X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/927524f1be454de021180b74999d682780b8cb6b..3eae74e5af3f81c324ec1d617141afe7619719b4:/doc/install/salt-multi-host.html.textile.liquid diff --git a/doc/install/salt-multi-host.html.textile.liquid b/doc/install/salt-multi-host.html.textile.liquid index e497240c4c..5d871c4277 100644 --- a/doc/install/salt-multi-host.html.textile.liquid +++ b/doc/install/salt-multi-host.html.textile.liquid @@ -20,8 +20,7 @@ SPDX-License-Identifier: CC-BY-SA-3.0 # "Run the provision.sh script":#run_provision_script # "Initial user and login":#initial_user # "Test the installed cluster running a simple workflow":#test_install - - +# "After the installation":#post_install h2(#introduction). Introduction @@ -48,6 +47,7 @@ We suggest distributing the Arvados components in the following way, creating at ## arvados controller ## arvados websocket ## arvados cloud dispatcher +## arvados keepbalance # WORKBENCH node: ## arvados workbench ## arvados workbench2 @@ -99,7 +99,9 @@ Edit the variables in the local.params file. Pay attention to the *_IN The multi_host example includes Let's Encrypt salt code to automatically request and install the certificates for the public-facing hosts (API/controller, Workbench, Keepproxy/Keepweb) using AWS' Route53. -{% include 'install_custom_certificates' %} +{% include 'multi_host_install_custom_certificates' %} + +If you want to use valid certificates provided by Let's Encrypt, set the variable SSL_MODE=lets-encrypt and make sure that all the FQDNs that you will use for the public-facing applications (API/controller, Workbench, Keepproxy/Keepweb) are reachable. h3(#further_customization). Further customization of the installation (modifying the salt pillars and states) @@ -111,9 +113,9 @@ h2(#installation_order). Installation order A few Arvados nodes need to be installed in certain order. The required order is -#. Database -#. API server -#. The other nodes can be installed in any order after the two above +* Database +* API server +* The other nodes can be installed in any order after the two above h2(#run_provision_script). Run the provision.sh script @@ -137,42 +139,42 @@ arvados: Failed: 0 The distribution of role as described above can be applied running these commands: -#. Database +h4. Database
scp -r provision.sh local* user@host:
 ssh user@host sudo ./provision.sh --config local.params --roles database
 
-#. API +h4. API
scp -r provision.sh local* user@host:
-ssh user@host sudo ./provision.sh --config local.params --roles api,controller,websocket,dispatcher
+ssh user@host sudo ./provision.sh --config local.params --roles api,controller,websocket,dispatcher,keepbalance
 
-#. Keepstore/s +h4. Keepstore(s)
scp -r provision.sh local* user@host:
 ssh user@host sudo ./provision.sh --config local.params --roles keepstore
 
-#. Workbench +h4. Workbench
scp -r provision.sh local* user@host:
 ssh user@host sudo ./provision.sh --config local.params --roles workbench,workbench2,webshell
 
-#. Keepproxy / Keepweb +h4. Keepproxy / Keepweb
scp -r provision.sh local* user@host:
 ssh user@host sudo ./provision.sh --config local.params --roles keepproxy,keepweb
 
-#. Shell (here we copy the CLI test workflow too) +h4. Shell (here we copy the CLI test workflow too)
scp -r provision.sh local* tests user@host:
 ssh user@host sudo ./provision.sh --config local.params --roles shell
@@ -288,3 +290,9 @@ INFO Final output collection d6c69a88147dde9d52a418d50ef788df+123
 INFO Final process status is success
 
+ +h2(#post_install). After the installation + +Once the installation is complete, it is recommended to keep a copy of your local configuration files. Committing them to version control is a good idea. + +Re-running the Salt-based installer is not recommended for maintaining and upgrading Arvados, please see "Maintenance and upgrading":{{site.baseurl}}/admin/maintenance-and-upgrading.html for more information.