Creating a machine set on GCP

    The Machine API is a combination of primary resources that are based on the upstream Cluster API project and custom OKD resources.

    For OKD 4.8 clusters, the Machine API performs all node host provisioning management actions after the cluster installation finishes. Because of this system, OKD 4.8 offers an elastic, dynamic provisioning method on top of public or private cloud infrastructure.

    The two primary resources are:

    Machines

    A fundamental unit that describes the host for a node. A machine has a specification, which describes the types of compute nodes that are offered for different cloud platforms. For example, a machine type for a worker node on Amazon Web Services (AWS) might define a specific machine type and required metadata.

    Machine sets

    MachineSet resources are groups of machines. Machine sets are to machines as replica sets are to pods. If you need more machines or must scale them down, you change the replicas field on the machine set to meet your compute need.

    The following custom resources add more capabilities to your cluster:

    Machine autoscaler

    The MachineAutoscaler resource automatically scales machines in a cloud. You can set the minimum and maximum scaling boundaries for nodes in a specified machine set, and the machine autoscaler maintains that range of nodes. The MachineAutoscaler object takes effect after a ClusterAutoscaler object exists. Both ClusterAutoscaler and MachineAutoscaler resources are made available by the ClusterAutoscalerOperator object.

    Cluster autoscaler

    This resource is based on the upstream cluster autoscaler project. In the OKD implementation, it is integrated with the Machine API by extending the machine set API. You can set cluster-wide scaling limits for resources such as cores, nodes, memory, GPU, and so on. You can set the priority so that the cluster prioritizes pods so that new nodes are not brought online for less important pods. You can also set the scaling policy so that you can scale up nodes but not scale them down.

    Machine health check

    The MachineHealthCheck resource detects when a machine is unhealthy, deletes it, and, on supported platforms, makes a new machine.

    In OKD version 3.11, you could not roll out a multi-zone architecture easily because the cluster did not manage machine provisioning. Beginning with OKD version 4.1, this process is easier. Each machine set is scoped to a single zone, so the installation program sends out machine sets across availability zones on your behalf. And then because your compute is dynamic, and in the face of a zone failure, you always have a zone for when you must rebalance your machines. The autoscaler provides best-effort balancing over the life of a cluster.

    Sample YAML for a machine set custom resource on GCP

    This sample YAML defines a machine set that runs in Google Cloud Platform (GCP) and creates nodes that are labeled with node-role.kubernetes.io/<role>: "".

    In addition to the ones created by the installation program, you can create your own machine sets to dynamically manage the machine compute resources for specific workloads of your choice.

    Prerequisites

    • Deploy an OKD cluster.

    • Install the OpenShift CLI (oc).

    • Log in to oc as a user with cluster-admin permission.

    Procedure

    1. Create a new YAML file that contains the machine set custom resource (CR) sample and is named <file_name>.yaml.

      Ensure that you set the <clusterID> and parameter values.

      1. If you are not sure which value to set for a specific field, you can check an existing machine set from your cluster:

        1. $ oc get machinesets -n openshift-machine-api

        Example output

    2. Create the new MachineSet CR:

      1. $ oc create -f <file_name>.yaml
    3. View the list of machine sets:

      Example output

      1. NAME DESIRED CURRENT READY AVAILABLE AGE
      2. agl030519-vplxk-infra-us-east-1a 1 1 1 1 11m
      3. agl030519-vplxk-worker-us-east-1a 1 1 1 1 55m
      4. agl030519-vplxk-worker-us-east-1c 1 1 1 1 55m
      5. agl030519-vplxk-worker-us-east-1d 0 0 55m
      6. agl030519-vplxk-worker-us-east-1e 0 0 55m

      When the new machine set is available, the DESIRED and CURRENT values match. If the machine set is not available, wait a few minutes and run the command again.

    Machine sets that deploy machines as preemptible VM instances

    You can save on costs by creating a machine set running on GCP that deploys machines as non-guaranteed preemptible VM instances. Preemptible VM instances utilize excess Compute Engine capacity and are less expensive than normal instances. You can use preemptible VM instances for workloads that can tolerate interruptions, such as batch or stateless, horizontally scalable workloads.

    GCP Compute Engine can terminate a preemptible VM instance at any time. Compute Engine sends a preemption notice to the user indicating that an interruption will occur in 30 seconds. OKD begins to remove the workloads from the affected instances when Compute Engine issues the preemption notice. An ACPI G3 Mechanical Off signal is sent to the operating system after 30 seconds if the instance is not stopped. The preemptible VM instance is then transitioned to a TERMINATED state by Compute Engine.

    Interruptions can occur when using preemptible VM instances for the following reasons:

    • There is a system or maintenance event

    • The supply of preemptible VM instances decreases

    • The instance reaches the end of the allotted 24-hour period for preemptible VM instances

    When GCP terminates an instance, a termination handler running on the preemptible VM instance node deletes the machine resource. To satisfy the machine set replicas quantity, the machine set creates a machine that requests a preemptible VM instance.

    You can launch a preemptible VM instance on GCP by adding preemptible to your machine set YAML file.

    Procedure

    • Add the following line under the providerSpec field:

      1. providerSpec:
      2. value:
      3. preemptible: true

      If preemptible is set to true, the machine is labelled as an interruptable-instance after the instance is launched.

    Enabling customer-managed encryption keys for a machine set

    Google Cloud Platform (GCP) Compute Engine allows users to supply an encryption key to encrypt data on disks at rest. The key is used to encrypt the data encryption key, not to encrypt the customer’s data. By default, Compute Engine encrypts this data by using Compute Engine keys.

    You can enable encryption with a customer-managed key by using the Machine API. You must first and assign the correct permissions to a service account. The KMS key name, key ring name, and location are required to allow a service account to use your key.

    Procedure

    1. Run the following command with your KMS key name, key ring name, and location to allow a specific service account to use your KMS key and to grant the service account the correct IAM role:

      1. gcloud kms keys add-iam-policy-binding <key_name> \
      2. --keyring <key_ring_name> \
      3. --location <key_ring_location> \
      4. --member "serviceAccount:service-<project_number>@compute-system.iam.gserviceaccount.com” \
    2. Configure the encryption key under the providerSpec field in your machine set YAML file. For example:

      After a new machine is created by using the updated object configuration, the disk encryption key is encrypted with the KMS key.