Online production installation of IBM Cloud Pak for AIOps (CLI method)
If your cluster is connected to the internet, you can complete a production installation of IBM Cloud Pak® for AIOps with the Red Hat® OpenShift® Container Platform command line interface (CLI).
Before you begin
- You must know whether you are deploying a base deployment or a extended deployment of IBM Cloud Pak for AIOps. For more information, see Incremental adoption.
- Review the Planning section.
- Online installations of IBM Cloud Pak for AIOps can be run entirely as a non-root user, and do not require that user to have sudo access.
- Ensure that you are logged in to your Red Hat OpenShift cluster with
oc loginfor any steps that use the Red Hat OpenShift command-line interface (CLI). - If you require details about the permissions that the IBM Cloud Pak for AIOps operators need, see Permissions (IBM Cloud Pak for AIOps).
- A user with
cluster-adminprivileges is needed for the following operations:
Important: If IBM Sales representatives and Business Partners supplied you with a custom profile ConfigMap to customize your deployment, then you must follow their instructions to apply it during installation. The custom profile cannot be applied after installation, and attempting to do so can break your IBM Cloud Pak for AIOps deployment. For more information about custom sizing, see Custom sizing.
Installation procedure
Follow these steps to install IBM Cloud Pak for AIOps.
- Install and configure Red Hat OpenShift
- Configure storage
- Retrieve your entitlement key
- Create environment variables
- Create a custom project (namespace)
- Create the entitlement key secret
- Configure usage data collection
- Create the catalog source
- Install Cert Manager
- Install the License Service
- Verify cluster readiness
- Install the operator
- Install IBM Cloud Pak for AIOps
- Verify your installation
- Create an EgressFirewall to restrict outgoing traffic
- Access the Cloud Pak for AIOps console
1. Install and configure Red Hat OpenShift
IBM Cloud Pak for AIOps requires Red Hat OpenShift to be installed and running. You must have administrative access to your Red Hat OpenShift cluster.
For more information about the supported versions of Red Hat OpenShift, see Supported Red Hat OpenShift Container Platform versions.
-
Install Red Hat OpenShift by using the instructions in the Red Hat OpenShift documentation
.
-
Install the Red Hat OpenShift command line interface (
oc) on your cluster's boot node and runoc login. For more information, see the instructions in Getting started with the Red Hat OpenShift CLI.
-
Ensure that the clocks on your Red Hat OpenShift cluster are synchronized. Each Red Hat OpenShift node in the cluster must have access to an NTP server. Red Hat OpenShift nodes use NTP to synchronize their clocks. IBM Cloud Pak for AIOps runs on Red Hat OpenShift and also has this requirement. Discrepancies between the clocks on the Red Hat OpenShift nodes can cause IBM Cloud Pak for AIOps to experience operational issues. See the Red Hat OpenShift documentation
for information about how to use a
MachineConfigcustom resource to configure chrony to connect to your NTP servers. -
Optionally configure a custom certificate for IBM Cloud Pak for AIOps to use. You can use either of the following methods:
- Configure a custom certificate for the Red Hat OpenShift cluster. Follow the instructions in the Red Hat OpenShift documentation Replacing the default ingress certificate.
- If you would like to use a custom certificate for the IBM Cloud Pak for AIOps console only, then after installation is complete follow the instructions in Using a custom certificate.
2. Configure storage
Configure persistent storage for IBM Cloud Pak for AIOps that satisfies your sizing requirements. For more information about storage, see Storage.
3. Retrieve your entitlement key
Obtain the IBM entitlement key that is assigned to your IBMid, which is needed to pull the IBM Cloud Pak for AIOps images from the IBM® Entitled Registry.
-
Log in to MyIBM Container Software Library
with the IBMid and password details that are associated with the entitled software.
-
In the Entitlement key section, select Copy to copy the entitlement key to the clipboard. You will need to use this value to set the environment variable $IBM_ENTITLEMENT_KEY in the next step.
4. Create environment variables
Create and then source a shell script named waiops_var.sh that defines the environment variables that will be used to provide installation parameters for your deployment. Use the following codeblock as a template, replacing the brackets
< ... > with values for your environment.
You can use the following table to find the values to set for your storage environment variables.
| Storage provider | RWX-storage-class-name | RWO-storage-class-name |
|---|---|---|
| IBM Cloud® | ibmc-file-gold-gid | ibmc-block-gold |
| Red Hat® OpenShift® Data Foundation | ocs-storagecluster-cephfs | ocs-storagecluster-ceph-rbd |
| IBM Storage Fusion Data Foundation | ocs-storagecluster-cephfs | ocs-storagecluster-ceph-rbd |
| IBM Storage Fusion Global Data Platform | If you are using IBM Storage Fusion, use ibm-spectrum-scale-sc. If you are using IBM Storage Fusion HCI System, use ibm-storage-fusion-cp-sc |
If you are using IBM Storage Fusion, use ibm-spectrum-scale-sc. If you are using IBM Storage Fusion HCI System, use ibm-storage-fusion-cp-sc |
| IBM Storage Scale Container Native | ibm-spectrum-scale-sc | ibm-spectrum-scale-sc |
| Portworx | px-csi-aiops | px-csi-aiops |
| Portworx (multi-zone HA) | px-csi-aiops-mz | px-csi-aiops-mz |
| AWS native storage | efs-sc | gp3-csi |
Note: To confirm that you have the storage classes for your chosen storage provider as shown in the table, run oc get sc.
#============================================================================================================
# Cloud Pak for AIOps installation variables
#============================================================================================================
export CP4AIOPS_NAME=ibm-cp-aiops
export CP4AIOPS_SIZE=large # Set to `small` if you only require a starter, non-production deployment.
export SECURE_TUNNEL=false # Set to `true` to install Secure Tunnel, otherwise set to `false`.
export PROJECT_CP4AIOPS=cp4aiops
export ACCEPT_LICENSE=false # Set to `true` to agree to the license terms, otherwise install will fail.
export CATALOG_SRC_CP4AIOPS=ibm-operator-catalog
# -----------------------------------------------------------------------------------------------------------
# Incremental adoption - set your deployment type
# Set to `true` to install an extended deployment with log anomaly detection and ticket analysis capabilities
# Set to `false` to install a base deployment without log anomaly detection and ticket analysis capabilities
# -----------------------------------------------------------------------------------------------------------
export LOG_ANOMALY=false
# -------------------------------------------------------------------------------------------------------
# Storage
# -------------------------------------------------------------------------------------------------------
export STG_CLASS=<RWX-storage-class-name>
export STG_CLASS_BLOCK=<RWO-storage-class-name>
# -------------------------------------------------------------------------------------------------------
# Your customer details
# -------------------------------------------------------------------------------------------------------
export CUSTOMER_NAME=<your company name>
export CUSTOMER_ICN=<your IBM Customer Number>
export CUSTOMER_ENVIRONMENT=<Set to `trial`, `poc`, or `production`>
# -------------------------------------------------------------------------------------------------------
# IBM Entitled Registry
# -------------------------------------------------------------------------------------------------------
export IBM_ENTITLEMENT_KEY=<IBM-entitlement-key> # Set to the entitlement key retrieved in previous step.
# -------------------------------------------------------------------------------------------------------
# `OwnNamespace` installation mode: leave INSTALL_MODE_NAMESPACE as it is.
# `AllNamespaces` installation mode: change to export INSTALL_MODE_NAMESPACE=openshift-operators
# -------------------------------------------------------------------------------------------------------
export INSTALL_MODE_NAMESPACE=${PROJECT_CP4AIOPS}
# -------------------------------------------------------------------------------------------------------
# Topology resource group terminology
# Specify `application` or `service` as the terminology to be used for collections of topology resource
# groups. The default is `application`.
# -------------------------------------------------------------------------------------------------------
export TOPOLOGY_TERMINOLOGY=application
If you need help with deciding on the values to set for these environment variables, see the following topics.
- LOG_ANOMALY: Incremental adoption
- CP4AIOPS_SIZE: Sizing
- SECURE_TUNNEL: Secure Tunnel
- INSTALL_MODE_NAMESPACE: Operator installation mode
You can update your deployment type after installation. For more information, see Updating the deployment type.
Note: You can set a different value for $PROJECT_CP4AIOPS and $CP4AIOPS_NAME if you want. However, you must not use the default, kube-system, kube-public, openshift-node, openshift-infra,
or openshift projects (namespaces) for $PROJECT_CP4AIOPS. This is because IBM Cloud Pak for AIOps uses Security Context Constraints (SCC), and SCCs cannot be assigned to pods created in one of the default Red Hat OpenShift projects
(namespaces).
Run the following command to source your script and set the environment variables:
. ./waiops_var.sh
5. Create a custom project (namespace)
Run the following command to create a project (namespace) to deploy IBM Cloud Pak for AIOps into.
oc create namespace "${PROJECT_CP4AIOPS}"
6. Create the entitlement key secret
Run the following command to create an image pull secret called ibm-entitlement-key to enable your deployment to pull the IBM Cloud Pak for AIOps images from the IBM Entitled Registry.
oc create secret docker-registry ibm-entitlement-key --docker-username=cp --docker-password="${IBM_ENTITLEMENT_KEY}" --docker-server=cp.icr.io --namespace=${PROJECT_CP4AIOPS}
7. Configure usage data collection
To help the development of IBM Cloud Pak for AIOps, daily aggregated usage data is collected to analyse how IBM Cloud Pak for AIOps is used. The usage data is collected by the cp4waiops-metricsprocessor pod, and is sent to and stored
in IBM controlled GDPR-compliant systems. The collection of usage data is enabled by default, but can be disabled. For transparency, the cp4waiops-metricsprocessor pod's logs contain all the information that is collected. The
usage data that is collected is numeric, or is about the deployment type and platform. It does not include email addresses, passwords, or specific details. Only the following data is collected:
- Current number of applications
- Current number of alerts (all severities aggregated)
- Current number of incidents (all priorities aggregated)
- Current number of policies (includes predefined and user created)
- Current number of runbooks run since installation
- Current number of integrations of each type (For example ServiceNow, Instana, Falcon Logscale)
- Secure tunnel enablement: whether connection (which controls whether you can create a secure tunnel) is enabled in the Installation custom resource
- Deployment type: base deployment or extended deployment
- Deployment platform: Red Hat® OpenShift® Container Platform or Linux®
Configuring the collection of usage data
If you do not want to disable the collection of usage data, run the following command to configure the usage data with your customer details.
oc create secret generic aiops-metrics-processor -n ${PROJECT_CP4AIOPS} --from-literal=customerName=${CUSTOMER_NAME} --from-literal=customerICN=${CUSTOMER_ICN} --from-literal=environment=${CUSTOMER_ENVIRONMENT}
If you have a firewall enabled, ensure that outbound traffic to https://api.segment.io is allowed.
Important: Usage data without your customer details is still collected even if you do not create this secret. If you do not want any usage data collected, then you must run the command that is given in Disabling the collection of usage data.
Disabling the collection of usage data
If you want to disable the collection of usage data, run the following command.
oc create secret generic aiops-metrics-processor -n ${PROJECT_CP4AIOPS} --from-literal=customerName=${CUSTOMER_NAME} --from-literal=customerICN=${CUSTOMER_ICN} --from-literal=environment=${CUSTOMER_ENVIRONMENT} --from-literal=enableCollection=false
Note: You can update your usage data collection preferences after installation. For more information, see Updating usage data collection preferences.
8. Create the catalog source
Add the IBM Cloud Pak for AIOps catalog source to your Red Hat OpenShift cluster.
After installation, the ibm-operator-catalog CatalogSource object determines whether the upgrade of your IBM Cloud Pak for AIOps deployment is initiated automatically when a new patch becomes available. The ibm-operator-catalog CatalogSource object can be configured to automatically poll for and retrieve a newer catalog by enabling the polling attribute spec.updateStrategy.registryPoll. If a newer catalog for a patch is found and retrieved, then an automatic
upgrade of your IBM Cloud Pak for AIOps deployment is initiated. For more information, see Controlling upgrade.
You can disable or re-enable automatic patch upgrade after installation if you change your mind. For more information, see Configuring automatic patch upgrades.
