Note: This is a beta release of Red Hat Bugzilla 5.0. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Also email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback here.
Bug 1366762 - [DOCS] Verifying Install steps assume master is also an etcd member.
Summary: [DOCS] Verifying Install steps assume master is also an etcd member.
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Documentation
Version: 3.2.1
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: ---
Assignee: Vikram Goyal
QA Contact: Vikram Goyal
Vikram Goyal
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-08-12 18:00 UTC by Ryan Howe
Modified: 2018-04-24 15:49 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2018-04-24 15:49:41 UTC


Attachments (Terms of Use)

Description Ryan Howe 2016-08-12 18:00:25 UTC
Document URL: 

https://docs.openshift.com/enterprise/latest/install_config/install/advanced_install.html#advanced-verifying-the-installation

Section Number and Name: Multiple etcd Hosts

Describe the issue: 
- The documentation assume that etcd was installed on the masters. If ectd members are external then the masters will not have the ectdctl command and the cert path is incorrect. 


Suggestions for improvement:
 
The ectdctl tool should really only be installed on the hosts running etcd. API calls using the etcd client certs would be the best option if the ectd host is not the master host. 


Additional information: 


https://coreos.com/etcd/docs/latest/api.html

 Examples:--------------------------------------------

  -List Members
  # curl --cacert /etc/origin/master/master.etcd-ca.crt --cert /etc/origin/master/master.etcd-client.crt --key /etc/origin/master/master.etcd-client.key  https://etcd-0.openshift.com:2379/v2/members |  python -m json.tool

  - Check Health of ectd member 
  # curl --cacert /etc/origin/master/master.etcd-ca.crt --cert /etc/origin/master/master.etcd-client.crt --key /etc/origin/master/master.etcd-client.key  https://etcd-0.openshift.com:2379/health

  - Stats 
  # curl --cacert /etc/origin/master/master.etcd-ca.crt --cert /etc/origin/master/master.etcd-client.crt --key /etc/origin/master/master.etcd-client.key  https://etcd-0.openshift.com:2379/v2/stats/self | python -m json.tool
  # curl --cacert /etc/origin/master/master.etcd-ca.crt --cert /etc/origin/master/master.etcd-client.crt --key /etc/origin/master/master.etcd-client.key  https://etcd-0.openshift.com:2379/v2/stats/leader | python -m json.tool
------------------------------------------------------

As for the ectdctl commands these can be run on the hosts that are running etcd and the certs can be found the /etc/etcd/ directory using the peer cert and key. 

  # etcdctl -C https://etcd-0.openshift.com:2379,https://etcd-1.openshift.com:2379,https://etcd-2.openshift.com:2379 --ca-file=/etc/etcd/ca.crt --cert-file=/etc/etcd/peer.crt --key-file=/etc/etcd/peer.key cluster-health

Comment 2 Alex Dellapenta 2018-04-24 15:49:41 UTC
Current docs instruct to make sure etcd is installed and that the etcdctl command is available:

https://docs.openshift.com/container-platform/3.9/install_config/install/advanced_install.html#advanced-verifying-the-installation


Note You need to log in before you can comment on or make changes to this bug.