You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<1> For `<installation_directory>`, specify the directory name to store the
208
208
files that the installation program creates.
209
209
+
210
-
[IMPORTANT]
211
-
====
212
-
Specify an empty directory. Some installation assets, like bootstrap X.509
213
-
certificates have short expiration intervals, so you must not reuse an
214
-
installation directory. If you want to reuse individual files from another
215
-
cluster installation, you can copy them into your directory. However, the file
216
-
names for the installation assets might change between releases. Use caution
217
-
when copying installation files from an earlier {product-title} version.
218
-
====
210
+
When specifying the directory:
211
+
* Verify that the directory has the `execute` permission. This permission is required to run Terraform binaries under the installation directory.
212
+
* Use an empty directory. Some installation assets, such as bootstrap X.509 certificates, have short expiration intervals, therefore you must not reuse an installation directory. If you want to reuse individual files from another cluster installation, you can copy them into your directory. However, the file names for the installation assets might change between releases. Use caution when copying installation files from an earlier {product-title} version.
213
+
219
214
ifndef::rhv[]
220
215
.. At the prompts, provide the configuration details for your cloud:
221
216
... Optional: Select an SSH key to use to access your cluster machines.
Copy file name to clipboardExpand all lines: modules/installation-launching-installer.adoc
+41-47Lines changed: 41 additions & 47 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -207,7 +207,12 @@ environment variables
207
207
** The `gcloud cli` default credentials
208
208
endif::gcp[]
209
209
210
+
ifdef::no-config[]
210
211
. Change to the directory that contains the installation program and initialize the cluster deployment:
212
+
endif::no-config[]
213
+
ifdef::custom-config[]
214
+
* Change to the directory that contains the installation program and initialize the cluster deployment:
215
+
endif::custom-config[]
211
216
+
212
217
[source,terminal]
213
218
----
@@ -225,19 +230,12 @@ endif::no-config[]
225
230
`error` instead of `info`.
226
231
ifdef::no-config[]
227
232
+
228
-
[IMPORTANT]
229
-
====
230
-
Specify an empty directory. Some installation assets, like bootstrap X.509
231
-
certificates have short expiration intervals, so you must not reuse an
232
-
installation directory. If you want to reuse individual files from another
233
-
cluster installation, you can copy them into your directory. However, the file
234
-
names for the installation assets might change between releases. Use caution
235
-
when copying installation files from an earlier {product-title} version.
236
-
====
237
-
+
238
-
--
233
+
When specifying the directory:
234
+
* Verify that the directory has the `execute` permission. This permission is required to run Terraform binaries under the installation directory.
235
+
* Use an empty directory. Some installation assets, such as bootstrap X.509 certificates, have short expiration intervals, therefore you must not reuse an installation directory. If you want to reuse individual files from another cluster installation, you can copy them into your directory. However, the file names for the installation assets might change between releases. Use caution when copying installation files from an earlier {product-title} version.
236
+
239
237
ifndef::rhv[]
240
-
Provide values at the prompts:
238
+
. Provide values at the prompts:
241
239
242
240
.. Optional: Select an SSH key to use to access your cluster machines.
243
241
+
@@ -341,7 +339,7 @@ ifdef::openshift-origin[]
341
339
endif::openshift-origin[]
342
340
endif::rhv[]
343
341
ifdef::rhv[]
344
-
Respond to the installation program prompts.
342
+
. Respond to the installation program prompts.
345
343
346
344
.. Optional: For `SSH Public Key`, select a password-less public key, such as `~/.ssh/id_rsa.pub`. This key authenticates connections with the new {product-title} cluster.
347
345
+
@@ -389,7 +387,7 @@ endif::openshift-origin[]
389
387
.. For `Cluster Name`, enter the name of the cluster. For example, `my-cluster`. Use cluster name from the externally registered/resolvable DNS entries you created for the {product-title} REST API and apps domain names. The installation program also gives this name to the cluster in the {rh-virtualization} environment.
390
388
.. For `Pull Secret`, copy the pull secret from the `pull-secret.txt` file you downloaded earlier and paste it here. You can also get a copy of the same {cluster-manager-url-pull}.
