OpenShift 3.6 Ingress Guest Configuration
Jump to navigation
Jump to search
Internal
Clone the Basic Template
Use the basic template as a base image and clone it, as described below.
While cloning the guest, make sure to:
- Adjust the memory and the number of virtual CPUs.
- Provision a directly-mapped network interface.
- Provision just one storage device - the guest image device.
The process will produce a ocp36.ingress.
External Access Configuration
- Create external accounts to be exposed publicly and configure their ssh access (~/.ssh/authorized_keys).
- Turn off external root access.
There is no need to install HAProxy manually to serve as master node load balancer, the OpenShift installation procedure will do it. After that, we can use the same HAProxy instance to load balance to the application router.
Name Resolution
- Add the IP addresses for masters, other nodes, support and lb (itself) to /etc/hosts, the DNS server may not be operational when we need it.
192.168.122.22 ingress ingress.ocp36.local api-lb api-lb.ocp36.local 192.168.122.23 support support.ocp36.local ns ns.ocp36.local nfs nfs.ocp36.local ansible ansible.ocp36.local 192.168.122.24 master master.ocp36.local 192.168.122.25 infranode infranode.ocp36.local 192.168.122.26 node1 node1.ocp36.local 192.168.122.27 node1 node1.ocp36.local
HAProxy
Make sure HAProxy is installed. It will be configured by the OpenShift installation utility, later.
yum list | grep haproxy
Create the Key for Internal Users
cd ~ovidiu ssh-keygen -q -b 2048 -f ~/.ssh/id_rsa -t rsa