Skip to content

Commit ea5c24b

Browse files
authored
Merge pull request #100781 from sr1kar99/tnf-tp-updates-main
OSDOCS#12987: Fixed issues in TNF docs
2 parents 9f888f6 + cb66444 commit ea5c24b

7 files changed

+23
-9
lines changed

installing/installing_two_node_cluster/installing_tnf/install-post-tnf.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,11 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9+
The following sections help with recovering from issues in a two-node OpenShift cluster with fencing.
10+
11+
:FeatureName: Two-node OpenShift cluster with fencing
12+
include::snippets/technology-preview.adoc[leveloffset=+1]
13+
914
// Manually recovering from a disruption event when automated recovery is unavailable
1015
include::modules/installation-manual-recovering-when-auto-recovery-is-unavail.adoc[leveloffset=+1]
1116

installing/installing_two_node_cluster/installing_tnf/install-tnf.adoc

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,8 @@ toc::[]
88

99
You can deploy a two-node OpenShift cluster with fencing by using either the installer-provisioned infrastructure or the user-provisioned infrastructure installation method. The following examples provide sample `install-config.yaml` configurations for both methods.
1010

11-
[NOTE]
12-
====
13-
Do an etcd backup before proceeding to ensure that you can restore the cluster if any issues occur.
14-
====
11+
:FeatureName: Two-node OpenShift cluster with fencing
12+
include::snippets/technology-preview.adoc[leveloffset=+1]
1513

1614
// Sample install-config.yaml for a two-node installer-provisioned infrastructure cluster with fencing
1715
include::modules/installation-sample-install-config-two-node-fencing-ipi.adoc[leveloffset=+1]

installing/installing_two_node_cluster/installing_tnf/installing-two-node-fencing.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ The two-node OpenShift cluster with fencing requires the following hosts:
3737
|===
3838

3939
The bootstrap and control plane machines must use Red Hat Enterprise Linux CoreOS (RHCOS) as the operating system. For instructions on installing RHCOS and starting the bootstrap process, see xref:../../../installing/installing_bare_metal/upi/installing-bare-metal#creating-machines-bare-metal_installing-bare-metal[Installing RHCOS and starting the {product-title} bootstrap process]
40+
4041
[NOTE]
4142
====
4243
The requirement to use RHCOS applies only to user-provisioned infrastructure deployments. For installer-provisioned infrastructure deployments, the bootstrap and control plane machines are provisioned automatically by the installation program, and you do not need to manually install RHCOS.

modules/installation-manual-recovering-when-auto-recovery-is-unavail.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Review all Pacemaker activity on the node by running the following command:
7373
$ sudo journalctl -u pacemaker
7474
----
7575
+
76-
Diagnose etcd resource startup issues byrunning the following command:
76+
Diagnose etcd resource startup issues by running the following command:
7777
+
7878
[source,terminal]
7979
----

modules/installation-replacing-control-plane-nodes.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ $ sudo OCF_RESKEY_CRM_meta_notify_start_resource='etcd' pcs resource debug-start
9292
+
9393
After recovery, etcd must be running successfully on the survivor node.
9494
95-
. Delete etcd secrets for the failed node by running the following command:
95+
. Delete etcd secrets for the failed node by running the following commands:
9696
+
9797
[source,terminal]
9898
----
@@ -174,7 +174,7 @@ You must perform this step only if you are using installer-provisioned infrastru
174174
For information about replacing a failed bare-metal control plane node, see "Replacing an unhealthy etcd member on bare metal".
175175
====
176176
177-
.. Remove the BMH and `Machine` objects. The Machine controller automatically deletes the node object.
177+
.. Remove the BMH and `Machine` objects. The machine controller automatically deletes the node object.
178178
179179
.. Provision a new machine by using the following sample configuration:
180180
+
@@ -295,7 +295,7 @@ $ oc annotate bmh <bmh_name> -n openshift-machine-api baremetalhost.metal3.io/de
295295
+
296296
[NOTE]
297297
====
298-
Run the following command on the surviving control plane node, not the node being replaced.
298+
Run the following command on the survivor control plane node, not the node being replaced.
299299
====
300300
+
301301
[source,terminal]

modules/installation-sample-install-config-two-node-fencing-ipi.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,11 @@
44

55
You can use the following `install-config.yaml` configuration as a template for deploying a two-node OpenShift cluster with fencing by using the installer-provisioned infrastructure method:
66

7+
[NOTE]
8+
====
9+
Do an etcd backup before proceeding to ensure that you can restore the cluster if any issues occur.
10+
====
11+
712
.Sample `install-config.yaml` configuration
813
[source,yaml]
914
----
@@ -57,7 +62,7 @@ sshKey: '<ssh_public_key>'
5762
* `compute.replicas`: Set this field to `0` because a two-node fencing cluster does not include worker nodes.
5863
* `controlPlane.replicas`: Set this field to `2` for a two-node fencing deployment.
5964
* `fencing.credentials.hostname`: Provide the Baseboard Management Console (BMC) credentials for each control plane node. These credentials are required for node fencing and prevent split-brain scenarios.
60-
* `fencing.credentials.certificateVerification`: Set this field to `Disabled` if your Redfish URL uses self-signed certificates, which is common for internally hosted endpoints. Set this field to `Enabled` for URLs with valid CA-signed certificates.
65+
* `fencing.credentials.certificateVerification`: Set this field to `Disabled` if your Redfish URL uses self-signed certificates, which is common for internally-hosted endpoints. Set this field to `Enabled` for URLs with valid CA-signed certificates.
6166
* `metadata.name`: The cluster name is used as a prefix for hostnames and DNS records.
6267
* `featureSet`: Set this field to `TechPreviewNoUpgrade` to enable two-node OpenShift cluster deployments.
6368
* `platform.baremetal.apiVIPs` and `platform.baremetal.ingressVIPs` : Virtual IPs for the API and Ingress endpoints. Ensure they are reachable by all nodes and external clients.

modules/installation-sample-install-config-two-node-fencing-upi.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,11 @@
44

55
You can use the following `install-config.yaml` configuration as a template for deploying a two-node OpenShift cluster with fencing by using the user-provisioned infrastructure method:
66

7+
[NOTE]
8+
====
9+
Do an etcd backup before proceeding to ensure that you can restore the cluster if any issues occur.
10+
====
11+
712
.Sample `install-config.yaml` configuration
813
[source,yaml]
914
----

0 commit comments

Comments
 (0)