Skip to content

Commit 40cdc0e

Browse files
authored
Merge pull request #32944 from johnwilkins/TELCODOCS-204
2 parents de84578 + a088b6c commit 40cdc0e

6 files changed

+87
-27
lines changed

installing/installing_bare_metal_ipi/ipi-install-configuration-files.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,10 @@ ifeval::[{product-version} >= 4.6]
1616
include::modules/ipi-install-modifying-install-config-for-no-provisioning-network.adoc[leveloffset=+1]
1717
endif::[]
1818

19+
ifeval::[{product-version} > 4.7]
20+
include::modules/ipi-install-configuring-managed-secure-boot-in-the-install-config-file.adoc[leveloffset=+1]
21+
endif::[]
22+
1923
include::modules/ipi-install-additional-install-config-parameters.adoc[leveloffset=+1]
2024

2125
include::modules/ipi-install-bmc-addressing.adoc[leveloffset=+1]

modules/ipi-install-additional-install-config-parameters.adoc

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,10 @@ and the `bmc` parameter for the `install-config.yaml` file.
1717
|
1818
| The domain name for the cluster. For example, `example.com`.
1919

20+
| [[bootmode]] `bootMode`
21+
| `UEFI`
22+
| The boot mode for a node. Options are `legacy`, `UEFI`, and `UEFISecureBoot`. If `bootMode` is not set, Ironic sets it while inspecting the node.
23+
2024
| [[sshkey]] `sshKey`
2125
|
2226
| The `sshKey` configuration setting contains the key in the `~/.ssh/id_rsa.pub` file required to access the control plane nodes and worker nodes. Typically, this key is from the `provisioner` node.
@@ -85,11 +89,9 @@ controlPlane:
8589
|Replicas sets the number of control plane (master) nodes included as part of the {product-title} cluster.
8690

8791
ifeval::[{product-version} >= 4.4]
88-
ifeval::[{product-version} <= 4.6]
8992
a| [[provisioningNetworkInterface]]`provisioningNetworkInterface` | | The name of the network interface on control plane nodes connected to the
9093
provisioning network.
9194
endif::[]
92-
endif::[]
9395

9496

9597
| `defaultMachinePlatform` | | The default configuration used for machine pools without a platform configuration.
@@ -185,9 +187,9 @@ endif::[]
185187
|
186188
| Set this parameter to `Disabled` to disable the requirement for a `provisioning` network. User may only do virtual media based provisioning, or bring up the cluster using assisted installation. If using power management, BMC's must be accessible from the machine networks. User must provide two IP addresses on the external network that are used for the provisioning services.
187189
ifeval::[{product-version} >= 4.6]
188-
Set this parameter to `managed`, which is the default, to fully manage the provisioning network, including DHCP, TFTP, and so on.
190+
Set this parameter to `Managed`, which is the default, to fully manage the provisioning network, including DHCP, TFTP, and so on.
189191

190-
Set this parameter to `unmanaged` to still enable the provisioning network but take care of manual configuration of DHCP. Virtual Media provisioning is recommended but PXE is still available if required.
192+
Set this parameter to `Unmanaged` to still enable the provisioning network but take care of manual configuration of DHCP. Virtual media provisioning is recommended but PXE is still available if required.
191193
endif::[]
192194

193195
ifeval::[{product-version} == 4.6]
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
// This is included in the following assemblies:
2+
//
3+
// installing/installing_bare_metal_ipi/ipi-install-configuration-files.adoc
4+
[id="configuring-managed-secure-boot-in-the-install-config-file_{context}"]
5+
6+
= Configuring managed Secure Boot in the `install-config.yaml` file (optional)
7+
8+
To enable managed Secure Boot, add the `bootMode` configuration setting to each node:
9+
10+
[source,yaml]
11+
.Example
12+
----
13+
hosts:
14+
- name: openshift-master-0
15+
role: master
16+
bmc:
17+
address: ipmi://<out-of-band-ip>
18+
username: <user>
19+
password: <password>
20+
bootMACAddress: <NIC1-mac-address>
21+
rootDeviceHints:
22+
deviceName: "/dev/sda"
23+
bootMode: UEFISecureBoot <1>
24+
----
25+
26+
<1> The `bootMode` setting is `UEFI` by default. Change it to `UEFISecureBoot` to enable managed Secure Boot.
27+
28+
[NOTE]
29+
====
30+
See "Configuring nodes" in the "Prerequisites" to ensure the nodes can support managed Secure Boot. If the nodes do not support managed Secure Boot, see "Configuring nodes for Secure Boot manually" in the "Configuring nodes" section. Configuring Secure Boot manually requires Redfish virtual media.
31+
====

