You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/guides/external-mgs/readme.md
+39-1Lines changed: 39 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,6 +17,7 @@ These three methods are not mutually exclusive on the system as a whole. Individ
17
17
18
18
## Configuration with an External MGT
19
19
20
+
### Storage Profile
20
21
An existing MGT external to the NNF cluster can be used to manage the Lustre file systems on the NNF nodes. An advantage to this configuration is that the MGT can be highly available through multiple MGSs. A disadvantage is that there is only a single MGT. An MGT shared between more than a handful of Lustre file systems is not a common use case, so the Lustre code may prove less stable.
21
22
22
23
The following yaml provides an example of what the `NnfStorageProfile` should contain to use an MGT on an external server.
@@ -30,12 +31,49 @@ metadata:
30
31
data:
31
32
[...]
32
33
lustreStorage:
33
-
externalMgs: 1.2.3.4@eth0
34
+
externalMgs: 1.2.3.4@eth0:1.2.3.5@eth0
34
35
combinedMgtMdt: false
35
36
standaloneMgtPoolName: ""
36
37
[...]
37
38
```
38
39
40
+
### NnfLustreMGT
41
+
42
+
A `NnfLustreMGT` resource tracks which fsnames have been used on the MGT to prevent fsname re-use. Any Lustre file systems that are created through the NNF software will request an fsname to use from a `NnfLustreMGT` resource. Every MGT must have a corresponding `NnfLustreMGT` resource. For MGTs that are hosted on NNF hardware, the `NnfLustreMGT` resources are created automatically. The NNF software also erases any unused fsnames from the MGT disk for any internally hosted MGTs.
43
+
44
+
For a MGT hosted on an external node, an admin must create an `NnfLustreMGT` resource. This resource ensures that fsnames will be created in a sequential order without any fsname re-use. However, after an fsname is no longer in use by a file system, it will not be erased from the MGT disk. An admin may decide to periodically run the `lctl erase_lcfg [fsname]` command to remove fsnames that are no longer in use.
45
+
46
+
Below is an example `NnfLustreMGT` resource. The `NnfLustreMGT` resource for external MGSs must be created in the `nnf-system` namespace.
47
+
48
+
```yaml
49
+
apiVersion: nnf.cray.hpe.com/v1alpha1
50
+
kind: NnfLustreMGT
51
+
metadata:
52
+
name: external-mgt
53
+
namespace: nnf-system
54
+
spec:
55
+
addresses:
56
+
- "1.2.3.4@eth0:1.2.3.5@eth0"
57
+
fsNameStart: "aaaaaaaa"
58
+
fsNameBlackList:
59
+
- "mylustre"
60
+
fsNameStartReference:
61
+
name: external-mgt
62
+
namespace: default
63
+
kind: ConfigMap
64
+
```
65
+
66
+
* `addresses` - This is a list of LNet addresses that could be used for this MGT. This should match any values that are used in the `externalMgs` field in the `NnfStorageProfiles`.
67
+
* `fsNameStart` - The first fsname to use. Subsequent fsnames will be incremented based on this starting fsname (e.g, `aaaaaaaa`, `aaaaaaab`, `aaaaaaac`). fsnames use lowercase letters `'a'`-`'z'`. `fsNameStart` should be exactly 8 characters long.
68
+
* `fsNameBlackList` - This is a list of fsnames that should not be given to any NNF Lustre file systems. If the MGT is hosting any non-NNF Lustre file systems, their fsnames should be included in this blacklist.
69
+
* `fsNameStartReference` - This is an optional `ObjectReference` to a `ConfigMap` that holds a starting fsname. If this field is specified, it takes precedence over the `fsNameStart` field in the spec. The `ConfigMap` will be updated to the next available fsname every time an fsname is assigned to a new Lustre file system.
70
+
71
+
### ConfigMap
72
+
73
+
For external MGTs, the `fsNameStartReference` should be used to point to a `ConfigMap` in the `default` namespace. The `ConfigMap` should be left empty initially. The `ConfigMap` is used to hold the value of the next available fsname, and it should not be deleted or modified while a `NnfLustreMGT` resource is referencing it. Removing the `ConfigMap` will cause the Rabbit software to lose track of which fsnames have already been used on the MGT. This is undesireable unless the external MGT is no longer being used by Rabbit software or if an admin has erased all previously used fsnames with the `lctl erase_lcfg [fsname]` command.
74
+
75
+
When using the `ConfigMap`, the nnf-sos software may be undeployed and redeployed without losing track of the next fsname value. During an undeploy, the `NnfLustreMGT` resource will be removed. During a deploy, the `NnfLustreMGT` resource will read the fsname value from the `ConfigMap` if it is present. The value in the `ConfigMap` will override the fsname in the `fsNameStart` field.
76
+
39
77
## Configuration with Persistent Lustre
40
78
41
79
The MGT from a persistent Lustre file system hosted on the NNF nodes can also be used as the MGT for other NNF Lustre file systems. This configuration has the advantage of not relying on any hardware outside of the cluster. However, there is no high availability, and a single MGT is still shared between all Lustre file systems created on the cluster.
Copy file name to clipboardExpand all lines: docs/guides/node-management/drain.md
+62-4Lines changed: 62 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,40 @@
1
-
# Draining A Node
1
+
# Disable Or Drain A Node
2
+
3
+
## Disabling a node
4
+
5
+
A Rabbit node can be manually disabled, indicating to the WLM that it should not schedule more jobs on the node. Jobs currently on the node will be allowed to complete at the discretion of the WLM.
6
+
7
+
Disable a node by setting its Storage state to `Disabled`.
The NNF software consists of a collection of DaemonSets and Deployments. The pods
4
40
on the Rabbit nodes are usually from DaemonSets. Because of this, the `kubectl drain`
@@ -9,7 +45,11 @@ Given the limitations of DaemonSets, the NNF software will be drained by using t
9
45
as described in
10
46
[Taints and Tolerations](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/).
11
47
12
-
## Drain NNF Pods From A Rabbit Node
48
+
This would be used only after the WLM jobs have been removed from that Rabbit (preferably) and there is some reason to also remove the NNF software from it. This might be used before a Rabbit is powered off and pulled out of the cabinet, for example, to avoid leaving pods in "Terminating" state (harmless, but it's noise).
49
+
50
+
If an admin used this taint before power-off it would mean there wouldn't be "Terminating" pods lying around for that Rabbit. After a new/same Rabbit is put back in its place, the NNF software won't jump back on it while the taint is present. The taint can be removed at any time, from immediately after the node is powered off up to some time after the new/same Rabbit is powered back on.
51
+
52
+
### Drain NNF pods from a rabbit node
13
53
14
54
Drain the NNF software from a node by applying the `cray.nnf.node.drain` taint.
15
55
The CSI driver pods will remain on the node to satisfy any unmount requests from k8s
0 commit comments