Skip to content

Commit a1905d4

Browse files
author
Martin Jackson
committed
Start updating getting started
1 parent cf6ba5f commit a1905d4

File tree

7 files changed

+21
-82
lines changed

7 files changed

+21
-82
lines changed
File renamed without changes.
File renamed without changes.
Lines changed: 21 additions & 82 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
22
title: Getting Started
33
weight: 10
4-
aliases: /ansible-edge-gitops/getting-started/
4+
aliases: /virtualization-starter-kit/getting-started/
55
---
66

7-
# Deploying the Ansible Edge GitOps Pattern
7+
# Deploying the Virtualization Starter Kit Pattern
88

99
# General Prerequisites
1010

11-
1. An OpenShift cluster ( Go to [the OpenShift console](https://console.redhat.com/openshift/create)). See also [sizing your cluster](../../ansible-edge-gitops/cluster-sizing). Currently this pattern only supports AWS. It could also run on a baremetal OpenShift cluster, because OpenShift Virtualization supports that; there would need to be some customizations made to support it as the default is AWS. We hope that GCP and Azure will support provisioning metal workers in due course so this can be a more clearly multicloud pattern.
11+
1. An OpenShift cluster ( Go to [the OpenShift console](https://console.redhat.com/openshift/create)). See also [sizing your cluster](../../virtualization-starter-kit/cluster-sizing). Currently this pattern only supports AWS. It could also run on a baremetal OpenShift cluster, because OpenShift Virtualization supports that; there would need to be some customizations made to support it as the default is AWS. We hope that GCP and Azure will support provisioning metal workers in due course so this can be a more clearly multicloud pattern.
1212
1. A GitHub account (and, optionally, a token for it with repositories permissions, to read from and write to your forks)
1313
1. The helm binary, see [here](https://helm.sh/docs/intro/install/)
1414
1. Ansible, which is used in the bootstrap and provisioning phases of the pattern install (and to configure Ansible Automation Platform).
15-
1. Please note that when run on AWS, this pattern will provision an additional worker node, which will be a metal instance (c5n.metal) to run the Edge Virtual Machines. This worker is provisioned through the OpenShift MachineAPI and will be automatically cleaned up when the cluster is destroyed.
15+
1. Please note that when run on AWS, this pattern will provision an additional worker node per availability zone (AZ) that the pattern is deployed in, which will be a metal instance (c5.metal) to run the Virtual Machines. These workers are provisioned through the OpenShift MachineAPI and will be automatically cleaned up when the cluster is destroyed.
1616

1717
The use of this pattern depends on having a running Red Hat
1818
OpenShift cluster. It is desirable to have a cluster for deploying the GitOps
@@ -25,29 +25,15 @@ service](https://console.redhat.com/openshift/create).
2525
# Credentials Required in Pattern
2626

2727
In addition to the openshift cluster, you will need to prepare a number of secrets, or credentials, which will be used
28-
in the pattern in various ways. To do this, copy the [values-secret.yaml template](https://github.com/validatedpatterns/ansible-edge-gitops/blob/main/values-secret.yaml.template) to your home directory as `values-secret.yaml` and replace the explanatory text as follows:
28+
in the pattern in various ways. To do this, copy the [values-secret.yaml template](https://github.com/validatedpatterns-sandbox/virtualization-starter-kit/blob/main/values-secret.yaml.template) to your home directory as `values-secret.yaml` and replace the explanatory text as follows:
2929

30-
* AWS Credentials (an access key and a secret key). These are used to provision the metal worker in AWS (which hosts
31-
the VMs). If the portworx variant of the pattern is used, these credentials will be used to modify IAM rules to allow
32-
portworx to run correctly.
30+
* A username and SSH Keypair (private key and public key). These will be used to provide access to the VMs in the demo.
3331

