Skip to content

Commit 61b5b3a

Browse files
authored
Merge pull request #93758 from lg-rh/hcp_multipath
[OCPBUGS-56705]IBM Z troubleshooting changes for HCP419
2 parents 8e97011 + 3db3d1a commit 61b5b3a

File tree

3 files changed

+93
-1
lines changed

3 files changed

+93
-1
lines changed

hosted_control_planes/hcp-troubleshooting.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,4 +65,5 @@ include::modules/hcp-ts-bm-nodes-not-added.adoc[leveloffset=+2]
6565

6666
include::modules/hosted-restart-hcp-components.adoc[leveloffset=+1]
6767
include::modules/hosted-control-planes-pause-reconciliation.adoc[leveloffset=+1]
68-
include::modules/scale-down-data-plane.adoc[leveloffset=+1]
68+
include::modules/scale-down-data-plane.adoc[leveloffset=+1]
69+
include::modules/agent-service-failure.adoc[leveloffset=+1]

modules/agent-service-failure.adoc

Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * hosted_control_planes/hcp-troubleshooting.adoc
4+
5+
:_mod-docs-content-type: PROCEDURE
6+
[id="agent-service-failure_{context}"]
7+
= Agent service failures and agents not joining the cluster
8+
9+
In some cases, agents might fail to join the cluster after booting the machines with the boot artifacts. You can confirm this issue by checking the `agent.service` logs for the following error:
10+
11+
----
12+
Error: copying system image from manifest list: Source image rejected: A signature was required, but no signature exists
13+
----
14+
15+
[NOTE]
16+
====
17+
This issue occurs because image signature verification fails when no signature is present.
18+
As a workaround, you can disable signature verification by modifying the container policy.
19+
====
20+
21+
.Procedure
22+
23+
. Add the `ignitionConfigOverride` field in the `InfraEnv` manifest to override the `/etc/containers/policy.json` file. This disables signature verification for container images.
24+
25+
. Replace the base64-encoded content in the `ignitionConfigOverride` with the required `/etc/containers/policy.json` configuration according to your image registries.
26+
27+
+
28+
.Example
29+
[source,json]
30+
----
31+
{
32+
"default": [
33+
{
34+
"type": "insecureAcceptAnything"
35+
}
36+
],
37+
"transports": {
38+
"docker": {
39+
"<REGISTRY1>": [
40+
{
41+
"type": "insecureAcceptAnything"
42+
}
43+
],
44+
"REGISTRY2": [
45+
{
46+
"type": "insecureAcceptAnything"
47+
}
48+
]
49+
},
50+
"docker-daemon": {
51+
"": [
52+
{
53+
"type": "insecureAcceptAnything"
54+
}
55+
]
56+
}
57+
}
58+
}
59+
----
60+
61+
+
62+
.Example InfraEnv manifest with `ignitionConfigOverride`
63+
[source,yaml]
64+
----
65+
apiVersion: agent-install.openshift.io/v1beta1
66+
kind: InfraEnv
67+
metadata:
68+
name: <hosted_cluster_name>
69+
namespace: <hosted_control_plane_namespace>
70+
spec:
71+
cpuArchitecture: s390x
72+
pullSecretRef:
73+
name: pull-secret
74+
sshAuthorizedKey: <ssh_public_key>
75+
ignitionConfigOverride: '{"ignition":{"version":"3.2.0"},"storage":{"files":[{"path":"/etc/containers/policy.json","mode":420,"overwrite":true,"contents":{"source":"data:text/plain;charset=utf-8;base64,ewogICAgImRlZmF1bHQiOiBbCiAgICAgICAgewogICAgICAgICAgICAidHlwZSI6ICJpbnNlY3VyZUFjY2VwdEFueXRoaW5nIgogICAgICAgIH0KICAgIF0sCiAgICAidHJhbnNwb3J0cyI6CiAgICAgICAgewogICAgICAgICAgICAiZG9ja2VyLWRhZW1vbiI6CiAgICAgICAgICAgICAgICB7CiAgICAgICAgICAgICAgICAgICAgIiI6IFt7InR5cGUiOiJpbnNlY3VyZUFjY2VwdEFueXRoaW5nIn1dCiAgICAgICAgICAgICAgICB9CiAgICAgICAgfQp9"}}]}}'
76+
----

modules/hcp-ibm-z-zvm-agents.adoc

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ Complete the following steps to start your {ibm-z-title} environment with the do
1414

1515
. Update the parameter file to add the `rootfs_url`, `network_adaptor` and `disk_type` values.
1616
+
17+
--
1718
.Example parameter file
1819
[source,yaml]
1920
----
@@ -31,7 +32,21 @@ ai.ip_cfg_override=1 \// <4>
3132
<1> For the `coreos.live.rootfs_url` artifact, specify the matching `rootfs` artifact for the `kernel` and `initramfs` that you are starting. Only HTTP and HTTPS protocols are supported.
3233
<2> For the `ip` parameter, manually assign the IP address, as described in _Installing a cluster with z/VM on {ibm-z-title} and {ibm-linuxone-title}_.
3334
<3> For installations on DASD-type disks, use `rd.dasd` to specify the DASD where Red Hat Enterprise Linux CoreOS (RHCOS) is to be installed. For installations on FCP-type disks, use `rd.zfcp=<adapter>,<wwpn>,<lun>` to specify the FCP disk where RHCOS is to be installed.
35+
+
36+
[NOTE]
37+
====
38+
For FCP multipath configurations, provide two disks instead of one.
39+
====
40+
+
41+
.Example
42+
[source,yaml]
43+
----
44+
rd.zfcp=<adapter1>,<wwpn1>,<lun1> \
45+
rd.zfcp=<adapter2>,<wwpn2>,<lun2>
46+
----
47+
+
3448
<4> Specify this parameter when you use an Open Systems Adapter (OSA) or HiperSockets.
49+
--
3550

3651
. Move `initrd`, kernel images, and the parameter file to the guest VM by running the following commands:
3752
+

0 commit comments

Comments
 (0)