Install CDP Private Cloud Experiences in air gap environment
You can launch the Private Cloud installation wizard from Cloudera Manager and follow the steps to install CDP Private Cloud Experiences in an air gap environment where your Cloudera Manager instance or your Kubernetes cluster does not have access to the Internet.
- Ensure that your Kubernetes
kubeconfighas permissions to create Kubernetes namespaces.
- You require persistent storage classes defined in your OpenShift cluster. Storage classes can be defined by OpenShift cluster administrators.
- Only TLS-enabled custom Docker Registry is supported. Ensure that you use a TLS certificate to secure the custom Docker Registry. The TLS certificate can be self-signed, or signed by a private or public trusted Certificate Authority (CA).
- Only TLS 1.2 is supported for authentication with Active Directory/LDAP. You require TLS 1.2 to authenticate the CDP control plane with your LDAP directory service like Active Directory.
In Cloudera Manager, on the top right corner, click Add > Add Cluster. The Add Cluster page appears.
In the Add Cluster page, select the cluster type as
Private Cloud Experiences Cluster and under
Other Options dropdown, click
here to install CDP Private Cloud Experiences.
On the Getting Started page of the installation wizard,
select Air Gapped as the Install Method. If you wish to
use a custom repository link provided to you by Cloudera, click
Custom Repository. On the Getting
Started page of the installation wizard, you can select the
repository that contains the installer. The Select
Repository field contains the CDP Private Cloud Experiences
repository download link. To use a custom repository link provided to you by
Cloudera, click Custom Repository. Click Next.
In the Configure Docker Registry page, enter your local
Docker Repository in the Custom Docker Repository field in the following
format:[*DOCKER REGISTRY*]/[*REPOSITORY NAME*].
Alternatively, you can use Cloudera's default Docker Repository if you are
setting up CDP Private Cloud in non-production environments. You can follow
these steps to prepare your Docker Repository from a machine that is running
Docker locally and has access to all the Docker images either directly from
Cloudera or a local HTTP mirror in your network.
- Click Generate the copy-docker script on the wizard or download the script file.
Log in to your custom Docker Registry and run the script using the
docker login <your_custom_registry> -u <user_with_write_access> bash copy-docker.txt
- Enter your Docker user name and password.
- Click Choose File to upload your Docker certificate.
In the Configure Databases page, follow the instructions
in the wizard to use your external existing databases with CDP Private
For production environments, Cloudera recommends that you use databases that you have previously created. These databases must all be on the same host and that host must be a PostgreSQL database server running version 10.6 or later.
Ensure that you have selected the Use TLS for Connections Between the Control Plane and the Database option if you have plan to use Cloudera Data Warehouse (CDW) Private Cloud. Enabling the base cluster PostgreSQL database to use an SSL connection to encrypt client-server communication is a requirement for CDW in CDP Private Cloud.
The databases must be created before you can proceed with the installation, and the database user must have permissions to create and drop databases on the server.
Enter your Kubernetes, Docker, database, and vault information.
- Upload a Kubernetes configuration (kubeconfig) file from your existing environment. You can obtain this file from your OpenShift Container Platform administrator. Ensure that this kubeconfig has permissions to create Kubernetes namespaces.
- In the Kubernetes Namespace field, enter the Kubernetes namespace that you want to use with this CDP Private Cloud deployment. Kubernetes virtual clusters are called namespaces. For more information, see Kubernetes namespaces
Enter your Vault information and upload a CA certificate.
Cloudera recommends that you use an external Vault for production environments. Enter the Vault address and token, and upload a CA certificate.
Enter a Storage Class to be configured on the Kubernetes
cluster. CDP Private Cloud uses Persistent Volumes to provision storage. You can
leave this field empty if you have a default storage class configured on your
Openshift cluster. Click Next.
If you want to use this installation configuration again to install CDP Private
Cloud, you have the option to download this information as a template.
The template file is a text file that contains the database and vault information that you entered for this installation. This template is useful if you will be installing Private Cloud again with the same databases, as the template will populate the fields here automatically. Note that the user password information is not saved in the template.
Click Next to start the installation.
Installation Progress page appears.
Click Next after the installation is complete. A summary
message with a link to Launch CDP appears.
- Click Launch CDP to launch your CDP Private Cloud Experiences.
- Log in using the default user name and password
- In the Welcome to CDP Private Cloud page, click Change Password to change the Local Administrator Account password.
- Set up external authentication using the URL of the LDAP server and a CA certificate of your secure LDAP. Follow the instructions on the Welcome to CDP Private Cloud page to complete this step.
- Click Test Connection to ensure that you can connect to the configured LDAP server.
- Register a CDP Private Cloud Experiences environment.
- Create your first Virtual Warehouse in the CDW Experiences and/or Provision an ML Workspace in the CML Experiences.