Skip to content

Commit 1201e68

Browse files
authored
Merge pull request #37365 from johnwilkins/bz-1989929
Fix for BZ 1989929
2 parents 6322638 + f43e887 commit 1201e68

9 files changed

+87
-226
lines changed

installing/installing_bare_metal_ipi/ipi-install-overview.adoc

Lines changed: 5 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -3,57 +3,17 @@
33
include::modules/common-attributes.adoc[]
44
:context: ipi-install
55

6-
ifdef::watermark[]
7-
[IMPORTANT]
8-
====
9-
The Bare Metal IPI images and code described in this document are for *Developer Preview* purposes and are *not supported* by Red Hat at this time.
10-
====
11-
endif::[]
12-
136
Installer-provisioned installation provides support for installing {product-title} on bare metal nodes. This guide provides a methodology to achieving a successful installation.
147

158
During installer-provisioned installation on bare metal, the installer on the bare metal node labeled as `provisioner` creates a bootstrap virtual machine (VM). The role of the bootstrap VM is to assist in the process of deploying an {product-title} cluster. The bootstrap VM connects to the `baremetal` network and to the `provisioning` network, if present, via the network bridges.
169

17-
ifeval::[{product-version} >= 4.6]
1810
image::71_OpenShift_4.6_Baremetal_IPI_Deployment_1020_1.svg[Deployment phase one]
19-
endif::[]
20-
21-
ifeval::[{product-version} == 4.5]
22-
image::4.5-71_OpenShift_Baremetal_IPI_Depoyment_0320_1.png[Deployment phase one]
23-
endif::[]
24-
25-
ifeval::[{product-version} < 4.5]
26-
image::4.4-71_OpenShift_Baremetal_IPI_Depoyment_0320_1.png[Deployment phase one]
27-
endif::[]
28-
29-
When the installation of OpenShift control plane nodes is complete and fully operational, the installer destroys the bootstrap VM automatically and moves the virtual IP addresses (VIPs) to
30-
ifeval::[{product-version} >= 4.8]
31-
the control plane nodes.
32-
endif::[]
33-
ifeval::[{product-version} <= 4.7]
34-
the appropriate nodes. The API VIP moves to the control plane nodes and the Ingress VIP moves to the worker nodes.
35-
endif::[]
36-
3711

12+
When the installation of OpenShift control plane nodes is complete and fully operational, the installer destroys the bootstrap VM automatically and moves the virtual IP addresses (VIPs) to the control plane nodes.
3813

39-
ifeval::[{product-version} >= 4.8]
4014
image::161_OpenShift_Baremetal_IPI_Deployment_updates_0521.svg[Deployment phase two]
41-
endif::[]
4215

43-
ifeval::[{product-version} >= 4.6]
44-
ifeval::[{product-version} <= 4.7]
45-
image::71_OpenShift_4.6_Baremetal_IPI_Deployment_1020_2.svg[Deployment phase two]
46-
endif::[]
47-
endif::[]
48-
49-
ifeval::[{product-version} == 4.5]
50-
The API VIPs move into the control plane nodes and the Ingress VIP services applications that reside within the worker nodes.
51-
52-
image::4.5-71_OpenShift_Baremetal_IPI_Depoyment_0320_2.png[Deployment phase two]
53-
endif::[]
54-
55-
ifeval::[{product-version} < 4.5]
56-
The API and DNS VIPs move into the control plane nodes and the Ingress VIP services applications that reside within the worker nodes.
57-
58-
image::4.4-71_OpenShift_Baremetal_IPI_Depoyment_0320_2.png[Deployment phase two]
59-
endif::[]
16+
[IMPORTANT]
17+
====
18+
The `provisioning` network is optional, but it is required for PXE booting. If you deploy without a `provisioning` network, you must use a virtual media BMC addressing option such as `redfish-virtualmedia` or `idrac-virtualmedia`.
19+
====

modules/ipi-install-additional-install-config-parameters.adoc

Lines changed: 5 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -89,9 +89,7 @@ controlPlane:
8989
|
9090
|Replicas sets the number of control plane (master) nodes included as part of the {product-title} cluster.
9191

