Skip to content

Commit 3344f3e

Browse files
committed
BZ-2099319: Adding option to perform rolling node restart
1 parent c8ded8a commit 3344f3e

File tree

2 files changed

+21
-5
lines changed

2 files changed

+21
-5
lines changed

authentication/bound-service-account-tokens.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,4 +14,9 @@ include::modules/bound-sa-tokens-about.adoc[leveloffset=+1]
1414
// Configuring bound service account tokens using volume projection
1515
include::modules/bound-sa-tokens-configuring.adoc[leveloffset=+1]
1616

17+
[role="_additional-resources"]
18+
.Additional resources
19+
20+
* xref:../nodes/nodes/nodes-nodes-rebooting.adoc#nodes-nodes-rebooting-gracefully_nodes-nodes-rebooting[Rebooting a node gracefully]
21+
1722
// TODO: Verify distros: openshift-enterprise,openshift-webscale,openshift-origin

modules/bound-sa-tokens-configuring.adoc

Lines changed: 16 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This step is typically not required if the bound tokens are used only within the
2323
====
2424
If you change the service account issuer to a custom one, the previous service account issuer is still trusted for the next 24 hours.
2525

26-
If necessary, you can manually restart all pods in the cluster so that the holder will request a new bound token. Before doing this, wait for a new revision of the Kubernetes API server pods to roll out with your service account issuer changes.
26+
You can force all holders to request a new bound token either by manually restarting all pods in the cluster or by performing a rolling node restart. Before performing either action, wait for a new revision of the Kubernetes API server pods to roll out with your service account issuer changes.
2727
====
2828

2929
.. Edit the `cluster` `Authentication` object:
@@ -44,9 +44,7 @@ spec:
4444

4545
.. Save the file to apply the changes.
4646

47-
.. Optional: Manually restart all pods in the cluster so that the holder will request a new bound token.
48-
49-
... Wait for a new revision of the Kubernetes API server pods to roll out. It can take several minutes for all nodes to update to the new revision. Run the following command:
47+
.. Wait for a new revision of the Kubernetes API server pods to roll out. It can take several minutes for all nodes to update to the new revision. Run the following command:
5048
+
5149
[source,terminal]
5250
----
@@ -67,13 +65,26 @@ If the output shows a message similar to one of the following messages, the upda
6765
** `3 nodes are at revision 11; 0 nodes have achieved new revision 12`
6866
** `2 nodes are at revision 11; 1 nodes are at revision 12`
6967

70-
... Manually restart all pods in the cluster:
68+
.. Optional: Force the holder to request a new bound token either by performing a rolling node restart or by manually restarting all pods in the cluster.
69+
70+
*** Perform a rolling node restart:
71+
+
72+
[WARNING]
73+
====
74+
It is not recommended to perform a rolling node restart if you have custom workloads running on your cluster, because it can cause a service interruption. Instead, manually restart all pods in the cluster.
75+
====
76+
+
77+
Restart nodes sequentially. Wait for the node to become fully available before restarting the next node. See _Rebooting a node gracefully_ for instructions on how to drain, restart, and mark a node as schedulable again.
78+
79+
*** Manually restart all pods in the cluster:
7180
+
7281
[WARNING]
7382
====
7483
Be aware that running this command causes a service interruption, because it deletes every running pod in every namespace. These pods will automatically restart after they are deleted.
7584
====
7685
+
86+
Run the following command:
87+
+
7788
[source,terminal]
7889
----
7990
$ for I in $(oc get ns -o jsonpath='{range .items[*]} {.metadata.name}{"\n"} {end}'); \

0 commit comments

Comments
 (0)