Note: ibm-operator-catalog also contains the catalogs for other IBM Cloud Paks®. If multiple IBM Cloud Paks are installed on your cluster, then the polling attribute is configured for all of them.
Run the steps in Create the catalog source with automatic upgrade disabled or Create the catalog source with automatic upgrade enabled.
Create the catalog source with automatic upgrade disabled
-
Run the following command to create the
ibm-operator-catalogCatalogSource object without polling enabled.cat << EOF | oc apply -f - apiVersion: operators.coreos.com/v1alpha1 kind: CatalogSource metadata: name: ${CATALOG_SRC_CP4AIOPS} namespace: openshift-marketplace spec: displayName: ${CATALOG_SRC_CP4AIOPS} publisher: IBM Content sourceType: grpc image: icr.io/cpopen/${CATALOG_SRC_CP4AIOPS}:latest EOF -
Update the
ibm-operator-catalogCatalogSource to fix it to always use the current image digest, instead oficr.io/cpopen/ibm-operator-catalog:latest. This ensures that theibm-operator-catalogCatalogSource pods do not pull the latest image if a node reload or other issue causes them to restart. Run the following commands:IMGDIGEST=`oc get pods -n openshift-marketplace -l=olm.catalogSource=ibm-operator-catalog --no-headers -o=jsonpath="{.items[0].status.containerStatuses[0].imageID}" -n openshift-marketplace` CATALOGIMG=`oc get catalogsource ibm-operator-catalog -n openshift-marketplace -o jsonpath='{.spec.image}'` if [ "${CATALOGIMG}" = "icr.io/cpopen/ibm-operator-catalog:latest" ]; then oc patch catalogsource ibm-operator-catalog -n openshift-marketplace --type=json -p "[{ "op": "replace", "path": "/spec/image", "value": "\"$IMGDIGEST\"" }]" fi -
Verify that the ibm-operator-catalog CatalogSource object is present, and is returned by the following command.
oc get CatalogSources ibm-operator-catalog -n openshift-marketplaceExample output:
oc get CatalogSources ibm-operator-catalog -n openshift-marketplace NAME DISPLAY TYPE PUBLISHER AGE ibm-operator-catalog IBM Operator Catalog grpc IBM 4h13m
Create the catalog source with automatic upgrade enabled
-
Run the following command to create the
ibm-operator-catalogCatalogSource object with polling enabled.cat << EOF | oc apply -f - apiVersion: operators.coreos.com/v1alpha1 kind: CatalogSource metadata: name: ${CATALOG_SRC_CP4AIOPS} namespace: openshift-marketplace spec: displayName: ${CATALOG_SRC_CP4AIOPS} publisher: IBM Content sourceType: grpc image: icr.io/cpopen/${CATALOG_SRC_CP4AIOPS}:latest updateStrategy: registryPoll: interval: 45m EOF -
Verify that the ibm-operator-catalog CatalogSource object is present, and is returned by the following command.
oc get CatalogSources ibm-operator-catalog -n openshift-marketplaceExample output:
oc get CatalogSources ibm-operator-catalog -n openshift-marketplace NAME DISPLAY TYPE PUBLISHER AGE ibm-operator-catalog IBM Operator Catalog grpc IBM 4h13m
9. Install Cert Manager
Skip this step if you already have a certificate manager installed on the Red Hat OpenShift cluster that you are installing IBM Cloud Pak for AIOps on. If you do not have a certificate manager then you must install one.
The IBM Cloud Pak® foundational services Cert Manager is recommended. For more information about IBM Cloud Pak® foundational services Cert Manager hardware requirements, see IBM Certificate Manager (cert-manager) hardware requirements in the IBM Cloud Pak foundational services documentation.
The Red Hat OpenShift Cert Manager v1.17.x or lower is also supported. You must not use Red Hat OpenShift Cert Manager v1.18.0 or higher, because the default private key rotation behavior introduced in v1.18.0 is not compatible with IBM Cloud Pak for AIOps. For more information, see cert-manager Operator for Red Hat OpenShift in the Red Hat OpenShift documentation.
The IBM Cloud Pak® foundational services Cert Manager can be installed with the following steps.