3432
```yaml
35-
---
3633
# NEVER COMMIT THESE VALUES TO GIT
3734
version: "2.0"
3835
secrets:
39-
- name: aws-creds
40-
fields:
41-
- name: aws_access_key_id
42-
value: "An aws access key that can provision VMs and manage IAM (if using portworx)"
43-
44-
- name: aws_secret_access_key
45-
value: "An aws access secret key that can provision VMs and manage IAM (if using portworx)"
46-
```
47-
* A username and SSH Keypair (private key and public key). These will be used to provide access to the Kiosk VMs in the demo.
48-
49-
```yaml
50-
- name: kiosk-ssh
36+
- name: vm-ssh
5137
fields:
5238
- name: username
5339
value: 'Username of user to attach privatekey and publickey to - cloud-user is a typical value'
@@ -59,27 +45,6 @@ secrets:
5945
value: 'Public ssh key of the user who will be able to elevate to root to provision kiosks'
6046
```
6147
62-
* A Red Hat Subscription Management username and password. These will be used to register Kiosk VM templates to the Red Hat Content Delivery Network and install content on the Kiosk VMs to run the demo.
63-
64-
```yaml
65-
- name: rhsm
66-
fields:
67-
- name: username
68-
value: 'username of user to register RHEL VMs'
69-
- name: password
70-
value: 'password of rhsm user in plaintext'
71-
```
72-
73-
* Container "extra" arguments which will set the admin password for the ignition application when it's running.
74-
75-
```yaml
76-
- name: kiosk-extra
77-
fields:
78-
# Default: '--privileged -e GATEWAY_ADMIN_PASSWORD=redhat'
79-
- name: container_extra_params
80-
value: "Optional extra params to pass to kiosk ignition container, including admin password"
81-
```
82-
8348
* A userData block to use with cloud-init. This will allow console login as the user you specify (traditionally cloud-user) with the password you specify. The value in cloud-init is used as the default; roles in the edge-gitops-vms chart can also specify other secrets to use by referencing them in the role block.
8449
8550
```yaml
@@ -93,36 +58,10 @@ secrets:
9358
chpasswd: { expire: False }
9459
```
9560
96-
* A manifest file with an entitlement to run Ansible Automation Platform. This file (which will be a .zip file) will be posted to to Ansible Automation Platform instance to enable its use. Instructions for creating a manifest file can be found [here](https://www.redhat.com/en/blog/how-create-and-use-red-hat-satellite-manifest)
97-
98-
```yaml
99-
- name: aap-manifest
100-
fields:
101-
- name: b64content
102-
path: 'full pathname of file containing Satellite Manifest for entitling Ansible Automation Platform'
103-
base64: true
104-
```
105-
10661
# Prerequisites for deployment via `make install`
10762

10863
If you are going to install via `make install` from your workstation, you will need the following tools and packages:
10964

110-
{% include prerequisite-tools.md %}
111-
112-
And additionally, the following ansible collections:
113-
114-
* community.okd
115-
* redhat_cop.controller_configuration
116-
* awx.awx
117-
118-
To see what collections are installed:
119-
120-
`ansible-galaxy collection list`
121-
122-
To install a collection that is not currently installed:
123-
124-
`ansible-galaxy collection install <collection>`
125-
12665
# How to deploy
12766

12867
1. Login to your cluster using oc login or exporting the KUBECONFIG
@@ -137,12 +76,12 @@ To install a collection that is not currently installed:
13776
export KUBECONFIG=~/my-ocp-env/hub/auth/kubeconfig
13877
```
13978

140-
1. Fork the [ansible-edge-gitops](https://github.com/validatedpatterns/ansible-edge-gitops) repo on GitHub. It is necessary to fork to preserve customizations you make to the default configuration files.
79+
1. Fork the [virtualization-starter-kit](https://github.com/validatedpatterns-sandbox/virtualization-starter-kit) repo on GitHub. It is necessary to fork to preserve customizations you make to the default configuration files.
14180

14281
1. Clone the forked copy of this repository.
14382

14483
```sh
145-
git clone [email protected]:your-username/ansible-edge-gitops.git
84+
git clone [email protected]:your-username/virtualization-starter-kit.git
14685
```
14786

14887
1. Create a local copy of the Helm values file that can safely include credentials
@@ -180,7 +119,7 @@ Please review the [Patterns quick start](/learn/quickstart/) page. This section
180119
./pattern.sh make install
181120
```
182121

183-
The installation process will take between 45-60 minutes to complete. If you want to know the details of what is happening during that time, the entire process is documented [here](/ansible-edge-gitops/installation-details/).
122+
The installation process will take between 45-60 minutes to complete. If you want to know the details of what is happening during that time, the entire process is documented [here](/virtualization-starter-kit/installation-details/).
184123

185124
# Installation Validation
186125

@@ -192,35 +131,35 @@ The installation process will take between 45-60 minutes to complete. If you wan
192131

193132
The screen should like this when installed via `make install`:
194133

195-
![ansible-edge-gitops-operators](/images/ansible-edge-gitops/aeg-new-operators.png "Ansible Edge GitOps Operators")
134+
![virtualization-starter-kit-operators](/images/virtualization-starter-kit/aeg-new-operators.png "Ansible Edge GitOps Operators")
196135

