Skip to content

Latest commit

 

History

History
117 lines (76 loc) · 6.41 KB

configure_administrative_access.md

File metadata and controls

117 lines (76 loc) · 6.41 KB

Configure Administrative Access

There are several operations which configure administrative access to different parts of the system. Ensuring that the cray CLI can be used with administrative credentials enables use of many management services via commands. The management nodes can be locked from accidental manipulation by the cray power (or cray capmc) and cray fas commands when the intent is to work on the entire system except the management nodes. The cray scsd command can change the SSH keys, NTP server, syslog server, and BMC/controller passwords.

Topics

  1. Configure the Cray command line interface
  2. Set Management role on the BMCs of management nodes
  3. Lock management nodes
  4. Configure BMC and controller parameters with SCSD
  5. Configure non-compute nodes with CFS
  6. Proceed to next topic

NOTE The procedures in this section of installation documentation are intended to be done in order, even though the topics are administrative or operational procedures. The topics themselves do not have navigational links to the next topic in the sequence.

1. Configure the Cray command line interface

The cray command line interface (CLI) is a framework created to integrate all of the system management REST APIs into easily usable commands.

Later procedures in the installation workflow use the cray command to interact with multiple services. The cray CLI configuration needs to be initialized for the Linux account. The Keycloak user who initializes the CLI configuration needs to be authorized for administrative actions.

There are two options to proceed with cray CLI authentication:

Automatic configuration using temporary Keycloak account

Configure all NCNs with a temporary Keycloak account for the duration of the install.

See Configure All NCNs With Temporary Keycloak User.

Manual configuration

Manually configure the cray CLI with a valid Keycloak account using the following steps:

  1. Configure Keycloak account

    Upcoming steps in the installation workflow require an account to be configured in Keycloak for authentication. This can be either a local Keycloak account or an external Identity Provider (IdP), such as LDAP. Having an account in Keycloak with administrative credentials enables the use of many management services via the cray command.

    See Configure Keycloak Account.

  2. Initialize and authorize the cray CLI on each NCN being used.

    See Single User Already Configured in Keycloak.

2. Set Management role on the BMCs of management nodes

The BMCs that control management nodes will not have been marked with the Management role in HSM. It is important to mark them with the Management role so that they can be easily included in the locking/unlocking operations required as protections for FAS and PCS/CAPMC actions.

Set BMC Management roles now!

See Set BMC Management Role.

3. Lock management nodes

The management nodes are unlocked at this point in the installation. Locking the management nodes and their BMCs will prevent actions from FAS to update their firmware or PCS/CAPMC to power off or do a power reset. Doing any of these by accident will take down a management node. If the management node is a Kubernetes master or worker node, this can have serious negative effects on system operation.

If a single node is taken down by mistake, it is possible that things will recover. However, if all management nodes are taken down, or all Kubernetes worker nodes are taken down by mistake, the system is dead and has to be completely restarted.

Lock the management nodes now!

(ncn-mw#) Run the lock_management_nodes.py script to lock all management nodes and their BMCs that are not already locked:

/opt/cray/csm/scripts/admin_access/lock_management_nodes.py

The return value of the script is 0 if locking was successful. Otherwise, a non-zero return means that manual intervention may be needed to lock the nodes and their BMCs.

For more information about locking and unlocking nodes, see Lock and Unlock Nodes.

4. Configure BMC and controller parameters with SCSD

NOTE If there are no liquid-cooled cabinets present in the HPE Cray EX system, then this step can be skipped.

The System Configuration Service (SCSD) allows administrators to set various BMC and controller parameters for components in liquid-cooled cabinets. At this point in the install, SCSD should be used to set the SSH key in the node controllers (BMCs) to enable troubleshooting. If any of the nodes fail to power down or power up as part of the compute node booting process, it may be necessary to look at the logs on the BMC for node power down or node power up.

See Configure BMC and Controller Parameters with SCSD.

5. Configure non-compute nodes with CFS

Non-compute Nodes (NCN) need to be configured after booting for administrative access, security, and other purposes. The Configuration Framework Service (CFS) is used to apply post-boot configuration in a decoupled, layered manner. Individual software products including CSM provide one or more layers of configuration in a process called "NCN personalization".

See Configure Non-Compute Nodes with CFS.

6. Proceed to next topic

After completing the operational procedures above which configure administrative access, the next step is to validate the health of management nodes and CSM services.

See Validate CSM Health.