-
-
-
Microsoft System Center Virtual Machine Manager virtualization environments
-
Red Hat OpenShift virtualization environments
-
Cloud Connector Standalone Citrix Secure Ticketing Authority (STA) service
-
-
-
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Red Hat OpenShift virtualization environments (Preview)
Citrix manages your Red Hat OpenShift workloads through a Citrix-managed OpenShift plug-in. With this plug-in, you can create hosting connections and hosting units to your OpenShift cluster, create catalogs, and power manage machines in the catalog.
Note:
The OpenShift plug-in is tested with Red Hat OpenShift cluster versions 4.17 and 4.18.
Key steps
- Set up your Red Hat OpenShift environment.
- Create a connection and a resource to the OpenShift cluster.
- Create a machine catalog.
- Create a delivery group.
Set up your Red Hat OpenShift environment
- Create an OpenShift cluster and obtain the cluster API address: In the OpenShift console, after setting up a cluster, navigate to Home > Overview > Details, and get the cluster API address.
- Create a service account and obtain the service account token using the OpenShift command-line interface (CLI) (oc command): The service account token is the authentication credential associated with the service account. The service account is used to authenticate the OpenShift plug-in with OpenShift. Each service account is associated with one namespace.
-
Configure permissions for the service account: A service account can have multiple roles, and each role consists of permissions that define what actions the OpenShift Plugin can perform on which resources. The roles are bound through Role Bindings, and there are two types of Role Bindings:
- Cluster-wide Role Binding: used for receiving events from OpenShift. Namespace-bound Role Binding: used for managing VMs in a specific namespace.
- Namespace-bound Role Binding: used for managing VMs in a specific namespace.
- Create a namespace (Project): Namespace in OpenShift is an isolated environment that groups resources like VMs or networks, allowing better organization and access control. Namespace is the Kubernetes term, while Project is the OpenShift term. From the OpenShift Plugin perspective, they are the same. A namespace is required to deploy the VMs. Use the OpenShift console or OpenShift Container Platform CLI to create the name space.
- Create one network attachment definition under the target namespace: Network attachment definitions specify the networking configuration for VMs running in OpenShift. Under Networking > NetworkAttachmentDefinitions, you can see the Network Attachment Definitions for each Namespace.
- Configure the storage classes: Storage classes define how VM storage is allocated. Under Storage > StorageClass, you can configure and see the list of storage providers.
Create a service account
- Download and unzip oc Command Line Tool.
- Access the OpenShift Console using your login ID.
- Click your user profile and click Copy login command.
- Click Display Token and copy the token.
-
Run the login command using oc Command Line. Example:
.\oc.exe login --token=<token> --server=<server address> <!--NeedCopy-->
-
Create a service account.
-
If you want to create the service account under the default namespace, run:
.\oc.exe create sa <service account name> <!--NeedCopy-->
-
If you want to create the service account under your own namespace, run:
.\oc.exe create sa <service account name> -n mynamespace <!--NeedCopy-->
-
-
Create a
YAML
file for secret. Example:-
If you create the service account under the default namespace:
apiVersion: v1 kind: Secret metadata: name: service account name annotations: kubernetes.io/service-account.name: service account name type: kubernetes.io/service-account-token <!--NeedCopy-->
-
If you create the service account under your own namespace:
apiVersion: v1 kind: Secret metadata: name: service account name namespace: mynamespace annotations: kubernetes.io/service-account.name: service account name type: kubernetes.io/service-account-token <!--NeedCopy-->
-
-
Apply the YAML.
.\oc.exe apply -f <yamlFile.yaml> <!--NeedCopy-->
Note:
The
oc
describes the secret to get the token. The token is used as a password.
Create roles and role bindings for the service account
With the cluster-wide role binding, the service account has permissions to read all VM events across the cluster, allowing the OpenShift plug-in to maintain a single event watcher for all VM-related events.
With the namespace role binding the service account has permissions to manage VMs in the target namespace.
You can use a script to create roles and bind them to a service account, or you can create roles and role bindings using the OpenShift console or CLI.
Where to go next
- Install core components
- Install VDAs
- Create a site
- For creating and managing a connection, see Connection to Red Hat OpenShift
More information
Share
Share
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.