modules/ipi-install-configuring-nodes.adoc

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ NIC1 is a non-routable network (`provisioning`) that is only used for the instal
2727
ifndef::openshift-origin[The {op-system-base-full} 8.x installation process on the provisioner node might vary. To install {op-system-base-full} 8.x using a local Satellite server or a PXE server, PXE-enable NIC2.]
2828
ifdef::openshift-origin[The {op-system-first} installation process on the provisioner node might vary. To install {op-system} using a local Satellite server or a PXE server, PXE-enable NIC2.]
2929

30+
3031
|===
3132
|PXE |Boot order
3233
| NIC1 PXE-enabled `provisioning` network | 1
@@ -61,16 +62,22 @@ NICx is a routable network (`baremetal`) that is used for the installation of th
6162
endif::[]
6263

6364
ifeval::[{product-version} > 4.6]
64-
.Configuring nodes for Secure Boot
65+
[id="configuring-nodes-for-secure-boot_{context}"]
66+
.Configuring nodes for Secure Boot manually
67+
68+
Secure Boot prevents a node from booting unless it verifies the node is using only trusted software, such as UEFI firmware drivers, EFI applications, and the operating system.
6569

66-
Secure Boot prevents a node from booting unless it verifies the node is using only trusted software, such as UEFI firmware drivers, EFI applications and the operating system. Red Hat only supports Secure Boot when deploying with RedFish Virtual Media.
70+
[NOTE]
71+
====
72+
Red Hat only supports manually configured Secure Boot when deploying with Redfish virtual media.
73+
====
6774

68-
To enable Secure Boot, refer to the hardware guide for the node. To enable Secure Boot, execute the following:
75+
To enable Secure Boot manually, refer to the hardware guide for the node and execute the following:
6976

7077
. Boot the node and enter the BIOS menu.
7178
. Set the node's boot mode to UEFI Enabled.
7279
. Enable Secure Boot.
73-
+
80+
7481
[IMPORTANT]
7582
====
7683
Red Hat does not support Secure Boot with self-generated keys.

modules/ipi-install-configuring-the-install-config-file.adoc

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -42,39 +42,42 @@ platform:
4242
username: <user>
4343
password: <password>
4444
bootMACAddress: <NIC1-mac-address>
45-
hardwareProfile: default
45+
rootDeviceHints:
46+
deviceName: "/dev/sda"
4647
- name: <openshift-master-1>
4748
role: master
4849
bmc:
4950
address: ipmi://<out-of-band-ip> <2>
5051
username: <user>
5152
password: <password>
5253
bootMACAddress: <NIC1-mac-address>
53-
hardwareProfile: default
54+
rootDeviceHints:
55+
deviceName: "/dev/sda"
5456
- name: <openshift-master-2>
5557
role: master
5658
bmc:
5759
address: ipmi://<out-of-band-ip> <2>
5860
username: <user>
5961
password: <password>
6062
bootMACAddress: <NIC1-mac-address>
61-
hardwareProfile: default
63+
rootDeviceHints:
64+
deviceName: "/dev/sda"
6265
- name: <openshift-worker-0>
6366
role: worker
6467
bmc:
6568
address: ipmi://<out-of-band-ip> <2>
6669
username: <user>
6770
password: <password>
6871
bootMACAddress: <NIC1-mac-address>
69-
hardwareProfile: unknown
7072
- name: <openshift-worker-1>
7173
role: worker
7274
bmc:
7375
address: ipmi://<out-of-band-ip>
7476
username: <user>
7577
password: <password>
7678
bootMACAddress: <NIC1-mac-address>
77-
hardwareProfile: unknown
79+
rootDeviceHints:
80+
deviceName: "/dev/sda"
7881
pullSecret: '<pull_secret>'
7982
sshKey: '<ssh_pub_key>'
8083
----

modules/ipi-install-node-requirements.adoc

Lines changed: 27 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -8,39 +8,52 @@
88