-
Run the following command to create the resource definitions that you need:
cat << EOF | oc apply -f - apiVersion: v1 kind: Namespace metadata: name: ibm-cert-manager --- apiVersion: operators.coreos.com/v1 kind: OperatorGroup metadata: name: ibm-cert-manager-operator-group namespace: ibm-cert-manager --- apiVersion: operators.coreos.com/v1alpha1 kind: Subscription metadata: name: ibm-cert-manager-operator namespace: ibm-cert-manager spec: channel: v4.2 installPlanApproval: Automatic name: ibm-cert-manager-operator source: ibm-operator-catalog sourceNamespace: openshift-marketplace EOF -
Run the following command to ensure that the IBM Cloud Pak® foundational services Cert Manager pods have a STATUS of Running before proceeding to the next step.
oc -n ibm-cert-manager get podsExample output for a successful IBM Cloud Pak® foundational services Cert Manager installation:
NAME READY STATUS RESTARTS AGE cert-manager-cainjector-674854c49d-vstq4 1/1 Running 0 8d cert-manager-controller-646d4bd6fd-zwmqm 1/1 Running 0 8d cert-manager-webhook-8598787c8-s4lkt 1/1 Running 0 8d ibm-cert-manager-operator-c96957695-dkxnm 1/1 Running 0 8d
10. Install the License Service
Skip this step if the IBM Cloud Pak® foundational services License Service is already installed on the Red Hat OpenShift cluster that you are installing IBM Cloud Pak for AIOps on.
IBM Cloud Pak for AIOps requires the installation of the IBM Cloud Pak foundational services License Service. You must install the IBM Cloud Pak foundational services License Service on the Red Hat OpenShift cluster that you are installing IBM Cloud Pak for AIOps on.
-
Run the following command to create the resource definitions that you need:
cat << EOF | oc apply -f - apiVersion: v1 kind: Namespace metadata: name: ibm-licensing --- apiVersion: operators.coreos.com/v1 kind: OperatorGroup metadata: name: ibm-licensing-operator-group namespace: ibm-licensing spec: targetNamespaces: - ibm-licensing --- apiVersion: operators.coreos.com/v1alpha1 kind: Subscription metadata: name: ibm-licensing-operator-app namespace: ibm-licensing spec: channel: v4.2 installPlanApproval: Automatic name: ibm-licensing-operator-app source: ibm-operator-catalog sourceNamespace: openshift-marketplace EOF -
Run the following command to ensure that the IBM Cloud Pak® foundational services License Server pods have a STATUS of Running before proceeding to the next step.
oc -n ibm-licensing get podsExample output for a successful IBM Cloud Pak® foundational services License Service installation:
NAME READY STATUS RESTARTS AGE ibm-licensing-operator-db4cd746c-xzmlf 1/1 Running 0 8d ibm-licensing-service-instance-596b99588f-76cc5 1/1 Running 0 8d
For more information about the IBM Cloud Pak® foundational services License Service, see License Service in the IBM Cloud Pak foundational services documentation.
11. Verify cluster readiness
Run the prerequisite checker script to verify whether your Red Hat OpenShift cluster is correctly set up for a IBM Cloud Pak for AIOps installation.
Download the prerequisite checker script from github.com/IBM ,
and run it with the following command:
./prereq.sh -n ${PROJECT_CP4AIOPS}
Example output:
# ./prereq.sh -n cp4aiops
[INFO] Starting IBM Cloud Pak for AIOps prerequisite checker v4.6...
CLI: oc
[INFO] =================================Platform Version Check=================================
[INFO] Checking Platform Type....
[INFO] You are using Openshift Container Platform
[INFO] OCP version 4.14.21 is compatible but only nodes with AMD64 architectures are supported at this time.
[INFO] =================================Openshift Container Platform Version Check=================================
[INFO] =================================Entitlement Pull Secret=================================
[INFO] Checking whether the Entitlement secret or Global pull secret is configured correctly.
[INFO] Checking if the job 'cp4aiops-entitlement-key-test-job' already exists.
[INFO] The job with name 'cp4aiops-entitlement-key-test-job' was not found, so moving ahead and creating it.
