Skip to content

Commit 98ca938

Browse files
Merge pull request #473 from syedriko/syedriko-ols-2020
OLS-2020: OCP docs and Python deps update 2025/08/11
2 parents 4a7cd47 + 22a6cb6 commit 98ca938

File tree

548 files changed

+4813
-32070
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

548 files changed

+4813
-32070
lines changed

Containerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ USER 0
2020
WORKDIR /workdir
2121

2222
COPY requirements.gpu.txt .
23-
RUN pip3.11 install --no-cache-dir -r requirements.gpu.txt
23+
RUN pip3.11 install --no-cache-dir -r requirements.gpu.txt && ln -s /usr/local/lib/python3.11/site-packages/llama_index/core/_static/nltk_cache /root/nltk_data
2424

2525
COPY ocp-product-docs-plaintext ./ocp-product-docs-plaintext
2626
COPY runbooks ./runbooks

ocp-product-docs-plaintext/4.15/backup_and_restore/application_backup_and_restore/backing_up_and_restoring/backing-up-applications.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,11 @@
44
Frequent backups might consume storage on the backup storage location. Check the frequency of backups, retention time, and the amount of data of the persistent volumes (PVs) if using non-local backups, for example, S3 buckets.
55
Because all taken backup remains until expired, also check the time to live (TTL) setting of the schedule.
66
You can back up applications by creating a Backup custom resource (CR). For more information, see Creating a Backup CR.
7+
The following are the different backup types for a Backup CR:
78
* The Backup CR creates backup files for Kubernetes resources and internal images on S3 object storage.
9+
* If you use Velero's snapshot feature to back up data stored on the persistent volume, only snapshot related information is stored in the S3 bucket along with the Openshift object data.
810
* If your cloud provider has a native snapshot API or supports CSI snapshots, the Backup CR backs up persistent volumes (PVs) by creating snapshots. For more information about working with CSI snapshots, see Backing up persistent volumes with CSI snapshots.
11+
If the underlying storage or the backup bucket are part of the same cluster, then the data might be lost in case of disaster.
912
For more information about CSI volume snapshots, see CSI volume snapshots.
1013

1114
[IMPORTANT]

ocp-product-docs-plaintext/4.15/installing/installing_bare_metal_ipi/ipi-install-prerequisites.txt

Lines changed: 46 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -364,4 +364,49 @@ Prior to the installation of the Red Hat OpenShift Container Platform cluster, g
364364
* Control plane and worker nodes are configured.
365365
* All nodes accessible via out-of-band management.
366366
* (Optional) A separate management network has been created.
367-
* Required data for installation.
367+
* Required data for installation.
368+
369+
# Installation overview
370+
371+
The installation program supports interactive mode. However, you can prepare an install-config.yaml file containing the provisioning details for all of the bare-metal hosts, and the relevant cluster details, in advance.
372+
373+
The installation program loads the install-config.yaml file and the administrator generates the manifests and verifies all prerequisites.
374+
375+
The installation program performs the following tasks:
376+
377+
* Enrolls all nodes in the cluster
378+
* Starts the bootstrap virtual machine (VM)
379+
* Starts the metal platform components as systemd services, which have the following containers:
380+
* Ironic-dnsmasq: The DHCP server responsible for handing over the IP addresses to the provisioning interface of various nodes on the provisioning network. Ironic-dnsmasq is only enabled when you deploy an Red Hat OpenShift Container Platform cluster with a provisioning network.
381+
* Ironic-httpd: The HTTP server that is used to ship the images to the nodes.
382+
* Image-customization
383+
* Ironic
384+
* Ironic-inspector (available in Red Hat OpenShift Container Platform 4.16 and earlier)
385+
* Ironic-ramdisk-logs
386+
* Extract-machine-os
387+
* Provisioning-interface
388+
* Metal3-baremetal-operator
389+
390+
The nodes enter the validation phase, where each node moves to a manageable state after Ironic validates the credentials to access the Baseboard Management Controller (BMC).
391+
392+
When the node is in the manageable state, the inspection phase starts. The inspection phase ensures that the hardware meets the minimum requirements needed for a successful deployment of Red Hat OpenShift Container Platform.
393+
394+
The install-config.yaml file details the provisioning network. On the bootstrap VM, the installation program uses the Pre-Boot Execution Environment (PXE) to push a live image to every node with the Ironic Python Agent (IPA) loaded. When using virtual media, it connects directly to the BMC of each node to virtually attach the image.
395+
396+
When using PXE boot, all nodes reboot to start the process:
397+
398+
* The ironic-dnsmasq service running on the bootstrap VM provides the IP address of the node and the TFTP boot server.
399+
* The first-boot software loads the root file system over HTTP.
400+
* The ironic service on the bootstrap VM receives the hardware information from each node.
401+
402+
The nodes enter the cleaning state, where each node must clean all the disks before continuing with the configuration.
403+
404+
After the cleaning state finishes, the nodes enter the available state and the installation program moves the nodes to the deploying state.
405+
406+
IPA runs the coreos-installer command to install the Red Hat Enterprise Linux CoreOS (RHCOS) image on the disk defined by the rootDeviceHints parameter in the install-config.yaml file. The node boots by using RHCOS.
407+
408+
After the installation program configures the control plane nodes, it moves control from the bootstrap VM to the control plane nodes and deletes the bootstrap VM.
409+
410+
The Bare-Metal Operator continues the deployment of the workers, storage, and infra nodes.
411+
412+
After the installation completes, the nodes move to the active state. You can then proceed with postinstallation configuration and other Day 2 tasks.
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,16 @@
11
# Installing a cluster on vSphere using the Agent-based Installer
22

