版本3.11 | AWS安装失败是由于HTTPS / X509问题上等待控制面板

问题描述 投票:0回答:1

试图做一个openshift 3.11安装用3主安装,2个下文和2级的节点。因为我想通了AWS ELB会照顾的,对于我,我没有使用LB节点。

我现在的问题是安装将在等待控制面板任务失败。

failed: [ip-10-0-4-29.us-east-2.compute.internal] (item=etcd) => {"attempts": 60, "changed": false, "item": "etcd", "msg": {"cmd": "/usr/bin/oc get pod master-etcd-ip-10-0-4-29.us-east-2.compute.internal -o json -n kube-system"

如下图不同的错误

我已经做了以下。

因为这是唯一一个妖系统,我想去低价路线,并创建自签名的证书。于是我就以下

openssl rew -new -key openshift.key -out openshift.csr
openssl req -new -key openshift.key -out openshift.csr
openssl x509 -req -days 1095 -in openshift.csr -signkey openshift.key -out openshift.crt

然后在我的hosts文件中添加以下

openshift_master_named_certificates=[{"certfile": "/home/ec2-user/certs/openshift.crt", "keyfile": "/home/ec2-user/certs/openshift.key"}]

接着我创建了一个ELB接受端口8443 HTTP流量,并将其引导到HTTP 8443到任何的主人。当我这样做,我得到以下重新运行该命令时失败,其失败的任务

[root@ip-10-0-4-29 ~]# /usr/bin/oc get pod master-etcd-ip-10-0-4-29.us-east-2.compute.internal -o json -n kube-system
Unable to connect to the server: http: server gave HTTP response to HTTPS client 

如果我改变ELB采取HTTP流量并将其引导到HTTPS 8443我GE下面的错误

[root@ip-10-0-4-29 ~]# /usr/bin/oc get pod master-etcd-ip-10-0-4-29.us-east-2.compute.internal -o json -n kube-system
The connection to the server os.domain-name.net:8443 was refused - did you specify the right host or port?

如果我试图改变ELB接受HTTPS流量,我需要复制guide to create SSL certs to use in aws但即使如此,在接受8443 HTTPS流量,或者通过HTTP或HTTPS在此错误寄往8443主节点结果

 [root@ip-10-0-4-29 ~]# /usr/bin/oc get pod master-etcd-ip-10-0-4-29.us-east-2.compute.internal -o json -n kube-system
 Unable to connect to the server: x509: certificate signed by unknown authority

我也复制我的hosts文件只是柜面我有东西掉它。 #创建包含主,节点,ETCD和LB基的OSEv3基。 #该磅组允许Ansible配置HAProxy的作为负载平衡的解决方案。 #注释磅了,如果你的负载平衡器是预配置。 [OSEv3:儿童]大师节点ETCD

# Set variables common for all OSEv3 hosts
[OSEv3:vars]
ansible_ssh_user=root
openshift_deployment_type=origin


openshift_cloudprovider_aws_access_key="{{ lookup('env','AWS_ACCESS_KEY_ID') }}"
openshift_cloudprovider_aws_secret_key="{{ lookup('env','AWS_SECRET_ACCESS_KEY') }}"
openshift_clusterid=openshift
openshift_cloudprovider_kind=aws

openshift_hosted_manage_registry=true
openshift_hosted_registry_storage_kind=object
openshift_hosted_registry_storage_provider=s3
openshift_hosted_registry_storage_s3_accesskey="{{ lookup('env','AWS_ACCESS_KEY_ID') }}"
openshift_hosted_registry_storage_s3_secretkey="{{ lookup('env','AWS_SECRET_ACCESS_KEY') }}"
openshift_hosted_registry_storage_s3_bucket=os-test-os-bucket
openshift_hosted_registry_storage_s3_region=us-west-2
openshift_hosted_registry_storage_s3_chunksize=26214400
openshift_hosted_registry_storage_s3_rootdirectory=/registry
openshift_hosted_registry_pullthrough=true
openshift_hosted_registry_acceptschema2=true
openshift_hosted_registry_enforcequota=true
openshift_hosted_registry_replicas=3

#openshift_enable_excluders=false
openshift_disable_check=memory_availability
openshift_additional_repos=[{'id': 'centos-okd-ci', 'name': 'centos-okd-ci', 'baseurl' :'https://rpms.svc.ci.openshift.org/openshift-origin-v3.11', 'gpgcheck' :'0', 'enabled' :'1'}]

openshift_node_groups=[{'name': 'node-config-master', 'labels': ['node-role.kubernetes.io/master=true']}, {'name': 'node-config-infra', 'labels': ['node-role.kubernetes.io/infra=true']}, {'name': 'node-config-compute', 'labels': ['node-role.kubernetes.io/compute=true']}]
openshift_router_selector='node-role.kubernetes.io/infra=true'
openshift_registry_selector='node-role.kubernetes.io/infra=true'
openshift_metrics_install_metrics=true


openshift_master_named_certificates=[{"certfile": "/home/ec2-user/certs/openshift.crt", "keyfile": "/home/ec2-user/certs/openshift.key"}]



# uncomment the following to enable htpasswd authentication; defaults to AllowAllPasswordIdentityProvider
openshift_master_identity_providers=[{'name': 'htpasswd_auth', 'login': 'true', 'challenge': 'true', 'kind': 'HTPasswdPasswordIdentityProvider'}]

# Native high availability cluster method with optional load balancer.
# If no lb group is defined installer assumes that a load balancer has
# been preconfigured. For installation the value of
# openshift_master_cluster_hostname must resolve to the load balancer
# or to one or all of the masters defined in the inventory if no load
# balancer is present.
openshift_master_cluster_method=native
openshift_master_cluster_hostname=os.domain-name.net
openshift_master_cluster_public_hostname=os.domain-name.net

# host group for masters

[masters]
ip-10-0-4-29.us-east-2.compute.internal
ip-10-0-5-54.us-east-2.compute.internal
ip-10-0-6-8.us-east-2.compute.internal

[etcd]
ip-10-0-4-29.us-east-2.compute.internal
ip-10-0-5-54.us-east-2.compute.internal
ip-10-0-6-8.us-east-2.compute.internal


[nodes]

# host group for nodes, includes region info
[nodes]

#master
ip-10-0-4-29.us-east-2.compute.internal  openshift_node_group_name='node-config-master'
ip-10-0-5-54.us-east-2.compute.internal  openshift_node_group_name='node-config-master'
ip-10-0-6-8.us-east-2.compute.internal  openshift_node_group_name='node-config-master'

#infra
ip-10-0-4-28.us-east-2.compute.internal openshift_node_group_name='node-config-infra'
ip-10-0-5-241.us-east-2.compute.internal openshift_node_group_name='node-config-infra'


#node
ip-10-0-4-162.us-east-2.compute.internal openshift_node_group_name='node-config-compute'
ip-10-0-5-146.us-east-2.compute.internal openshift_node_group_name='node-config-compute'

如有任何人都可以帮我闯过这关,所以我终于可以尝试使用Openshift我会非常感激演示了CI / CD管道

amazon-web-services ssl-certificate openshift x509certificate okd
1个回答
0
投票

我知道这是一个古老的链接,但我当时正在与我的ELB配置为HTTPS同样的问题。我改变了监听TCP和使用端口443的负载平衡器端口和实例端口。对于健康检查,确保您使用Ping协议HTTPS,平端口443和“/”平路径。这些配置更改允许继续安装。

© www.soinside.com 2019 - 2024. All rights reserved.