Ansible Tower User Guide Release Ansible Tower 3.4.1

Total Page:16

File Type:pdf, Size:1020Kb

Ansible Tower User Guide Release Ansible Tower 3.4.1 Ansible Tower User Guide Release Ansible Tower 3.4.1 Red Hat, Inc. May 05, 2021 CONTENTS 1 Overview 2 1.1 Real-time Playbook Output and Exploration..............................2 1.2 “Push Button” Automation........................................2 1.3 Enhanced and Simplified Role-Based Access Control and Auditing..................2 1.4 Cloud & Autoscaling Flexibility.....................................3 1.5 The Ideal RESTful API.........................................3 1.6 Backup and Restore...........................................3 1.7 Ansible Galaxy Integration........................................3 1.8 Inventory Support for OpenStack....................................3 1.9 Remote Command Execution......................................4 1.10 System Tracking.............................................4 1.11 Integrated Notifications.........................................4 1.12 Satellite and CloudForms Integration..................................4 1.13 Run-time Job Customization.......................................4 1.14 Red Hat Insights Integration.......................................4 1.15 Enhanced Tower User Interface.....................................5 1.16 Custom Virtual Environments......................................5 1.17 Authentication Enhancements......................................5 1.18 Cluster Management...........................................5 1.19 Container Platform Support.......................................5 1.20 Workflow Enhancements.........................................5 1.21 Job Distribution.............................................6 1.22 Support for deployment in a FIPS-enabled environment........................6 2 Tower Licensing, Updates, and Support7 2.1 Support..................................................7 2.2 Trial / Evaluation.............................................7 2.3 Subscription Types............................................7 2.4 Node Counting in Licenses.......................................8 2.5 Tower Component Licenses.......................................8 3 Logging In 9 4 Import a License 10 4.1 Adding a Tower License Manually.................................... 11 5 The Tower User Interface 13 5.1 Activity Streams............................................. 13 5.2 Views................................................... 15 5.3 Resources and Access.......................................... 18 i 5.4 Tower Administration Menu....................................... 19 6 Search 21 6.1 Searching Tips.............................................. 21 6.2 Sort.................................................... 23 7 Organizations 25 7.1 Creating a New Organization...................................... 26 8 Users 36 8.1 Create a User............................................... 36 8.2 User Types - Quick View......................................... 38 8.3 Users - Organizations.......................................... 39 8.4 Users - Teams.............................................. 39 8.5 Users - Permissions........................................... 39 8.6 Users - Tokens.............................................. 42 9 Teams 44 9.1 Create a Team.............................................. 44 10 Credentials 50 10.1 Understanding How Credentials Work.................................. 50 10.2 Getting Started with Credentials..................................... 51 10.3 Add a New Credential.......................................... 52 10.4 Credential Types............................................. 54 11 Custom Credential Types 66 11.1 Backwards-Compatible API Considerations............................... 66 11.2 Getting Started with Credential Types.................................. 67 11.3 Create a New Credential Type...................................... 68 12 Applications 73 12.1 Getting Started with Applications.................................... 73 12.2 Create a new application......................................... 74 13 Projects 77 13.1 Add a new project............................................ 78 13.2 Work with Permissions.......................................... 82 13.3 Work with Notifications......................................... 86 13.4 Work with Job Templates........................................ 87 13.5 Work with Schedules........................................... 87 14 Inventories 90 14.1 Smart Inventories............................................. 92 14.2 Add a new inventory........................................... 93 14.3 Running Ad Hoc Commands....................................... 115 15 Job Templates 118 15.1 Create a Job Template.......................................... 119 15.2 Add Permissions............................................. 124 15.3 Work with Notifications......................................... 128 15.4 View Completed Jobs.......................................... 129 15.5 Scheduling................................................ 130 15.6 Surveys.................................................. 132 15.7 Launch a Job Template.......................................... 134 15.8 Copy a Job Template........................................... 137 ii 15.9 Scan Job Templates........................................... 138 15.10 Fact Caching............................................... 141 15.11 Utilizing Cloud Credentials....................................... 143 15.12 Provisioning Callbacks.......................................... 146 15.13 Extra Variables.............................................. 148 16 Job Slicing 151 16.1 Job slice considerations......................................... 151 16.2 Job slice execution behavior....................................... 152 16.3 Search job slices............................................. 153 17 Workflows 154 17.1 Workflow scenarios and considerations................................. 155 17.2 Extra Variables.............................................. 157 17.3 Workflow States............................................. 158 17.4 Role-Based Access Controls....................................... 159 18 Workflow Job Templates 160 18.1 Create a Workflow Template....................................... 161 18.2 Work with Permissions.......................................... 163 18.3 Work with Notifications......................................... 164 18.4 View Completed Jobs.......................................... 165 18.5 Work with Schedules........................................... 167 18.6 Surveys.................................................. 169 18.7 Workflow Visualizer........................................... 171 18.8 Launch a Workflow Template...................................... 180 18.9 Copy a Workflow Template....................................... 181 18.10 Extra Variables.............................................. 182 19 Instance Groups 183 19.1 Create an instance group......................................... 183 20 Jobs 187 20.1 Job Details - Inventory Sync....................................... 189 20.2 Job Details - SCM............................................ 190 20.3 Job Details - Playbook Run....................................... 192 20.4 Ansible Tower Capacity Determination and Job Impact......................... 196 21 Notifications 200 21.1 Notifier Hierarchy............................................ 200 21.2 Workflow................................................. 201 21.3 Create a Notification Template...................................... 201 21.4 Notification Types............................................ 202 21.5 Configuring the towerhost hostname................................. 208 22 Setting up an Insights Project 209 22.1 Create Insights Credential........................................ 209 22.2 Create an Insights Project........................................ 211 22.3 Create Insights Inventory......................................... 212 22.4 Create a Scan Project........................................... 213 22.5 Create a Scan Job Template....................................... 214 22.6 Remediate Insights Inventory...................................... 216 23 Best Practices 220 23.1 Use Source Control............................................ 220 iii 23.2 Ansible file and directory structure................................... 220 23.3 Use Dynamic Inventory Sources..................................... 220 23.4 Variable Management for Inventory................................... 221 23.5 Autoscaling................................................ 221 23.6 Larger Host Counts............................................ 221 23.7 Continuous integration / Continuous Deployment............................ 221 24 Security 222 24.1 Playbook Access and Information Sharing............................... 222 24.2 Role-Based Access Controls....................................... 224 24.3 Function of roles: editing and creating.................................. 232 25 Index 235 26 Copyright © 2019 Red Hat, Inc. 236 Index 237 iv Ansible Tower User Guide, Release Ansible Tower 3.4.1 Thank you for your interest in Red Hat Ansible Tower. Ansible Tower is a commercial offering that helps teams man- age complex multi-tier deployments by adding control, knowledge, and delegation to Ansible-powered environments. The Ansible Tower User Guide discusses all of the functionality available in Ansible Tower and assumes moderate familiarity with Ansible, including concepts such as Playbooks, Variables, and Tags. For more information on these and other Ansible concepts, please see the Ansible documentation at http://docs.ansible.com/.
Recommended publications
  • IBM Red Hat Ansible Health Check Is Your Red Hat Ansible Environment Working As Hard As You Are?
    IBM Red Hat Ansible health check Is your Red Hat Ansible environment working as hard as you are? Highlights Your journey to cloud has many stops along the way. And, as with all journeys, it’s crucial to know where you want to be and how you’ll get there. No one solution is perfect without some tweaking of the software and tools. And, not all individuals Understand your progress and have experience in Red Hat® solutions and cloud environment management to align to your vision and roadmap. finetune tools as they progress. And, that’s where IBM can help. IBM Services® offers IBM Red Hat Ansible Health Check service to help you get Work to further achieve the goals the most from your Red Hat Ansible®, Ansible Tower and cloud investments by of Ansible and Ansible Tower— highlighting areas for you to adjust. The IBM specialists perform an assessment simplicity, security and stability. based on common challenges, such as provisioning, orchestration, automation, playbooks and processes, including continuous integration or continuous delivery Gain operational efficiencies (CI/CD). Following the 2.5-hour assessment session, you’ll receive a report that with Ansible in the areas of: will identify areas of concern, provide recommendations and help you make more – Infrastructure as code informed decisions for your enterprise and cloud environment. and provisioning – Compliance as code, Helping understand the complexities of automating, configuration management and security automation optimizing and allocating resources – Application deployment, While Ansible is incredibly flexible and adaptable, automation and provisioning orchestration and CI/CD can be complex with the number of technologies that are required to complete the tasks across multiple vendor environments, operating systems, hybrid clouds, – Network automation networks, plugins, modules and APIs.