99
Installer-provisioned installation involves a number of hardware node requirements:
1010

11-
- **CPU architecture:** All nodes must use `x86_64` CPU architecture.
11+
- *CPU architecture:* All nodes must use `x86_64` CPU architecture.
1212

13-
- **Similar nodes:** Red Hat recommends nodes have an identical configuration per role. That is, Red Hat recommends nodes be the same brand and model with the same CPU, memory and storage configuration.
13+
- *Similar nodes:* Red Hat recommends nodes have an identical configuration per role. That is, Red Hat recommends nodes be the same brand and model with the same CPU, memory, and storage configuration.
1414

1515
ifeval::[{product-version} < 4.5]
16-
- **Intelligent Platform Management Interface (IPMI):** Installer-provisioned installation requires IPMI enabled on each node.
16+
- *Intelligent Platform Management Interface (IPMI):* Installer-provisioned installation requires IPMI enabled on each node.
1717
endif::[]
1818

1919
ifeval::[{product-version} > 4.4]
20-
- **Baseboard Management Controller:** The `provisioner` node must be able to access the baseboard management controller (BMC) of each {product-title} cluster node. You may use IPMI, RedFish, or a proprietary protocol.
20+
- *Baseboard Management Controller:* The `provisioner` node must be able to access the baseboard management controller (BMC) of each {product-title} cluster node. You may use IPMI, Redfish, or a proprietary protocol.
2121
endif::[]
2222

2323
ifndef::openshift-origin[]
24-
- **Latest generation:** Nodes must be of the most recent generation. Installer-provisioned installation relies on BMC protocols, which must be compatible across nodes. Additionally, {op-system-base} 8 ships with the most recent drivers for RAID controllers. Ensure that the nodes are recent enough to support {op-system-base} 8 for the `provisioner` node and {op-system} 8 for the control plane and worker nodes.
24+
- *Latest generation:* Nodes must be of the most recent generation. Installer-provisioned installation relies on BMC protocols, which must be compatible across nodes. Additionally, {op-system-base} 8 ships with the most recent drivers for RAID controllers. Ensure that the nodes are recent enough to support {op-system-base} 8 for the `provisioner` node and {op-system} 8 for the control plane and worker nodes.
2525
endif::[]
2626
ifdef::openshift-origin[]
27-
- **Latest generation:** Nodes must be of the most recent generation. Installer-provisioned installation relies on BMC protocols, which must be compatible across nodes. Additionally, {op-system-first} ships with the most recent drivers for RAID controllers. Ensure that the nodes are recent enough to support {op-system} for the `provisioner` node and {op-system} for the control plane and worker nodes.
27+
- *Latest generation:* Nodes must be of the most recent generation. Installer-provisioned installation relies on BMC protocols, which must be compatible across nodes. Additionally, {op-system-first} ships with the most recent drivers for RAID controllers. Ensure that the nodes are recent enough to support {op-system} for the `provisioner` node and {op-system} for the control plane and worker nodes.
2828
endif::[]
2929

30-
- **Registry node:** Optional: If setting up a disconnected mirrored registry, it is recommended the registry reside in its own node.
30+
- *Registry node:* (Optional) If setting up a disconnected mirrored registry, it is recommended the registry reside in its own node.
3131

32-
- **Provisioner node:** Installer-provisioned installation requires one `provisioner` node.
32+
- *Provisioner node:* Installer-provisioned installation requires one `provisioner` node.
3333

34-
- **Control plane:** Installer-provisioned installation requires three control plane nodes for high availability.
34+
- *Control plane:* Installer-provisioned installation requires three control plane nodes for high availability.
3535

36-
- **Worker nodes:** While not required, a typical production cluster has one or more worker nodes. Smaller clusters are more resource efficient for administrators and developers during development, production, and testing.
36+
- *Worker nodes:* While not required, a typical production cluster has one or more worker nodes. Smaller clusters are more resource efficient for administrators and developers during development, production, and testing.
3737

