Skip to main content
Skip table of contents

Installation and setup for OpenShift

Hardware requirements

The hardware requirements for Data Control Tower to deploy on OCP are listed below. In addition to these requirements, inbound port 443 or 80 must be open for API clients. This is the minimum total resource requirement for the deployment. 

  • CPU: 4-Core

  • CPU Architecture: x86_64

  • Memory: 16GB

  • Storage: 50GB

  • Port: 443

The recommended minimum 50 GB of storage is shared across the Kubernetes cluster (i.e. hosts). All pods and/or services use this storage for mounted volumes and other utilities, including image storage.

In a single node cluster, if shared volumes are not externalized, the host requires the full 50 GB of storage. If the persistent volume is mounted externally, the host requires 37 GB of storage, since the default storage required by the database (10 GB), gateway (1 GB), masking (1 GB) and virtualization-app (1 GB) draws from the external storage. The default storage configuration for the database, gateway, masking, and virtualization-app can be modified in the values.yaml file.

Many users may have default container settings as part of their Kubernetes or OpenShift infrastructure management. It is paramount to compare those default settings with the recommended minimum performance specifications (please engage your container infrastructure team to verify). If those default setting are lower, please update them to the minimum or higher.

For users who need to have limits set, you can start with the following sample configuration.

CODE
dataBookmarks:
  resources:
    requests:
      memory: "256Mi"
      cpu: "100m"
    limits:
      memory: "512Mi"
      cpu: "300m"
dataLibrary:
  resources:
    requests:
      memory: "256Mi"
      cpu: "100m"
    limits:
      memory: "1024Mi"
      cpu: "800m"
database:
  resources:
    requests:
      memory: "256Mi"
      cpu: "200m"
    limits:
      memory: "4096Mi"
      cpu: "1100m"
gateway:
  resources:
    requests:
      memory: "512Mi"
      cpu: "400m"
    limits:
      memory: "2048Mi"
      cpu: "400m"
graphql:
  resources:
    requests:
      memory: "256Mi"
      cpu: "100m"
    limits:
      memory: "1024Mi"
      cpu: "200m"
ui:
  resources:
    requests:
      memory: "128Mi"
      cpu: "100m"
    limits:
      memory: "256Mi"
      cpu: "200m"
jobs:
  resources:
    requests:
      memory: "256Mi"
      cpu: "200m"
    limits:
      memory: "1024Mi"
      cpu: "400m"
jobsCleaner:
  resources:
    requests:
      memory: "256Mi"
      cpu: "200m"
    limits:
      memory: "512Mi"
      cpu: "400m"
masking:
  resources:
    requests:
      memory: "512Mi"
      cpu: "500m"
    limits:
      memory: "2304Mi"
      cpu: "700m"
virtualizationApp:
  resources:
    requests:
      memory: "512Mi"
      cpu: "600m"
    limits:
      memory: "2560Mi"
      cpu: "700m"
virtualization:
  resources:
    requests:
      memory: "256Mi"
      cpu: "100m"
    limits:
      memory: "512Mi"
      cpu: "300m"

Installation requirements (OpenShift)

DCT is designed to run and is supported on any Certified Kubernetes platform that supports Helm. See the full statement in the Getting started page.

DCT requires a running OpenShift cluster to run, oc command line tool to interact with OpenShift cluster, and HELM for deployment onto the cluster.

Requirement

DCT Recommended Version

Comments

OpenShift Cluster

4.12 or above

HELM

3.9.0 or above

HELM installation should support HELM v3. More information on HELM can be found at https://helm.sh/docs/.

To install HELM, follow the installation instructions at https://helm.sh/docs/intro/install/.

oc

4.11.3 or above

To install oc, follow the instructions at https://docs.openshift.com/container-platform/4.16/cli_reference/openshift_cli/getting-started-cli.html.

If an intermediate HELM repository is to be used instead of the default Delphix HELM repository, then the repository URL, username, and password to access this repository needs to be configured in the values.yaml file under imageCredentials section.

