Skip to content

Instantly share code, notes, and snippets.

@ilackarms
Last active June 22, 2017 18:55
Show Gist options
  • Save ilackarms/e9ee0bf644b737ff1d0970a4c16e6af2 to your computer and use it in GitHub Desktop.
Save ilackarms/e9ee0bf644b737ff1d0970a4c16e6af2 to your computer and use it in GitHub Desktop.
#!/bin/bash
set -x #-e
export PATH=${PATH}:${PWD}/_output/local/bin/linux/amd64
export KUBECONFIG=${PWD}/openshift.local.config/master/admin.kubeconfig
#make sure docker daemon starts with --insecure-registry 172.30.0.0/16
#check out /usr/lib/systemd/system/docker.service
sudo systemctl stop firewalld
sudo env "PATH=$PATH" openshift start > openshift.local.log 2>&1 &
sleep 5
sudo chmod +rw $KUBECONFIG
sudo chgrp $USER $KUBECONFIG
sudo chown $USER $KUBECONFIG
oc login -u system:admin
#manageiq stuff
oadm registry -n default --config=openshift.local.config/master/admin.kubeconfig
sleep 10
oc adm new-project management-infra --description="Management Infrastructure"
oc create sa -n management-infra management-admin
oc create sa -n management-infra inspector-admin
oc create -f - <<API
---
apiVersion: v1
kind: ClusterRole
metadata:
name: management-infra-admin
rules:
- resources:
- pods/proxy
verbs:
- '*'
API
oc create -f - <<API
apiVersion: v1
kind: ClusterRole
metadata:
name: hawkular-metrics-admin
rules:
- apiGroups:
- ""
resources:
- hawkular-metrics
- hawkular-alerts
verbs:
- '*'
API
oc adm policy add-role-to-user -n management-infra admin -z management-admin
oc adm policy add-role-to-user -n management-infra management-infra-admin -z management-admin
oc adm policy add-cluster-role-to-user cluster-reader system:serviceaccount:management-infra:management-admin
oc adm policy add-scc-to-user privileged system:serviceaccount:management-infra:management-admin
oc adm policy add-cluster-role-to-user system:image-puller system:serviceaccount:management-infra:inspector-admin
oc adm policy add-scc-to-user privileged system:serviceaccount:management-infra:inspector-admin
oc adm policy add-cluster-role-to-user self-provisioner system:serviceaccount:management-infra:management-admin
oc adm policy add-cluster-role-to-user hawkular-metrics-admin system:serviceaccount:management-infra:management-admin
echo "STOPPPING HERE"
tail -f openshift.local.log
#hawkular stuff
oc project openshift-infra
oc adm policy add-role-to-user view system:serviceaccount:openshift-infra:hawkular -n openshift-infra
oc create -f - <<API
apiVersion: v1
kind: ServiceAccount
metadata:
name: metrics-deployer
secrets:
- name: metrics-deployer
API
oadm policy add-role-to-user \
edit system:serviceaccount:openshift-infra:metrics-deployer
oadm policy add-cluster-role-to-user \
cluster-reader system:serviceaccount:openshift-infra:heapster
oc process -f ../metrics-deployer.yaml \
-p USE_PERSISTENT_STORAGE=false \
-p HAWKULAR_METRICS_HOSTNAME=hawkular-metrics.example.com \
| oc create -f -
oc secrets new metrics-deployer nothing=/dev/null
#start tailing logs
tail -f openshift.local.log
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment