Create an Azure Red Hat OpenShift 4 private cluster
In this article, you'll prepare your environment to create Azure Red Hat OpenShift private clusters running OpenShift 4. You'll learn how to:
- Setup the prerequisites and create the required virtual network and subnets
- Deploy a cluster with a private API server endpoint and a private ingress controller
If you choose to install and use the CLI locally, this tutorial requires that you're running the Azure CLI version 2.30.0 or later. Run az --version
to find the version. If you need to install or upgrade, see Install Azure CLI.
Before you begin
Register the resource providers
If you have multiple Azure subscriptions, specify the relevant subscription ID:
az account set --subscription <SUBSCRIPTION ID>
Register the
Microsoft.RedHatOpenShift
resource provider:az provider register -n Microsoft.RedHatOpenShift --wait
Register the
Microsoft.Compute
resource provider (if you haven't already):az provider register -n Microsoft.Compute --wait
Register the
Microsoft.Network
resource provider (if you haven't already):az provider register -n Microsoft.Network --wait
Register the
Microsoft.Storage
resource provider (if you haven't already):az provider register -n Microsoft.Storage --wait
Get a Red Hat pull secret (optional)
A Red Hat pull secret enables your cluster to access Red Hat container registries along with additional content. This step is optional but recommended.
Go to your Red Hat OpenShift cluster manager portal and log in.
You'll need to log in to your Red Hat account or create a new Red Hat account with your business email and accept the terms and conditions.
Click Download pull secret.
Keep the saved pull-secret.txt
file somewhere safe - it will be used in each cluster creation.
When running the az aro create
command, you can reference your pull secret using the --pull-secret @pull-secret.txt
parameter. Execute az aro create
from the directory where you stored your pull-secret.txt
file. Otherwise, replace @pull-secret.txt
with @<path-to-my-pull-secret-file
.
If you're copying your pull secret or referencing it in other scripts, your pull secret should be formatted as a valid JSON string.
Create a virtual network containing two empty subnets
Next, you'll create a virtual network containing two empty subnets.
Set the following variables.
LOCATION=eastus # the location of your cluster RESOURCEGROUP="v4-$LOCATION" # the name of the resource group where you want to create your cluster CLUSTER=aro-cluster # the name of your cluster
Create a resource group
An Azure resource group is a logical group in which Azure resources are deployed and managed. When you create a resource group, you're asked to specify a location. This location is where resource group metadata is stored, it's also where your resources run in Azure if you don't specify another region during resource creation. Create a resource group using the [az group create][az-group-create] command.
az group create --name $RESOURCEGROUP --location $LOCATION
The following example output shows the resource group created successfully:
{ "id": "/subscriptions/<guid>/resourceGroups/aro-rg", "location": "eastus", "managedBy": null, "name": "aro-rg", "properties": { "provisioningState": "Succeeded" }, "tags": null }
Create a virtual network.
Azure Red Hat OpenShift clusters running OpenShift 4 require a virtual network with two empty subnets, for the master and worker nodes.
Create a new virtual network in the same resource group you created earlier.
az network vnet create \ --resource-group $RESOURCEGROUP \ --name aro-vnet \ --address-prefixes 10.0.0.0/22
The following example output shows the virtual network created successfully:
{ "newVNet": { "addressSpace": { "addressPrefixes": [ "10.0.0.0/22" ] }, "id": "/subscriptions/<guid>/resourceGroups/aro-rg/providers/Microsoft.Network/virtualNetworks/aro-vnet", "location": "eastus", "name": "aro-vnet", "provisioningState": "Succeeded", "resourceGroup": "aro-rg", "type": "Microsoft.Network/virtualNetworks" } }
Add an empty subnet for the master nodes.
az network vnet subnet create \ --resource-group $RESOURCEGROUP \ --vnet-name aro-vnet \ --name master-subnet \ --address-prefixes 10.0.0.0/23 \ --service-endpoints Microsoft.ContainerRegistry
Add an empty subnet for the worker nodes.
az network vnet subnet create \ --resource-group $RESOURCEGROUP \ --vnet-name aro-vnet \ --name worker-subnet \ --address-prefixes 10.0.2.0/23 \ --service-endpoints Microsoft.ContainerRegistry
Disable subnet private endpoint policies on the master subnet. This is required to be able to connect and manage the cluster.
az network vnet subnet update \ --name master-subnet \ --resource-group $RESOURCEGROUP \ --vnet-name aro-vnet \ --disable-private-link-service-network-policies true
Create the cluster
Run the following command to create a cluster. Optionally, you can pass your Red Hat pull secret which enables your cluster to access Red Hat container registries along with additional content.
