Preparing Your Environment
To prepare your environment for installing the OMT infrastructure, ensure that you complete the following procedures:
- Checking Your Firewall Settings
- Enabling the Masquerade Setting in the Firewall
- Modifying the System Clock
- Checking Password Authentication Settings
- Ensuring That Required OS Packages Are Installed
- Checking MAC and Cipher Algorithms
- Setting System Parameters (Network Bridging)
- Understanding Example Files
- Removing Libraries to Prevent Ingress
- Configuring Elasticsearch Settings
Checking Your Firewall Settings
Ensure that the firewalld.service
is enabled and running on all nodes.
# systemctl start firewalld
# systemctl enable firewalld
Enabling the Masquerade Setting in the Firewall
You must enable the masquerade setting only when the firewall is enabled.
Run the following command on all master and worker nodes to check whether the masquerade setting is enabled:
# firewall-cmd --query-masquerade
- If the returned value is
yes
, the masquerade setting is enabled. - If the returned value is
no
, run the following commands to enable the masquerade setting in the firewall.
# firewall-cmd --add-masquerade --permanent
# firewall-cmd --reload
Modifying the System Clock
A network time server must be available. chrony
implements this protocol and is installed by default on some versions of RHEL . chrony
must be installed on every node.
Verify the chrony
configuration by using the command:
# chronyc tracking
To install chrony
, start the chrony
daemon, then verify operation with these commands:
# yum install chrony
# systemctl start chronyd
# systemctl enable chronyd
# chronyc tracking
Checking Password Authentication Settings
If you use a user name and password authentication for adding cluster nodes during the installation, ensure that the PasswordAuthentication parameter in the /etc/ssh/sshd_config
file is set to "yes."
There is no need to check the password authentication setting when you add the cluster nodes using a user name and key authentication.
To ensure the password authentication is enabled, perform the following steps on every master and worker node:
- Log on to the cluster node.
- Open the following file:
- Check if the parameter
PasswordAuthentication
is set to yes. If not, set the parameter to yes as below. - Run the following command to restart the
sshd
service:
/etc/ssh/sshd_config
PasswordAuthentication yes
systemctl restart sshd.service
Ensuring That Required OS Packages Are Installed
The packages listed in the following table are required on one or more node types, as shown here. These packages are available in the standard yum
repositories.
Additional Information
- tar is required for tar images. If you do not have tar installed, the following error displays during installation:
- Below are yum example lines including all the required packages for each node type.
- Master Nodes
- Worker Nodes
- NFS
yum install conntrack-tools container-selinux curl device-mapper-libs httpd-tools java-1.8.0-openjdk openssl libgcrypt libseccomp libtool-libs libtool-ltdl lvm2 net-tools nfs-utils rpcbind socat systemd-libs unzip bind-utils tar
yum install conntrack-tools container-selinux curl device-mapper-libs httpd-tools libgcrypt openssl libseccomp libtool-libs libtool-ltdl lvm2 net-tools nfs-utils rpcbind socat systemd-libs unzip tar
yum install nfs-utils rpcbind
Package Name |
Required by Master Nodes? |
Required by Worker Nodes? | Required by NFS Server? |
---|---|---|---|
|
Yes |
Yes | No |
container-selinux (package version 2.74 or later) |
Yes | Yes | No |
|
Yes |
Yes | No |
|
Yes |
Yes | No |
|
Yes |
Yes | No |
|
Yes |
No | No |
|
Yes |
Yes | No |
|
Yes |
Yes | No |
|
Yes |
Yes | No |
|
Yes |
Yes | No |
|
Yes |
Yes | No |
|
Yes |
Yes | Yes |
|
Yes |
Yes | Yes |
socat
|
Yes | Yes | No |
|
Yes |
Yes | No |
|
Yes |
Yes | No |
bind-utils
|
Yes |
Yes | No |
openssl
|
Yes | Yes | No |
bash-completion
is not installed as a package on nodes, a warning is shown. However, the bash-completion
package is not required.To check for prior installation of any of these packages:
- Set up the
yum
repository on your server. - Run this command:
- This command returns an exit status code where:
yum list installed <package name>
0
indicates the package is installed
1
indicates the package is not installed (does not check whether the package is valid)
To install a required package:
Run the following command:
yum -y install <package name>
Checking MAC and Cipher Algorithms
Ensure that the /etc/ssh/sshd_config
files on every master and worker nodes are configured with at least one of the following values, which lists all supported algorithms. Add only the algorithms that meet the security policy of your organization.
To verify configurations:
- For MAC algorithms:
hmac-sha1,hmac-sha2-256,hmac-sha2-512,hmac-sha1-96
3des-cbc,aes128-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,blowfish-cbc
For example, you could add the following lines to the /etc/ssh/sshd_config
files on all master and worker nodes:
MACs hmac-sha2-256,hmac-sha2-512
Ciphers aes128-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr
Setting System Parameters (Network Bridging)
- Log in to the node.
- Run the following command:
-
Run the following command:
echo "br_netfilter" > /etc/modules-load.d/br_netfilter.conf
- Run the following commands:
- Open the following file in a text editor:
- (Conditional) If installing on RHEL earlier than version 8.1, change the following if the line exists.
- (Conditional) If installing on RHEL 8.1 or later, remove or comment out this line, if it exists.
- Save your changes and close the file.
- Run this command to apply your updates to the node:
echo -e "\nnet.bridge.bridge-nf-call-ip6tables=1\nnet.bridge.bridge-nf-call-iptables=1" >> /etc/sysctl.conf
modprobe br_netfilter && sysctl -p
echo -e '\nmodprobe br_netfilter && sysctl -p' >> /etc/rc.d/rc.local; chmod +x /etc/rc.d/rc.local
/etc/sysctl.conf
net.ipv4.tcp_tw_recycle=1
tonet.ipv4.tcp_tw_recycle=0
net.ipv4.tcp_tw_recycle=
reboot
Understanding Example Files
To view example files:
Example sysctl.conf
file for RedHat version 7.x:
net.bridge.bridge-nf-call-iptables=1
net.bridge.bridge-nf-call-ip6tables=1
net.ipv4.ip_forward=1
net.ipv4.tcp_tw_recycle=0
kernel.sem=50100 128256000 50100 2560
Example sysctl.conf
file for RedHat 8.1 or later:
net.bridge.bridge-nf-call-iptables=1
net.bridge.bridge-nf-call-ip6tables=1
net.ipv4.ip_forward=1
kernel.sem=50100 128256000 50100 2560
Remove IPV6 entry (mandatory)
A manual installation requires removing the IPv6 entry from /etc/hosts
. Follow these steps to accomplish the removal:
-
Execute this command:
vi /etc/hosts
-
Comment out the line by changing:
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
to
#::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
Removing Libraries to Prevent Ingress
You must remove any libraries that will prevent ingress from starting.
- Run the following command:
- Confirm the removal when prompted.
yum remove rsh rsh-server vsftpd
Configuring Elasticsearch Settings
To ensure the Elasticsearch pods run after deployment and the Elasticsearch cluster is accessible:
- Launch a terminal session and log in to a worker node.
- Change to the following directory:
- In the
sysctl.conf
file, add the following: - Restart the node:
- Repeat steps 1-4 on all worker nodes.
cd /etc/
vm.max_map_count=262144
reboot