Installation process

Jump box setup

OC login

Run the OC login command to authenticate OpenShift CLI with the server:

BASH
oc login https://openshift1.example.com --token=<<token>>

Verify KubeConfig

HELM will use the configuration file inside the $HOME/.kube/ folder to deploy artifacts on an OpenShift cluster.

Be sure the config file has the cluster context added, and the current-context is set to use this cluster. To verify the context, run this command:

BASH
oc config current-context

Create a new project

Create a new project named dct-services using the command below:

BASH
oc new-project dct-services --description="DCT Deployment project" --display-name="dct-services"

Installing Helm

Install HELM using the following installation instructions mentioned at https://helm.sh/docs/intro/install/.

Deploy DCT chart

Add the DCT HELM repo with the following, which will link the DCT HELM repo to the local HELM repo:

CODE
helm repo add dct-services https://dlpx-helm-dct.s3.amazonaws.com 

Update the added repos with the following, which will update the local HELM charts metadata (index.yaml):

CODE
helm repo update

Pull the HELM charts with the following, which is used to download the .tgz file:

CODE
helm pull dct-services/delphix-dct --version x.0.0

The downloaded file is then extracted using the following command (where x.0.0 should be changed to the version of DCT being installed):

CODE
tar -xvf delphix-dct-x.0.0.tgz

Update the following properties in the values.yaml file, present in the extracted delphix-dct folder.

  • To generate the bootstrap APIKey, set apiKeyCreate: true.

  • Provide image credentials to pull images from docker registry.

    • username: <retrieved from download.delphix.com>

    • password: <retrieved from download.delphix.com>

  • isOpenshift should be set to true.

To get the image credentials, visit the Delphix DCT Download page and login with your user login credentials. Once logged in, select the DCT Helm Repository link and accept the Terms and Conditions. Use password from the popup screen, as shown below.

Offline mode

Instructions for offline mode

An offline mode is supported for use cases where:

  1. The cluster can be air gapped (it does not have access to the Delphix Docker registry).

  2. Delphix Docker images should first be pushed to the organization's internal Artifactory or registry for scanning and to comply with any other security policies in place.

If one such use case exists, retrieve the Delphix Docker images, Helm chart, and deploy. A jump box machine is needed, which has access to both Delphix Docker registry/download site and the organization’s internal Artifactory/registry. In addition, the jump box machine must satisfy the installation requirements.

Get the Docker images

There are two ways to retrieve the Delphix Docker images:

  1. Pull the images from the Delphix Docker registry.

  2. Download and load the images from tarball.

1. Pulling images from Docker registry

  • Login into the jump box machine.

  • Pull the Docker images from the Delphix Docker registry.

    CODE
    $ docker pull dct.download.delphix.com/delphix-dct:nginx-x.0.0
    $ docker pull dct.download.delphix.com/delphix-dct:app-x.0.0
    $ docker pull dct.download.delphix.com/delphix-dct:data-bookmarks-x.0.0
    $ docker pull dct.download.delphix.com/delphix-dct:delphix-data-library-x.0.0
    $ docker pull dct.download.delphix.com/delphix-dct:graphql-x.0.0
    $ docker pull dct.download.delphix.com/delphix-dct:ui-x.0.0
    $ docker pull dct.download.delphix.com/delphix-dct:jobs-x.0.0
    $ docker pull dct.download.delphix.com/delphix-dct:postgres-x.0.0
    $ docker pull dct.download.delphix.com/delphix-dct:virtualization-x.0.0
    $ docker pull dct.download.delphix.com/delphix-dct:masking-x.0.0
    $ docker pull dct.download.delphix.com/delphix-dct:virtualization-app-x.0.0
  • Re-tag all above Docker images. This is a sample re-tag for one image:

    CODE
    $ docker tag dct.download.delphix.com/delphix-dct:nginx-x.0.0 <local registry url>:nginx-x.0.0

Note: Re-tag all remaining DCT images in the same format.

  • Push re-tagged images into the internal registry. This is a sample push example for one image:

    CODE
    $ docker push <local registry url>:nginx-x.0.0

2. Download tarball images

If you do not have direct access to Delphix HELM and Docker repositories, download the HELM charts and Docker images packages as delphix-dct-x.0.0.tar.gz, which is available on the download site.

  • Login into the jump box machine.

  • Download the HELM chart and docker images packages as delphix-dct-x.0.0.tar.gz, which is available on the download site.

  • Extract the downloaded.tar.gz file to get the HELM chart and Docker images.

  • Load extracted Docker images using following:

    CODE
    for image in *tar; do sudo docker load --input $image; done
  • Re-tag all above Docker images. Sample re-tag example for one image:

    CODE
    $ docker tag registry.delphix.com/delphix-dct:nginx-x.0.0 <local registry url>:nginx-x.0.0

Note: Re-tag all remaining DCT images in the same format.

  • Push re-tagged images into internal registry. Sample push example for one image:

    CODE
    $ docker push <local registry url>:nginx-x.0.0

Deploy

  1. Update the values.yaml file for registry name and image credentials:

    1. Registry: <local registry url>

    2. Username: <local registry username>

    3. Password: <local registry password>

  2. Install.

    1. Follow the instructions below.

Find and update fsGroup in values.yaml file

The fsGroup field is used to specify a supplementary group ID. All processes of the container, the owner of the volume, and any files created on the volume are also part of this supplementary group ID.

For OpenShift deployment, this value need to be specified in the values.yaml file.

Find the allowed supplementary group range:

BASH
oc get project dct-services -o yaml

A response should appear as follows:

BASH
apiVersion: project.openshift.io/v1
kind: Project
metadata:
  annotations:
    openshift.io/description: ""
    openshift.io/display-name: ""
    openshift.io/requester: cluster-admin
    openshift.io/sa.scc.mcs: s0:c32,c4
    openshift.io/sa.scc.supplemental-groups: 1001000000/10000
    openshift.io/sa.scc.uid-range: 1001000000/10000
  creationTimestamp: "2023-01-18T10:33:04Z"
  labels:
    kubernetes.io/metadata.name: dct-services
    pod-security.kubernetes.io/audit: restricted
    pod-security.kubernetes.io/audit-version: v1.24
    pod-security.kubernetes.io/warn: restricted
    pod-security.kubernetes.io/warn-version: v1.24
  name: dct-services
  resourceVersion: "99974"
  uid: ccdd5c9f-2ce5-49b4-91a7-662e0598b63b
spec:
  finalizers:
  - kubernetes
status:
  phase: Active

Copy the first value from the openshift.io/sa.scc.supplemental-groups line, before the slash (e.g. 1001000000). Paste this value in the values.yaml file:

BASH
# Define SecurityContextConstraints for the pod
podSecurityContext:
 fsGroup: 1001000000

Deploy DCT

Run the following command to deploy the DCT chart (where x.0.0 should be changed to the version of DCT being installed):

BASH
helm install dct-services delphix-dct

delphix-dct is the name of the folder which was extracted in the previous step. dct-services is the chart name which is given for this deployment.

In the above directory structure, the values.yaml file contains the properties which are configured above. Deploy DCT using following command to use the custom values.yaml:

helm install dct-services -f <path to edited values.yaml> <directory path of the extracted chart>

Verify deployment

All the images will be downloaded and then deployed. If some pods restarted at the startup, this is expected. After some time, a total of 9 pods will be in running status and one job pod will be in completed status.

BASH
oc get pods -n dct-services

Find API key

For the very first deployment bootstrap API key will be printed in logs, please view gateway pod logs and find for “NEWLY GENERATED API KEY”. the value is the API key.

BASH
oc logs <gateway-pod-name> -n dct-services

Configure Ingress

DCT only works with HTTPS Ingress, the UI does not support HTTP.

Creating route

To create a route, you can use the OpenShift console and create a new one for the DCT service. 

If SSL is terminated at this route, only then should the useSSL value in values.yaml be updated to false, so that 80 port will be exposed in proxy service and can be used to configure the route. The following screenshot shows the route that forwards requests to 80 port of proxy service:

If SSL is not terminated at the Route level, then create a PassTrough route and use 443 port of the proxy service, and configure the SSL certificate and key in the values.yaml file:

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.