Before you begin
You must complete the preinstallation requirements before you can deploy the High-Speed Transfer Server (HSTS). There are also various optional preinstallation tasks that you might want to perform. Then, you can use the IBM Cloud Pak Platform UI to deploy the server.
Preinstallation requirements
For guidance on OpenShift resource requirements, see Resource requirements.
The following items are prerequisites for installing the Aspera High-Speed Transfer Server operator:
- IBM Cloud Pak® for Integration
- Install Cloud Pak for Integration. See Overview – Installation.
- Aspera license
- Obtain an Aspera license. To do so, email aspera-license@ibm.com with the sales order number and
number of VPCs for HSTS. You can also get an evaluation license key from the IBM sales team.Note: To obtain full HSTS performance you need an Aspera production environment license.
- OpenShift
- Version 4.7.0 or later.
- OpenShift CLI
- Install the OpenShift CLI. For more information about installing the CLI, see Getting started with the OpenShift CLI in the OpenShift documentation.
- kubectl
- Install and configure kubectl with access to your cluster.
- Project (Namespace)
- Create a namespace for HSTS by using the OpenShift web console or the OpenShift CLI.
- IBM entitlement key and secret
- Obtain an IBM entitlement key, and create a secret for it.
- Go to Access your container software.
- Select Get entitlement key, click Copy key, and save it according to your local security practices.
-
Create a secret for your IBM entitlement key, for the cluster in your namespace. Use this command syntax, where you enter the values for your entitlement key and HSTS namespace:
export IBM_ENTITLEMENT_USER=cp export IBM_ENTITLEMENT_KEY=my_entitlement_key oc create secret docker-registry ibm-entitlement-key \ --docker-username=$IBM_ENTITLEMENT_USER \ --docker-password=$IBM_ENTITLEMENT_KEY \ --docker-server=cp.icr.io \ -n my_namespace
- Cluster-scoped permissions
- See Cluster-scoped permissions required by the Aspera HSTS operator
Optional: Create a Persistent Volume Claim
The HSTS operator automatically creates a persistent Persistent Volume Claim (PVC), of the class
hsts-transfer-pvc
.
To create a PVC with your own specifications:
- Create a pvc.yaml file with the required configuration.
Note that the storage class is in this example is unique to IBM Cloud. When OpenShift is deployed on other public clouds, there are different storage classes.
Open the OpenShift web console and click Storage in the navigation menu to find what storage classes are available. You must use a storage class with a name that ends in -gid (for supplemental group ID).
In this example,storage
is set to100Gi
(100 Gigabytes) andstorageClassName
is set to
:hsts-transfer-pvc
apiVersion: v1 kind: PersistentVolumeClaim metadata: name: hsts-transfer-pvc spec: accessModes: - ReadWriteMany resources: requests: storage: 100Gi storageClassName: hsts-transfer-pvc-gid
- Create a reserve disk by using this
syntax:
oc apply -f pvc.yaml -n MY_NAMESPACE
- Save your PVC name (which is defined in the YAML file with
name
) in a convenient place, according to your local security practices. You will need it later to mount the storage to your pod.
Optional: Create an Aspera node credentials secret
The HSTS operator automatically creates the HSTS Node API credentials that you need to use when configuring HSTS with a Node API access key and secret, and that are required for doing file transfers with your HSTS instance. The credentials consist of a unique Node API username and password, which are stored in a secret called your_deployment_name-asperanoded-admin.
However, if you choose to create your own Node API user and password credentials, follow these steps:
- Run this command and store the secret according to your local security practices. If you copy
and paste the command, make sure to edit the values NODE_USER and
NODE_PASS. For example, the password value NODE_PASS is being
set to
uuid
based on theuuidgen
command:Note: This password is not secure as it does not comply with the security best practices. This password is only an example for this documentation.oc create secret generic asperanoded-creds --from-literal=NODE_USER=nodeuser --from-literal=NODE_PASS=`uuidgen` -n aspera
- If you skip this step, a default credential with a random password is created. The default
secret is saved under the key
<instancename>-asperanoded-admin.
You can assign your instance name to the variable $INSTANCE_NAME. To assign you instance name to the variable, run this command:INSTANCE_NAME=`oc get IbmAsperaHsts -n aspera -o jsonpath='{.items[0].metadata.name}'`
Note: If you didn't change your instance name, the default name of the instance isquickstart
.