You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Deploying a managed {sno} cluster using the IBI Operator
8
8
9
-
Create the site-specific configuration resources in the hub cluster to initiate the image-based deployment of a preinstalled host.
9
+
Create the site-specific configuration resources in the hub cluster to initiate the image-based deployment of a preinstalled host.
10
10
11
11
When you create these configuration resources in the hub cluster, the Image Based Install (IBI) Operator generates a configuration ISO and attaches it to the target host to begin the site-specific configuration process. When the configuration process completes, the {sno} cluster is ready.
<1> Specify the name for the `BareMetalHost` resource.
140
-
<2> Specify if the host should be online.
140
+
<2> Specify if the host should be online.
141
141
<3> Specify the host boot MAC address.
142
142
<4> Specify the BMC address. You can only use bare-metal host drivers that support virtual media networking booting, for example redfish-virtualmedia and idrac-virtualmedia.
143
143
<5> Specify the name of the bare-metal host `Secret` resource.
@@ -245,7 +245,7 @@ spec:
245
245
baseDomain: example.com <3>
246
246
clusterInstallRef:
247
247
group: extensions.hive.openshift.io
248
-
kind: ImageClusterInstall
248
+
kind: ImageClusterInstall
249
249
name: ibi-image-install <4>
250
250
version: v1alpha1
251
251
clusterName: ibi-cluster <5>
@@ -283,7 +283,7 @@ spec:
283
283
hubAcceptsClient: true <2>
284
284
----
285
285
<1> Specify the name for the `ManagedCluster` resource.
286
-
<2> Specify `true` to enable {rh-rhacm} to mange the cluster.
286
+
<2> Specify `true` to enable {rh-rhacm} to manage the cluster.
287
287
288
288
.. Create the `ManagedCluster` resource by running the following command:
Copy file name to clipboardExpand all lines: modules/microshift-automation-example-bootc-systems.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,8 +15,8 @@ As a use case, consider the following example situation in which you want to aut
15
15
16
16
.Prerequisites
17
17
18
-
* You have created the `10-auto-recovery.conf` and `microshift-auto-recovery.service` files as explained in the the "Automating the integration process with systemd for RPM systems" section.
19
-
* You have created the `microshift-auto-recovery` script as explained in the the "Automating the integration process with systemd for RPM systems" section.
18
+
* You have created the `10-auto-recovery.conf` and `microshift-auto-recovery.service` files as explained in the "Automating the integration process with systemd for RPM systems" section.
19
+
* You have created the `microshift-auto-recovery` script as explained in the "Automating the integration process with systemd for RPM systems" section.
Copy file name to clipboardExpand all lines: modules/microshift-ingress-controller-config.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ You can use detailed ingress control settings by updating the {microshift-short}
22
22
.. Update the {microshift-short} `config.yaml` configuration file by making a copy of the provided `config.yaml.default` file in the `/etc/microshift/` directory, naming it `config.yaml` and keeping it in the source directory.
23
23
* After you create it, the `config.yaml` file takes precedence over built-in settings. The configuration file is read every time the {microshift-short} service starts.
24
24
25
-
.. Use a configuration snippet to apply the ingress control settings you want. To do this, create a configuration snippet YAML file and put it in the the `/etc/microshift/config.d/` configuration directory.
25
+
.. Use a configuration snippet to apply the ingress control settings you want. To do this, create a configuration snippet YAML file and put it in the `/etc/microshift/config.d/` configuration directory.
26
26
* Configuration snippet YAMLs take precedence over both built-in settings and a `config.yaml` configuration file. See the Additional resources links for more information.
27
27
28
28
. Replace the default values in the `network` section of the {microshift-short} YAML with your valid values, or create a configuration snippet file with the sections you need.
@@ -164,4 +164,4 @@ $ oc get pods -n openshift-ingress
Multi-tenancy in the Network Observability Operator allows and restricts individual user access, or group access, to the flows stored in Loki and or or Prometheus. Access is enabled for project administrators. Project administrators who have limited access to some namespaces can access flows for only those namespaces.
8
+
Multi-tenancy in the Network Observability Operator allows and restricts individual user access, or group access, to the flows stored in Loki and or Prometheus. Access is enabled for project administrators. Project administrators who have limited access to some namespaces can access flows for only those namespaces.
9
9
10
10
For Developers, multi-tenancy is available for both Loki and Prometheus but requires different access rights.
Copy file name to clipboardExpand all lines: modules/nw-sriov-networknodepolicy-object.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ If you want to create virtual function on the default network interface, ensure
72
72
+
73
73
[NOTE]
74
74
====
75
-
When `externallyManaged` is set to `true`, you must manually create the Virtual Functions (VFs) on the physical function (PF) before applying the `SriovNetworkNodePolicy` resource. If the VFs are not pre-created, the SR-IOV Network Operator's webhook will block the policy request.
