Beyond the platform-agnostic install-config.yaml
properties, the installer supports additional, Azure-specific properties.
The following options are available when using Azure:
region
(required string): The Azure region where the cluster will be created.baseDomainResourceGroupName
(required string): The resource group where the Azure DNS zone for the base domain is found.defaultMachinePlatform
(optional object): Default Azure-specific machine pool properties which applies to machine pools that do not define their own Azure-specific properties.resourceGroupName
(optional string): The name of an already existing resource group where the cluster should be installed. If empty, a new resource group will created for the cluster.networkResourceGroupName
(optional string): The resource group where the Azure VNet is found.virtualNetwork
(optional string): The name of an existing VNet where the cluster infrastructure should be provisioned.controlPlaneSubnet
(optional string): An existing subnet which should be used for the cluster control plane.computeSubnet
(optional string): An existing subnet which should be used by cluster nodes.outboundType
(optional string): OutboundType is a strategy for how egress from cluster is achieved. Valid values areLoadbalancer
orUserDefinedRouting
Loadbalancer
(default): LoadbalancerOutboundType uses Standard loadbalancer for egress from the cluster, see docsUserDefinedRouting
: UserDefinedRoutingOutboundType uses user defined routing for egress from the cluster, see docs. User defined routing for egress can only be used when deploying clusters to pre-existing virtual networks.
osDisk
(optional object):diskSizeGB
(optional integer): The size of the disk in gigabytes (GB).diskType
(optional string): The type of disk (allowed values are:Premium_LRS
,Standard_LRS
, andStandardSSD_LRS
).
diskEncryptionSet
(optional object):subscriptionId
(required string): The subscription ID of the disk encryption set.resourceGroup
(required string): The resource group of the disk encryption set.name
(required string): The name of the disk encryption set.
encryptionAtHost
(optional bool): enables encryption at hosttype
(optional string): The Azure instance type.zones
(optional string slice): List of Azure availability zones that can be used (for example,["1", "2", "3"]
).acceleratedNetworking
(optional string): Whether to enable AcceleratedNetworking on hosts (allowed values are:Accelerated
,Basic
).
The installer can use an existing resource group when provisioning an OpenShift cluster. This resource group should only be used for this specific cluster and the cluster components will assume ownership of all resources in the resource group. Destroying the cluster using installer will delete this resource group. This resource group must be empty with no other resources when trying to use it for creating a cluster.
If you're limiting the installer's Service Principal scope to the Resource Group defined with resourceGroupName
, you will also need to ensure proper permissions for any other resource used by the installer in your environment such as Public DNS Zone, VNet, etc.
The installer can use an existing VNet and subnets when provisioning an OpenShift cluster. If one of networkResourceGroupName
, virtualNetwork
, controlPlaneSubnet
, or computeSubnet
is specified, all must be specified (see example below). The installer will use these existing networks when creating infrastructure such as virtual machines, load balancers, and DNS zones.
When pre-existing subnets are provided, the installer will not create a network security group (NSG) or alter an existing one attached to the subnet. Because cluster components do not modify the user-provided network security groups, which the Kubernetes controllers update, a pseudo-network security group is created for the Kubernetes controller to modify without impacting the rest of the environment. If multiple clusters are installed to the same VNet and isolation is desired, it must be enforced through an administrative task after the cluster is installed.
Some example install-config.yaml
are shown below.
For examples of platform-agnostic configuration fragments, see here.
An example minimal Azure install config is:
apiVersion: v1
baseDomain: example.com
metadata:
name: test-cluster
platform:
azure:
region: centralus
baseDomainResourceGroupName: os4-common
pullSecret: '{"auths": ...}'
sshKey: ssh-ed25519 AAAA...
An example Azure install config with custom machine pools:
apiVersion: v1
baseDomain: example.com
controlPlane:
name: master
platform:
azure:
type: Standard_DS4_v2
osDisk:
diskSizeGB: 512
diskType: Premium_LRS
replicas: 3
compute:
- name: worker
platform:
azure:
type: Standard_DS4_v2
osDisk:
diskSizeGB: 512
diskType: Standard_LRS
zones:
- "1"
- "2"
- "3"
replicas: 5
metadata:
name: test-cluster
platform:
azure:
region: centralus
baseDomainResourceGroupName: os4-common
pullSecret: '{"auths": ...}'
sshKey: ssh-ed25519 AAAA...
An example Azure install config to use a pre-existing resource group:
apiVersion: v1
baseDomain: example.com
metadata:
creationTimestamp: null
name: test-cluster
platform:
azure:
baseDomainResourceGroupName: os4-common
resourceGroupName: example-rg
cloudName: AzurePublicCloud
outboundType: Loadbalancer
region: centralus
pullSecret: '{"auths": ...}'
sshKey: ssh-ed25519 AAAA...
An example Azure install config to use a pre-existing VNet and subnets:
apiVersion: v1
baseDomain: example.com
metadata:
name: test-cluster
platform:
azure:
region: centralus
baseDomainResourceGroupName: os4-common
networkResourceGroupName: example_vnet_rg
virtualNetwork: example_vnet
controlPlaneSubnet: example_master_subnet
computeSubnet: example_worker_subnet
osDisk:
diskSizeGB: 512
diskType: Premium_LRS
pullSecret: '{"auths": ...}'
sshKey: ssh-ed25519 AAAA...