You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: installing/installing_bare_metal_ipi/ipi-install-overview.adoc
+5-45Lines changed: 5 additions & 45 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,57 +3,17 @@
3
3
include::modules/common-attributes.adoc[]
4
4
:context: ipi-install
5
5
6
-
ifdef::watermark[]
7
-
[IMPORTANT]
8
-
====
9
-
The Bare Metal IPI images and code described in this document are for *Developer Preview* purposes and are *not supported* by Red Hat at this time.
10
-
====
11
-
endif::[]
12
-
13
6
Installer-provisioned installation provides support for installing {product-title} on bare metal nodes. This guide provides a methodology to achieving a successful installation.
14
7
15
8
During installer-provisioned installation on bare metal, the installer on the bare metal node labeled as `provisioner` creates a bootstrap virtual machine (VM). The role of the bootstrap VM is to assist in the process of deploying an {product-title} cluster. The bootstrap VM connects to the `baremetal` network and to the `provisioning` network, if present, via the network bridges.
When the installation of OpenShift control plane nodes is complete and fully operational, the installer destroys the bootstrap VM automatically and moves the virtual IP addresses (VIPs) to
30
-
ifeval::[{product-version} >= 4.8]
31
-
the control plane nodes.
32
-
endif::[]
33
-
ifeval::[{product-version} <= 4.7]
34
-
the appropriate nodes. The API VIP moves to the control plane nodes and the Ingress VIP moves to the worker nodes.
35
-
endif::[]
36
-
37
11
12
+
When the installation of OpenShift control plane nodes is complete and fully operational, the installer destroys the bootstrap VM automatically and moves the virtual IP addresses (VIPs) to the control plane nodes.
The `provisioning` network is optional, but it is required for PXE booting. If you deploy without a `provisioning` network, you must use a virtual media BMC addressing option such as `redfish-virtualmedia` or `idrac-virtualmedia`.
Copy file name to clipboardExpand all lines: modules/ipi-install-additional-install-config-parameters.adoc
+5-51Lines changed: 5 additions & 51 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,9 +89,7 @@ controlPlane:
89
89
|
90
90
|Replicas sets the number of control plane (master) nodes included as part of the {product-title} cluster.
91
91
92
-
ifeval::[{product-version} >= 4.4]
93
92
a| `provisioningNetworkInterface` | | The name of the network interface on nodes connected to the `provisioning` network. For {product-title} 4.9 and later releases, use the `bootMACAddress` configuration setting to enable Ironic to identify the IP address of the NIC instead of using the `provisioningNetworkInterface` configuration setting to identify the name of the NIC.
94
-
endif::[]
95
93
96
94
97
95
| `defaultMachinePlatform` | | The default configuration used for machine pools without a platform configuration.
@@ -105,13 +103,6 @@ default name resolves correctly.
105
103
106
104
| `ingressVIP` | `test.apps.<clustername.clusterdomain>` | The VIP to use for ingress traffic.
107
105
108
-
ifeval::[{product-version} < 4.5]
109
-
Provide this setting or pre-configure it in the DNS so that the default name resolves correctly.
110
-
|`dnsVIP` | | The VIP to use for internal DNS communication.
111
-
112
-
This setting has no default and must always be provided.
113
-
endif::[]
114
-
115
106
|===
116
107
117
108
@@ -122,15 +113,6 @@ endif::[]
122
113
|Default
123
114
|Description
124
115
125
-
126
-
ifeval::[{product-version} > 4.3]
127
-
ifeval::[{product-version} < 4.6]
128
-
|`provisioningDHCPExternal`
129
-
| `false`
130
-
|Defines if the installer uses an external DHCP or the provisioner node DHCP.
131
-
endif::[]
132
-
endif::[]
133
-
134
116
|`provisioningDHCPRange`
135
117
|`172.22.0.10,172.22.0.100`
136
118
|Defines the IP range for nodes on the `provisioning` network.
@@ -145,15 +127,7 @@ a|`provisioningNetworkCIDR`
145
127
146
128
|`bootstrapProvisioningIP`
147
129
|The second IP address of the `provisioningNetworkCIDR`.