197136
* Check all applications are synchronised
198137

199-
Under the project `ansible-edge-gitops-hub` click on the URL for the `hub`gitops`server`. All applications will sync, but this takes time as ODF has to completely install, and OpenShift Virtualization cannot provision VMs until the metal node has been fully provisioned and ready. Additionally, the Dynamic Provision Kiosk Template in AAP must complete; it can only start once the VMs have provisioned and are running:
138+
Under the project `virtualization-starter-kit-hub` click on the URL for the `hub`gitops`server`. All applications will sync, but this takes time as ODF has to completely install, and OpenShift Virtualization cannot provision VMs until the metal node has been fully provisioned and ready. Additionally, the Dynamic Provision Kiosk Template in AAP must complete; it can only start once the VMs have provisioned and are running:
200139

201-
![ansible-edge-gitops-applications](/images/ansible-edge-gitops/aeg-applications.png "Ansible Edge GitOps Applications")
140+
![virtualization-starter-kit-applications](/images/virtualization-starter-kit/aeg-applications.png "Ansible Edge GitOps Applications")
202141

203142
* While the metal node is building, the VMs in OpenShift console will show as "Unschedulable." This is normal and expected, as the VMs themselves cannot run until the metal node completes provisioning and is ready.
204143

205-
![ansible-edge-vms-unschedulable](/images/ansible-edge-gitops/aeg-vm-unschedulable.png "Ansible Edge GitOps Unschedulable VMs")
144+
![ansible-edge-vms-unschedulable](/images/virtualization-starter-kit/aeg-vm-unschedulable.png "Ansible Edge GitOps Unschedulable VMs")
206145

207146
* Under Virtualization > Virtual Machines, the virtual machines will eventually show as "Running." Once they are in "Running" state the Provisioning workflow will run on them, and install Firefox, Kiosk mode, and the Ignition application on them:
208147

209-
![ansible-edge-gitops-vmlist](/images/ansible-edge-gitops/aeg-openshift-vm-screen.png "Ansible Edge GitOps VM List")
148+
![virtualization-starter-kit-vmlist](/images/virtualization-starter-kit/aeg-openshift-vm-screen.png "Ansible Edge GitOps VM List")
210149

211150
* Finally, the VM Consoles will show the Ignition introduction screen. You can choose any of these options; this tutorial assumes you chose "Ignition":
212151

213-
![ansible-edge-gitops-ignition-options](/images/ansible-edge-gitops/aeg-vm-ignition-intro.png "Ansible Edge GitOps Ignition Options")
152+
![virtualization-starter-kit-ignition-options](/images/virtualization-starter-kit/aeg-vm-ignition-intro.png "Ansible Edge GitOps Ignition Options")
214153

215154
* You should be able to login to the application with the userid "admin" and the password you specified as the GATEWAY_ADMIN_PASSWORD in `container_extra_params` in your values-secret.yaml file.
216155

217-
![ansible-edge-gitops-vmconsole](/images/ansible-edge-gitops/aeg-openshift-vm-console.png "Ansible Edge GitOps VM Console")
156+
![virtualization-starter-kit-vmconsole](/images/virtualization-starter-kit/aeg-openshift-vm-console.png "Ansible Edge GitOps VM Console")
218157

219-
Please see [Installation Details](/ansible-edge-gitops/installation-details/) for more information on the steps of installation.
158+
Please see [Installation Details](/virtualization-starter-kit/installation-details/) for more information on the steps of installation.
220159

221-
Please see [Ansible Automation Platform](/ansible-edge-gitops/ansible-automation-platform/) for more information on how this pattern uses the Ansible Automation Platform Operator for OpenShift.
160+
Please see [Ansible Automation Platform](/virtualization-starter-kit/ansible-automation-platform/) for more information on how this pattern uses the Ansible Automation Platform Operator for OpenShift.
222161

223-
Please see [OpenShift Virtualization](/ansible-edge-gitops/openshift-virtualization/) for more information on how this pattern uses OpenShift Virtualization.
162+
Please see [OpenShift Virtualization](/virtualization-starter-kit/openshift-virtualization/) for more information on how this pattern uses OpenShift Virtualization.
224163

225164
# Infrastructure Elements of this Pattern
226165

@@ -246,4 +185,4 @@ As part of this pattern HashiCorp Vault has been installed. Refer to the section
246185
# Next Steps
247186

248187
## [Help & Feedback](https://groups.google.com/g/validatedpatterns)
249-
## [Report Bugs](https://github.com/validatedpatterns/ansible-edge-gitops/issues)
188+
## [Report Bugs](https://github.com/validatedpatterns-sandbox/virtualization-starter-kit/issues)
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

0 commit comments

Comments
 (0)