391
389
endif::rhv[]
392
-
--
390
+
393
391
endif::no-config[]
394
392
ifdef::vmc[]
395
393
+
@@ -407,39 +405,6 @@ permissions to deploy the cluster, the installation process stops, and the
407
405
missing permissions are displayed.
408
406
====
409
407
endif::vsphere[]
410
-
+
411
-
When the cluster deployment completes, directions for accessing your cluster,
412
-
including a link to its web console and credentials for the `kubeadmin` user,
413
-
display in your terminal.
414
-
+
415
-
.Example output
416
-
[source,terminal]
417
-
----
418
-
...
419
-
INFO Install complete!
420
-
INFO To access the cluster as the system:admin user when using 'oc', run 'export KUBECONFIG=/home/myuser/install_dir/auth/kubeconfig'
421
-
INFO Access the OpenShift web-console here: https://console-openshift-console.apps.mycluster.example.com
422
-
INFO Login to the console with user: "kubeadmin", and password: "4vYBz-Ee6gm-ymBZj-Wt5AL"
423
-
INFO Time elapsed: 36m22s
424
-
----
425
-
+
426
-
[NOTE]
427
-
====
428
-
The cluster access and credential information also outputs to `<installation_directory>/.openshift_install.log` when an installation succeeds.
429
-
====
430
-
+
431
-
[IMPORTANT]
432
-
====
433
-
* The Ignition config files that the installation program generates contain certificates that expire after 24 hours, which are then renewed at that time. If the cluster is shut down before renewing the certificates and the cluster is later restarted after the 24 hours have elapsed, the cluster automatically recovers the expired certificates. The exception is that you must manually approve the pending `node-bootstrapper` certificate signing requests (CSRs) to recover kubelet certificates. See the documentation for _Recovering from expired control plane certificates_ for more information.
434
-
435
-
* It is recommended that you use Ignition config files within 12 hours after they are generated because the 24-hour certificate rotates from 16 to 22 hours after the cluster is installed. By using the Ignition config files within 12 hours, you can avoid installation failure if the certificate update runs during installation.
436
-
====
437
-
+
438
-
[IMPORTANT]
439
-
====
440
-
You must not delete the installation program or the files that the installation
441
-
program creates. Both are required to delete the cluster.
442
-
====
443
408
444
409
ifdef::aws[]
445
410
. Optional: Remove or disable the `AdministratorAccess` policy from the IAM
@@ -458,6 +423,35 @@ ifdef::gcp[]
458
423
you can remove it.
459
424
endif::gcp[]
460
425
426
+
.Verification
427
+
When the cluster deployment completes successfully:
428
+
429
+
* The terminal displays directions for accessing your cluster, including a link to the web console and credentials for the `kubeadmin` user.
430
+
* Credential information also outputs to `<installation_directory>/.openshift_install.log`.
431
+
432
+
[IMPORTANT]
433
+
====
434
+
Do not delete the installation program or the files that the installation program creates. Both are required to delete the cluster.
435
+
====
436
+
437
+
.Example output
438
+
[source,terminal]
439
+
----
440
+
...
441
+
INFO Install complete!
442
+
INFO To access the cluster as the system:admin user when using 'oc', run 'export KUBECONFIG=/home/myuser/install_dir/auth/kubeconfig'
443
+
INFO Access the OpenShift web-console here: https://console-openshift-console.apps.mycluster.example.com
444
+
INFO Login to the console with user: "kubeadmin", and password: "4vYBz-Ee6gm-ymBZj-Wt5AL"
445
+
INFO Time elapsed: 36m22s
446
+
----
447
+
448
+
[IMPORTANT]
449
+
====
450
+
* The Ignition config files that the installation program generates contain certificates that expire after 24 hours, which are then renewed at that time. If the cluster is shut down before renewing the certificates and the cluster is later restarted after the 24 hours have elapsed, the cluster automatically recovers the expired certificates. The exception is that you must manually approve the pending `node-bootstrapper` certificate signing requests (CSRs) to recover kubelet certificates. See the documentation for _Recovering from expired control plane certificates_ for more information.
451
+
452
+
* It is recommended that you use Ignition config files within 12 hours after they are generated because the 24-hour certificate rotates from 16 to 22 hours after the cluster is installed. By using the Ignition config files within 12 hours, you can avoid installation failure if the certificate update runs during installation.
0 commit comments