38-
- **Network interfaces:** Each node must have at least one 10GB network interface for the routable `baremetal` network. Each node must have one 10GB network interface for a `provisioning` network *when using the `provisioning` network* for deployment. Using the `provisioning` network is the default configuration. Network interface names must follow the same naming convention across all nodes. For example, the first NIC name on a node, such as `eth0` or `eno1`, must be the same name on all of the other nodes. The same principle applies to the remaining NICs on each node.
38+
- *Network interfaces:* Each node must have at least one 10GB network interface for the routable `baremetal` network. Each node must have one 10GB network interface for a `provisioning` network *when using the `provisioning` network* for deployment. Using the `provisioning` network is the default configuration. Network interface names must follow the same naming convention across all nodes. For example, the first NIC name on a node, such as `eth0` or `eno1`, must be the same name on all of the other nodes. The same principle applies to the remaining NICs on each node.
3939

4040
ifeval::[{product-version} > 4.3]
41-
- **Unified Extensible Firmware Interface (UEFI):** Installer-provisioned installation requires UEFI boot on all {product-title} nodes when using IPv6 addressing on the `provisioning` network. In addition, UEFI Device PXE Settings must be set to use the IPv6 protocol on the `provisioning` network NIC, but *omitting the `provisioning` network removes this requirement.*
41+
- *Unified Extensible Firmware Interface (UEFI):* Installer-provisioned installation requires UEFI boot on all {product-title} nodes when using IPv6 addressing on the `provisioning` network. In addition, UEFI Device PXE Settings must be set to use the IPv6 protocol on the `provisioning` network NIC, but omitting the `provisioning` network removes this requirement.
4242
endif::[]
4343

44-
ifeval::[{product-version} > 4.6]
45-
- **Secure Boot:** Many production scenarios require nodes with Secure Boot enabled to verify the node only boots with trusted software, such as UEFI firmware drivers, EFI applications and the operating system. To deploy a {product-title} cluster with Secure Boot, you must enable UEFI boot mode and Secure Boot on each control plane node and each worker node. Red Hat supports Secure Boot **only** when installer-provisioned installation uses Red Fish Virtual Media. Red Hat **does not** support Secure Boot with self-generated keys.
44+
ifeval::[{product-version} == 4.7]
45+
- *Secure Boot:* Many production scenarios require nodes with Secure Boot enabled to verify the node only boots with trusted software, such as UEFI firmware drivers, EFI applications, and the operating system. To deploy an {product-title} cluster with Secure Boot, you must enable UEFI boot mode and Secure Boot on each control plane node and each worker node. Red Hat supports Secure Boot only when installer-provisioned installations use Red Fish Virtual Media. Red Hat does not support Secure Boot with self-generated keys.
46+
endif::[]
47+
48+
ifeval::[{product-version} > 4.7]
49+
- *Secure Boot:* Many production scenarios require nodes with Secure Boot enabled to verify the node only boots with trusted software, such as UEFI firmware drivers, EFI applications, and the operating system. You may deploy with Secure Boot manually or managed.
50+
+
51+
. *Manually:* To deploy an {product-title} cluster with Secure Boot manually, you must enable UEFI boot mode and Secure Boot on each control plane node and each worker node. Red Hat supports Secure Boot with manually enabled UEFI and Secure Boot only when installer-provisioned installations use Redfish virtual media. See "Configuring nodes for Secure Boot manually" in the "Configuring nodes" section for additional details.
52+
+
53+
. *Managed:* To deploy an {product-title} cluster with managed Secure Boot, you must set the `bootMode` value to `UEFISecureBoot` in the `install-config.yaml` file. Red Hat only supports installer-provisioned installation with managed Secure Boot on 10th generation HPE hardware and 13th generation Dell hardware running firmware version `2.75.75.75` or greater. Deploying with managed Secure Boot does not require Redfish virtual media. See "Configuring managed Secure Boot" in the "Setting up the environment for an OpenShift installation" section for details.
54+
+
55+
[NOTE]
56+
====
57+
Red Hat does not support Secure Boot with self-generated keys.
58+
====
4659
endif::[]

0 commit comments

Comments
 (0)