Pre-Installation Checklist for OpenShift 4 on VMware vSphere

This checklist should help in getting everything ready for a smooth installation of OpenShift 4 on VMware vSphere.

Checklist

VMware vSphere

Virtual Machines

The following VMs are required to create an OpenShift 4 cluster:

Machine Number vCPU RAM Storage OS

Bastion Host1

1

1

4 GB

20 GB

RHEL or similar

Webserver1

1

1

4 GB

20 GB

irrelevant

Bootstrap Node2

1

4

16 GB

120 GB

RHCOS4

Masters

3

4

16 GB

120 GB

RHCOS4

Infra Nodes

3

8

32 GB

120 GB

RHCOS4

Worker Nodes3

2+

2+

8+ GB

120 GB

RHCOS4

1: The bastion host can also be used as a web server. Red Hat doesn’t define any resource requirements for bastion host and web server. The values above are based on our recommendations and can be adapted to your needs.

2: The bootstrap node is a temporary machine that can be deleted after the installation.

3: Number and dimensioning of the worker nodes is dependent on your workload.

4: RHCOS = Red Hat CoreOS

Network

Address and DHCP

The OpenShift VMs should get their IP address via DHCP. Create DHCP reservations with the specified MAC address of the VM.

DNS records

Several DNS records are required for OpenShift to work correctly.

The OpenShift documentation lists the required records in detail.

To illustrate, the following variables are set:

<base_domain>:

appuio.ch

<cluster_name>:

ocp4-vs

<cluster_name> must match the folder name in vSphere, in which all OpenShift VMs reside, for vSphere storage integration to work correctly.

With the defined variables, the following DNS records are required:

Record Type Target

api.ocp4-vs.appuio.ch

A/CNAME

API Load Balancer

api-int.ocp4-vs.appuio.ch

A/CNAME

API Load Balancer

*.apps.ocp4-vs.appuio.ch

A/CNAME

Apps Load Balancer

console.ocp4-vs.appuio.ch

CNAME

Apps Load Balancer

etcd-0.ocp4-vs.appuio.ch

A

Master 1

etcd-1.ocp4-vs.appuio.ch

A

Master 2

etcd-2.ocp4-vs.appuio.ch

A

Master 3

_etcd-server-ssl._tcp.ocp4-vs.appuio.ch

SRV

See User-provisioned DNS requirements for details.

By default, Windows DNS servers create a SRV record for every A record. For the A records of etcd, make sure that the SRV records aren’t created (or delete them, if they were), so the hostnames can be enumerated correctly.

Certificates

Certificates for the following hostnames need to be created:

  • api.ocp4-vs.appuio.ch

  • console.ocp4-vs.appuio.ch

  • *.apps.ocp4-vs.appuio.ch (wildcard certificate)

Subject Alternative Name

For the certificates to be valid in modern web browser, make sure the Subject Alternative Name (SAN) contains the hostname of the certificate. See How to create a CSR with OpenSSL for an example on how to do so.

Private PKI

If the certificates are issued from your own private PKI, the RootCA certificate of your PKI needs to be added to the install-config.yaml as described in the Configuring a custom PKI:

…
additionalTrustBundle: |
    -----BEGIN CERTIFICATE-----
    <MY_TRUSTED_CA_CERT_1>
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    <MY_TRUSTED_CA_CERT_2>
    -----END CERTIFICATE-----
…

Multiple CA certificates can be added.

Load balancers

For accessing API and applications, the following load balancers are required:

  • API load balancer

    • Targets: all 3 masters and the bootstrap node at the beginning of the installation

    • Ports: 6443/tcp, 22623/tcp

    • TLS passthrough (no TLS termination on the load balancer

    • WebSockets allowed

  • Apps load balancer

    • Targets: all 3 Infra Nodes

    • Ports: 80/tcp, 443/tcp

    • TLS passthrough (optimally no TLS termination on the load balancer)

Communication

The following communication has to be guaranteed:

Source Destination Ports Comment

OpenShift

API load balancer

6443/tcp, 22623/tcp

All nodes

OpenShift

App load balancer

80/tcp, 443/tcp

All nodes

OpenShift

Outgoing proxy

depending on proxy

All nodes

OpenShift masters

Configured IdP

depending on IdP

Authentication is handled by components running on masters

Possible further surrounding systems:

  • Access to Git repositories from all worker nodes

  • Access to databases and other applications from all worker nodes

Outgoing proxy

The following URLs need to be whitelisted on the outgoing proxy, as described at Configuring your firewall.

If the connection to the proxy is done via HTTPS, the CA certificate, which was used to sign the certificate of the proxy server, needs to be added to the install-config.yaml, as described above.