Skip to content

Latest commit

 

History

History
177 lines (122 loc) · 5.57 KB

README.md

File metadata and controls

177 lines (122 loc) · 5.57 KB

Installation assets for CP4MCM 2.2

Note: This project is provided AS-IS. Support will be provided as possible via git issues.

Updates:
12/11/2020

  • Updated the installer to work with the latest CP4MCM 2.2 release.

11/22/2020

  • As it turns out that RedHat Advanced Cluster Management is not supported on IBM Cloud RedHat Openshift clusters (ROKS) as a management hub, the default install method is change to use Core MCM instead of RHACM. In you plan to install on a supported cluster and want to use RHACM, export the variable CP4MCM_RHACM_ENABLED="true" (e.g. uncomment the relevant line in a _customizations.sh script shown below)

11/4/2020

  • Added support for RedHat Advanced Cluster Management
  • Refactored installation process

Overview:

This project is designed to provide an automated way to install the Cloud Pak for Multicloud Management (CP4MCM) v2.1.

Scope:

Single replica (Non-HA) Configuration

This automation currently provides the following installation functionality:

  • MCM Core / RHACM
  • Monitoring Module
  • Infrastructure Management Module (formerly CloudForms), with sample LDAP)

In development:

  • Ansible Tower

Usage:

There are two ways this automation can be used:

  1. You can clone this repo and execute the commands locally
  2. You can execute the installation from the Docker image that has been built (Beta)

Executing locally

Pre-reqs

Process

1. Clone repo locally:

$ git clone https://github.com/ibm-garage-tsa/cp4mcm-installer.git
$ cd cp4mcm-installer

2. Export configurable variables:

There are quite some configurable variables to further customize the installation.

Please check out setup_env.sh for details.

Note: It's recommended to compile a local bash file so that we can export all customized variables without the need to change any existing files -- a file starting with _ will be ignored by this repository so it's safe to keep it local and private only.

$ cat > _customization.sh <<EOF

#
# IBM Entitled Registry Credential
#
export ENTITLED_REGISTRY_USER="cp"
export ENTITLED_REGISTRY_KEY="<YOUR LONG ENTITLEMENT KEY GOES HERE>"

#
# Cloud Pak Modules to enable or disable:
# - true: to enable
# - false: to disable
#
#export CP4MCM_RHACM_ENABLED="true"
export CP4MCM_INFRASTRUCTUREMANAGEMENT_ENABLED="true"
export CP4MCM_MONITORING_ENABLED="true"

#
# (Optional) If RHACM is enabled, Red Hat Pull Secret must be set
#
export RED_HAT_PULL_SECRET_PATH="YOUR RED HAT PULL SECRET FILE PATH GOES HERE"

#
# Storage Classes
#
# Important notes:
# - If you are using ROKS you can just accept the defaults by setting it "" and it will use:
#   - ibmc-block-gold
#   - ibmc-file-gold
# - If you are using OpenShift Container Storage you can accept the defaults by setting it "" and it will use
#   - ocs-storagecluster-ceph-rbd
#   - ocs-storagecluster-cephfs
# - If you are using some other storage solution or you want to use storage other than the defaults, specify them here
#
export CP4MCM_BLOCK_STORAGECLASS=""
export CP4MCM_FILE_STORAGECLASS=""

EOF

3. Make sure you are in the base project folder to execute commands

# Source the customization we've compiled
$ source _customization.sh

# Make sure we've logged into OCP, then kick it off
$ make

Note: A install.log file will be generated to log the installation activities within the _logs folder under current folder, but you can change the folder by export LOGDIR=<somewhere else>.

4. How to access?

The log file will generate the info for you to access the CP4MCM.

But you can always retrieve the required info by running this:

# CP4MCM URL
$ oc -n ibm-common-services get route cp-console --template '{{.spec.host}}'

There are 2 major mechanisms to authenticate and access CP4MCM ans its components:

Type 1: Default admin account with Default authentication authentication type

# CP4MCM default admin user name
oc -n ibm-common-services get secret platform-auth-idp-credentials -o jsonpath='{.data.admin_username}' | base64 -d
# CP4MCM default admin user password
oc -n ibm-common-services get secret platform-auth-idp-credentials -o jsonpath='{.data.admin_password}' | base64 -d

Type 2: LDAP users with Enterprise LDAP authentication type

By default, the users within operations group are imported as admins as well:

  • bob
  • laura
  • josie
  • tom
  • paula

The password for all these LDAP users is Passw0rd.

Troubleshooting

If your installation hang with the following error:

Waiting for pods to start.. retry (28 of 60)(Pods remaining =        1)(Consecutive tries 0/3)

ibm-common-services                                ibm-monitoring-grafana-6958ff5fb7-szjqw                           0/3     Init:0/1           0          25m

it may be related to the timing issue during installation. To progress the installation you can go to the Openshift console -> Installed Operators and uninstall IBM Monitoring Prometheus Extension Operator. It will get recreated.

Containerized execution

Coming soon

Known limitations:

  • Does not work on ROKS with VPC
  • Supports online installation only
  • Supports OpenShift 4.x

Other Notes

  • If you want to uninstall RHACM you can run ./rhacm/99-rhacm-uninstall.sh (You need to change permissions to 755)