External Infrastructure
By default, the HyperShift operator hosts both the HostedCluster's control plane pods and KubeVirt worker VMs within the same cluster.
With the external infrastructure feature, it possible to place the worker node VMs on a separate cluster from the control plane pods.
Understanding Hosting Cluster Types
Management Cluster: This is the OpenShift cluster that runs the HyperShift operator and hosts the control plane pods for a HostedCluster.
Infrastructure Cluster: This is the OpenShift cluster that runs the KubeVirt worker VMs for a HostedCluster.
By default, the management cluster also acts as the infrastructure cluster that hosts VMs. However, for the external infrastructure use case, the management and infrastructure clusters are distinctly different.
Create a HostedCluster using External Infrastructure
Prerequisites * Creation of a namespace on the external infrastructure cluster for the KubeVirt worker nodes to be hosted in. * A kubeconfig for the external infrastructure cluster
Once the prerequisites are met, the hcp cli tool can be used to create
the guest cluster. In order to place the KubeVirt worker VMs on the
infrastructure cluster, use the --infra-kubeconfig-file and --infra-namespace
arguments.
Below is an example of creating a guest cluster using external infrastructure.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 | |
This command will result in the control plane pods being hosted on the management cluster that the HyperShift Operator runs on, while the KubeVirt VMs will be hosted on a separate infrastructure cluster.
Required RBAC for the external infrastructure cluster
It isn't necessary for the user defined in the kubeconfig used for the external infra cluster to be a cluster-admin.
The user or service account used in the provided kubeconfig should have full permissions over the following resources:
* virtualmachines.kubevirt.io
* virtualmachineinstances.kubevirt.io
* virtualmachines.kubevirt.io/finalizers
* datavolumes.cdi.kubevirt.io
* services
* endpointslices
* endpointslices/restricted
* routes
* networkpolicies
The user or service account used in the provided kubeconfig should also have get/create/delete permissions over the following resources:
* volumesnapshots
As well as get/create/update permission for:
* events
And get permission for:
* persistentvolumeclaims
All of these permissions are needed only on the target namespace on the infra cluster (passed through the --infra-namespace command-line argument).
In addition, the HyperShift operator reads the infrastructure cluster's network configuration (networks.config.openshift.io) to build a virt-launcher NetworkPolicy that blocks egress to the infra cluster's internal pod/service networks. This resource is cluster-scoped, so it requires a separate ClusterRole and ClusterRoleBinding (see below). If this permission is not granted, the NetworkPolicy is still created but without CIDR-based egress blocking, and a ValidKubeVirtInfraNetworkPolicyRBAC=False condition is set on the HostedCluster along with a warning event in the infrastructure cluster namespace.
This can be achieved by binding the following Role and ClusterRole to the user used in the external infra kubeconfig:
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: kv-external-infra-role
namespace: clusters-example
rules:
- apiGroups:
- kubevirt.io
resources:
- virtualmachines
- virtualmachines/finalizers
- virtualmachineinstances
verbs:
- '*'
- apiGroups:
- cdi.kubevirt.io
resources:
- datavolumes
verbs:
- '*'
- apiGroups:
- ''
resources:
- services
verbs:
- '*'
- apiGroups:
- route.openshift.io
resources:
- routes
- routes/custom-host
verbs:
- '*'
- apiGroups:
- discovery.k8s.io
resources:
- endpointslices
- endpointslices/restricted
verbs:
- '*'
- apiGroups:
- ''
resources:
- secrets
verbs:
- '*'
- apiGroups:
- networking.k8s.io
resources:
- networkpolicies
verbs:
- '*'
- apiGroups:
- ''
resources:
- events
verbs:
- get
- create
- update
- apiGroups:
- snapshot.storage.k8s.io
resources:
- volumesnapshots
verbs:
- get
- create
- delete
- apiGroups:
- ''
resources:
- persistentvolumeclaims
verbs:
- get
For full virt-launcher network isolation, also create a ClusterRole and ClusterRoleBinding to allow reading the infrastructure cluster's network configuration:
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: kv-external-infra-network-reader
rules:
- apiGroups:
- config.openshift.io
resources:
- networks
verbs:
- get
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: kv-external-infra-network-reader-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kv-external-infra-network-reader
subjects:
- kind: ServiceAccount
name: hcp-infra-sa
namespace: clusters-example