Bastion Host Installation
This section outlines the use of the Installer Bootstrap Host to provision db-2/RMS2 with an operating system and configure it to fulfill the role of Database Host. After the Bastion Host is created, it is used to complete the installation of OCCNE.
Provision Second Database Host (RMS2) from Installer Bootstrap Host (RMS1)
Table 2-11 Terminology used in Procedure
Name | Description |
---|---|
bastion_full_name | This is the full name of the Bastion Host as defined in the
hosts.ini file.
Example: bastion-2.rainbow.us.labs.oracle.com |
bastion_kvm_host_full_name | This is the full name of the KVM server (usually RMS2/db-2)
that hosts the Bastion Host VM.
Example: db-2.rainbow.us.labs.oracle.com |
bastion_kvm_host_ip_address |
This is the IPv4 ansible_host IP address of the server (usually RMS2/db-2) that hosts the Bastion Host VM. Example: 172.16.3.5 |
bastion_short_name | This is the name of the Bastion Host derived from the
bastion_full_name up to the first ".".
Example: bastion-2 |
bastion_ip_address | This is the internal IPv4 "ansible_host" address of the
Bastion Host as defined within the hosts.ini file.
Example: 172.16.3.100 for bastion-2 on db-2 |
cluster_full_name | This is the name of the cluster as defined in the hosts.ini
file field: occne_cluster_name.
Example: rainbow.us.labs.oracle.com |
cluster_short_name | This is the short name of the cluster derived from the
cluster_full_name up to the the first ".".
Example: rainbow |
Note:
The Bootstrap Host must be setup to use root/<customer_specific_root_password> as the credentials to access it. Setting that user/password is part of the instructions at: Installation of Oracle Linux 7.x on Bootstrap Host.Table 2-12 Bastion Installation
Step # | Procedure | Description |
---|---|---|
1.
|
Copy the Necessary Files from the Utility USB to Support the OS Install |
|
2.
|
Set up the /etc/hosts file for the Central Repo and Verify Access |
|
3.
|
Copy the OL7 ISO to the Installer Bootstrap Host |
The iso file must be accessible from a Customer Site Specific repository. This file should be accessible because the ToR switch configurations were completed in procedure: Configure Top of Rack 93180YC-EX Switches
Copy the OL7 ISO file to the /var/occne directory. The example below uses OracleLinux-7.5-x86_64-disc1.iso. If this file was copied to the Utility USB, it can be copied from there into the same directory on the Bootstrap Host. Note: If the user copies this ISO from their laptop then they must use an application like WinSCP pointing to the Management Interface IP. scp <usr>@<site_specific_address>:/<path_to_iso>/OracleLinux-7.5-x86_64-disc1.iso /var/occne/OracleLinux-7.5-x86_64-disc1.iso |
4.
|
Install Packages onto the Installer Bootstrap Host | Use YUM to install necessary packages onto
the installer Bootstrap Host.
$ yum install docker-engine nfs_utils ansible |
5.
|
Set up access to the Docker Registry on the Installer Bootstrap Host |
|
6.
|
Setup NFS on the Installer Bootstrap Host |
Run the following commands using sudo (assumes nfs-utils has already been installed in procedure: Installation of Oracle Linux 7.x on Bootstrap Host : Install Additional Packages). Note: The IP address used in the echo command is the Platform
VLAN IP Address (VLAN 3)of the Bootstrap Host (RMS 1) as given in:
Installation PreFlight Checklist : Site Survey Host Table.
$ echo '/var/occne 172.16.3.4/24(ro,no_root_squash)' >> /etc/exports $ systemctl start nfs-server $ systemctl enable nfs-server Verify nfs is running: $ ps -elf | grep nfs $ systemctl status nfs-server |
7.
|
Set up the Boot Loader on the Installer Bootstrap Host | Execute the following commands:
$ mkdir -p /var/occne/pxelinux $ mount -t iso9660 -o loop /var/occne/OracleLinux-7.5-x86_64-disc1.iso /mnt $ cp /mnt/isolinux/initrd.img /var/occne/pxelinux $ cp /mnt/isolinux/vmlinuz /var/occne/pxelinux |
8.
|
Verify and Set the PXE Configuration File Permissions on the Installer Bootstrap Host | Each file configured in the step above must
be open for read and write permissions.
$ chmod -R 777 /var/occne/pxelinux |
9.
|
Disable DHCP and TFTP on the Installer Bootstrap Host | The TFTP and DHCP services running on the
Installer Bootstrap Host may still be running. These services must be disabled.
$ systemctl stop dhcpd $ systemctl disable dhcpd $ systemctl stop tftp $ systemctl disable tftp |
10.
|
Disable SELINUX | Set SELINUX to permissive mode. In order to
successfully set the SELINUX mode, a reboot of the system is required. The
getenforce command is used to determine the status of SELINUX.
$ getenforce active If the output of this command displays "active", change it to "permissive" by editing the /etc/selinux/config file. $ vi /etc/selinux/config Change the SELINUX variable to passive: SELINUX=permissive save the file Reboot the system: reboot |
11.
|
Generate the SSH private and public keys on Bootstrap Host. |
This command generates a private and public key for the cluster. These keys are passed to the Bastion Host and used to communicate to other nodes from that Bastion Host. The public key is passed to each node on OS install. Do not supply a passphrase when it asks for one. Just hit enter. Note: The private key (occne_id_rsa) must be copied to a server that going to access the Bastion Host because the Bootstrap Host is repaved. This key is used later in the procedure to access the Bastion Host after it has been created. Execute the following commands on the Bootstrap Host:$ mkdir -m 0700 /var/occne/cluster/<cluster_short_name>/.ssh $ ssh-keygen -b 4096 -t rsa -C "occne installer key" -f "/var/occne/cluster/<cluster_short_name>/.ssh/occne_id_rsa" -q -N "" |
12.
|
Execute the OS Install and Bastion VM Creation on Bastion KVM Host (RMS2) from the Installer Bootstrap Host |
|