33

4+
45
The Agent-based installation method provides the flexibility to boot your on-premise servers in any way that you choose. It combines the ease of use of the Assisted Installation service with the ability to run offline, including in air-gapped environments.
6+
57
Agent-based installation is a subcommand of the Red Hat OpenShift Container Platform installer. It generates a bootable ISO image containing all of the information required to deploy an Red Hat OpenShift Container Platform cluster with an available release image.
68

7-
# Additional resources
9+
For more information about installing a cluster using the Agent-based Installer, see Preparing to install with the Agent-based Installer.
10+
811

9-
* Preparing to install with the Agent-based Installer
12+
[IMPORTANT]
13+
----
14+
Your vSphere account must include privileges for reading and creating the resources required to install an Red Hat OpenShift Container Platform cluster.
15+
For more information about privileges, see vCenter requirements.
16+
----

ocp-product-docs-plaintext/4.15/networking/configuring_ingress_cluster_traffic/configuring-externalip.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Red Hat OpenShift Container Platform supports both automatic and manual IP addre
6161
To use IP address blocks defined by autoAssignCIDRs in Red Hat OpenShift Container Platform, you must configure the necessary IP address assignment and routing for your host network.
6262
----
6363

64-
The following YAML describes a service with an external IP address configured:
64+
The following YAML shows a Service object with a configured external IP:
6565

6666

6767
```yaml

ocp-product-docs-plaintext/4.15/networking/ovn_kubernetes_network_provider/configuring-egress-ips-ovn.txt

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -249,6 +249,12 @@ For the configuration in the previous example, Red Hat OpenShift Container Platf
249249
The following YAML describes the API for the EgressIP object. The scope of the object is cluster-wide; it is not created in a namespace.
250250

251251

252+
[IMPORTANT]
253+
----
254+
EgressIP selected pods cannot serve as backends for services with externalTrafficPolicy set to Local. If you try this configuration, service ingress traffic that targets the pods gets incorrectly rerouted to the egress node that hosts the EgressIP. This situation negatively impacts the handling of incoming service traffic and causes connections to drop. This leads to unavailable and non-functional services.
255+
----
256+
257+
252258
```yaml
253259
apiVersion: k8s.ovn.org/v1
254260
kind: EgressIP
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# About Logging 6.0
2+
3+
4+
5+
As a cluster administrator, you can deploy logging on an Red Hat OpenShift Container Platform cluster, and use it to collect and aggregate node system audit logs, application container logs, and infrastructure logs.
6+
7+
You can use logging to perform the following tasks:
8+
9+
* Forward logs to your chosen log outputs, including on-cluster, Red Hat managed log storage.
10+
* Visualize your log data in the Red Hat OpenShift Container Platform web console.
11+
12+
13+
[NOTE]
14+
----
15+
Because logging releases on a different cadence from Red Hat OpenShift Container Platform, the logging 6 documentation is available as a separate documentation set at Red Hat OpenShift Logging.
16+
----

ocp-product-docs-plaintext/4.15/observability/logging/logging-6.0/log6x-about.txt

Lines changed: 0 additions & 153 deletions
This file was deleted.

0 commit comments

Comments
 (0)