The pre-check script performs a series of checks on the Controller host to determine whether it is ready to accept the installation. To use the script:
hpe-cp-prechecks-<version>.bin script, where
<version> is the version number, such as 5.3. For RHEL/CentOS: RHEL/CentOS Pre-check script
For SLES: SLES Pre-check script
chmod a+x hpe-cp-prechecks-<version>.binhpe-cp-prechecks-<version>.bin <options>where <options> denotes the options and parameters you need
to pass to the script. See Script Options for a complete list
of options and when to use them, and Examples for examples of usage
scenarios.
Do not use the config file to install the controller in a production environment if the pre-check output lists one or more errors.
For non-production environments, when you want to create a deployment that is
smaller than the requirements for production environments, specify the
--force option when executing the script.
/tmp/bd_prechecks.confThis table lists all of the Controller-specific options that can be used with the pre-check script. Not all of these options will apply in all situations. See Examples for exmaples of how this script can be used in a variety of real-world scenarios.
| Option | Short Option | Description | Notes | Example |
|
|
Verify host meets Controller requirements. | Use this option on the Controller host only. | |
|
Internal gateway IP address for virtual nodes/containers. This address cannot be used by another resource on the corporate network. See Network Requirements. | Optional. If not specified, default value is 172.16.13.1 |
|
|
|
|
Proxy URL in the format
|
Skip this option if no web proxy is being used for EPIC. See Web Proxy Requirements. |
|
|
Auto-mount root on the Controller. |
|
||
|
Path where the configuration file (see Sample Pre-Check Output) will be written. |
|
||
|
Specify the actual sudo prefix to use when running privileged commands as a non-root user. | Defaults to sudo -n if no other option
provided. |
|
|
|
SSL certificate to use for secure (https://) access to the web interface. | Do not use this option if you will be using non-secured (http://) access to the web interface. |
|
|
|
Provide the CA authentication chain data required for having an SSL client authenticate the server certificate. | This must be an absolute file path that will be readable by the
httpd process. The “CA data” file is used for an openssl verify -CAfile command to ensure that an SSL client
(such as those used in our k8s support) can validate the
certificate. |
|
|
|
Provide the public-key SSL certificate for SSL termination in the
gateway. If this is not provided, but the server certificate and
private key are, these values will now default from those server
certificate values (--ssl-cert and --ssl-priv-key). |
This must be an absolute path. |
|
|
|
Provide the private key corresponding to the above. | This also must be an absolute path if given. |
|
|
|
SSL private key to use for secure (https://) access to the web interface. | Do not use this option if you will be using non-secured (http://) access to the web interface. |
|
|
|
Worker hosts must be initialized manually before installing them via the web interface. | ONLY USE THIS OPTIONS WHEN YOUR ENVIRONMENT DOES NOT ALLOW KEY-BASED SSH. SEE Configuration Requirements. | ||
|
|
Force pre-check validation to succeed regardless of any errors. | THIS OPTION IS FOR ADVANCED USERS ONLY AND MAY RESULT IN AN UNUSABLE DEPLOYMENT. | |
|
Optional. Specifies the user that dnsmasq service will run under. |
If not specified, then the dnsmasq service will
run under user nobody:nobody. |
|
|
|
Optional. Specifies the group of dnsmasq
users. |
= |
|
This section presents some examples of using the pre-check script.
Root/Agent: This example pre-checks HPE Ezmeral Container Platform as the root user and includes the Worker agent because password-less SSH is not available in the environment.
# root@localhost> /root/hpe-cp-prechecks-5.1.bin --worker-agent-install
Root/non-Agent: This example pre-checks HPE Ezmeral Container Platform
as the root user. The environment does allow password-less SSH, and thus the
--worker-agent-install option is not used.
# root@localhost> /root/hpe-cp-prechecks-5.1.bin
Root/Agent/SSL: This example pre-checks HPE Ezmeral Container Platform as the root user and includes the Worker agent because password-less SSH is not available in the environment. It also provides SSL information to enable secure (https://) access to the HPE Ezmeral Container Platform interface.
# root@localhost> /root/hpe-cp-prechecks-5.1.bin --worker-agent-install --ssl-cert /root/bdhost.cert --ssl-priv-key /root/bdhost.pem
Root/Non-Agent/SSL: This example pre-checks HPE Ezmeral Container Platform as
the root user. The environment does allow password-less SSH, and thus the
--worker-agent-install option is not used. This
example also provides SSL information to enable secure (https://) access to
the HPE Ezmeral Container Platform interface.
# root@localhost> /home/epic/hpe-cp-prechecks-5.1.bin --ssl-cert /root/bdhost.cert --ssl-priv-key /root/bdhost.pem
Non-root/Agent: This example pre-checks HPE Ezmeral Container Platform as a non-root user and includes the Worker agent because password-less SSH is not available in the environment.
# epic@localhost> /home/epic/hpe-cp-prechecks-5.1.bin --worker-agent-install
Non-root/non-Agent: This example pre-checks HPE Ezmeral Container Platform as a non-root user. The environment does allow password-less SSH,
and thus the --worker-agent-install option is not
used
# epic@localhost> /home/epic/hpe-cp-prechecks-5.1.bin
Non-root/Agent/SSL: This example pre-checks HPE Ezmeral Container Platform as a non-root user and includes the Worker agent because password-less SSH is not available in the environment. It also provides SSL information to enable secure (https://) access to the web interface.
# epic@localhost> /home/epic/hpe-cp-prechecks-5.1.bin --worker-agent-install --ssl-cert /home/epic/bdhost.cert --ssl-priv-key /home/epic/bdhost.pem
Non-root/non-Agent/SSL: This example pre-checks HPE Ezmeral Container Platform as a non-root user. The environment does allow password-less SSH, and thus the --worker-agent-install option is not used. This example also provides SSL information to enable secure (https://) access to the web interface.
# epic@localhost> /home/epic/hpe-cp-prechecks-5.1.bin --ssl-cert /home/epic/bdhost.cert --ssl-priv-key /home/epic/bdhost.pem