mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 12:46:18 +01:00
234 lines
10 KiB
Plaintext
234 lines
10 KiB
Plaintext
// Module included in the following assemblies:
|
|
//
|
|
// * installing/installing_aws/installing-aws-user-infra.adoc
|
|
// * installing/installing_azure/installing-azure-user-infra.adoc
|
|
// * installing/installing_azure_stack_hub/installing-azure-stack-hub-user-infra.adoc
|
|
// * installing/installing_gcp/installing-gcp-user-infra.adoc
|
|
// * installing/installing_gcp/installing-gcp-restricted-networks.adoc
|
|
// * installing/installing_bare_metal/installing-bare-metal.adoc
|
|
// * installing/installing_aws/installing-restricted-networks-aws.adoc
|
|
// * installing/installing_bare_metal/installing-restricted-networks-bare-metal.adoc
|
|
// * installing/installing_vsphere/installing-restricted-networks-vsphere.adoc
|
|
// * installing/installing_vsphere/installing-vsphere.adoc
|
|
// * installing/installing_vsphere/installing-vsphere-network-customizations.adoc
|
|
// * machine_management/adding-rhel-compute.adoc
|
|
// * machine_management/more-rhel-compute.adoc
|
|
// * machine_management/user_provisioned/adding-aws-compute-user-infra.adoc
|
|
// * machine_management/user_provisioned/adding-bare-metal-compute-user-infra.adoc
|
|
// * machine_management/user_provisioned/adding-vsphere-compute-user-infra.adoc
|
|
// * post_installation_configuration/node-tasks.adoc
|
|
// * installing/installing_ibm_z/installing-ibm-z.adoc
|
|
// * installing/installing_ibm_z/installing-restricted-networks-ibm-z.adoc
|
|
// * installing/installing_ibm_z/installing-ibm-z-kvm.adoc
|
|
// * installing/installing_ibm_z/installing-restricted-networks-ibm-z-kvm.adoc
|
|
// * installing/installing_ibm_z/installing-ibm-z-lpar.adoc
|
|
// * installing/installing_ibm_z/installing-restricted-networks-ibm-z-lpar.adoc
|
|
// * installing/installing_ibm_z/installing-ibm-power.adoc
|
|
// * installing/installing_ibm_z/installing-restricted-networks-ibm-power.adoc
|
|
// * installing/installing_azure/installing-restricted-networks-azure-user-provisioned.adoc
|
|
// * post_installation_configuration/configuring-multi-arch-compute-machines/creating-multi-arch-compute-nodes-ibm-power.adoc
|
|
|
|
|
|
ifeval::["{context}" == "installing-ibm-z"]
|
|
:ibm-z:
|
|
endif::[]
|
|
ifeval::["{context}" == "installing-ibm-z-lpar"]
|
|
:ibm-z:
|
|
endif::[]
|
|
ifeval::["{context}" == "installing-ibm-z-kvm"]
|
|
:ibm-z-kvm:
|
|
endif::[]
|
|
ifeval::["{context}" == "creating-multi-arch-compute-nodes-ibm-power"]
|
|
:ibm-power:
|
|
endif::[]
|
|
|
|
:_mod-docs-content-type: PROCEDURE
|
|
[id="installation-approve-csrs_{context}"]
|
|
= Approving the certificate signing requests for your machines
|
|
|
|
When you add machines to a cluster, two pending certificate signing requests (CSRs) are generated for each machine that you added. You must confirm that these CSRs are approved or, if necessary, approve them yourself. The client requests must be approved first, followed by the server requests.
|
|
|
|
.Prerequisites
|
|
|
|
* You added machines to your cluster.
|
|
|
|
.Procedure
|
|
|
|
. Confirm that the cluster recognizes the machines:
|
|
+
|
|
[source,terminal]
|
|
----
|
|
$ oc get nodes
|
|
----
|
|
+
|
|
.Example output
|
|
[source,terminal]
|
|
----
|
|
NAME STATUS ROLES AGE VERSION
|
|
master-0 Ready master 63m v1.30.3
|
|
master-1 Ready master 63m v1.30.3
|
|
master-2 Ready master 64m v1.30.3
|
|
----
|
|
+
|
|
The output lists all of the machines that you created.
|
|
+
|
|
[NOTE]
|
|
====
|
|
The preceding output might not include the compute nodes, also known as worker nodes, until some CSRs are approved.
