OKD Virtualization on user provided infrastructure¶
Preparing the hardware¶
As a first step for providing an infrastructure for OKD Virtualization, you need to prepare the hardware:
- check that the minimum hardware requirements for running OKD are satisfied
- check that the additional hardware requirements for running OKD Virtualization are also satisfied.
Preparing the infrastructure¶
Once your hardware is ready and connected to the network you need to configure your services, your network and your DNS for allowing the OKD installer to deploy the software. You may also need to prepare in advance a few services you'll need during the deployment. Carefully read the Preparing the user-provisioned infrastructure section and ensure all the requirements are met.
Provision your hosts¶
For the bastion / service host you can use CentOS Stream 8. You can follow the CentOS 8 installation documentation but we recommend using the latest CentOS Stream 8 ISO.
For the OKD nodes you’ll need Fedora CoreOS. You can get it from the Get Fedora! website, choose the Bare Metal ISO.
Configure the bastion to host needed services¶
Configure Apache to serve on port 8080/8443 as the http/https port will be used by the haproxy service. Apache will be needed to provide ignition configuration for OKD nodes.
dnf install -y httpd
sed -i 's/Listen 80/Listen 8080/' /etc/httpd/conf/httpd.conf
sed -i 's/Listen 443/Listen 8443/' /etc/httpd/conf.d/ssl.conf
setsebool -P httpd_read_user_content 1
systemctl enable --now httpd.service
firewall-cmd --permanent --add-port=8080/tcp
firewall-cmd --permanent --add-port=8443/tcp
firewall-cmd --reload
# Verify it’s up:
curl localhost:8080
Configure haproxy:
dnf install haproxy -y
firewall-cmd --permanent --add-port=6443/tcp
firewall-cmd --permanent --add-port=22623/tcp
firewall-cmd --permanent --add-service=http
firewall-cmd --permanent --add-service=https
firewall-cmd --reload
setsebool -P haproxy_connect_any 1
systemctl enable --now haproxy.service
Installing OKD¶
OKD current stable-4 branch is delivering OKD 4.8. If you're using an older version we recommend to update to ODK 4.8.
At this point you should have all OKD nodes ready to be installed with Fedora CoreOS and the bastion with all the needed services. Check that all nodes and the bastion have the correct ip addresses and fqdn and that they are resolvable via DNS.
As we are going to use the baremetal UPI installation you’ll need to create a install-config.yaml
following the example for installing bare metal
Remember to configure your proxy settings if you have a proxy
Apply the workarounds¶
- qemu-ga is hitting selinux denials https://bugzilla.redhat.com/show_bug.cgi?id=1927639
You can workaround this by adding a custom policy:
echo '(allow virt_qemu_ga_t container_var_lib_t (dir (search)))' >local_virtqemu_ga.cil
semodule -i local_virtqemu_ga.cil
- iptables is hitting selinux denials https://bugzilla.redhat.com/show_bug.cgi?id=2008097
You can workaround this by adding a custom policy:
echo '(allow iptables_t cgroup_t (dir (ioctl)))' >local_iptables.cil
semodule -i local_iptables.cil
- rpcbind
echo '(allow rpcbind_t unreserved_port_t (udp_socket (name_bind)))' >local_rpcbind.cil
semodule -i local_rpcbind.cil
- master nodes are failing the first boot with access denied to
[::1]:53
https://github.com/openshift/okd/issues/897
While the master node is booting edit the grub config adding to kernel command line console=null
.
- worker nodes may fail on openvswitch
echo '(allow openvswitch_t init_var_run_t (capability (fsetid)))' >local_openvswitch.cil
semodule -i local_openvswitch.cil
Installing HCO and KubeVirt¶
Once the OKD console is up, connect to it. Go to Operators -> OperatorHub, look for KubeVirt HyperConverged Cluster Operator
and install it.
Click on the Create Hyperconverged button, all the defaults should be fine.
Providing storage¶
Shared storage is not mandatory for OKD Virtualization, but without a doubt it provides many advantages over a configuration based on local storage which is considered a suboptimal configuration.
Between the advantages enabled by shared storage it is worth mentioning: - Live migration of Virtual Machines - Founding pillar for HA - Enables seamless cluster upgrades without the need to shut down and restart all the VMs on each upgrade - Centralized storage management enabling elastic scalability - Centralized backup
Shared storage¶
TBD: rook.io deployment
Local storage¶
You can configure local storage for your virtual machines by using the OKD Virtualization hostpath provisioner feature.
When you install OKD Virtualization, the hostpath provisioner Operator is automatically installed. To use it, you must: - Configure SELinux on your worker nodes via a Machine Config object. - Create a HostPathProvisioner custom resource. - Create a StorageClass object for the hostpath provisioner.
Configuring SELinux for the hostpath provisioner on OKD worker nodes¶
You can configure SELinux for your OKD Worker nodes using a MachineConfig.
Creating a custom resource (CR) for the HostPathProvisioner operator¶
-
Create the HostPathProvisioner custom resource file. For example:
$ touch hostpathprovisioner_cr.yaml
-
Edit that file. For example:
apiVersion: hostpathprovisioner.kubevirt.io/v1beta1 kind: HostPathProvisioner metadata: name: hostpath-provisioner spec: imagePullPolicy: IfNotPresent pathConfig: path: "/var/hpvolumes" # The path of the directory on the node useNamingPrefix: false # Use the name of the PVC bound to the created PV as part of the directory name.
-
Create the CR in the
kubevirt-hyperconverged
namespace:$ oc create -n kubevirt-hyperconverged -f hostpathprovisioner_cr.yaml
Creating a StorageClass for the HostPathProvisioner operator¶
-
Create the YAML file for the storage class. For example:
$ touch hppstorageclass.yaml
-
Edit that file. For example:
apiVersion: storage.k8s.io/v1 kind: StorageClass metadata: name: hostpath-provisioner provisioner: kubevirt.io/hostpath-provisioner reclaimPolicy: Delete volumeBindingMode: WaitForFirstConsumer
-
Creating the Storage Class object:
$ oc create -f hppstorageclass.yaml