148
-
|The IP address on the bootstrap VM where the provisioning services run while the installer is deploying the control plane (master) nodes. Defaults to the second IP address of the `provisioning` subnet. For example, `172.22.0.2`
149
-
ifeval::[{product-version} >= 4.5]
150
-
or `2620:52:0:1307::2`
151
-
endif::[]
152
-
.
153
-
154
-
ifeval::[{product-version} == 4.6]
155
-
Set this parameter to an available IP address on the `baremetal` network when the `provisioningNetwork` configuration setting is set to `Disabled`.
156
-
endif::[]
130
+
|The IP address on the bootstrap VM where the provisioning services run while the installer is deploying the control plane (master) nodes. Defaults to the second IP address of the `provisioning` subnet. For example, `172.22.0.2` or `2620:52:0:1307::2`.
157
131
158
132
| `externalBridge`
159
133
| `baremetal`
@@ -170,13 +144,7 @@ endif::[]
170
144
| `bootstrapOSImage`
171
145
|
172
146
| A URL to override the default operating system image for the bootstrap node. The URL must contain a SHA-256 hash of the image. For example:
`Disabled`: Set this parameter to `Disabled` to disable the requirement for a `provisioning` network. When set to `Disabled`, you must only use virtual media based provisioning, or bring up the cluster using the assisted installer. If `Disabled` and using power management, BMCs must be accessible from the `baremetal` network. If `Disabled`, you must provide two IP addresses on the `baremetal` network that are used for the provisioning services.
191
159
192
-
ifeval::[{product-version} >= 4.6]
193
160
`Managed`: Set this parameter to `Managed`, which is the default, to fully manage the provisioning network, including DHCP, TFTP, and so on.
194
161
195
162
`Unmanaged`: Set this parameter to `Unmanaged` to enable the provisioning network but take care of manual configuration of DHCP. Virtual media provisioning is recommended but PXE is still available if required.
196
-
endif::[]
197
163
198
-
ifeval::[{product-version} == 4.6]
199
-
| `provisioningHostIP`
200
-
|
201
-
| Set this parameter to an available IP address on the `baremetal` network when the `provisioningNetwork` configuration setting is set to `Disabled`.
202
-
endif::[]
203
-
204
-
ifeval::[{product-version} > 4.4]
205
164
| `httpProxy`
206
165
|
207
166
| Set this parameter to the appropriate HTTP proxy used within your environment.
| Set this parameter to the appropriate list of exclusions for proxy usage within your environment.
216
-
endif::[]
217
175
218
176
|===
219
177
220
-
.Hosts
178
+
[discrete]
179
+
== Hosts
221
180
222
181
The `hosts` parameter is a list of separate bare metal assets used to build the cluster.
223
182
224
-
[options="header"]
183
+
[width="100%", cols="3,2,5", options="header"]
225
184
.Hosts
226
185
|===
227
186
|Name |Default |Description
@@ -244,9 +203,4 @@ The `hosts` parameter is a list of separate bare metal assets used to build the
244
203
|
245
204
| The MAC address of the NIC that the host uses for the `provisioning` network. Ironic retrieves the IP address using the `bootMACAddress` configuration setting. Then, it binds to the host.
246
205
247
-
ifeval::[{product-version} < 4.6]
248
-
| `hardwareProfile`
249
-
| `default`
250
-
| This parameter exposes the device name that the installer attempts to deploy the {product-title} cluster for the control plane and worker nodes. The value defaults to `default` for control plane nodes and `unknown` for worker nodes. The list of profiles includes: `default`, `libvirt`, `dell`, `dell-raid`, and `openstack`. The `default` parameter attempts to install on `/dev/sda` of the {product-title} cluster nodes.
@@ -39,19 +40,11 @@ Use `idrac-virtualmedia` as the protocol for Redfish virtual media. `redfish-vir
39
40
40
41
See the following sections for additional details.
41
42
42
-
.Redfish virtual media for Dell iDRAC
43
+
[discrete]
44
+
== Redfish virtual media for Dell iDRAC
43
45
44
46
For Redfish virtual media on Dell servers, use `idrac-virtualmedia://` in the `address` setting. Using `redfish-virtualmedia://` will not work.