[INFO] Creating the job 'cp4aiops-entitlement-key-test-job'
job.batch/cp4aiops-entitlement-key-test-job created
[INFO] Verifying if the job 'cp4aiops-entitlement-key-test-job' completed successfully..
[INFO] SUCCESS! Entitlement secret is configured correctly.
job.batch "cp4aiops-entitlement-key-test-job" deleted
[INFO] =================================Entitlement Pull Secret=================================
[INFO] =================================Storage Provider=================================
[INFO] Checking storage providers
[INFO] No IBM Storage Fusion Found... Skipping configuration check.
[INFO] No Portworx StorageClusters found with "Running" or "Online" status. Skipping configuration check for Portworx.
[INFO] Openshift Data Foundation found.
[INFO] No IBM Cloud Storage found... Skipping configuration check for IBM Cloud Storage Check.
Checking Openshift Data Foundation Configuration...
Verifying if Red Hat Openshift Data Foundation pods are in "Running" or "Completed" status
[INFO] Pods in openshift-storage project are "Running" or "Completed"
[WARNING] ocs-storagecluster-ceph-rbd does not exist.
[INFO] One of more warnings found when checking for Storage Providers.
[INFO] =================================Storage Provider=================================
[INFO] =================================Cert Manager Check=================================
[INFO] Checking for Cert Manager operator
[INFO] Successfully functioning cert-manager found.
CLUSTERSERVICEVERSION NAMESPACE
ibm-cert-manager-operator.v4.2.4 auto-openldap
[INFO] =================================Cert Manager Check=================================
[INFO] =================================Licensing Service Operator Check=================================
[INFO] Checking for Licensing Service operator
[INFO] Successfully functioning licensing service operator found.
CLUSTERSERVICEVERSION NAMESPACE
ibm-licensing-operator.v4.2.4 ibm-licensing
[INFO] =================================Licensing Service Operator Check=================================
[INFO] =================================Starter or Large Install Resources=================================
[INFO] Checking for cluster resources
[INFO] ==================================Resource Summary====================================================
[INFO] Nodes vCPU Memory(GB)
[INFO] Small (Non-HA) Base (available/required) [ 17 / 3 ] [ 124 / 47 ] [ 136 / 123 ]
[INFO] (+ Log Anomaly Detection & Ticket Analysis) [ 17 / 3 ] [ 124 / 55 ] [ 136 / 136 ]
[INFO] Large (HA) Base (available/required) [ 17 / 6 ] [ 124 / 130 ] [ 136 / 310 ]
[INFO] (+ Log Anomaly Detection & Ticket Analysis) [ 17 / 6 ] [ 124 / 156 ] [ 136 / 368 ]
[INFO] ==================================Resource Summary====================================================
[INFO] Cluster currently has resources available to create a starter install of Cloud Pak for AIOps
[INFO] =================================Prerequisite Checker Tool Summary=================================
[ PASS ] Openshift Container Platform Version Check
[ PASS ] Entitlement Pull Secret
[ WARNING ] Storage Provider
[ PASS ] Small (Non-HA) Base Install Resources
[ FAIL ] Large (HA) Base Install Resources
[ PASS ] Cert Manager Operator Installed
[ PASS ] Licensing Service Operator Installed
[INFO] =================================Prerequisite Checker Tool Summary=================================
Note: If you are not using IBM Cloud Pak® foundational services Cert Manager, then ignore any errors that are returned by the Cert Manager check.
12. Install the operator
For more information about installing operators, see Adding Operators to a cluster in the Red Hat OpenShift documentation.
For more information about the operators which are installed with IBM Cloud Pak for AIOps, see Operator Details.
-
Create an OperatorGroup.
Important: Skip this step if you are installing using the 'All Namespaces' installation mode. Check that you set
INSTALL_MODE_NAMESPACEcorrectly in step 4, and proceed to the next step, Install the IBM Cloud Pak for AIOps operator.If you are installing using the 'OwnNamespace' installation mode, then you must create an operator group in your custom project (namespace), or the IBM Cloud Pak for AIOps operator will not install. There might be an operator group for managing a namespace for given APIs. If there is an operator group for the namespace, do not create a second one.