92-
ifeval::[{product-version} >= 4.4]
9392
a| `provisioningNetworkInterface` | | The name of the network interface on nodes connected to the `provisioning` network. For {product-title} 4.9 and later releases, use the `bootMACAddress` configuration setting to enable Ironic to identify the IP address of the NIC instead of using the `provisioningNetworkInterface` configuration setting to identify the name of the NIC.
94-
endif::[]
9593

9694

9795
| `defaultMachinePlatform` | | The default configuration used for machine pools without a platform configuration.
@@ -105,13 +103,6 @@ default name resolves correctly.
105103

106104
| `ingressVIP` | `test.apps.<clustername.clusterdomain>` | The VIP to use for ingress traffic.
107105

108-
ifeval::[{product-version} < 4.5]
109-
Provide this setting or pre-configure it in the DNS so that the default name resolves correctly.
110-
|`dnsVIP` | | The VIP to use for internal DNS communication.
111-
112-
This setting has no default and must always be provided.
113-
endif::[]
114-
115106
|===
116107

117108

@@ -122,15 +113,6 @@ endif::[]
122113
|Default
123114
|Description
124115

125-
126-
ifeval::[{product-version} > 4.3]
127-
ifeval::[{product-version} < 4.6]
128-
|`provisioningDHCPExternal`
129-
| `false`
130-
|Defines if the installer uses an external DHCP or the provisioner node DHCP.
131-
endif::[]
132-
endif::[]
133-
134116
|`provisioningDHCPRange`
135117
|`172.22.0.10,172.22.0.100`
136118
|Defines the IP range for nodes on the `provisioning` network.
@@ -145,15 +127,7 @@ a|`provisioningNetworkCIDR`
145127

146128
|`bootstrapProvisioningIP`
147129
|The second IP address of the `provisioningNetworkCIDR`.
148-
|The IP address on the bootstrap VM where the provisioning services run while the installer is deploying the control plane (master) nodes. Defaults to the second IP address of the `provisioning` subnet. For example, `172.22.0.2`
149-
ifeval::[{product-version} >= 4.5]
150-
or `2620:52:0:1307::2`
151-
endif::[]
152-
.
153-
154-
ifeval::[{product-version} == 4.6]
155-
Set this parameter to an available IP address on the `baremetal` network when the `provisioningNetwork` configuration setting is set to `Disabled`.
156-
endif::[]
130+
|The IP address on the bootstrap VM where the provisioning services run while the installer is deploying the control plane (master) nodes. Defaults to the second IP address of the `provisioning` subnet. For example, `172.22.0.2` or `2620:52:0:1307::2`.
157131

158132
| `externalBridge`
159133
| `baremetal`
@@ -170,13 +144,7 @@ endif::[]
170144
| `bootstrapOSImage`
171145
|
172146
| A URL to override the default operating system image for the bootstrap node. The URL must contain a SHA-256 hash of the image. For example:
173-
`https://mirror.openshift.com/rhcos-<version>-qemu.qcow2.gz?sha256=<uncompressed_sha256>`
174-
ifdef::upstream[]
175-
ifeval::[{product-version} >= 4.5]
176-
or `http://[2620:52:0:1307::1]/rhcos-<version>-qemu.x86_64.qcow2.gz?sha256=<uncompressed_sha256>`
177-
endif::[]
178-
endif::[]
179-
.
147+
`https://mirror.openshift.com/rhcos-<version>-qemu.qcow2.gz?sha256=<uncompressed_sha256>`.
180148

181149
| `clusterOSImage`
182150
|
@@ -189,19 +157,10 @@ endif::[]
189157

190158
`Disabled`: Set this parameter to `Disabled` to disable the requirement for a `provisioning` network. When set to `Disabled`, you must only use virtual media based provisioning, or bring up the cluster using the assisted installer. If `Disabled` and using power management, BMCs must be accessible from the `baremetal` network. If `Disabled`, you must provide two IP addresses on the `baremetal` network that are used for the provisioning services.
191159

192-
ifeval::[{product-version} >= 4.6]
193160
`Managed`: Set this parameter to `Managed`, which is the default, to fully manage the provisioning network, including DHCP, TFTP, and so on.
194161

