| title | Azure requirements |
|---|---|
| weight | 10 |
| aliases | /coco-pattern/coco-pattern-azure-requirements/ |
This pattern has been tested on Microsoft Azure using self-managed OpenShift clusters provisioned with openshift-install.
OpenShift documentation contains details on how to install a cluster on Azure.
The documentation outlines the minimum required configuration for an Azure account.
Do not accept default sizes for OpenShift install. It is recommended to increase the worker node size to at least Standard_D8s_v5.
This can be done by using openshift-install create install-config first and adjusting the workers under platform, for example:
- architecture: amd64
hyperthreading: Enabled
name: worker
platform:
azure:
type: Standard_D8s_v5
replicas: 3On a cloud provider the virtual machines for the kata containers use "peer pods" which are running directly on the cloud provider’s hypervisor (see the diagram below).
This means that access is required to the "confidential computing" virtual machine class. On Azure the Standard_DCas_v5 class of virtual machines are used.
These virtual machines are NOT available in all regions. Check Azure products by region to confirm availability in your target region.
Users will also need to request quota increases for the Standard_DC2as_v5 (and optionally Standard_DC4as_v5, Standard_DC8as_v5, Standard_DC16as_v5) virtual machine families in their target region. By default, Azure subscriptions may have zero quota for confidential computing VM sizes.
DNS for the OpenShift cluster MUST be provided by Azure DNS. The pattern uses Azure DNS for both the cluster’s ingress and for cert-manager DNS01 challenge validation when issuing certificates.
The validated pattern requires access to Azure APIs to provision peer-pod VMs.
Azure configuration information must be provided in two places:
-
A secret must be loaded using a ../../../learn/secrets-management-in-the-validated-patterns-framework/[values-secret] file. The
values-secret.yaml.templatefile provides the appropriate structure. The Azure client secret (service principal password) is stored here and loaded into Vault. -
A broader set of information about the cluster is required in
values-global.yaml(see below). These values are used by the sandboxed containers operator to provision peer-pod VMs in the correct Azure subscription, resource group, and virtual network.
global:
azure:
clientID: '' # Service principal ID
subscriptionID: ''
tenantID: '' # Tenant ID
DNSResGroup: '' # Resource group for the azure DNS hosted zone
hostedZoneName: '' # the hosted zone name
clusterResGroup: '' # Resource group of the cluster
clusterSubnet: '' # subnet of the cluster
clusterNSG: '' # network security group of the worker nodes in the cluster
clusterRegion: ''The clusterResGroup, clusterSubnet, and clusterNSG values can be found in the Azure portal after the cluster has been provisioned, or via openshift-install metadata. The DNSResGroup and hostedZoneName correspond to the Azure DNS zone used for the cluster’s base domain.