    [Show full text]
  • Release 3.11.0
    CEKit Release 3.11.0 May 17, 2021 Contents 1 About 3 2 Main features 5 3 I’m new, where to start? 7 4 Releases and changelog 9 5 Contact 11 6 Documentation 13 6.1 Getting started guide........................................... 13 6.2 Handbook................................................ 19 6.3 Guidelines................................................ 61 6.4 Descriptor documentation........................................ 75 6.5 Contribution guide............................................ 137 7 Sponsor 143 8 License 145 i ii CEKit, Release 3.11.0 Contents 1 CEKit, Release 3.11.0 2 Contents CHAPTER 1 About Container image creation tool. CEKit helps to build container images from image definition files with strong focus on modularity and code reuse. 3 CEKit, Release 3.11.0 4 Chapter 1. About CHAPTER 2 Main features • Building container images from YAML image definitions using many different builder engines • Integration/unit testing of images 5 CEKit, Release 3.11.0 6 Chapter 2. Main features CHAPTER 3 I’m new, where to start? We suggest looking at the getting started guide. It’s probably the best place to start. Once get through this tutorial, look at handbook which describes how things work. Later you may be interested in the guidelines sections. 7 CEKit, Release 3.11.0 8 Chapter 3. I’m new, where to start? CHAPTER 4 Releases and changelog See the releases page for latest releases and changelogs. 9 CEKit, Release 3.11.0 10 Chapter 4. Releases and changelog CHAPTER 5 Contact • Please join the #cekit IRC channel on Freenode • You can always mail us at: cekit at cekit dot io 11 CEKit, Release 3.11.0 12 Chapter 5.
    [Show full text]
  • Automating the F5 BIG-IP Platform with Ansible | F5 Technical White
    + TECHNICAL WHITE PAPER Automating the F5 BIG-IP Platform with Ansible TECHNICAL WHITE PAPER Automating the F5 BIG-IP Platform with Ansible Contents Introduction 3 The programmable network 3 A comprehensive joint solution 4 Use case: configure an HTTPS application on the BIG-IP platform 4 Conclusion 9 2 TECHNICAL WHITE PAPER Automating the F5 BIG-IP Platform with Ansible Introduction “The key drivers for the use of DevOps-related frameworks and toolsets remain scalability and reduction of operational expenses.”1 Traditionally, organizations deploy infrastructure and applications using a combination of various documents such as deployment guides along with many manual processes and operations. It’s a time-consuming approach that doesn’t align with ever-increasing requirements for speed and agility. The need to deploy full application stacks and services more quickly and more often in a repeatable manner has driven both development and operational teams toward automation and orchestration. In addition to enabling organizations to better manage applications, infrastructure deployments, and the process of provisioning and de-provisioning, automation reduces the amount of IT resources required and ensures increased reliability, efficiency, and agility. The programmable network Through a deep understanding of best practices for networking and application delivery, F5 empowers organizations to take advantage of the benefits of automation and programmability as they configure and manage devices on the BIG-IP platform. Both the hardware and virtual editions of F5 Application Delivery Controllers (ADCs) feature flexible and programmable management, control and data planes. F5 ADCs achieve programmability through the following features: 1. Traffic Management Shell (tmsh): Allows complete access to configure system features and set up and manage network elements.
