Skip to content

Commit 5a2bbe6

Browse files
Merge pull request #45195 from mjpytlak/osdocs-3434
OSDOCS-3434: Adding permission requirement for installation directory
2 parents ee3ae73 + b8803e9 commit 5a2bbe6

File tree

2 files changed

+45
-57
lines changed

2 files changed

+45
-57
lines changed

modules/installation-initializing.adoc

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -207,15 +207,10 @@ $ ./openshift-install create install-config --dir <installation_directory> <1>
207207
<1> For `<installation_directory>`, specify the directory name to store the
208208
files that the installation program creates.
209209
+
210-
[IMPORTANT]
211-
====
212-
Specify an empty directory. Some installation assets, like bootstrap X.509
213-
certificates have short expiration intervals, so you must not reuse an
214-
installation directory. If you want to reuse individual files from another
215-
cluster installation, you can copy them into your directory. However, the file
216-
names for the installation assets might change between releases. Use caution
217-
when copying installation files from an earlier {product-title} version.
218-
====
210+
When specifying the directory:
211+
* Verify that the directory has the `execute` permission. This permission is required to run Terraform binaries under the installation directory.
212+
* Use an empty directory. Some installation assets, such as bootstrap X.509 certificates, have short expiration intervals, therefore you must not reuse an installation directory. If you want to reuse individual files from another cluster installation, you can copy them into your directory. However, the file names for the installation assets might change between releases. Use caution when copying installation files from an earlier {product-title} version.
213+
219214
ifndef::rhv[]
220215
.. At the prompts, provide the configuration details for your cloud:
221216
... Optional: Select an SSH key to use to access your cluster machines.
@@ -684,4 +679,3 @@ ifeval::["{context}" == "installing-restricted-networks-vmc"]
684679
:!vsphere:
685680
:!restricted:
686681
endif::[]
687-

modules/installation-launching-installer.adoc

Lines changed: 41 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,12 @@ environment variables
207207
** The `gcloud cli` default credentials
208208
endif::gcp[]
209209

210+
ifdef::no-config[]
210211
. Change to the directory that contains the installation program and initialize the cluster deployment:
212+
endif::no-config[]
213+
ifdef::custom-config[]
214+
* Change to the directory that contains the installation program and initialize the cluster deployment:
215+
endif::custom-config[]
211216
+
212217
[source,terminal]
213218
----
@@ -225,19 +230,12 @@ endif::no-config[]
225230
`error` instead of `info`.
226231
ifdef::no-config[]
227232
+
228-
[IMPORTANT]
229-
====
230-
Specify an empty directory. Some installation assets, like bootstrap X.509
231-
certificates have short expiration intervals, so you must not reuse an
232-
installation directory. If you want to reuse individual files from another
233-
cluster installation, you can copy them into your directory. However, the file
234-
names for the installation assets might change between releases. Use caution
235-
when copying installation files from an earlier {product-title} version.
236-
====
237-
+
238-
--
233+
When specifying the directory:
234+
* Verify that the directory has the `execute` permission. This permission is required to run Terraform binaries under the installation directory.
235+
* Use an empty directory. Some installation assets, such as bootstrap X.509 certificates, have short expiration intervals, therefore you must not reuse an installation directory. If you want to reuse individual files from another cluster installation, you can copy them into your directory. However, the file names for the installation assets might change between releases. Use caution when copying installation files from an earlier {product-title} version.
236+
239237
ifndef::rhv[]
240-
Provide values at the prompts:
238+
. Provide values at the prompts:
241239

242240
.. Optional: Select an SSH key to use to access your cluster machines.
243241
+
@@ -341,7 +339,7 @@ ifdef::openshift-origin[]
341339
endif::openshift-origin[]
342340
endif::rhv[]
343341
ifdef::rhv[]
344-
Respond to the installation program prompts.
342+
. Respond to the installation program prompts.
345343

