IBM Storage Fusion HCI System comes with the bootstrapping
software that is installed from the factory. The IBM support representative completes the initial
verification and physically connects the system to network and power. Then, they conduct the network
setup of the appliance, which connects the appliance to the data center network. This procedure
configures all the default nodes (three controllers and three compute nodes). If you ordered more
nodes, then they get installed as well. Use this information to install IBM Storage Fusion HCI System. Finally, Storage and Backup software get
installed on these nodes.
Procedure
-
Go to the URL provided by your IBM Systems Support Representative (SSR).
The format
of the URL is
http://<host IP address>:3000/isfsetup
.
Note: If you close your
browser anytime before the completion of stage 2, then open the URL again to go back to its last
state.
Important: Ensure that you do not add, change, or remove files during provisioning the
node.
- Accept the license.
After you accept the license, a
network precheck
runs to validate whether the appliance is correctly configured for
DHCP and DNS.
Configure network:
The Network
precheck page runs an automatic network check against all nodes in the appliance. It
checks whether each node has an assigned IP address and hostname.
- Check whether you can see all your nodes in Connected state.
In a high-availability cluster, it displays all the nodes present in all three racks. If
you observe all your nodes in connected state, go to step
4. Any
nodes that do not pass the network check shows in
Disconnected status.
- If one or more nodes are in a Disconnected state, do the
following steps:
- Work with your network team and confirm that the DNS and DHCP are configured for all
nodes in the appliance.
- After you make all the changes to DHCP or DNS, click Restart
precheck to initiate a new network check.
- Click Next.
- In the OpenShift version page, select the version of the
OpenShift and click
Next.
Important: If you select version 4.15, then you cannot install the Data Cataloging service.
- Set up your image registry:
If you want to use your
private image registry, you can install both
Red Hat
OpenShift and
IBM Storage Fusion HCI System software from images, which are maintained
in a container registry that you manage. If you do not want to use your enterprise registry, then
skip this step to install
Red Hat OpenShift Container Platform and
IBM Storage Fusion software by using the images that are hosted
in the Red Hat and IBM entitled registries.
Important: Support is available for
self signed, custom certificates, and certificates signed by a
well known CA authority.
- Choose whether to use the Public image
registry or Private image registry
option.
Choice |
Procedure |
Public image registry |
To use the public image registry, you need a pull secret and an entitlement key.
- Enter the Pull secret. It is an authorization token
that stores Docker credentials that you can use to access a registry. Your cluster needs this secret
to access and pull OpenShift images from the
quay.io container registry. If you do not have a pull secret, click
Get Pull secret. It takes you to https://cloud.redhat.com/openshift/install/pull-secret.
- Enter the Entitlement key. It is a product code that
is used to pull images from IBM Entitlement Registry. Your cluster needs this key to gain access to
IBM Storage Fusion images in the IBM Entitlement Registry.
If you do not have a key, click Get Entitlement key. It
takes you to IBM Container Library. For steps to obtain the key, see the Activating IBM Storage Fusion HCI System Software to be downloaded.
|
Private image registry |
If you select the Private image registry, then first mirror the Red Hat and IBM Storage Fusion images to your private registry. For more
information about mirroring, see Mirroring your images to the enterprise registry.You can choose to host the
Red Hat and IBM Storage Fusion images in separate repositories, or use the
same repository.
|
- If you need to use a proxy to connect to the external network, select the
Connect through a proxy option. To connect through a
proxy, enter the URL for the proxy server in the Host address field. If your
proxy requires authentication, then enter a Username and
Password.
- Click Next to go to the Network settings
page.
- Configure network - OpenShift network and storage network.
The
Network settings page shows the OpenShift network to setup OpenShift, as well as the storage configuration
for the internal storage network of IBM Storage Fusion.
- Optional: Ingress certificate:
The Ingress certificate page
allows you to optionally configure a custom certificate for OpenShift.
- Click the Configure now toggle to off to configure OpenShift with a self-signed certificate.
By default, the
Configure now toggle is set to on. However, it is
recommended that you upload a certificate that is provided by Certificate Authority (CA). Applying a
custom certificate during the installation ensures that the certificate is used immediately by
OpenShift. If you do not apply custom
certificate during installation, then you can do it later from
OpenShift. For more information about how to
apply custom certificate from
OpenShift, see
Ingress Operator in OpenShift.
- Drag and drop to upload a .crt file of a size that does not
exceed 1 MB or enter the details as text input.
- Enter the Private key and click Next.
The OpenShift initialization page gets
displayed.
- Click Finish.
- Initializing OpenShift cluster and next steps.
The final
step of this phase of installation is to create a three node Red Hat
OpenShift cluster. This minimal cluster is
used in the next phase of the installation to orchestrate building out the cluster and configuring
the Global Data Platform for IBM Storage Fusion HCI System.
- Monitor the progress of the OpenShift cluster.
In case of
failures, collect logs to analyze the errors. Click Learn more link to see
details about the error and steps to troubleshoot the issue. After you fix the issue, click
Retry. If you need to change any information entered in previous install
steps, click Change install settings.
After the OpenShift cluster gets successfully created, you
can view the credentials for the OpenShift
cluster.
- Click Download Password and CoreOS key to download and save the
kubeadmin password and CoreOS key.
Note down the credentials before the installation
proceeds with the next phase as you cannot access the OpenShift cluster without these credentials. It
is also required for debug and system recovery.
- To retrieve the password from the downloaded file in the future, run the following
commands:
- Go to the Downloads folder:
cd ~/Downloads
- List the files in the folder:
ls -ltr
- Extract the contents of ocpkeys compressed file.
- Go to the auth folder:
cd clusterconfigs/auth
- Open kubeadmin-password in edit mode and copy the password:
vi kubeadmin-password
- Go to the extracted folder /install, save the CoreOS
Key:
id_rsa
- In the installation folder, id_rsa is a CoreOS key that can be used to
connect to CoreOS nodes.
- In the Login section, copy the Username
and Password and save it. Use it to log in to IBM Storage Fusion HCI System and Red Hat
OpenShift. These credentials are configured
as single sign-on between Red Hat
OpenShift and IBM Storage Fusion.
Note: After you save the password and download the
ocpkey.zip file, the URL
points you to the OCP address. If your URL does not automatically point to the OCP address, then
check the
Network Preparation tab in your TDA installation worksheet to ensure that the
DNS wildcard domain name is added to the DNS server. Test your connectivity with
https://DNSentryingressendpointipaddress.
- Click IBM Storage Fusion to go to the IBM Storage Fusion HCI System user interface.
The login page
of the IBM Storage Fusion HCI System console displays in a new browser
tab.
- Enter the credentials that you noted down and click Log in to
resume with the installation.
If you encounter errors in the OpenShift installation
wizard, see Installation and upgrade issues. If you encounter errors in the
Provisioning and software installation wizard, check the
logs. For more information about accessing these logs, see Collecting log files of final installation.