Last active
June 22, 2017 18:55
-
-
Save ilackarms/e9ee0bf644b737ff1d0970a4c16e6af2 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
set -x #-e | |
export PATH=${PATH}:${PWD}/_output/local/bin/linux/amd64 | |
export KUBECONFIG=${PWD}/openshift.local.config/master/admin.kubeconfig | |
#make sure docker daemon starts with --insecure-registry 172.30.0.0/16 | |
#check out /usr/lib/systemd/system/docker.service | |
sudo systemctl stop firewalld | |
sudo env "PATH=$PATH" openshift start > openshift.local.log 2>&1 & | |
sleep 5 | |
sudo chmod +rw $KUBECONFIG | |
sudo chgrp $USER $KUBECONFIG | |
sudo chown $USER $KUBECONFIG | |
oc login -u system:admin | |
#manageiq stuff | |
oadm registry -n default --config=openshift.local.config/master/admin.kubeconfig | |
sleep 10 | |
oc adm new-project management-infra --description="Management Infrastructure" | |
oc create sa -n management-infra management-admin | |
oc create sa -n management-infra inspector-admin | |
oc create -f - <<API | |
--- | |
apiVersion: v1 | |
kind: ClusterRole | |
metadata: | |
name: management-infra-admin | |
rules: | |
- resources: | |
- pods/proxy | |
verbs: | |
- '*' | |
API | |
oc create -f - <<API | |
apiVersion: v1 | |
kind: ClusterRole | |
metadata: | |
name: hawkular-metrics-admin | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- hawkular-metrics | |
- hawkular-alerts | |
verbs: | |
- '*' | |
API | |
oc adm policy add-role-to-user -n management-infra admin -z management-admin | |
oc adm policy add-role-to-user -n management-infra management-infra-admin -z management-admin | |
oc adm policy add-cluster-role-to-user cluster-reader system:serviceaccount:management-infra:management-admin | |
oc adm policy add-scc-to-user privileged system:serviceaccount:management-infra:management-admin | |
oc adm policy add-cluster-role-to-user system:image-puller system:serviceaccount:management-infra:inspector-admin | |
oc adm policy add-scc-to-user privileged system:serviceaccount:management-infra:inspector-admin | |
oc adm policy add-cluster-role-to-user self-provisioner system:serviceaccount:management-infra:management-admin | |
oc adm policy add-cluster-role-to-user hawkular-metrics-admin system:serviceaccount:management-infra:management-admin | |
echo "STOPPPING HERE" | |
tail -f openshift.local.log | |
#hawkular stuff | |
oc project openshift-infra | |
oc adm policy add-role-to-user view system:serviceaccount:openshift-infra:hawkular -n openshift-infra | |
oc create -f - <<API | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: metrics-deployer | |
secrets: | |
- name: metrics-deployer | |
API | |
oadm policy add-role-to-user \ | |
edit system:serviceaccount:openshift-infra:metrics-deployer | |
oadm policy add-cluster-role-to-user \ | |
cluster-reader system:serviceaccount:openshift-infra:heapster | |
oc process -f ../metrics-deployer.yaml \ | |
-p USE_PERSISTENT_STORAGE=false \ | |
-p HAWKULAR_METRICS_HOSTNAME=hawkular-metrics.example.com \ | |
| oc create -f - | |
oc secrets new metrics-deployer nothing=/dev/null | |
#start tailing logs | |
tail -f openshift.local.log |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment