There are several operations which configure administrative access to different parts of the system.
Ensuring that the cray
CLI can be used with administrative credentials enables use of many management
services via commands. The management nodes can be locked from accidental manipulation by the
cray power
(or cray capmc
) and cray fas
commands when the intent is to work on the entire system
except the management nodes. The cray scsd
command can change the SSH keys, NTP server, syslog
server,
and BMC/controller passwords.
- Configure the Cray command line interface
- Set
Management
role on the BMCs of management nodes - Lock management nodes
- Configure BMC and controller parameters with SCSD
- Configure non-compute nodes with CFS
- Proceed to next topic
NOTE
The procedures in this section of installation documentation are intended to be done in order, even though the topics are administrative or operational procedures. The topics themselves do not have navigational links to the next topic in the sequence.
The cray
command line interface (CLI) is a framework created to integrate all of the system management REST
APIs into easily usable commands.
Later procedures in the installation workflow use the cray
command to interact with multiple services.
The cray
CLI configuration needs to be initialized for the Linux account. The Keycloak user who initializes the
CLI configuration needs to be authorized for administrative actions.
There are two options to proceed with cray
CLI authentication:
- Automatic configuration using temporary Keycloak account
- [Manual configuration](#manual configuration)
Configure all NCNs with a temporary Keycloak account for the duration of the install.
See Configure All NCNs With Temporary Keycloak User.
Manually configure the cray
CLI with a valid Keycloak account using the following steps:
-
Configure Keycloak account
Upcoming steps in the installation workflow require an account to be configured in Keycloak for authentication. This can be either a local Keycloak account or an external Identity Provider (IdP), such as LDAP. Having an account in Keycloak with administrative credentials enables the use of many management services via the
cray
command. -
Initialize and authorize the
cray
CLI on each NCN being used.
The BMCs that control management nodes will not have been marked with the Management
role in HSM. It is important
to mark them with the Management
role so that they can be easily included in the locking/unlocking operations required
as protections for FAS and PCS/CAPMC actions.
Set BMC Management
roles now!
The management nodes are unlocked at this point in the installation. Locking the management nodes and their BMCs will prevent actions from FAS to update their firmware or PCS/CAPMC to power off or do a power reset. Doing any of these by accident will take down a management node. If the management node is a Kubernetes master or worker node, this can have serious negative effects on system operation.
If a single node is taken down by mistake, it is possible that things will recover. However, if all management nodes are taken down, or all Kubernetes worker nodes are taken down by mistake, the system is dead and has to be completely restarted.
Lock the management nodes now!
(ncn-mw#
) Run the lock_management_nodes.py
script to lock all management nodes and their BMCs that are not already locked:
/opt/cray/csm/scripts/admin_access/lock_management_nodes.py
The return value of the script is 0 if locking was successful. Otherwise, a non-zero return means that manual intervention may be needed to lock the nodes and their BMCs.
For more information about locking and unlocking nodes, see Lock and Unlock Nodes.
NOTE
If there are no liquid-cooled cabinets present in the HPE Cray EX system, then this step can be skipped.
The System Configuration Service (SCSD) allows administrators to set various BMC and controller parameters for components in liquid-cooled cabinets. At this point in the install, SCSD should be used to set the SSH key in the node controllers (BMCs) to enable troubleshooting. If any of the nodes fail to power down or power up as part of the compute node booting process, it may be necessary to look at the logs on the BMC for node power down or node power up.
See Configure BMC and Controller Parameters with SCSD.
Non-compute Nodes (NCN) need to be configured after booting for administrative access, security, and other purposes. The Configuration Framework Service (CFS) is used to apply post-boot configuration in a decoupled, layered manner. Individual software products including CSM provide one or more layers of configuration in a process called "NCN personalization".
See Configure Non-Compute Nodes with CFS.
After completing the operational procedures above which configure administrative access, the next step is to validate the health of management nodes and CSM services.
See Validate CSM Health.