Create the operator group by running the following command:
cat << EOF | oc apply -f - apiVersion: operators.coreos.com/v1 kind: OperatorGroup metadata: name: cp4aiops-operator-group namespace: ${PROJECT_CP4AIOPS} spec: targetNamespaces: - "${PROJECT_CP4AIOPS}" EOF -
Install the IBM Cloud Pak for AIOps operator.
Run the following command.
cat << EOF | oc apply -f - apiVersion: operators.coreos.com/v1alpha1 kind: Subscription metadata: name: ibm-aiops-orchestrator namespace: $INSTALL_MODE_NAMESPACE spec: channel: v4.6 installPlanApproval: Automatic name: ibm-aiops-orchestrator source: ${CATALOG_SRC_CP4AIOPS} sourceNamespace: openshift-marketplace EOFWarning: installPlanApproval must not be changed to Manual. Manual approval, which requires the manual review and approval of the generated InstallPlans, is not supported. Incorrect timing or ordering of manual approvals of InstallPlans can result in a failed installation.
-
After a few minutes, the IBM Cloud Pak for AIOps operator is installed. Verify that the all of the components have a state of
Succeededby running the following command:oc get csv -n ${INSTALL_MODE_NAMESPACE} | egrep "ibm-aiops-orchestrator"Example output:
$ oc get csv -n ${INSTALL_MODE_NAMESPACE} | egrep "ibm-aiops-orchestrator" ibm-aiops-orchestrator.v4.6.0 IBM Cloud Pak for AIOps 4.6.0 Succeeded
13. Install IBM Cloud Pak for AIOps
Create an instance of the IBM Cloud Pak for AIOps custom resource. A maximum of one IBM Cloud Pak for AIOps custom resource is allowed per cluster.
Use the following YAML to create an instance of the IBM Cloud Pak for AIOps custom resource.
cat << EOF | oc apply -f -
apiVersion: orchestrator.aiops.ibm.com/v1alpha1
kind: Installation
metadata:
name: ${CP4AIOPS_NAME}
namespace: ${PROJECT_CP4AIOPS}
spec:
size: ${CP4AIOPS_SIZE}
storageClass: ${STG_CLASS}
storageClassLargeBlock: ${STG_CLASS_BLOCK}
imagePullSecret: ibm-entitlement-key
topologyModel: ${TOPOLOGY_TERMINOLOGY}
license:
accept: ${ACCEPT_LICENSE}
pakModules:
- name: aiopsFoundation
enabled: true
- name: applicationManager
enabled: true
- name: aiManager
enabled: true
- name: connection
enabled: ${SECURE_TUNNEL}
- name: logAnomalyDetection
enabled: ${LOG_ANOMALY}
EOF
Warning: The pakModules aiopsFoundation, applicationManager, and aiManager must be enabled as in the preceding YAML. Do not change these values to false.
14. Verify your installation
Run the following command to check that the PHASE of your installation is Updating.
oc get installations.orchestrator.aiops.ibm.com -n ${PROJECT_CP4AIOPS}
Example output:
NAME PHASE LICENSE STORAGECLASS STORAGECLASSLARGEBLOCK AGE
ibm-cp-aiops Updating Accepted rook-cephfs rook-ceph-block 3m
It takes around 60-90 minutes for the installation to complete (subject to the speed with which images can be pulled). When installation is complete and successful, the PHASE of your installation changes to Running.
If your installation phase does not change to Running, then use the following command to find out which components are not ready:
oc get installation.orchestrator.aiops.ibm.com -o yaml -n ${PROJECT_CP4AIOPS} | grep 'Not Ready'
Example output:
lifecycleservice: Not Ready
zenservice: Not Ready
To see details about why a component is Not Ready run the following command, where <component> is the component that is not ready, for example zenservice.
oc get <component> -o yaml -n ${PROJECT_CP4AIOPS}
(Optional) You can also download and run a status checker script to see information about the status of your deployment. For more information about how to download and run the script, see github.com/IBM.
If the installation fails, or is not complete and is not progressing, then see Troubleshooting installation and upgrade and Known Issues to help you identify any installation problems.
