You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/nw-sriov-configuring-device.adoc
+11-3Lines changed: 11 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,10 +27,10 @@ You can configure an SR-IOV network device by creating a SriovNetworkNodePolicy
27
27
When applying the configuration specified in a `SriovNetworkNodePolicy` object, the SR-IOV Operator might drain the nodes, and in some cases, reboot nodes.
28
28
Reboot only happens in the following cases:
29
29
30
-
* With Mellanox NICs (`mlx5` driver) a node reboot happens every time the number of virtual functions (VFs) increase on a physical function (PF).
30
+
* With Mellanox NICs (`mlx5` driver) a node reboot happens every time the number of virtual functions (VFs) increase on a physical function (PF).
31
31
* With Intel NICs, a reboot only happens if the kernel parameters do not include `intel_iommu=on` and `iommu=pt`.
32
32
33
-
It might take several minutes for a configuration change to apply.
33
+
It might take several minutes for a configuration change to apply.
34
34
=====
35
35
36
36
.Prerequisites
@@ -68,6 +68,8 @@ spec:
68
68
deviceType: vfio-pci <13>
69
69
isRdma: false <14>
70
70
----
71
+
+
72
+
--
71
73
<1> Specify a name for the CR object.
72
74
<2> Specify the namespace where the SR-IOV Operator is installed.
73
75
<3> Specify the resource name of the SR-IOV device plugin. You can create multiple `SriovNetworkNodePolicy` objects for a resource name.
@@ -77,8 +79,13 @@ Container Network Interface (CNI) plugin and device plugin are deployed only on
77
79
<5> Optional: Specify an integer value between `0` and `99`. A smaller number gets higher priority, so a priority of `10` is higher than a priority of `99`. The default value is `99`.
78
80
<6> Optional: Specify a value for the maximum transmission unit (MTU) of the virtual function. The maximum MTU value can vary for different NIC models.
79
81
<7> Specify the number of the virtual functions (VF) to create for the SR-IOV physical network device. For an Intel network interface controller (NIC), the number of VFs cannot be larger than the total VFs supported by the device. For a Mellanox NIC, the number of VFs cannot be larger than `127`.
80
-
<8> The `nicSelector` mapping selects the Ethernet device for the Operator to configure. You do not need to specify values for all the parameters. It is recommended to identify the Ethernet adapter with enough precision to minimize the possibility of selecting an Ethernet device unintentionally.
82
+
<8> The `nicSelector` mapping selects the Ethernet device for the Operator to configure. You do not need to specify values for all the parameters.
83
+
+
84
+
[NOTE]
85
+
====
86
+
It is recommended to identify the Ethernet adapter with enough precision to minimize the possibility of selecting an Ethernet device unintentionally.
81
87
If you specify `rootDevices`, you must also specify a value for `vendor`, `deviceID`, or `pfNames`.
88
+
====
82
89
If you specify both `pfNames` and `rootDevices` at the same time, ensure that they point to an identical device.
83
90
<9> Optional: Specify the vendor hex code of the SR-IOV network device. The only allowed values are either `8086` or `15b3`.
84
91
<10> Optional: Specify the device hex code of SR-IOV network device. The only allowed values are `158b`, `1015`, `1017`.
@@ -92,6 +99,7 @@ If you specify both `pfNames` and `rootDevices` at the same time, ensure that th
92
99
If `isRDMA` flag is set to `true`, you can continue to use the RDMA enabled VF as a normal network device.
93
100
A device can be used in either mode.
94
101
====
102
+
--
95
103
endif::virt-sriov[]
96
104
97
105
. Optional: Label the SR-IOV capable cluster nodes with `SriovNetworkNodePolicy.Spec.NodeSelector` if they are not already labeled. For more information about labeling nodes, see "Understanding how to update labels on nodes".
* There is no change to how you access VMs by using the `virtctl` CLI tool or the {product-title} web console.
45
45
* You can expose VMs by using a `NodePort` or `LoadBalancer` service.
46
-
** The load balancer approach is preferable because {product-title} automatically creates the load balancer in AWS and manages its lifecycle. A security group is also created for the load balancer, and you can use annotations to attach existing security groups. When you remove the service, {product-title} removes the load balancer and its associated resources.
46
+
+
47
+
[NOTE]
48
+
====
49
+
The load balancer approach is preferable because {product-title} automatically creates the load balancer in AWS and manages its lifecycle. A security group is also created for the load balancer, and you can use annotations to attach existing security groups. When you remove the service, {product-title} removes the load balancer and its associated resources.
