- Überblick
- Anforderungen
- Pre-installation
- Vorbereiten der Installation
- Installing and configuring the service mesh
- Herunterladen der Installationspakete
- Konfigurieren der OCI-konformen Registrierung
- Granting installation permissions
- Installing and configuring the GitOps tool
- Deploying Redis through OperatorHub
- Applying miscellaneous configurations
- Running uipathctl
- Installation
- Nach der Installation
- Migration und Upgrade
- Clusterverwaltung
- Produktspezifische Konfiguration
- Konfigurieren von Orchestrator-Parametern
- Konfigurieren von AppSettings
- Konfigurieren der maximalen Anforderungsgröße
- Überschreiben der Speicherkonfiguration auf Clusterebene
- Konfigurieren von NLog
- Speichern von Roboterprotokollen in Elasticsearch
- Konfigurieren von Anmeldeinformationsspeichern
- Konfigurieren der Verwendung von einem Verschlüsselungsschlüssel pro Mandant
- Bereinigen der Orchestrator-Datenbank
- Fehlersuche und ‑behebung
Installing and configuring the service mesh
Automation Suite requires the Istio service mesh for ingress and networking.
Red Hat provides OpenShift Service Mesh, which relies on Istio internally.
The service mesh installation and configuration is a two-step process. Which of the steps you must perform depends on whether or not you can grant the Automation Suite installer admin privileges over your cluster. For details, see the following table:
Schritt |
Admin privileges |
No admin privileges |
---|---|---|
Step 1: Installing the service mesh |
Required step |
Required step |
Step 2: Configuring Istio and installing the WASM plugin for routing |
Step not required |
Required step |
To install OpenShift Service Mesh, follow the instructions in the OpenShift Service Mesh documentation.
Automation Suite does not require applications such as Kiali and Jaeger. However, you can use them at your discretion.
UiPath® has no opinion on configuring the Service Mesh Operator to run on any node.
-
Install the new instance of the service mesh control plane in the
<istio-system>
namespace. -
Use
ClusterWide
mode for the service mesh control plane. ForMultiTenant
mode, refer to point 3 on this page. The following block must be present under thespec
section of theServiceMeshControlPlane
resource:To disable the OpenShift route, refer to point 4 on this page.gateways: enabled: true openshiftRoute: enabled: true mode: ClusterWide
gateways: enabled: true openshiftRoute: enabled: true mode: ClusterWide -
You can use
MultiTenant
mode for the service mesh control plane. This scenario requires you to explicitly create a service mesh member roll, as shown in the following sample:apiVersion: maistra.io/v1 kind: ServiceMeshMemberRoll metadata: name: default namespace: <istio-system> spec: members: - <uipath>
apiVersion: maistra.io/v1 kind: ServiceMeshMemberRoll metadata: name: default namespace: <istio-system> spec: members: - <uipath> -
You also have the option to disable the OpenShift route. However, this choice comes with the additional responsibility of manually creating a route for the FQDN. For manual route creation, see the following sample:
kind: Route apiVersion: route.openshift.io/v1 metadata: name: uipath-route namespace: <istio-system> labels: app: istio-ingressgateway app.kubernetes.io/part-of: istio app.kubernetes.io/instance: <istio-system> maistra.io/owner-name: basic release: istio app.kubernetes.io/version: 2.6.1-1-1 app.kubernetes.io/component: istio-ingress maistra-version: 2.6.1 istio: ingressgateway app.kubernetes.io/managed-by: maistra-istio-operator maistra.io/owner: <istio-system> istio.io/rev: basic app.kubernetes.io/name: istio-ingress spec: to: kind: Service name: istio-ingressgateway tls: termination: passthrough insecureEdgeTerminationPolicy: Redirect host: <fqdn> port: targetPort: https alternateBackends: []