195162
`Unmanaged`: Set this parameter to `Unmanaged` to enable the provisioning network but take care of manual configuration of DHCP. Virtual media provisioning is recommended but PXE is still available if required.
196-
endif::[]
197163

198-
ifeval::[{product-version} == 4.6]
199-
| `provisioningHostIP`
200-
|
201-
| Set this parameter to an available IP address on the `baremetal` network when the `provisioningNetwork` configuration setting is set to `Disabled`.
202-
endif::[]
203-
204-
ifeval::[{product-version} > 4.4]
205164
| `httpProxy`
206165
|
207166
| Set this parameter to the appropriate HTTP proxy used within your environment.
@@ -213,15 +172,15 @@ ifeval::[{product-version} > 4.4]
213172
| `noProxy`
214173
|
215174
| Set this parameter to the appropriate list of exclusions for proxy usage within your environment.
216-
endif::[]
217175

218176
|===
219177

220-
.Hosts
178+
[discrete]
179+
== Hosts
221180

222181
The `hosts` parameter is a list of separate bare metal assets used to build the cluster.
223182

224-
[options="header"]
183+
[width="100%", cols="3,2,5", options="header"]
225184
.Hosts
226185
|===
227186
|Name |Default |Description
@@ -244,9 +203,4 @@ The `hosts` parameter is a list of separate bare metal assets used to build the
244203
|
245204
| The MAC address of the NIC that the host uses for the `provisioning` network. Ironic retrieves the IP address using the `bootMACAddress` configuration setting. Then, it binds to the host.
246205

247-
ifeval::[{product-version} < 4.6]
248-
| `hardwareProfile`
249-
| `default`
250-
| This parameter exposes the device name that the installer attempts to deploy the {product-title} cluster for the control plane and worker nodes. The value defaults to `default` for control plane nodes and `unknown` for worker nodes. The list of profiles includes: `default`, `libvirt`, `dell`, `dell-raid`, and `openstack`. The `default` parameter attempts to install on `/dev/sda` of the {product-title} cluster nodes.
251-
endif::[]
252206
|===

modules/ipi-install-bmc-addressing-for-dell-idrac.adoc

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,9 @@ platform:
2323

2424
For Dell hardware, Red Hat supports integrated Dell Remote Access Controller (iDRAC) virtual media, Redfish network boot, and IPMI.
2525

26-
.BMC address formats for Dell iDRAC
27-
[frame="topbot",options="header"]
26+
[discrete]
27+
== BMC address formats for Dell iDRAC
28+
[width="100%", cols="1,3", options="header"]
2829
|====
2930
|Protocol|Address Format
3031
|iDRAC virtual media| `idrac-virtualmedia://<out-of-band-ip>/redfish/v1/Systems/System.Embedded.1`
@@ -39,19 +40,11 @@ Use `idrac-virtualmedia` as the protocol for Redfish virtual media. `redfish-vir
3940

4041
See the following sections for additional details.
4142

42-
.Redfish virtual media for Dell iDRAC
43+
[discrete]
44+
== Redfish virtual media for Dell iDRAC
4345

4446
For Redfish virtual media on Dell servers, use `idrac-virtualmedia://` in the `address` setting. Using `redfish-virtualmedia://` will not work.
4547

46-
ifeval::[{product-version} >= 4.6]
47-
ifeval::[{product-version} < 4.7]
48-
[NOTE]
49-
====
50-
Redfish virtual media on Dell servers has a known issue in {product-title} 4.6, which will be resolved in a future release.
51-
====
52-
endif::[]
53-
endif::[]
54-
5548
The following example demonstrates using iDRAC virtual media within the `install-config.yaml` file.
5649

5750
[source,yaml]
@@ -94,7 +87,8 @@ Use `idrac-virtualmedia://` as the protocol for Redfish virtual media. Using `re
9487
====
9588

9689

97-
.Redfish network boot for iDRAC
90+
[discrete]
91+
== Redfish network boot for iDRAC
9892