75
+
When `externallyManaged` is set to `true`, you must manually create the Virtual Functions (VFs) on the physical function (PF) before applying the `SriovNetworkNodePolicy` resource. If the VFs are not pre-created, the SR-IOV Network Operator's webhook will block the policy request.
76
76
77
77
When `externallyManaged` is set to `false`, the SR-IOV Network Operator automatically creates and manages the VFs, including resetting them if necessary.
78
78
@@ -114,7 +114,7 @@ When `linkType` is set to `ib`, `isRdma` is automatically set to `true` by the S
114
114
+
115
115
Do not set linkType to `eth` for SriovNetworkNodePolicy, because this can lead to an incorrect number of available devices reported by the device plugin.
116
116
117
-
<19> Optional: To enable hardware offloading, you must set the `eSwitchMode` field to `"switchdev"`. For more information about hardware offloading, see "Configuring hardware offloading".
117
+
<19> Optional: To enable hardware offloading, you must set the `eSwitchMode` field to `"switchdev"`. For more information about hardware offloading, see "Configuring hardware offloading".
118
118
119
119
<20> Optional: To exclude advertising an SR-IOV network resource's NUMA node to the Topology Manager, set the value to `true`. The default value is `false`.
120
120
@@ -168,4 +168,4 @@ spec:
168
168
169
169
<1> The `numVfs` field is always set to `1` when configuring the node network policy for a virtual machine.
170
170
171
-
<2> The `netFilter` field must refer to a network ID when the virtual machine is deployed on {rh-openstack}. Valid values for `netFilter` are available from an `SriovNetworkNodeState` object.
171
+
<2> The `netFilter` field must refer to a network ID when the virtual machine is deployed on {rh-openstack}. Valid values for `netFilter` are available from an `SriovNetworkNodeState` object.
= Backing up an application and its self-signed CA certificate
8
8
9
-
The `s3.openshift-storage.svc` service, provided by {odf-short}, uses a Transport Layer Security protocol (TLS) certificate that is signed with the self-signed service CA.
9
+
The `s3.openshift-storage.svc` service, provided by {odf-short}, uses a Transport Layer Security protocol (TLS) certificate that is signed with the self-signed service CA.
10
10
11
11
To prevent a `certificate signed by unknown authority` error, you must include a self-signed CA certificate in the backup storage location (BSL) section of `DataProtectionApplication` custom resource (CR). For this situation, you must complete the following tasks:
12
12
@@ -71,11 +71,11 @@ backup-c20...41fd
71
71
s3.openshift-storage.svc
72
72
----
73
73
74
-
. To get the bucket credentials from the `secret` object, run the following command:
74
+
. To get the bucket credentials from the `secret` object, run the following command:
75
75
+
76
76
[source,terminal]
77
77
----
78
-
$ oc extract --to=- secret/test-obc
78
+
$ oc extract --to=- secret/test-obc
79
79
----
80
80
+
81
81
.Example output
@@ -92,8 +92,8 @@ YXf...+NaCkdyC3QPym
92
92
[source,terminal]
93
93
----
94
94
[default]
95
-
aws_access_key_id=<AWS_ACCESS_KEY_ID>
96
-
aws_secret_access_key=<AWS_SECRET_ACCESS_KEY>
95
+
aws_access_key_id=<AWS_ACCESS_KEY_ID>
96
+
aws_secret_access_key=<AWS_SECRET_ACCESS_KEY>
97
97
----
98
98
99
99
. Create the `cloud-credentials` secret with the `cloud-credentials` file content by running the following command:
@@ -142,20 +142,20 @@ spec:
142
142
- aws
143
143
- openshift
144
144
- csi
145
-
defaultSnapshotMoveData: true
145
+
defaultSnapshotMoveData: true
146
146
backupLocations:
147
147
- velero:
148
148
config:
149
149
profile: "default"
150
150
region: noobaa
151
-
s3Url: https://s3.openshift-storage.svc
152
-
s3ForcePathStyle: "true"
151
+
s3Url: https://s3.openshift-storage.svc
152
+
s3ForcePathStyle: "true"
153
153
insecureSkipTLSVerify: "false" # <1>
154
154
provider: aws
155
155
default: true
156
156
credential:
157
157
key: cloud
158
-
name: cloud-credentials
158
+
name: cloud-credentials
159
159
objectStorage:
160
160
bucket: <bucket_name> # <2>
161
161
prefix: oadp
@@ -169,7 +169,7 @@ spec:
169
169
+
170
170
[source,terminal]
171
171
----
172
-
$ oc apply -f <dpa_filename>
172
+
$ oc apply -f <dpa_filename>
173
173
----
174
174
175
175
. Verify that the `DataProtectionApplication` CR is created successfully by running the following command:
@@ -211,7 +211,7 @@ metadata:
211
211
+
212
212
[source,terminal]
213
213
----
214
-
$ oc get backupstoragelocations.velero.io -n openshift-adp
214
+
$ oc get backupstoragelocations.velero.io -n openshift-adp
0 commit comments