@@ -397,11 +397,94 @@ Terminal Server has been deployed and configured as follows:
397
397
- puretune -set PS_RDMA_STALE_OP_THRESH_MS 5000 "PURE-209441";
398
398
- puretune -set PS_BDRV_REQ_MAXBUFS 128 "PURE-209441";
399
399
400
+ ## iDRAC IP Assignment
401
+
402
+ Before deploying AODS software, it’s best for the Operator to set the iDRAC IPs while organizing the hardware racks. Here’s how to map servers to IPs:
403
+
404
+ - Assign IPs based on each server’s position within the rack.
405
+ - Use the fourth /24 block from the /19 subnet allocated for fabric.
406
+ - Start assigning IPs from the bottom server upwards in each rack, beginning with .11.
407
+ - Continue to assign IPs in sequence to the first server at the bottom of the subsequent rack.
408
+
409
+ ### Example
410
+
411
+ Fabric range: 10.1.0.0-10.1.31.255 – iDRAC subnet at fourth /24 is 10.1.3.0/24
412
+
413
+ | Rack | Server | iDRAC IP |
414
+ |--------|---------------|---------------|
415
+ | Rack 1 | Worker 1 | 10.1.3.11/24 |
416
+ | Rack 1 | Worker 2 | 10.1.3.12/24 |
417
+ | Rack 1 | Worker 3 | 10.1.3.13/24 |
418
+ | Rack 1 | Worker 4 | 10.1.3.14/24 |
419
+ | Rack 1 | Worker 5 | 10.1.3.15/24 |
420
+ | Rack 1 | Worker 6 | 10.1.3.16/24 |
421
+ | Rack 1 | Worker 7 | 10.1.3.17/24 |
422
+ | Rack 1 | Worker 8 | 10.1.3.18/24 |
423
+ | Rack 1 | Controller 1 | 10.1.3.19/24 |
424
+ | Rack 1 | Controller 2 | 10.1.3.20/24 |
425
+ | Rack 2 | Worker 1 | 10.1.3.21/24 |
426
+ | Rack 2 | Worker 2 | 10.1.3.22/24 |
427
+ | Rack 2 | Worker 3 | 10.1.3.23/24 |
428
+ | Rack 2 | Worker 4 | 10.1.3.24/24 |
429
+ | Rack 2 | Worker 5 | 10.1.3.25/24 |
430
+ | Rack 2 | Worker 6 | 10.1.3.26/24 |
431
+ | Rack 2 | Worker 7 | 10.1.3.27/24 |
432
+ | Rack 2 | Worker 8 | 10.1.3.28/24 |
433
+ | Rack 2 | Controller 1 | 10.1.3.29/24 |
434
+ | Rack 2 | Controller 2 | 10.1.3.30/24 |
435
+ | Rack 3 | Worker 1 | 10.1.3.31/24 |
436
+ | Rack 3 | Worker 2 | 10.1.3.32/24 |
437
+ | Rack 3 | Worker 3 | 10.1.3.33/24 |
438
+ | Rack 3 | Worker 4 | 10.1.3.34/24 |
439
+ | Rack 3 | Worker 5 | 10.1.3.35/24 |
440
+ | Rack 3 | Worker 6 | 10.1.3.36/24 |
441
+ | Rack 3 | Worker 7 | 10.1.3.37/24 |
442
+ | Rack 3 | Worker 8 | 10.1.3.38/24 |
443
+ | Rack 3 | Controller 1 | 10.1.3.39/24 |
444
+ | Rack 3 | Controller 2 | 10.1.3.40/24 |
445
+ | Rack 4 | Worker 1 | 10.1.3.41/24 |
446
+ | Rack 4 | Worker 2 | 10.1.3.42/24 |
447
+ | Rack 4 | Worker 3 | 10.1.3.43/24 |
448
+ | Rack 4 | Worker 4 | 10.1.3.44/24 |
449
+ | Rack 4 | Worker 5 | 10.1.3.45/24 |
450
+ | Rack 4 | Worker 6 | 10.1.3.46/24 |
451
+ | Rack 4 | Worker 7 | 10.1.3.47/24 |
452
+ | Rack 4 | Worker 8 | 10.1.3.48/24 |
453
+ | Rack 4 | Controller 1 | 10.1.3.49/24 |
454
+ | Rack 4 | Controller 2 | 10.1.3.50/24 |
455
+
456
+ An example design of three instances using sequential /19 networks in a /16:
457
+
458
+ | Instance | Fabric Range | iDRAC subnet |
459
+ |------------|-------------------------|--------------|
460
+ | Instance 1 | 10.1.0.0-10.1.31.255 | 10.1.3.0/24 |
461
+ | Instance 2 | 10.1.32.0-10.1.63.255 | 10.1.35.0/24 |
462
+ | Instance 3 | 10.1.64.0-10.1.95.255 | 10.1.67.0/24 |
463
+
400
464
### Default setup for other devices installed
401
465
402
466
- All network fabric devices (except for the Terminal Server) are set to `ZTP` mode
403
467
- Servers have default factory settings
404
468
469
+ ## Firewall rules between Azure to undercloud.
470
+
471
+ To establish firewall rules between Azure and the undercloud, the Operator must open the specified ports. This ensures proper communication and connectivity for required services.
472
+
473
+
474
+ | S.No | Source | Destination | Port (TCP/UDP) | Bidirectional | Rule Purpose |
475
+ |------|------------------------|-----------------------|-----------------|----------------|----------------------------------------------------------|
476
+ | 1 | Azure virtual Network | Undercloud | 22 TCP | No | For SSH to undercloud servers from CM subnet |
477
+ | 2 | Azure virtual Network | Undercloud | 443 TCP | No | For accessing undercloud nodes iDRAC |
478
+ | 3 | Azure virtual Network | Undercloud | 5900 TCP | No | Gnmi |
479
+ | 4 | Azure virtual Network | Undercloud | 6030 TCP | No | Gnmi Certs |
480
+ | 5 | Azure virtual Network | Undercloud | 6443 TCP | No | For accessing undercloud K8S cluster |
481
+ | 6 | Undercloud | Azure virtual Network | 8080 TCP | Yes | For mounting ISO image into iDRAC and NNF runtime upgrade|
482
+ | 7 | Undercloud | Azure virtual Network | 3128 TCP | No | Proxy to connect to public Azure endpoints |
483
+ | 8 | Undercloud | Azure virtual Network | 53 TCP and UDP | No | DNS |
484
+ | 9 | Undercloud | Azure virtual Network | 123 UDP | No | NTP |
485
+ | 10 | Undercloud | Azure virtual Network | 8888 TCP | No | For connecting to Cluster Manager webservice |
486
+ | 11 | Undercloud | Azure virtual Network | 514 TCP and UDP | No | For accessing undercloud logs from Cluster Manager |
487
+
405
488
## Install CLI extensions and sign-in to your Azure subscription
406
489
407
490
Install latest version of the
0 commit comments