45
47
46
-
ifeval::[{product-version} >= 4.6]
47
-
ifeval::[{product-version} < 4.7]
48
-
[NOTE]
49
-
====
50
-
Redfish virtual media on Dell servers has a known issue in {product-title} 4.6, which will be resolved in a future release.
51
-
====
52
-
endif::[]
53
-
endif::[]
54
-
55
48
The following example demonstrates using iDRAC virtual media within the `install-config.yaml` file.
56
49
57
50
[source,yaml]
@@ -94,7 +87,8 @@ Use `idrac-virtualmedia://` as the protocol for Redfish virtual media. Using `re
94
87
====
95
88
96
89
97
-
.Redfish network boot for iDRAC
90
+
[discrete]
91
+
== Redfish network boot for iDRAC
98
92
99
93
To enable Redfish, use `redfish://` or `redfish+http://` to disable transport layer security (TLS). The installer requires both the hostname or the IP address and the path to the system ID. The following example demonstrates a Redfish configuration within the `install-config.yaml` file.
@@ -34,7 +34,8 @@ For HPE integrated Lights Out (iLO), Red Hat supports Redfish virtual media, Red
34
34
35
35
See the following sections for additional details.
36
36
37
-
.Redfish virtual media for HPE iLO
37
+
[discrete]
38
+
== Redfish virtual media for HPE iLO
38
39
39
40
To enable Redfish virtual media for HPE servers, use `redfish-virtualmedia://` in the `address` setting. The following example demonstrates using Redfish virtual media within the `install-config.yaml` file.
40
41
@@ -73,7 +74,8 @@ Redfish virtual media is not supported on 9th generation systems running iLO4, b
73
74
====
74
75
75
76
76
-
.Redfish network boot for HPE iLO
77
+
[discrete]
78
+
== Redfish network boot for HPE iLO
77
79
78
80
To enable Redfish, use `redfish://` or `redfish+http://` to disable TLS. The installer requires both the hostname or the IP address and the path to the system ID. The following example demonstrates a Redfish configuration within the `install-config.yaml` file.
Copy file name to clipboardExpand all lines: modules/ipi-install-bmc-addressing.adoc
+9-3Lines changed: 9 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,10 @@
5
5
6
6
= BMC addressing
7
7
8
-
Most vendors support BMC addressing with the Intelligent Platform Management Interface (IPMI). IPMI does not encrypt communications. It is suitable for use within a data center over a secured or dedicated management network. Check with your vendor to see if they support Redfish network boot. Redfish delivers simple and secure management for converged, hybrid IT and the Software Defined Data Center (SDDC). Redfish is human readable and machine capable, and leverages common internet and web services standards to expose information directly to the modern tool chain. If your hardware does not support Redfish network boot, use IPMI.
8
+
Most vendors support Baseboard Management Controller (BMC) addressing with the Intelligent Platform Management Interface (IPMI). IPMI does not encrypt communications. It is suitable for use within a data center over a secured or dedicated management network. Check with your vendor to see if they support Redfish network boot. Redfish delivers simple and secure management for converged, hybrid IT and the Software Defined Data Center (SDDC). Redfish is human readable and machine capable, and leverages common internet and web services standards to expose information directly to the modern tool chain. If your hardware does not support Redfish network boot, use IPMI.
9
9
10
-
.IPMI
10
+
[discrete]
11
+
== IPMI
11
12
12
13
Hosts using IPMI use the `ipmi://<out-of-band-ip>:<port>` address format, which defaults to port `623` if not specified. The following example demonstrates an IPMI configuration within the `install-config.yaml` file.
13
14
@@ -24,8 +25,13 @@ platform:
24
25
password: <password>
25
26
----
26
27
28
+
[IMPORTANT]
29
+
====
30
+
The `provisioning` network is required when PXE booting using IPMI for BMC addressing. It is not possible to PXE boot hosts without a `provisioning` network. If you deploy without a `provisioning` network, you must use a virtual media BMC addressing option such as `redfish-virtualmedia` or `idrac-virtualmedia`. See "Redfish virtual media for HPE iLO" in the "BMC addressing for HPE iLO" section or "Redfish virtual media for Dell iDRAC" in the "BMC addressing for Dell iDRAC" section for additional details.