Note
If you're copy/pasting commands and using one of the optional parameters, be sure delete the initial hashtags and the trailing comment text. As well, close the argument on the preceding line of the command with a trailing backslash.
az aro create \
--resource-group $RESOURCEGROUP \
--name $CLUSTER \
--vnet aro-vnet \
--master-subnet master-subnet \
--worker-subnet worker-subnet \
--apiserver-visibility Private \
--ingress-visibility Private
# --domain foo.example.com # [OPTIONAL] custom domain
# --pull-secret @pull-secret.txt # [OPTIONAL]
After executing the az aro create
command, it normally takes about 35 minutes to create a cluster.
Note
When attempting to create a cluster, if you receive an error message saying that your resource quota has been exceeded, see Adding Quota to ARO account to learn how to proceed.
Important
If you choose to specify a custom domain, for example foo.example.com, the OpenShift console will be available at a URL such as https://console-openshift-console.apps.foo.example.com
, instead of the built-in domain https://console-openshift-console.apps.<random>.<location>.aroapp.io
.
By default OpenShift uses self-signed certificates for all of the routes created on *.apps.<random>.<location>.aroapp.io
. If you choose Custom DNS, after connecting to the cluster, you'll need to follow the OpenShift documentation to configure a custom certificate for your ingress controller and custom certificate for your API server.
Create a private cluster without a public IP address (preview)
Typically, private clusters are created with a public IP address and load balancer, providing a means for outbound connectivity to other services. However, you can create a private cluster without a public IP address. This may be required in situations in which security or policy requirements prohibit the use of public IP addresses.
Important
Currently, this Azure Red Hat OpenShift feature is being offered in preview only. Preview features are available on a self-service, opt-in basis. Previews are provided "as is" and "as available," and they are excluded from the service-level agreements and limited warranty. Azure Red Hat OpenShift previews are partially covered by customer support on a best-effort basis. As such, these features are not meant for production use.
To create a private cluster without a public IP address, register for the feature flag UserDefinedRouting
using the following command structure:
az feature register --namespace Microsoft.RedHatOpenShift --name UserDefinedRouting
After you've registered the feature flag, create the cluster using the command above.
Enabling this User Defined Routing option prevents a public IP address from being provisioned. User Defined Routing (UDR) allows you to create custom routes in Azure to override the default system routes or to add more routes to a subnet's route table. See Virtual network traffic routing to learn more.
Note
Be sure to specify the correct subnet with the properly configured routing table when creating your private cluster.
For egress, the User Defined Routing option ensures that the newly created cluster has the egress lockdown feature enabled to allow you to secure outbound traffic from your new private cluster. See Control egress traffic for your Azure Red Hat OpenShift (ARO) cluster (preview) to learn more.
Connect to the private cluster
You can log into the cluster using the kubeadmin
user. Run the following command to find the password for the kubeadmin
user.
az aro list-credentials \
--name $CLUSTER \
--resource-group $RESOURCEGROUP
The following example output shows the password will be in kubeadminPassword
.
{
"kubeadminPassword": "<generated password>",
"kubeadminUsername": "kubeadmin"
}
You can find the cluster console URL by running the following command, which will look like https://console-openshift-console.apps.<random>.<region>.aroapp.io/
az aro show \
--name $CLUSTER \
--resource-group $RESOURCEGROUP \
--query "consoleProfile.url" -o tsv
Important
In order to connect to a private Azure Red Hat OpenShift cluster, you'll need to perform the following step from a host that is either in the Virtual Network you created or in a Virtual Network that is peered with the Virtual Network the cluster was deployed to.
Launch the console URL in a browser and login using the kubeadmin
credentials.
Install the OpenShift CLI
Once you're logged into the OpenShift Web Console, click on the ? on the top right and then on Command Line Tools. Download the release appropriate to your machine.
You can also download the latest release of the CLI appropriate to your machine.
Connect using the OpenShift CLI
Retrieve the API server's address.
apiServer=$(az aro show -g $RESOURCEGROUP -n $CLUSTER --query apiserverProfile.url -o tsv)
Important
In order to connect to a private Azure Red Hat OpenShift cluster, you'll need to perform the following step from a host that is either in the Virtual Network you created or in a Virtual Network that is peered with the Virtual Network the cluster was deployed to.
Login to the OpenShift cluster's API server using the following command. Replace <kubeadmin password> with the password you just retrieved.
oc login $apiServer -u kubeadmin -p <kubeadmin password>
Next steps
In this article, an Azure Red Hat OpenShift cluster running OpenShift 4 was deployed. You learned how to:
- Setup the prerequisites and create the required virtual network and subnets
- Deploy a cluster
- Connect to the cluster using the
kubeadmin
user
Advance to the next article to learn how to configure the cluster for authentication using Azure Active Directory.
Feedback
Submit and view feedback for