Copy file name to clipboardExpand all lines: modules/virt-vm-storage-volume-types.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,11 +33,11 @@ Specify `type: dataVolume` or `type: ""`. If you specify any other value for `ty
33
33
34
34
A `containerDisk` volume is not limited to a single virtual machine and is useful for creating large numbers of virtual machine clones that do not require persistent storage.
35
35
36
-
Only RAW and QCOW2 formats are supported disk types for the container image registry. QCOW2 is recommended for reduced image size.
37
-
38
36
[NOTE]
39
37
====
40
-
A `containerDisk` volume is ephemeral. It is discarded when the virtual machine is stopped, restarted, or deleted. A `containerDisk` volume is useful for read-only file systems such as CD-ROMs or for disposable virtual machines.
38
+
* Only RAW and QCOW2 formats are supported disk types for the container image registry. QCOW2 is recommended for reduced image size.
39
+
40
+
* A `containerDisk` volume is ephemeral. It is discarded when the virtual machine is stopped, restarted, or deleted. A `containerDisk` volume is useful for read-only file systems such as CD-ROMs or for disposable virtual machines.
Copy file name to clipboardExpand all lines: modules/ztp-talo-integration.adoc
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,10 +34,13 @@ All CRs in the same policy must have the same setting for the `ztp-deploy-wave`
34
34
+
35
35
The {cgu-operator} applies the configuration policies in the order specified by the wave annotations. The {cgu-operator} waits for each policy to be compliant before moving to the next policy. It is important to ensure that the wave annotation for each CR takes into account any prerequisites for those CRs to be applied to the cluster. For example, an Operator must be installed before or concurrently with the configuration for the Operator. Similarly, the `CatalogSource` for an Operator must be installed in a wave before or concurrently with the Operator Subscription. The default wave value for each CR takes these prerequisites into account.
36
36
+
37
+
[NOTE]
38
+
====
37
39
Multiple CRs and policies can share the same wave number. Having fewer policies can result in faster deployments and lower CPU usage. It is a best practice to group many CRs into relatively few waves.
38
-
40
+
====
41
+
+
39
42
To check the default wave value in each source CR, run the following command against the `out/source-crs` directory that is extracted from the `ztp-site-generate` container image:
// the following section is in the assembly for xref reasons
41
41
Cloud platforms::
@@ -299,7 +299,11 @@ The default xref:../../virt/live_migration/virt-configuring-live-migration.adoc#
299
299
====
300
300
301
301
* If the virtual machine uses a host model CPU, the nodes must support the virtual machine's host model CPU.
302
-
* A xref:../../virt/vm_networking/virt-dedicated-network-live-migration.adoc#virt-dedicated-network-live-migration[dedicated Multus network] for live migration is highly recommended. A dedicated network minimizes the effects of network saturation on tenant workloads during migration.
302
+
303
+
[NOTE]
304
+
====
305
+
A xref:../../virt/vm_networking/virt-dedicated-network-live-migration.adoc#virt-dedicated-network-live-migration[dedicated Multus network] for live migration is highly recommended. A dedicated network minimizes the effects of network saturation on tenant workloads during migration.
@@ -338,7 +342,7 @@ Currently, IPI is not supported on {ibm-z-name}.
338
342
====
339
343
340
344
* Automatic high availability for both IPI and non-IPI is available by using the *Node Health Check Operator* on the {product-title} cluster to deploy the `NodeHealthCheck` controller. The controller identifies unhealthy nodes and uses a remediation provider, such as the Self Node Remediation Operator or Fence Agents Remediation Operator, to remediate the unhealthy nodes. For more information on remediation, fencing, and maintaining nodes, see the link:https://access.redhat.com/documentation/en-us/workload_availability_for_red_hat_openshift[Workload Availability for Red Hat OpenShift] documentation.
341
-
345
+
+
342
346
[NOTE]
343
347
====
344
348
Fence Agents Remediation uses supported fencing agents to reset failed nodes faster than the Self Node Remediation Operator. This improves overall virtual machine high availability. For more information, see the link:https://access.redhat.com/articles/7057929[OpenShift Virtualization - Fencing and VM High Availability Guide] knowledgebase article.
You can create a service for a virtual machine (VM) and connect to the IP address and port exposed by the service.
104
104
105
+
[NOTE]
106
+
====
105
107
Services provide excellent performance and are recommended for applications that are accessed from outside the cluster or within the cluster. Ingress traffic is protected by firewalls.
108
+
====
106
109
107
110
If the cluster network cannot handle the traffic load, consider using a secondary network for VM access.
0 commit comments