|
|
====
|
|
|
|
. Review the pending CSRs and ensure that you see the client requests with the `Pending` or `Approved` status for each machine that you added to the cluster:
|
|
+
|
|
ifndef::ibm-z,ibm-z-kvm[]
|
|
[source,terminal]
|
|
----
|
|
$ oc get csr
|
|
----
|
|
+
|
|
.Example output
|
|
[source,terminal]
|
|
----
|
|
NAME AGE REQUESTOR CONDITION
|
|
csr-8b2br 15m system:serviceaccount:openshift-machine-config-operator:node-bootstrapper Pending
|
|
csr-8vnps 15m system:serviceaccount:openshift-machine-config-operator:node-bootstrapper Pending
|
|
...
|
|
----
|
|
+
|
|
In this example, two machines are joining the cluster. You might see more approved CSRs in the list.
|
|
endif::ibm-z,ibm-z-kvm[]
|
|
ifdef::ibm-z,ibm-z-kvm[]
|
|
[source,terminal]
|
|
----
|
|
$ oc get csr
|
|
----
|
|
+
|
|
[source,terminal]
|
|
.Example output
|
|
----
|
|
NAME AGE REQUESTOR CONDITION
|
|
csr-mddf5 20m system:node:master-01.example.com Approved,Issued
|
|
csr-z5rln 16m system:node:worker-21.example.com Approved,Issued
|
|
----
|
|
endif::ibm-z,ibm-z-kvm[]
|
|
|
|
. If the CSRs were not approved, after all of the pending CSRs for the machines you added are in `Pending` status, approve the CSRs for your cluster machines:
|
|
+
|
|
[NOTE]
|
|
====
|
|
Because the CSRs rotate automatically, approve your CSRs within an hour of adding the machines to the cluster. If you do not approve them within an hour, the certificates will rotate, and more than two certificates will be present for each node. You must approve all of these certificates. After the client CSR is approved, the Kubelet creates a secondary CSR for the serving certificate, which requires manual approval. Then, subsequent serving certificate renewal requests are automatically approved by the `machine-approver` if the Kubelet requests a new certificate with identical parameters.
|
|
====
|
|
+
|
|
[NOTE]
|
|
====
|
|
For clusters running on platforms that are not machine API enabled, such as bare metal and other user-provisioned infrastructure, you must implement a method of automatically approving the kubelet serving certificate requests (CSRs). If a request is not approved, then the `oc exec`, `oc rsh`, and `oc logs` commands cannot succeed, because a serving certificate is required when the API server connects to the kubelet. Any operation that contacts the Kubelet endpoint requires this certificate approval to be in place. The method must watch for new CSRs, confirm that the CSR was submitted by the `node-bootstrapper` service account in the `system:node` or `system:admin` groups, and confirm the identity of the node.
|
|
====
|
|
|
|
** To approve them individually, run the following command for each valid CSR:
|
|
+
|
|
[source,terminal]
|
|
----
|
|
$ oc adm certificate approve <csr_name> <1>
|
|
----
|
|
<1> `<csr_name>` is the name of a CSR from the list of current CSRs.
|
|
|
|
** To approve all pending CSRs, run the following command:
|
|
+
|
|
[source,terminal]
|
|
----
|
|
$ oc get csr -o go-template='{{range .items}}{{if not .status}}{{.metadata.name}}{{"\n"}}{{end}}{{end}}' | xargs --no-run-if-empty oc adm certificate approve
|
|
----
|
|
+
|
|
[NOTE]
|
|
====
|
|
Some Operators might not become available until some CSRs are approved.
|
|
====
|
|
|
|
. Now that your client requests are approved, you must review the server requests for each machine that you added to the cluster:
|
|
+
|
|
[source,terminal]
|
|
----
|
|
$ oc get csr
|
|
----
|
|
+
|
|
.Example output
|
|
[source,terminal]
|
|
----
|
|
NAME AGE REQUESTOR CONDITION
|
|
csr-bfd72 5m26s system:node:ip-10-0-50-126.us-east-2.compute.internal Pending
|
|
csr-c57lv 5m26s system:node:ip-10-0-95-157.us-east-2.compute.internal Pending
|
|
...
|
|
----
|
|
|
|
. If the remaining CSRs are not approved, and are in the `Pending` status, approve the CSRs for your cluster machines:
|
|
|
|
** To approve them individually, run the following command for each valid CSR:
|
|
+
|
|
[source,terminal]
|
|
----
|
|
$ oc adm certificate approve <csr_name> <1>
|
|
----
|
|
<1> `<csr_name>` is the name of a CSR from the list of current CSRs.
