You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-baremetal-functions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ This article describes how to perform lifecycle management operations on bare me
26
26
-**Replace the BMM**
27
27
28
28
> [!IMPORTANT]
29
-
> Disruptive command requests against a Kubernetes Control Plane (KCP) node are rejected if there is another disruptive action command already running against another KCP node or if the full KCP is not available. This check is done to maintain the integrity of the Nexus instance and ensure multiple KCP nodes don't go down at once due to simultaneous disruptive actions. If multiple nodes go down, it will break the healthy quorum threshold of the Kubernetes Control Plane.
29
+
> Disruptive command requests against a Kubernetes Control Plane (KCP) node are rejected if there is another disruptive action command already running against another KCP node or if the full KCP is not available. This check is done to maintain the integrity of the Nexus instance and ensure multiple KCP nodes don't become non-operational at once due to simultaneous disruptive actions. If multiple nodes become non-operational, it will break the healthy quorum threshold of the Kubernetes Control Plane.
30
30
>
31
31
> The bolded actions in the above list are considered disruptive (Power off, Restart, Reimage, Replace). Cordon without evacuate is not considered disruptive. Cordon with evacuate is considered disruptive.
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-baremetal-nexusctl.md
+17-12Lines changed: 17 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,17 +18,18 @@ run simple actions on bare metal machines without using the Azure console or com
18
18
> Do not perform any action against management servers without first consulting with Microsoft support personnel. Doing so could affect the integrity of the Operator Nexus Cluster.
19
19
20
20
> [!IMPORTANT]
21
-
> Disruptive command requests against a Kubernetes Control Plane (KCP) node are rejected if there is another disruptive action command already running against another KCP node or if the full KCP is not available. This check is done to maintain the integrity of the Nexus instance and ensure multiple KCP nodes don't go down at once due to simultaneous disruptive actions. If multiple nodes go down, it will break the healthy quorum threshold of the Kubernetes Control Plane.
21
+
> Disruptive command requests against a Kubernetes Control Plane (KCP) node are rejected if there is another disruptive action command already running against another KCP node or if the full KCP is not available. This check is done to maintain the integrity of the Nexus instance and ensure multiple KCP nodes don't become non-operational at once due to simultaneous disruptive actions. If multiple nodes become non-operational, it will break the healthy quorum threshold of the Kubernetes Control Plane.
22
22
>
23
23
> Powering off a KCP node is the only nexusctl action considered disruptive in the context of this check.
24
24
25
25
## Prerequisites
26
26
27
-
1. Create a [BareMetalMachineKeySet](./howto-baremetal-bmm-ssh.md) to allow ssh access to the bare metal machines.
27
+
1. Create a [BareMetalMachineKeySet](./howto-baremetal-bmm-ssh.md) to allow ssh access to the bare metal machines. The user must have superuser privilege level.
28
+
1. The platform Kubernetes must be up and running on site.
28
29
29
30
## Overview
30
31
31
-
`nexusctl` is a stand-alone program that can be run using `nc-toolbox` from an `ssh` session on any management node. Since `nexusctl` is contained in the `nc-toolbox-breakglass` container image and isn't installed directly on the host, it must be run with a command-line like:
32
+
`nexusctl` is a stand-alone program that can be run using `nc-toolbox` from an `ssh` session on any control-plane or management-plane node. Since `nexusctl` is contained in the `nc-toolbox-breakglass` container image and isn't installed directly on the host, it must be run with a command-line like:
@@ -64,7 +69,7 @@ The status is blank until the operation completes and reaches either a "succeede
64
69
65
70
## Start a bare metal machine
66
71
67
-
A single bare metal machine can be started from a power-off state by connecting to a management node via ssh and running the command:
72
+
A single bare metal machine can be started from a power-off state by connecting to a control-plane or management-plane node via ssh and running the command:
@@ -80,19 +85,19 @@ The status is blank until the operation completes and reaches either a "succeede
80
85
81
86
## Unmanage a bare metal machine (set to unmanaged state)
82
87
83
-
A single bare metal machine can be moved from a managed state to an unmanaged state by connecting to a management node via ssh and running the command:
88
+
A single bare metal machine can be moved from a managed state to an unmanaged state by connecting to a control-plane or management-plane node via ssh and running the command:
While in an unmanaged state, no actions are permitted for that machine, except for returning it to a managed state (see next section).
94
+
While in an unmanaged state, no actions are permitted for that machine, except for returning it to a managed state (see next section). This can be used to keep a bare metal machine powered off in the instance it's caught in a rebooting crash loop.
90
95
91
96
`unmanage` isn't a long-running command, so there's no associated command to check operation status.
92
97
93
98
## Manage a bare metal machine (set to managed state)
94
99
95
-
A single bare metal machine can be moved from an unmanaged state to a managed state by connecting to a management node via ssh and running the command:
100
+
A single bare metal machine can be moved from an unmanaged state to a managed state by connecting to a control-plane or management-plane node via ssh and running the command:
The current user accounts on the storage appliance can be listed by connecting to a management node via ssh and running the command:
140
+
The current user accounts on the storage appliance can be listed by connecting to a control-plane or management-plane node via ssh and running the command:
136
141
137
142
```
138
143
sudo nc-toolbox nc-toolbox-breakglass nexusctl storage users get
139
144
```
140
145
141
146
## Rotate passwords for users on storage appliances
142
147
143
-
Passwords can be rotated for users on the Pure storage appliance by connecting to a management node via ssh and running the command:
148
+
Passwords can be rotated for users on the Pure storage appliance by connecting to a control-plane or management-plane node via ssh and running the command:
0 commit comments