forked from pivotal-cf/docs-pks
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathinstalling-pks-azure.html.md.erb
164 lines (95 loc) · 7.21 KB
/
installing-pks-azure.html.md.erb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
---
title: Installing PKS on Azure
owner: PKS
iaas: Azure
---
<strong><%= modified_date %></strong>
This topic describes how to install and configure Pivotal Container Service (PKS) on Azure.
##<a id='prerequisites'></a>Prerequisites
Before performing the procedures in this topic, you must have deployed and configured Ops Manager.
For more information, see [Azure Prerequisites and Resource Requirements](azure-requirements.html).
<%= partial 'prerequisites' %>
##<a id='install'></a> Step 1: Install PKS
<%= partial 'install-pks' %>
##<a id='configure'></a> Step 2: Configure PKS
Click the orange **Pivotal Container Service** tile to start the configuration process.
![Pivotal Container Service tile on the Ops Manager installation dashboard](images/pks-tile-orange.png)
<p class="note warning"><strong>WARNING</strong>: When you configure the PKS tile,
do not use spaces in any field entries. This includes spaces between characters as well as
leading and trailing spaces. If you use a space in any field entry, the deployment of PKS fails.</p>
###<a id='azs-networks'></a> Assign Networks
<%= partial 'azs-networks-azure' %>
###<a id='pks-api'></a> PKS API
<%= partial 'pks-api' %>
###<a id='plans'></a> Plans
<%= partial 'plans' %>
###<a id='cloud-provider'></a> Kubernetes Cloud Provider
To configure your Kubernetes cloud provider settings, follow the procedures below:
1. Click **Kubernetes Cloud Provider**.
1. Under **Choose your IaaS**, select **Azure**.
<img src="images/cloud-azure.png" alt="Azure pane configuration">
1. Under **Azure Cloud Name**, select the identifier of your Azure environment.
1. Enter **Subscription ID**. This is the ID of the Azure subscription that the cluster is deployed in.
1. Enter **Tenant ID**. This is the Azure Active Directory (AAD) tenant ID for the subscription that the cluster is deployed in.
1. Enter **Location**. This is the location of the resource group that the cluster is deployed in.
<br><br>
You set the location name in the `terraform.tfvars` file in [Deploying Ops Manager on Azure](azure-om-deploy.html). However, Terraform removes the spaces from this name and makes it lower-case. For example, if you entered `Central US` in the `terraform.tfvars` file, it becomes `centralus`. You must enter the converted form of the location name in the **Location** field, such as `centralus`.
1. Enter **Resource Group**. This is the name of the resource group that the cluster is deployed in.
1. Enter **Virtual Network**. This is the name of the virtual network that the cluster is deployed in.
1. Enter **Virtual Network Resource Group**. This is the name of the resource group that the virtual network is deployed in.
1. Enter **Default Security Group**. This is the name of the security group attached to the cluster's subnet.
1. Enter **Primary Availability Set**. This is the name of the availability set that will be used as the load balancer back end.
<br><br>
Terraform creates this availability set and its name is `YOUR-ENVIRONMENT-NAME-pks-as`, where `YOUR-ENVIRONMENT-NAME` is the value you provided for `env_name` in the `terraform.tfvars` file. See [Step 1: Download and Edit the Terraform Variables File](azure-om-deploy.html#download) of <em>Deploying Ops Manager on Azure</em> for more information. You can also find the name of the availability set by logging in to the Azure console.
1. For **Master Managed Identity**, enter `pks-master`. You created the managed identity for the master nodes in
[Create the Master Nodes Managed Identity](azure-managed-identities.html#create-master) in *Creating Managed Identities in Azure for PKS*.
1. For **Worker Managed Identity**, enter `pks-worker`. You created the managed identity for the worker nodes in
[Create the Worker Nodes Managed Identity](azure-managed-identities.html#create-worker) in *Creating Managed Identities in Azure for PKS*.
1. Click **Save**.
###<a id='syslog'></a> (Optional) Logging
<%= partial 'logging' %>
###<a id='networking'></a> Networking
To configure networking, do the following:
1. Click **Networking**.
1. Under **Container Networking Interface**, select **Flannel**.
<img src="images/networking-flannel.png" alt="Networking pane configuration" width="425">
1. (Optional) Enter values for **Kubernetes Pod Network CIDR Range** and **Kubernetes Service Network CIDR Range**.
* Ensure that the CIDR ranges do not overlap and have sufficient space for your deployed services.
* Ensure that the CIDR range for the **Kubernetes Pod Network CIDR Range** is large enough to accommodate the expected maximum number of pods.
1. Under **Allow outbound internet access from Kubernetes cluster vms (IaaS-dependent)**, leave the **Enable outbound internet access** checkbox unselected. You must leave this checkbox unselected due to an incompatibility between the public dynamic IPs provided by BOSH and load balancers on Azure.
1. Click **Save**.
###<a id='uaa'></a> UAA
<%= partial 'uaa' %>
###<a id='monitoring'></a> (Optional) Monitoring
<%= partial 'monitoring' %>
###<a id='usage'></a> Usage Data
<%= partial 'usage-data' %>
###<a id='errands'></a> Errands
<%= partial 'errands' %>
###<a id='resource-config'></a> Resource Config
To modify the resource usage of PKS and specify your PKS API load balancer, follow the steps below:
1. Select **Resource Config**.
1. In the **Load Balancers** column, enter the name of your PKS API load balancer.
The name of your PKS API load balancer is `YOUR-ENVIRONMENT-NAME-pks-lb`. Refer to
the environment name you configured in your `terraform.tfstate` file during [Step 1: Download
Templates and Edit Variables File](https://docs.pivotal.io/pcf/om/2-4/azure/prepare-env-terraform.html). Then, append `-pks-lb` to that environment name.
<%= partial 'lb-resource-config' %>
1. (Optional) Edit other resources used by the **Pivotal Container Service** job.
![Resource pane configuration](images/azure-resources.png)
<p class="note"><strong>Note</strong>: If you experience timeouts or slowness when interacting with the PKS API, select a <strong>VM Type</strong> with greater CPU and memory resources for the <strong>Pivotal Container Service</strong> job.</p>
##<a id='apply-changes'></a> Step 3: Apply Changes
<%= partial 'apply-changes' %>
##<a id='retrieve-pks-api'></a> Step 4: Retrieve the PKS API Endpoint
<%= partial 'share-endpoint' %>
## <a id='lb-pks-api'></a> Step 5: Configure an Azure Load Balancer for the PKS API
Follow the procedures in [Configuring an Azure Load Balancer for the PKS API](azure-api-load-balancer.html) to configure an Azure load balancer for the PKS API.
## <a id='clis'></a> Step 6: Install the PKS and Kubernetes CLIs
<%= partial 'install-cli' %>
## <a id='api'></a> Step 7: Configure PKS API Access
Follow the procedures in [Configuring PKS API Access](configure-api.html).
## <a name='auth'></a> Step 8: Configure Authentication for PKS
<%= partial 'configure-auth' %>
##<a id='next-steps'></a> Next Steps
After installing PKS on Azure, you may want to do one or more of the following:
* Create a load balancer for your PKS clusters. For more information, see [Creating and Configuring an Azure Load Balancer for PKS Clusters](azure-cluster-load-balancer.html).
* Create your first PKS cluster. For more information, see [Creating Clusters](create-cluster.html).