9993
To enable Redfish, use `redfish://` or `redfish+http://` to disable transport layer security (TLS). The installer requires both the hostname or the IP address and the path to the system ID. The following example demonstrates a Redfish configuration within the `install-config.yaml` file.
10094

modules/ipi-install-bmc-addressing-for-fujitsu-irmc.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ platform:
2424
For Fujitsu hardware, Red Hat supports integrated Remote Management Controller (iRMC) and IPMI.
2525

2626
.BMC address formats for Fujitsu iRMC
27-
[frame="topbot",options="header"]
27+
[options="header"]
2828
|====
2929
|Protocol|Address Format
3030
|iRMC| `irmc://<out-of-band-ip>`

modules/ipi-install-bmc-addressing-for-hpe-ilo.adoc

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ platform:
2424
For HPE integrated Lights Out (iLO), Red Hat supports Redfish virtual media, Redfish network boot, and IPMI.
2525

2626
.BMC address formats for HPE iLO
27-
[frame="topbot",options="header"]
27+
[width="100%", cols="1,3", options="header"]
2828
|====
2929
|Protocol|Address Format
3030
|Redfish virtual media| `redfish-virtualmedia://<out-of-band-ip>/redfish/v1/Systems/1`
@@ -34,7 +34,8 @@ For HPE integrated Lights Out (iLO), Red Hat supports Redfish virtual media, Red
3434

3535
See the following sections for additional details.
3636

37-
.Redfish virtual media for HPE iLO
37+
[discrete]
38+
== Redfish virtual media for HPE iLO
3839

3940
To enable Redfish virtual media for HPE servers, use `redfish-virtualmedia://` in the `address` setting. The following example demonstrates using Redfish virtual media within the `install-config.yaml` file.
4041

@@ -73,7 +74,8 @@ Redfish virtual media is not supported on 9th generation systems running iLO4, b
7374
====
7475

7576

76-
.Redfish network boot for HPE iLO
77+
[discrete]
78+
== Redfish network boot for HPE iLO
7779

7880
To enable Redfish, use `redfish://` or `redfish+http://` to disable TLS. The installer requires both the hostname or the IP address and the path to the system ID. The following example demonstrates a Redfish configuration within the `install-config.yaml` file.
7981

modules/ipi-install-bmc-addressing.adoc

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,10 @@
55

66
= BMC addressing
77

8-
Most vendors support BMC addressing with the Intelligent Platform Management Interface (IPMI). IPMI does not encrypt communications. It is suitable for use within a data center over a secured or dedicated management network. Check with your vendor to see if they support Redfish network boot. Redfish delivers simple and secure management for converged, hybrid IT and the Software Defined Data Center (SDDC). Redfish is human readable and machine capable, and leverages common internet and web services standards to expose information directly to the modern tool chain. If your hardware does not support Redfish network boot, use IPMI.
8+
Most vendors support Baseboard Management Controller (BMC) addressing with the Intelligent Platform Management Interface (IPMI). IPMI does not encrypt communications. It is suitable for use within a data center over a secured or dedicated management network. Check with your vendor to see if they support Redfish network boot. Redfish delivers simple and secure management for converged, hybrid IT and the Software Defined Data Center (SDDC). Redfish is human readable and machine capable, and leverages common internet and web services standards to expose information directly to the modern tool chain. If your hardware does not support Redfish network boot, use IPMI.
99

10-
.IPMI
10+
[discrete]
11+
== IPMI
1112

1213
Hosts using IPMI use the `ipmi://<out-of-band-ip>:<port>` address format, which defaults to port `623` if not specified. The following example demonstrates an IPMI configuration within the `install-config.yaml` file.
1314

@@ -24,8 +25,13 @@ platform:
2425
password: <password>
2526
----
2627

28+
[IMPORTANT]
29+
====
30+
The `provisioning` network is required when PXE booting using IPMI for BMC addressing. It is not possible to PXE boot hosts without a `provisioning` network. If you deploy without a `provisioning` network, you must use a virtual media BMC addressing option such as `redfish-virtualmedia` or `idrac-virtualmedia`. See "Redfish virtual media for HPE iLO" in the "BMC addressing for HPE iLO" section or "Redfish virtual media for Dell iDRAC" in the "BMC addressing for Dell iDRAC" section for additional details.
31+
====
2732

