Prepare an environment to install OMT

On this page

Before you install OPTIC Management Toolkit (OMT), configure your environment by completing the following tasks.

Prepare to deploy the embedded Kubernetes

Make sure your cluster meets the requirements for OMT’s embedded Kubernetes.

TaskRequired?DescriptionDetailed steps
Enable a regular user to install OMTOptionalRequired only if installing OMT as a non-root user.Enable a regular user to install OMT
Update the system configurationMandatoryConfigure system settings, including:
• Localhost resolution (127.0.0.1)
• System parameters
• Disabled swap space
• Required Linux packages
• SSH connectivity
• Hostname consistency
• Time synchronization

A script is available to automate this.
Make required system configurations
Check the firewall settingsMandatory (if you’ve set a firewall)Make sure your firewall rules meet OMT’s requirements.Check the firewall settings
Check that the required ports are openMandatoryConfirm all network ports OMT requires for communication are open.Check that the required ports are open
Configure High Availability (HA)OptionalIf you have more than one master node, you can configure HA. You can either use Keepalived (included in OMT) or set up your own load balancer(s).Configure Keepalived for High Availability

Configure an internal load balancer
Configure the install.properties file.OptionalConfigure the installation of the master and worker nodes in the install.properties file. You can alternatively use command options to do this when you run the install command.Configure the install.properties file
Run a preliminary check of the nodesOptionalRun the pre-check.sh script to check node readiness Before installation. This step is optional but highly recommended.Run a preliminary check

Request certificates

Certificates protect network traffic between OMT and external services.

  • Browser > OMT
    The OMT installer will create certificate authorities (CAs) to generate and sign server certificates for the ingress controller. For browsers in your organization to trust OMT, request a server certificate pair (server certificate, key, and CA certificate) from your IT team for OMT’s external hostname.

    For more information, see Request server certificates.

  • OMT > external database
    If you are installing OMT with an external database, connect the database with TLS mode. Request the CA certificate to validate the database server certificate. This is required to configure the config.json file later.
  • OMT > external image registry
    If the registry’s server certificate isn’t trusted at the operating system level, request its CA certificate for validation. The CA certificate is required when you run the install command later.

These certificates are required for OMT installation. Check the application documentation for information about the certificates required by applications.

Set up persistent volumes

If a container stops or restarts, all changes made inside the container are lost. To save information such as configuration files and databases, the information must be stored outside of the container in a persistent volume (PV).

When you install OMT with the embedded Kubernetes, the NFS provisioner capability (enabled by default) creates the required PVs automatically. To use this capability, you must create a single volume on the NFS server. When you run the install command, you will specify the NFS server URL and the path to this volume in command options.

For more information about how to set up persistent volumes, see Set up persistent volumes.

Create external databases

OMT requires an IdM database. By default, the installer deploys an embedded PostgreSQL instance if you don’t specify any database options when you run the install command.

If you want to use your own database instance, see Configure an external database.

Configure log handling

By default, OMT stores logs on an NFS volume (itom-logging-vol). Optionally, you can forward the logs to an external receiver, such as Elasticsearch Server or Splunk. For more information, see Forward application logs to an external receiver.

Configure on-access security scans

On-access scanning (by security products such as McAfee Endpoint Security, Microsoft Defender, or Trend Micro Deep Security Agent) may disrupt installation. To prevent this, exclude certain directories from the scan.

Further information is available in the Security products can't scan files before they're deleted troubleshooting topic.

Prepare a config.json file

Before you run the install command, you must Create and configure a config.json file with all installation parameters. This consolidates decisions from the steps above.