    [Show full text]
  • Product Appendix 1 Software and Support
    PRODUCT APPENDIX 1 SOFTWARE AND SUPPORT SUBSCRIPTIONS This Product Appendix (which includes Exhibits applicable to specific Red Hat Products) contains terms that describe the parameters and govern your use of Software Subscriptions and Support Subscriptions. This Product Appendix does not apply to Red Hat hosted or on-line subscription offerings. When we use a capitalized term in this Product Appendix without defining it in this Product Appendix, the term has the meaning defined in the Agreement to which this Product Appendix applies, either the Red Hat Enterprise Agreement set forth at http://www.redhat.com/agreements or, if applicable, a mutually signed agreement between Client and Red Hat. In the event of a conflict, inconsistency or difference between this Product Appendix and an Exhibit to this Product Appendix, the terms of the Exhibit control. Red Hat may modify or update this Product Appendix either by posting a revised version of this Product Appendix at http://www.redhat.com/agreements, and/or by providing notice using other reasonable means. If you do not agree to the updated terms then, (a) the existing Product Appendix will continue to apply to Red Hat Products you have purchased as of the date of the update for the remainder of the then-current Subscription term(s); and (b) the updated or modified terms will apply to any new purchases or renewals of Red Hat Products made after the effective date of the updated terms. This Product Appendix does not apply to generally available open source projects such as www.wildfly.org, www.feedhenry.org, www.fedoraproject.org, www.openstack.redhat.com, www.gluster.org, www.centos.org, Ansible Project Software or other community projects.
    [Show full text]
  • Product Appendix 1 Software and Support Subscriptions
    PRODUCT APPENDIX 1 SOFTWARE AND SUPPORT SUBSCRIPTIONS This Product Appendix (which includes Exhibits applicable to specific Red Hat Products) contains terms that describe the parameters and govern your use of Software Subscriptions and Support Subscriptions. This Product Appendix does not apply to Red Hat hosted or on- line subscription offerings. When we use a capitalized term in this Product Appendix without defining it, the term has the meaning defined in the Agreement to which this Product Appendix applies, such as the Red Hat Enterprise Agreement. In the event of a conflict, inconsistency or difference between this Product Appendix and an Exhibit to this Product Appendix, the terms of the Exhibit control. Red Hat may modify or update this Product Appendix either by posting a revised version of this Product Appendix at http://www.redhat.com/agreements, and/or by providing notice using other reasonable means. If you do not agree to the updated terms then, (a) the existing Product Appendix will continue to apply to Red Hat Products you have purchased as of the date of the update for the remainder of the then-current Subscription term(s); and (b) the updated or modified terms will apply to any new purchases or renewals of Red Hat Products made after the effective date of the updated terms. This Product Appendix does not apply to generally available open source projects such as www.wildfly.org, www.feedhenry.org, www.fedoraproject.org, www.openstack.redhat.com, www.gluster.org, www.centos.org, Ansible Project Software or other community projects. 1. Subscription Services 1.1 Subscription Unit Definitions.
    [Show full text]
  • Ansible in Depth
    ansible.com WHITEPAPER ANSIBLE IN DEPTH “Ansible is quite fun INTRODUCTION to use right away. As Ansible is an open source IT configuration management, deployment, and orchestration tool. It is unique from other management tools in many respects, aiming to provide large productivity gains to a wide soon as you write five variety of automation challenges as a more productive drop-in replacement for many core capabilities lines of code it works. in other automation solutions. Furthermore, Ansible seeks to solve major unsolved IT challenges such as With SSH and Ansible clear orchestration of complex multi- tier workflows and cleanly unifying OS configuration and application I can send commands software deployment under a single banner. to 500 servers without Ansible is designed to be minimal in nature, consistent, secure, and highly reliable, with an extremely having even used the low learning curve for administrators, developers, and IT managers. Ansible seeks to keep descriptions servers before.” of IT easy to build, and easy to understand - such that new users can be quickly brought into new IT projects, and longstanding automation content is easily understood even after months of being away from a project. Ansible seeks to make things powerful for expert users, but equally accessible for all skill MARK MAAS UNIX/LINUX SYSTEMS levels, ensuring a quicker time to market for IT projects and faster, less-error prone turnaround on IT ADMINISTRATOR configuration change. BINCKBANK ARCHITECTURE, AGENTS, AND SECURITY One of the primary differentiators between Ansible and many other tools in this space is its architecture. Ansible is an agentless tool that runs in a ‘push’ model - no software is required to be installed on remote machines to make them manageable.