28-
.Redfish network boot
33+
[discrete]
34+
== Redfish network boot
2935

3036
To enable Redfish, use `redfish://` or `redfish+http://` to disable TLS. The installer requires both the hostname or the IP address and the path to the system ID. The following example demonstrates a Redfish configuration within the `install-config.yaml` file.
3137

modules/ipi-install-configuring-nodes.adoc

Lines changed: 18 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,8 @@
55
[id="configuring-nodes_{context}"]
66
= Configuring nodes
77

8-
.Configuring nodes when using the `provisioning` network
8+
[discrete]
9+
== Configuring nodes when using the `provisioning` network
910

1011
Each node in the cluster requires the following configuration for proper installation.
1112

@@ -16,18 +17,19 @@ A mismatch between nodes will cause an installation failure.
1617

1718
While the cluster nodes can contain more than two NICs, the installation process only focuses on the first two NICs:
1819

20+
[options="header"]
1921
|===
2022
|NIC |Network |VLAN
21-
| NIC1 | `provisioning` | <provisioning-vlan>
22-
| NIC2 | `baremetal` | <baremetal-vlan>
23+
| NIC1 | `provisioning` | `<provisioning_vlan>`
24+
| NIC2 | `baremetal` | `<baremetal_vlan>`
2325
|===
2426

25-
NIC1 is a non-routable network (`provisioning`) that is only used for the installation of the {product-title} cluster.
27+
In the foregoing example, NIC1 is a non-routable network (`provisioning`) that is only used for the installation of the {product-title} cluster.
2628

2729
ifndef::openshift-origin[The {op-system-base-full} 8.x installation process on the provisioner node might vary. To install {op-system-base-full} 8.x using a local Satellite server or a PXE server, PXE-enable NIC2.]
2830
ifdef::openshift-origin[The {op-system-first} installation process on the provisioner node might vary. To install {op-system} using a local Satellite server or a PXE server, PXE-enable NIC2.]
2931

30-
32+
[options="header"]
3133
|===
3234
|PXE |Boot order
3335
| NIC1 PXE-enabled `provisioning` network | 1
@@ -41,29 +43,33 @@ Ensure PXE is disabled on all other NICs.
4143

4244
Configure the control plane and worker nodes as follows:
4345

46+
[options="header"]
4447
|===
4548
|PXE | Boot order
4649
| NIC1 PXE-enabled (provisioning network) | 1
4750
|===
4851

49-
ifeval::[{product-version} > 4.3]
50-
51-
.Configuring nodes without the `provisioning` network
52+
[discrete]
53+
== Configuring nodes without the `provisioning` network
5254

5355
The installation process requires one NIC:
5456

57+
[options="header"]
5558
|===
5659
|NIC |Network |VLAN
57-
| NICx | `baremetal` | <baremetal-vlan>
60+
| NICx | `baremetal` | `<baremetal_vlan>`
5861
|===
5962

6063
NICx is a routable network (`baremetal`) that is used for the installation of the {product-title} cluster, and routable to the internet.
6164

62-
endif::[]
65+
[IMPORTANT]
66+
====
67+
The `provisioning` network is optional, but it is required for PXE booting. If you deploy without a `provisioning` network, you must use a virtual media BMC addressing option such as `redfish-virtualmedia` or `idrac-virtualmedia`.
68+
====
6369

64-
ifeval::[{product-version} > 4.6]
6570
[id="configuring-nodes-for-secure-boot_{context}"]
66-
.Configuring nodes for Secure Boot manually
71+
[discrete]
72+
== Configuring nodes for Secure Boot manually
6773

6874
Secure Boot prevents a node from booting unless it verifies the node is using only trusted software, such as UEFI firmware drivers, EFI applications, and the operating system.
6975

@@ -82,4 +88,3 @@ To enable Secure Boot manually, refer to the hardware guide for the node and exe
8288
====
8389
Red Hat does not support Secure Boot with self-generated keys.
8490
====
85-
endif::[]

0 commit comments

Comments
 (0)