kind: Route apiVersion: route.openshift.io/v1 metadata: name: uipath-route namespace: <istio-system> labels: app: istio-ingressgateway app.kubernetes.io/part-of: istio app.kubernetes.io/instance: <istio-system> maistra.io/owner-name: basic release: istio app.kubernetes.io/version: 2.6.1-1-1 app.kubernetes.io/component: istio-ingress maistra-version: 2.6.1 istio: ingressgateway app.kubernetes.io/managed-by: maistra-istio-operator maistra.io/owner: <istio-system> istio.io/rev: basic app.kubernetes.io/name: istio-ingress spec: to: kind: Service name: istio-ingressgateway tls: termination: passthrough insecureEdgeTerminationPolicy: Redirect host: <fqdn> port: targetPort: https alternateBackends: []Warning: Disabling the OpenShift route will lead to the following error when running the prerequisite checks:❌ [ISTIO_SERVICEMESH_VALIDATION_URL_ACCESS] error accessing the url. unexpected status code: 503
❌ [ISTIO_SERVICEMESH_VALIDATION_URL_ACCESS] error accessing the url. unexpected status code: 503
apiVersion: operators.coreos.com/v1alpha1
kind: Subscription
metadata:
name: servicemeshoperator
namespace: openshift-operators
spec:
channel: stable
installPlanApproval: Manual
name: servicemeshoperator
source: redhat-operators
sourceNamespace: openshift-marketplace
startingCSV: servicemeshoperator.v2.4.5
apiVersion: operators.coreos.com/v1alpha1
kind: Subscription
metadata:
name: servicemeshoperator
namespace: openshift-operators
spec:
channel: stable
installPlanApproval: Manual
name: servicemeshoperator
source: redhat-operators
sourceNamespace: openshift-marketplace
startingCSV: servicemeshoperator.v2.4.5
servicemeshoperator.v2.4.5
with the correct value for your version in the YAML file. For example, to install OSSM version 2.5.0, enter servicemeshoperator.v2.5.0
.
oc apply -f <yaml>
oc apply -f <yaml>
<yaml>
placeholder in the sample command with the name of your YAML file.
In the OpenShift console, go to Operators > Installed Operators > Servicemeshoperator > 1 requires approval > Preview Install Plan > Approve.
input.json
file:"ingress": {
"gateway_selector": {
"istio": "ingressgateway"
},
"ingress_gateway_secret": "istio-ingressgateway-certs",
"namespace": "<istio-system>"
},
"ingress": {
"gateway_selector": {
"istio": "ingressgateway"
},
"ingress_gateway_secret": "istio-ingressgateway-certs",
"namespace": "<istio-system>"
},
Parameter |
Wert |
---|---|
ingress.gateway_selector.istio |
Standardwert:
ingressgateway If you have changed the value, then use the following command to get the right value:
|
ingress.ingress_gateway_secret |
The name of the secret that contains the certificate files. The default value is
istio-ingressgateway-certs .
|
ingress.namespace | The namespace where you have installed the service mesh. |
This step requires admin privileges for installation in the Istio namespace.
- If you cannot provide the permissions that the Automation Suite installer requires, then you must perform this step before the Automation Suite installation.
- During the Automation Suite installation. This method requires the Kubeconfig file that you use during the Automation Suite installation to have the necessary permissions. To review the permissions, refer to the Granting installation permissions section. If you can provide all the necessary permissions, then skip this step.
To configure Istio and install the WASM plugin for routing, take the following steps:
If you update the FQDN post-installation, one of the following scenarios applies:
-
If you grant the Automation Suite installer admin privileges and you did not add the
istio-configure
component to theexclude_components
list in yourinput.json
file, you do not need to perform any additional step. -
If you do not grant the Automation Suite installer admin privileges and you added the
istio-configure
component to theexclude_components
list in yourinput.json
file, you must take the following steps:-
Update the parameter values file mentioned in Point 3 with the new FQDN.
-
Repeat all the steps for configuring Istio and installing the WASM plugin for routing.
-