346344
.. Optional: For `SSH Public Key`, select a password-less public key, such as `~/.ssh/id_rsa.pub`. This key authenticates connections with the new {product-title} cluster.
347345
+
@@ -389,7 +387,7 @@ endif::openshift-origin[]
389387
.. For `Cluster Name`, enter the name of the cluster. For example, `my-cluster`. Use cluster name from the externally registered/resolvable DNS entries you created for the {product-title} REST API and apps domain names. The installation program also gives this name to the cluster in the {rh-virtualization} environment.
390388
.. For `Pull Secret`, copy the pull secret from the `pull-secret.txt` file you downloaded earlier and paste it here. You can also get a copy of the same {cluster-manager-url-pull}.
391389
endif::rhv[]
392-
--
390+
393391
endif::no-config[]
394392
ifdef::vmc[]
395393
+
@@ -407,39 +405,6 @@ permissions to deploy the cluster, the installation process stops, and the
407405
missing permissions are displayed.
408406
====
409407
endif::vsphere[]
410-
+
411-
When the cluster deployment completes, directions for accessing your cluster,
412-
including a link to its web console and credentials for the `kubeadmin` user,
413-
display in your terminal.
414-
+
415-
.Example output
416-
[source,terminal]
417-
----
418-
...
419-
INFO Install complete!
420-
INFO To access the cluster as the system:admin user when using 'oc', run 'export KUBECONFIG=/home/myuser/install_dir/auth/kubeconfig'
421-
INFO Access the OpenShift web-console here: https://console-openshift-console.apps.mycluster.example.com
422-
INFO Login to the console with user: "kubeadmin", and password: "4vYBz-Ee6gm-ymBZj-Wt5AL"
423-
INFO Time elapsed: 36m22s
424-
----
425-
+
426-
[NOTE]
427-
====
428-
The cluster access and credential information also outputs to `<installation_directory>/.openshift_install.log` when an installation succeeds.
429-
====
430-
+
431-
[IMPORTANT]
432-
====
433-
* The Ignition config files that the installation program generates contain certificates that expire after 24 hours, which are then renewed at that time. If the cluster is shut down before renewing the certificates and the cluster is later restarted after the 24 hours have elapsed, the cluster automatically recovers the expired certificates. The exception is that you must manually approve the pending `node-bootstrapper` certificate signing requests (CSRs) to recover kubelet certificates. See the documentation for _Recovering from expired control plane certificates_ for more information.
434-
435-
* It is recommended that you use Ignition config files within 12 hours after they are generated because the 24-hour certificate rotates from 16 to 22 hours after the cluster is installed. By using the Ignition config files within 12 hours, you can avoid installation failure if the certificate update runs during installation.
436-
====
437-
+
438-
[IMPORTANT]
439-
====
440-
You must not delete the installation program or the files that the installation
441-
program creates. Both are required to delete the cluster.
442-
====
443408

444409
ifdef::aws[]
445410
. Optional: Remove or disable the `AdministratorAccess` policy from the IAM
@@ -458,6 +423,35 @@ ifdef::gcp[]
458423
you can remove it.
459424
endif::gcp[]
460425

426+
.Verification
427+
When the cluster deployment completes successfully:
428+
429+
* The terminal displays directions for accessing your cluster, including a link to the web console and credentials for the `kubeadmin` user.
430+
* Credential information also outputs to `<installation_directory>/.openshift_install.log`.
431+
432+
[IMPORTANT]
433+
====
434+
Do not delete the installation program or the files that the installation program creates. Both are required to delete the cluster.
435+
====
436+
437+
.Example output
438+
[source,terminal]
439+
----
440+
...
441+
INFO Install complete!
442+
INFO To access the cluster as the system:admin user when using 'oc', run 'export KUBECONFIG=/home/myuser/install_dir/auth/kubeconfig'
443+
INFO Access the OpenShift web-console here: https://console-openshift-console.apps.mycluster.example.com
444+
INFO Login to the console with user: "kubeadmin", and password: "4vYBz-Ee6gm-ymBZj-Wt5AL"
445+
INFO Time elapsed: 36m22s
446+
----
447+
448+
[IMPORTANT]
449+
====
450+
* The Ignition config files that the installation program generates contain certificates that expire after 24 hours, which are then renewed at that time. If the cluster is shut down before renewing the certificates and the cluster is later restarted after the 24 hours have elapsed, the cluster automatically recovers the expired certificates. The exception is that you must manually approve the pending `node-bootstrapper` certificate signing requests (CSRs) to recover kubelet certificates. See the documentation for _Recovering from expired control plane certificates_ for more information.
451+
452+
* It is recommended that you use Ignition config files within 12 hours after they are generated because the 24-hour certificate rotates from 16 to 22 hours after the cluster is installed. By using the Ignition config files within 12 hours, you can avoid installation failure if the certificate update runs during installation.
453+
====
454+
461455
ifeval::["{context}" == "installing-alibaba-customizations"]
462456
:!custom-config:
463457
endif::[]

0 commit comments

Comments
 (0)