Skip to content

Latest commit

 

History

History
172 lines (106 loc) · 6.94 KB

README.md

File metadata and controls

172 lines (106 loc) · 6.94 KB

Cluster Bootstrap

This project is designed to bootstrap an OpenShift cluster with several operators and components that are utilized for Machine Learning.

Components

This repository will configure the following items.

Operators

  • AMQ-Streams Operator
  • Crunchy Postgres Operator
  • Elasticsearch Operator
  • Grafana Operator
  • OpenDataHub Operator
  • OpenShift Data Foundations Operator
  • OpenShift GitOps Operator
  • OpenShift Logging Operator
  • OpenShift Pipelines Operator
  • OpenShift Serverless Operator
  • Sealed Secrest Operator
  • Seldon Operator
  • Web Terminal Operators

Additional Configurations

  • OpenShift Monitoring - User Workload Monitoring

Prerequisites

Client

In order to bootstrap this repository you must have the following cli tools:

Cluster Request

Request resources from the Red Hat Product Demo System

  1. Access RHPDS
  2. Select the catalog item: Services > Catalogs > All Services > Openshift Workshops > OpenShift 4.9 Workshop > click Order
  3. Use N/A for the SFDC Opportunity, Campaign ID, or Partner Registration required field
  4. Utilize the default Training size to generate a cluster with three nodes
  5. Check confirmation box to acknowledge the warnings
  6. Select purpose from the optinons menu
  7. Click Submit at bottom of the page
  8. Provisioning should be automatic and will take 45-75 minutes to complete, connection details (web console, oc commands etc.) are provided in an email once complete

Bootstrapping a Cluster

Before beginning, make sure you are logged into your cluster using oc.

Next, clone this repository to your local environment.

Sealed Secrets Bootstrap

This repository deploys sealed-secrets and requires a sealed secret master key to bootstrap. If you plan to reuse sealed-secrets created using another key you must obtain that key from the person that created the sealed-secrets.

If you do not plan to utilize existing sealed secrets you can instead bootstrap a new sealed-secrets controller and obtain a new secret.

Execute the following script:

./bootstrap_sealed-secrets_secret.sh

This will install a new instance of Sealed Secrets on the cluster and create the following file:

bootstrap/base/sealed-secrets-secret.yaml

Cluster Bootstrap

Execute the following script:

./bootstrap.sh

The bootstrap.sh script will install the OpenShift GitOps Operator, create an ArgoCD instance once the operator is deployed in the openshift-gitops namespace, and bootstrap a set of ArgoCD applications to configure the cluster.

Once the script completes, verify that you can access the ArgoCD UI using the URL output by the last line of the script execution. This URL should present an ArgoCD login page, showing that it was successfully deployed.

Alternatively you can also obtain the ArgoCD login URL from the ArgoCD route:

oc get routes openshift-gitops-server -n openshift-gitops

Use the OpenShift Login option and sign in with your OpenShift credentials.

The cluster may take 10-15 minutes to finish installing and updating.

Project Structure Overview

This project structure is based on the oppinionated configuration found here. For a more detailed breakdown of the intention of this folder structure, feel free to read more there.

Bootstrap

The bootstrap folder contains the initial set of resources utilized to deploy the cluster.

Clusters

Clusters is the main aggregation layer for all of the elements of the cluster. It also contains the main configuration elements for changing the repo/branch of the project.

Components

Components contains the builk of the configuration. Currently we are utilizing two main folders inside of components:

  • argocd
  • operators

The oppinionated configuration referenced above recommends several other folders in the components folder that we are not utilizing today but may be useful to add in the future.

Argocd

The argocd folder contains the ArgoCD specific objects needed to configure the items in the apps folder. The folders inside of Argo represent the different custom resources ArgoCD supports and refer back to objects in the apps folder.

Operators

Operators contain the operators we wish to configure on the cluster and the details of how we would like them to be configured.

The operators folder general follows a pattern where each folder in operators is intended to be a seperate ArgoCD application. The majority of the folder structure utilized inside of those folders is a direct reference to the redhat-cop/gitops-catalog. When attempting to add new operators to the cluster, be sure to check there first and feel free to contribute new components back to the catalog as well!

Updating the ArgoCD Groups

Argo creates the following group in OpenShift to grant access and control inside of ArgoCD:

  • gitopsadmins

To add a user to the admin group run:

oc adm groups add-users argocdadmins $(oc whoami)

To add a user to the user group run:

oc adm groups add-users argocdusers $(oc whoami)

Once the user has been added to the group logout of Argo and log back in to apply the updated permissions.

Can you validate that you have the correct permissions by going to User Info menu inside of Argo.

Accessing Argo using the CLI

To log into ArgoCD using the argocd cli tool run the following command:

argocd login --sso <argocd-route> --grpc-web

ArgoCD Troubleshooting

Operator Shows Progressing for a Very Long Time

ArgoCD Symptoms:

Argo Applications and the child subscription object for operator installs show Progressing for a very long time.

Explanation:

Argo utilizes a Health Check to validate if an object has been successfully applied and updated, failed, or is progressing by the cluster. The health check for the Subscription object looks at the Condition field in the Subscription which is updated by the OLM. Once the Subscription is applied to the cluster, OLM creates several other objects in order to install the Operator. Once the Operator has been installed OLM will report the status back to the Subscription object. This reconciliation process may take several minutes even after the Operator has successfully installed.

Resolution/Troubleshooting:

  • Validate that the Opator has successfully installed via the Installed Operators section of the OpenShift Web Console.
  • If the Operator has not installed, additional troubleshooting is required.
  • If the Operator has successfully installed, feel free to ignore the Progressing state and proceed. OLM should reconcile the status after several minutes and Argo will update the state to Healthy.