Deploy OKD 4.9 Cluster
This instruction provides detailed information on the OKD 4.9 cluster deployment in the AWS Cloud and contains the additional setup necessary for the managed infrastructure.
A full description of the cluster deployment can be found in the official documentation.
Prerequisites​
Before the OKD cluster deployment and configuration, make sure to check the prerequisites.
Required Tools​
-
Install the following tools listed below:
-
Create the AWS IAM user with the required permissions. Make sure the AWS account is active, and the user doesn't have a permission boundary. Remove any Service Control Policy (SCP) restrictions from the AWS account.
-
Generate a key pair for cluster node SSH access. Please perform the steps below:
-
Generate the SSH key. Specify the path and file name, such as ~/.ssh/id_ed25519, of the new SSH key. If there is an existing key pair, ensure that the public key is in the ~/.ssh directory.
ssh-keygen -t ed25519 -N '' -f <path>/<file_name>
-
Add the SSH private key identity to the SSH agent for a local user if it has not already been added.
eval "$(ssh-agent -s)"
-
Add the SSH private key to the ssh-agent:
ssh-add <path>/<file_name>
-
Prepare for the Deployment Process​
Before deploying the OKD cluster, please perform the steps below:
-
Download the OKD installer.
-
Extract the installation program:
tar -xvf openshift-install-linux.tar.gz
-
Download the installation pull secret for any private registry.
This pull secret allows to authenticate with the services that are provided by the included authorities, including Quay.io serving container images for OKD components. For example, here is a pull secret for Docker Hub:
The pull secret for the private registry
{
"auths":{
"https://index.docker.io/v1/":{
"auth":"$TOKEN"
}
}
} -
Create the deployment directory and the install-config.yaml file:
mkdir okd-deployment
touch okd-deployment/install-config.yamlTo specify more details about the OKD cluster platform or to modify the values of the required parameters, customize the install-config.yaml file for AWS. Please see an example of the customized file below:
install-config.yaml - OKD cluster’s platform installation configuration file
apiVersion: v1
baseDomain: <YOUR_DOMAIN>
compute:
- architecture: amd64
hyperthreading: Enabled
name: worker
platform:
aws:
zones:
- eu-central-1a
rootVolume:
size: 50
type: r5.large
replicas: 3
controlPlane:
architecture: amd64
hyperthreading: Enabled
name: master
platform:
aws:
rootVolume:
size: 50
zones:
- eu-central-1a
type: m5.xlarge
replicas: 3
metadata:
creationTimestamp: null
name: 4-9-okd-sandbox
platform:
aws:
region: eu-central-1
userTags:
user:tag: 4-9-okd-sandbox
publish: External
pullSecret: <PULL_SECRET>
sshKey: |
<SSH_KEY>where:
- YOUR_DOMAIN - is a base domain,
- PULL_SECRET - is a created pull secret for a private registry,
- SSH_KEY - is a created SSH key.
Deploy the Cluster​
To initialize the cluster deployment, run the following command:
./openshift-install create cluster --dir <installation_directory> --log-level=info
If the cloud provider account configured on the host does not have sufficient permissions to deploy the cluster, the installation process stops, and the missing permissions are displayed.
When the cluster deployment is completed, directions for accessing the cluster are displayed in the terminal, including a link to the web console and credentials for the kubeadmin user. The kubeconfig
for the cluster will be located in okd-deployment/auth/kubeconfig.
Example output
...
INFO Install complete!
INFO To access the cluster as the system:admin user when using 'oc', run 'export KUBECONFIG=/home/myuser/install_dir/auth/kubeconfig'
INFO Access the OpenShift web-console here: https://console-openshift-console.apps.mycluster.example.com
INFO Login to the console with the user: "kubeadmin", and password: "4vYBz-Ee6gm-ymBZj-Wt5AL"
INFO Time elapsed: 36m22s:
The Ignition config files contain certificates that expire after 24 hours, which are then renewed at that time. Do not turn off the cluster for this time, or you will have to update the certificates manually. See OpenShift Container Platform documentation for more information.
Log Into the Cluster​
To log into the cluster, export the kubeconfig
:
export KUBECONFIG=<installation_directory>/auth/kubeconfig