SOP Retrieve ocp4 cacert

Signed-off-by: David Kirwan <dkirwan@redhat.com>
This commit is contained in:
David Kirwan 2021-09-15 13:02:05 +09:00
parent c894cc2304
commit 6a195f85ed
3 changed files with 23 additions and 11 deletions

View file

@ -38,14 +38,3 @@ sudo rbac-playbook groups/noc.yml -t 'tftp_server,dhcp_server'
On the `noc01` instance the `grub.cfg` file is located at `/var/lib/tftpboot/uefi/grub.cfg`
If particular changes to OS images for example, are required, they should be made on the `noc01` instance directly at `/var/lib/tftpboot/images/`. This will require users to be in the `sysadmin-noc` group.

View file

@ -0,0 +1,22 @@
== SOP Retrieve OCP4 Cluster CACERT
=== Resources
- [1] https://pagure.io/fedora-infra/ansible/blob/main/f/roles/dhcp_server[Ansible Role DHCP Server]
=== Retrieve CACERT
In Fedora Infra, we have Apache terminating TLS for the cluster. Connections to the api and the machineconfig server are handled by haproxy. To prevent TLS errors we must configure haproxy with the OCP4 Cluster CA Cert.
This can be retrieved once the cluster control plane has been installed, from the `os-control01` node like so:
----
oc get configmap kube-root-ca.crt -o yaml -n openshift-ingress
----
Extract this CACERT in full, and commit it to ansible at: `https://pagure.io/fedora-infra/ansible/blob/main/f/roles/haproxy/files/ocp.<ENV>-iad2.pem`
To deploy this cert, one must be apart of the `sysadmin-noc` group. Run the following playbook:
----
sudo rbac-playbook groups/proxies.yml -t 'haproxy'
----

View file

@ -3,3 +3,4 @@
- xref:sop_installation.adoc[SOP Openshift 4 Installation on Fedora Infra]
- xref:sop_configure_baremetal_pxe_uefi_boot.adoc[SOP Configure Baremetal PXE-UEFI Boot]
- xref:sop_create_machineconfigs.adoc[SOP Create MachineConfigs to Configure RHCOS]
- xref:sop_retrieve_ocp4_cacert.adoc[SOP Retrieve OCP4 CACERT]