    [Show full text]
  • Ansible Tower Upgrade and Migration Release Ansible Tower 3.7.3
    Ansible Tower Upgrade and Migration Release Ansible Tower 3.7.3 Red Hat, Inc. Sep 29, 2021 CONTENTS 1 Release Notes for Ansible Tower Version 3.7.32 1.1 Ansible Tower Version 3.7.3.......................................2 2 Upgrading Ansible Tower 3 2.1 Upgrade Planning............................................3 2.2 Obtaining Ansible Tower.........................................4 2.3 Setting up the Inventory File.......................................4 2.4 The Setup Playbook...........................................7 3 Role-Based Access Controls 9 3.1 Organization field on Job Templates...................................9 4 Using virtualenv with Ansible Tower 10 4.1 Preparing a new custom virtualenv.................................... 10 4.2 Assigning custom virtualenvs...................................... 12 5 Index 15 6 Copyright © Red Hat, Inc. 16 Index 17 i Ansible Tower Upgrade and Migration, Release Ansible Tower 3.7.3 Thank you for your interest in Ansible Tower. Ansible Tower is a commercial offering that helps teams manage complex multi-tier deployments by adding control, knowledge, and delegation to Ansible-powered environments. Note: You must upgrade your Ansible Tower to Ansible Tower 3.5 before you can upgrade to Ansible Tower 3.7.0. We Need Feedback! If you spot a typo in this documentation, or if you have thought of a way to make this manual better, we would love to hear from you! Please send an email to: [email protected] If you have a suggestion, try to be as specific as possible when describing it. If you have found an error, please include the manual’s title, chapter number/section number, and some of the surrounding text so we can find it easily.
    [Show full text]
  • Deploying Java Ee Apps in Cloud and Container Environments
    DEPLOYING JAVA EE APPS IN CLOUD AND CONTAINER ENVIRONMENTS TECHNOLOGY OVERVIEW FEATURES ORGANIZATIONS STRUGGLE TO DELIVER APPLICATIONS FASTER • Fully certified Java As the leader of a Java™ organization, you struggle to deliver business value and innovation to Enterprise Edition (EE) 7 and market faster than your competition. Your application development teams must meet strict, diverse Java SE 8 support requirements while improving efficiency and decreasing costs. To keep up with today’s pace, your organization has to deliver new applications and updates in days or weeks — not months. But speedy • Full web services stack delivery of new features is not the only requirement. Applications must also be reliable, perform • Modular architecture smoothly at large scale with millions of connections, and meet strict security and compliance optimized for containers and expectations. cloud deployments Beyond rapidly delivering high-quality applications, your teams must grapple with application • Enterprise capabilities such as deployment in different environments. Legacy applications are mostly deployed in on-premise or failover, distributed caching, virtual environments, and new applications are increasingly being deployed into private, public, and intelligent load balancing, hybrid cloud environments. clustering, and distributed Successful leaders are turning to DevOps methodologies, microservices architectures, and contain- deployment ers to accelerate application development and delivery, maintain high levels of quality and reliability, • Integrated development envi- and achieve technical flexibility. To support these new approaches, you must choose a platform flex- ronment (IDE) that maximizes ible enough to meet diverse application needs. The right platform can help you: productivity and performance • Rapidly deploy web-scale Java EE applications to cloud environments.
    [Show full text]
  • Red Hat Enterprise Agreement Thailand
    RED HAT ENTERPRISE AGREEMENT THAILAND PLEASE READ THIS AGREEMENT CAREFULLY BEFORE PURCHASING AND/OR USING SOFTWARE OR SERVICES FROM RED HAT. BY USING RED HAT SOFTWARE OR SERVICES, CLIENT SIGNIFIES ITS ASSENT TO AND ACCEPTANCE OF THIS AGREEMENT AND ACKNOWLEDGES IT HAS READ AND UNDERSTANDS THIS AGREEMENT. AN INDIVIDUAL ACTING ON BEHALF OF AN ENTITY REPRESENTS THAT HE OR SHE HAS THE AUTHORITY TO ENTER INTO THIS AGREEMENT ON BEHALF OF THAT ENTITY. IF CLIENT DOES NOT ACCEPT THE TERMS OF THIS AGREEMENT, THEN IT MUST NOT USE RED HAT SOFTWARE OR SERVICES. This Agreement incorporates those appendices at the end of this Agreement. This Red Hat Enterprise Agreement, including all referenced appendices and documents located at URLs (the " Agreement "), is between Red Hat (Thailand) Limited (" Red Hat ") and the purchaser or user of Red Hat software and services who accepts the terms of this Agreement (O Client P). The effective date of this Agreement (O Effective Date P) is the earlier of the date that Client signs or accepts this Agreement or the date that Client uses Red Hat's software or services. 1. Scope of Agreement 1.1 Framework. This Agreement establishes a framework that will enable Red Hat to provide Software and Services to Client. O Software P means Red Hat Enterprise Linux, JBoss Enterprise Middleware and other software programs branded by Red Hat, its Affiliates and/or third parties including all modifications, additions or further enhancements delivered by Red Hat. The specific services (the O Services P) and/or Software that Red Hat will provide to Client will be described in an Order Form, signed by the parties or otherwise accepted by Red Hat, which may consist of (a) one or more mutually agreed order forms, statements of work, work orders or similar transaction documents, or (b) an order placed by Client through Red Hat's online store accessible from a Red Hat website.