15. Create an EgressFirewall
There is no egress firewall policy defined when you install IBM Cloud Pak for AIOps, so outgoing traffic from workload pods to the internal and external network is unrestricted.
To create a more secure environment, use the following steps.
-
Create an
EgressFirewallon your Red Hat OpenShift cluster to limit egress from the IBM Cloud Pak for AIOps project (namespace).For more information about creating an
EgressFirewall, see Configuring an egress firewall for a project.
Note: You can have only one
EgressFirewallper project/namespace. -
Configure exceptions to the
EgressFirewall.Edit your
EgressFirewallto add exceptions for the following IBM Cloud Pak for AIOps components that have egress dependencies, otherwise these components fail when they attempt egress.-
Allow egress to any external services, such as the following integrations:
- Kubernetes
- GitHub
- Microsoft® Teams
- ServiceNow
- Slack
- VMware® vCenter
-
Configure your
EgressFirewallto allow traffic for your GitHub, Kubernetes, ServiceNow, and VMware vCenter integrations.Edit your
EgressFirewallto allow or deny egress, as in the following example. Substitute values fordnsNameandcidrSelectorthat are the DNS names and addresses of your GitHub, Kubernetes, ServiceNow, or VMware vCenter sources.kind: EgressFirewall metadata: name: default spec: egress: - type: Allow to: cidrSelector: <1.2.3.0/24> - type: Allow to: dnsName: <www.github.com> - type: Allow to: dnsName: <www.developer.kubernetes.com> - type: Allow to: dnsName: <www.developer.servicenow.com> - type: Allow to: dnsName: <www.developer.vcenter.com> - type: Deny to: cidrSelector: <0.0.0.0/0>
-
Allow egress to any external services, such as the following integrations:
16. Access the Cloud Pak for AIOps console
After you successfully install IBM Cloud Pak for AIOps, get the URL for accessing the Cloud Pak for AIOps console.
-
Use the following command to get the URL to access the Cloud Pak for AIOps console:
oc get route -n ${PROJECT_CP4AIOPS} cpd -o jsonpath='{.spec.host}'The following output is a sample output:
cpd-cp4aiops.apps.mycluster.mydomain
Based on the sample output, your console URL would be
https://cpd-cp4aiops.apps.mycluster.mydomain -
Enter the URL in your browser to open the Cloud Pak for AIOps console. Log in with your username and password.
Find the IBM Cloud Pak for AIOps console username and password
The default username to access the Cloud Pak for AIOps console is admin. You can check the default username and their password with the following commands.
Note: This information is for the IBM provided credentials (admin only) authentication type.
-
Find the default username.
oc -n ${PROJECT_CP4AIOPS} get secret platform-auth-idp-credentials -o jsonpath='{.data.admin_username}' | base64 -d && echo -
Get the password for the
adminusername.oc -n ${PROJECT_CP4AIOPS} get secret platform-auth-idp-credentials -o jsonpath='{.data.admin_password}' | base64 -dThe following extract shows a sample output:
EwK9dj9fwPZHyHTyu9TyIgh9klZSzVsA
Based on the sample output, your password would be
EwK9dj9fwPZHyHTyu9TyIgh9klZSzVsA.
Important: You can change this default password at any time. For more information, see Changing the cluster administrator password.
What to do next
- Define integrations and applications with Defining.
- You can install and integrate with IBM Cognos® Analytics. For more information, see Installing IBM Cognos Analytics.
- If you have an existing on-premises IBM Tivoli Netcool/OMNIbus deployment, then you can connect it to IBM Cloud Pak for AIOps through an integration. For more information, see Creating IBM Tivoli Netcool/OMNIbus integrations.
- If you have an existing on-premises IBM Tivoli Netcool/Impact deployment, then you can connect it to IBM Cloud Pak for AIOps through an integration. For more information, see Creating IBM Tivoli Netcool/Impact integrations.
- Familiarize yourself with backup and restore procedures. It is recommended that you take regular backups of your IBM Cloud Pak for AIOps deployment. For more information, see Backup and restore.
- For more information about health checks and monitoring, see Health checks and monitoring.