31
+
====
27
32
28
-
.Redfish network boot
33
+
[discrete]
34
+
== Redfish network boot
29
35
30
36
To enable Redfish, use `redfish://` or `redfish+http://` to disable TLS. The installer requires both the hostname or the IP address and the path to the system ID. The following example demonstrates a Redfish configuration within the `install-config.yaml` file.
Copy file name to clipboardExpand all lines: modules/ipi-install-configuring-nodes.adoc
+18-13Lines changed: 18 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,8 @@
5
5
[id="configuring-nodes_{context}"]
6
6
= Configuring nodes
7
7
8
-
.Configuring nodes when using the `provisioning` network
8
+
[discrete]
9
+
== Configuring nodes when using the `provisioning` network
9
10
10
11
Each node in the cluster requires the following configuration for proper installation.
11
12
@@ -16,18 +17,19 @@ A mismatch between nodes will cause an installation failure.
16
17
17
18
While the cluster nodes can contain more than two NICs, the installation process only focuses on the first two NICs:
18
19
20
+
[options="header"]
19
21
|===
20
22
|NIC |Network |VLAN
21
-
| NIC1 | `provisioning` | <provisioning-vlan>
22
-
| NIC2 | `baremetal` | <baremetal-vlan>
23
+
| NIC1 | `provisioning` | `<provisioning_vlan>`
24
+
| NIC2 | `baremetal` | `<baremetal_vlan>`
23
25
|===
24
26
25
-
NIC1 is a non-routable network (`provisioning`) that is only used for the installation of the {product-title} cluster.
27
+
In the foregoing example, NIC1 is a non-routable network (`provisioning`) that is only used for the installation of the {product-title} cluster.
26
28
27
29
ifndef::openshift-origin[The {op-system-base-full} 8.x installation process on the provisioner node might vary. To install {op-system-base-full} 8.x using a local Satellite server or a PXE server, PXE-enable NIC2.]
28
30
ifdef::openshift-origin[The {op-system-first} installation process on the provisioner node might vary. To install {op-system} using a local Satellite server or a PXE server, PXE-enable NIC2.]
29
31
30
-
32
+
[options="header"]
31
33
|===
32
34
|PXE |Boot order
33
35
| NIC1 PXE-enabled `provisioning` network | 1
@@ -41,29 +43,33 @@ Ensure PXE is disabled on all other NICs.
41
43
42
44
Configure the control plane and worker nodes as follows:
43
45
46
+
[options="header"]
44
47
|===
45
48
|PXE | Boot order
46
49
| NIC1 PXE-enabled (provisioning network) | 1
47
50
|===
48
51
49
-
ifeval::[{product-version} > 4.3]
50
-
51
-
.Configuring nodes without the `provisioning` network
52
+
[discrete]
53
+
== Configuring nodes without the `provisioning` network
52
54
53
55
The installation process requires one NIC:
54
56
57
+
[options="header"]
55
58
|===
56
59
|NIC |Network |VLAN
57
-
| NICx | `baremetal` | <baremetal-vlan>
60
+
| NICx | `baremetal` | `<baremetal_vlan>`
58
61
|===
59
62
60
63
NICx is a routable network (`baremetal`) that is used for the installation of the {product-title} cluster, and routable to the internet.
61
64
62
-
endif::[]
65
+
[IMPORTANT]
66
+
====
67
+
The `provisioning` network is optional, but it is required for PXE booting. If you deploy without a `provisioning` network, you must use a virtual media BMC addressing option such as `redfish-virtualmedia` or `idrac-virtualmedia`.
Secure Boot prevents a node from booting unless it verifies the node is using only trusted software, such as UEFI firmware drivers, EFI applications, and the operating system.
69
75
@@ -82,4 +88,3 @@ To enable Secure Boot manually, refer to the hardware guide for the node and exe
82
88
====
83
89
Red Hat does not support Secure Boot with self-generated keys.
0 commit comments