    [Show full text]
  • Red Hat Ceph Storage 3 Installation Guide for Ubuntu
    Red Hat Ceph Storage 3 Installation Guide for Ubuntu Installing Red Hat Ceph Storage on Ubuntu Last Updated: 2021-07-23 Red Hat Ceph Storage 3 Installation Guide for Ubuntu Installing Red Hat Ceph Storage on Ubuntu Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Automating the Enterprise with Ansible
    AUTOMATING THE ENTERPRISE WITH ANSIBLE Dustin Boyd Solutions Architect September 12, 2017 EVERY ORGANIZATION IS A DIGITAL ORGANIZATION. Today, IT is driving innovation. If you can’t deliver software fast, your organization can’t meet the mission, period. Digital organizations are essentially software. If they expect to thrive in a digital environment, they must have an improved competence in software delivery. Gartner 2015 2 COMPLEXITY KILLS PRODUCTIVITY. Complexity is the enemy of innovation, which is why today’s enterprises are looking to automation and DevOps tools and practices. DevOps can help organizations that are pushing to implement a bimodal strategy to support their digitalization efforts. Gartner 2015 3 WHEN YOU AUTOMATE, YOU ACCELERATE. Ansible loves the repetitive work your people hate. It helps smart people do smarter work. All with fewer errors and better accountability. Automation can crush complexity and it gives you the one thing you can’t get enough of… time. 4 “Ansible delivers DevOps to a broader class of enterprise users that include those inside the business units and teams where agile practices and fast provisioning of infrastructure are in demand.” JAY LYMAN, 451 RESEARCH – NOV 2013 GARTNER COOL VENDOR 2015 “Previous vendors in this [DevOps] market often require unique programming skills. Ansible’s simple language reduces the barrier to adoption and opens it up to a variety of skill sets…” 5 AUTOMATION = ACCELERATION “With Ansible Tower, we just click a button and deploy to production in 5 minutes. It used to take us 5 hours with 6 people sitting in a room, making sure we didn’t do anything wrong (and we usually still had errors).
    [Show full text]
  • Dell EMC Ready Stack for Red Hat Openshift Container Platform 4.3 Enabled by Dell EMC Poweredge R-Series Servers and Powerswitch Networking
    Dell EMC Ready Stack for Red Hat OpenShift Container Platform 4.3 Enabled by Dell EMC PowerEdge R-Series Servers and PowerSwitch Networking January 2021 H18212.1 Deployment Guide Abstract This deployment guide provides a validated procedure for deploying Red Hat OpenShift Container Platform 4.3 on Dell EMC PowerEdge servers. Dell Technologies Solutions Copyright The information in this publication is provided as is. Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. Copyright © 2021 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Intel, the Intel logo, the Intel Inside logo and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries. Other trademarks may be trademarks of their respective owners. Published in the USA 01/21 Deployment Guide H18212.1. Dell Inc. believes the information in this document is accurate as of its publication date. The information is subject to change without notice. s 2 Dell EMC Ready Stack for Red Hat OpenShift Container Platform 4.3 Enabled by Dell EMC PowerEdge R-Series Servers and PowerSwitch Networking Deployment Guide Contents Contents Chapter 1 Introduction 5 Solution overview ..................................................................................................
    [Show full text]