|
|
|
|
** To approve all pending CSRs, run the following command:
|
|
+
|
|
[source,terminal]
|
|
----
|
|
$ oc get csr -o go-template='{{range .items}}{{if not .status}}{{.metadata.name}}{{"\n"}}{{end}}{{end}}' | xargs oc adm certificate approve
|
|
----
|
|
|
|
. After all client and server CSRs have been approved, the machines have the `Ready` status. Verify this by running the following command:
|
|
+
|
|
[source,terminal]
|
|
----
|
|
ifndef::ibm-power[]
|
|
$ oc get nodes
|
|
endif::ibm-power[]
|
|
ifdef::ibm-power[]
|
|
$ oc get nodes -o wide
|
|
endif::ibm-power[]
|
|
----
|
|
+
|
|
.Example output
|
|
[source,terminal]
|
|
----
|
|
ifndef::ibm-power[]
|
|
NAME STATUS ROLES AGE VERSION
|
|
master-0 Ready master 73m v1.30.3
|
|
master-1 Ready master 73m v1.30.3
|
|
master-2 Ready master 74m v1.30.3
|
|
worker-0 Ready worker 11m v1.30.3
|
|
worker-1 Ready worker 11m v1.30.3
|
|
endif::ibm-power[]
|
|
ifdef::ibm-power[]
|
|
NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME
|
|
worker-0-ppc64le Ready worker 42d v1.30.3 192.168.200.21 <none> Red Hat Enterprise Linux CoreOS 415.92.202309261919-0 (Plow) 5.14.0-284.34.1.el9_2.ppc64le cri-o://1.30.3-3.rhaos4.15.gitb36169e.el9
|
|
worker-1-ppc64le Ready worker 42d v1.30.3 192.168.200.20 <none> Red Hat Enterprise Linux CoreOS 415.92.202309261919-0 (Plow) 5.14.0-284.34.1.el9_2.ppc64le cri-o://1.30.3-3.rhaos4.15.gitb36169e.el9
|
|
master-0-x86 Ready control-plane,master 75d v1.30.3 10.248.0.38 10.248.0.38 Red Hat Enterprise Linux CoreOS 415.92.202309261919-0 (Plow) 5.14.0-284.34.1.el9_2.x86_64 cri-o://1.30.3-3.rhaos4.15.gitb36169e.el9
|
|
master-1-x86 Ready control-plane,master 75d v1.30.3 10.248.0.39 10.248.0.39 Red Hat Enterprise Linux CoreOS 415.92.202309261919-0 (Plow) 5.14.0-284.34.1.el9_2.x86_64 cri-o://1.30.3-3.rhaos4.15.gitb36169e.el9
|
|
master-2-x86 Ready control-plane,master 75d v1.30.3 10.248.0.40 10.248.0.40 Red Hat Enterprise Linux CoreOS 415.92.202309261919-0 (Plow) 5.14.0-284.34.1.el9_2.x86_64 cri-o://1.30.3-3.rhaos4.15.gitb36169e.el9
|
|
worker-0-x86 Ready worker 75d v1.30.3 10.248.0.43 10.248.0.43 Red Hat Enterprise Linux CoreOS 415.92.202309261919-0 (Plow) 5.14.0-284.34.1.el9_2.x86_64 cri-o://1.30.3-3.rhaos4.15.gitb36169e.el9
|
|
worker-1-x86 Ready worker 75d v1.30.3 10.248.0.44 10.248.0.44 Red Hat Enterprise Linux CoreOS 415.92.202309261919-0 (Plow) 5.14.0-284.34.1.el9_2.x86_64 cri-o://1.30.3-3.rhaos4.15.gitb36169e.el9
|
|
endif::ibm-power[]
|
|
----
|
|
+
|
|
[NOTE]
|
|
====
|
|
It can take a few minutes after approval of the server CSRs for the machines to transition to the `Ready` status.
|
|
====
|
|
|
|
.Additional information
|
|
* link:https://kubernetes.io/docs/reference/access-authn-authz/certificate-signing-requests/[Certificate Signing Requests]
|
|
|
|
ifeval::["{context}" == "installing-ibm-z"]
|
|
:!ibm-z:
|
|
endif::[]
|
|
ifeval::["{context}" == "installing-ibm-z-kvm"]
|
|
:!ibm-z-kvm:
|
|
endif::[]
|
|
ifeval::["{context}" == "installing-ibm-z-lpar"]
|
|
:!ibm-z:
|
|
endif::[]
|
|
ifeval::["{context}" == "creating-multi-arch-compute-nodes-ibm-power"]
|
|
:!ibm-power:
|
|
endif::[]
|