource to add a CA bundle in an image-based deployment
You can use a ConfigMap resource to add a certificate authority (CA) bundle to the host to ensure trusted communications for cluster services.
After you create the ConfigMap resource, reference it in the spec.caBundleRef field of the ImageClusterInstall resource.
-
You preinstalled a host with single-node OpenShift using an image-based installation.
-
You logged in as a user with
cluster-adminprivileges.
-
Create a CA bundle file called
tls-ca-bundle.pem:Exampletls-ca-bundle.pemfile-----BEGIN CERTIFICATE----- MIIDXTCCAkWgAwIBAgIJAKmjYKJbIyz3MA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV ...Custom CA certificate bundle... 4WPl0Qb27Sb1xZyAsy1ww6MYb98EovazUSfjYr2EVF6ThcAPu4/sMxUV7He2J6Jd cA8SMRwpUbz3LXY= -----END CERTIFICATE----- -
Create the
ConfigMapobject by running the following command:$ oc create configmap custom-ca --from-file=tls-ca-bundle.pem -n ibi-ns-
custom-caspecifies the name for theConfigMapresource. -
tls-ca-bundle.pemdefines the key for thedataentry in theConfigMapresource. You must include adataentry with thetls-ca-bundle.pemkey. -
ibi-nsspecifies the namespace that has theImageClusterInstallresource.Example outputconfigmap/custom-ca created
-
-
Reference the
ConfigMapresource in thespec.caBundleReffield of theImageClusterInstallresource:#... spec: caBundleRef: name: custom-ca #...