mirror of
https://github.com/kemko/nomad.git
synced 2026-01-04 17:35:43 +03:00
* Move commands from docs to its own root-level directory * temporarily use modified dev-portal branch with nomad ia changes * explicitly clone nomad ia exp branch * retrigger build, fixed dev-portal broken build * architecture, concepts and get started individual pages * fix get started section destinations * reference section * update repo comment in website-build.sh to show branch * docs nav file update capitalization * update capitalization to force deploy * remove nomad-vs-kubernetes dir; move content to what is nomad pg * job section * Nomad operations category, deploy section * operations category, govern section * operations - manage * operations/scale; concepts scheduling fix * networking * monitor * secure section * remote auth-methods folder and move up pages to sso; linkcheck * Fix install2deploy redirects * fix architecture redirects * Job section: Add missing section index pages * Add section index pages so breadcrumbs build correctly * concepts/index fix front matter indentation * move task driver plugin config to new deploy section * Finish adding full URL to tutorials links in nav * change SSO to Authentication in nav and file system * Docs NomadIA: Move tutorials into NomadIA branch (#26132) * Move governance and policy from tutorials to docs * Move tutorials content to job-declare section * run jobs section * stateful workloads * advanced job scheduling * deploy section * manage section * monitor section * secure/acl and secure/authorization * fix example that contains an unseal key in real format * remove images from sso-vault * secure/traffic * secure/workload-identities * vault-acl change unseal key and root token in command output sample * remove lines from sample output * fix front matter * move nomad pack tutorials to tools * search/replace /nomad/tutorials links * update acl overview with content from deleted architecture/acl * fix spelling mistake * linkcheck - fix broken links * fix link to Nomad variables tutorial * fix link to Prometheus tutorial * move who uses Nomad to use cases page; move spec/config shortcuts add dividers * Move Consul out of Integrations; move namespaces to govern * move integrations/vault to secure/vault; delete integrations * move ref arch to docs; rename Deploy Nomad back to Install Nomad * address feedback * linkcheck fixes * Fixed raw_exec redirect * add info from /nomad/tutorials/manage-jobs/jobs * update page content with newer tutorial * link updates for architecture sub-folders * Add redirects for removed section index pages. Fix links. * fix broken links from linkcheck * Revert to use dev-portal main branch instead of nomadIA branch * build workaround: add intro-nav-data.json with single entry * fix content-check error * add intro directory to get around Vercel build error * workound for emtpry directory * remove mdx from /intro/ to fix content-check and git snafu * Add intro index.mdx so Vercel build should work --------- Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>
186 lines
5.5 KiB
Plaintext
186 lines
5.5 KiB
Plaintext
---
|
|
layout: api
|
|
page_title: Upgrade Check - Operator - HTTP API
|
|
description: |-
|
|
The /operator/upgrade-check endpoints provide tools for verifying the state
|
|
of the cluster prior to upgrades.
|
|
---
|
|
|
|
# Upgrade Check Operator HTTP API
|
|
|
|
The `/operator/upgrade-check` endpoints provide some predefined verifications
|
|
that can be useful prior to upgrades and changes to Nomad configuration.
|
|
|
|
<Note>
|
|
|
|
These endpoints are meant to target specific releases of Nomad and may be
|
|
removed or modified without notice.
|
|
|
|
</Note>
|
|
|
|
## Vault Workload Identity
|
|
|
|
This endpoint retrieves jobs, nodes, and Vault ACL tokens that may be affected
|
|
when migrating a Nomad cluster to use [workload identities for
|
|
Vault][nomad_acl_vault_wid].
|
|
|
|
| Method | Path | Produces |
|
|
| ------ | ---------------------------------------------------- | ------------------ |
|
|
| `GET` | `/v1/operator/upgrade-check/vault-workload-identity` | `application/json` |
|
|
|
|
The table below shows this endpoint's support for
|
|
[blocking queries](/nomad/api-docs#blocking-queries) and
|
|
[required ACLs](/nomad/api-docs#acls).
|
|
|
|
| Blocking Queries | ACL Required |
|
|
| ---------------- | --------------- |
|
|
| `NO` | `operator:read` |
|
|
|
|
### Sample Request
|
|
|
|
```shell-session
|
|
$ nomad operator api \
|
|
/v1/operator/upgrade-check/vault-workload-identity
|
|
```
|
|
|
|
### Sample Response
|
|
|
|
```json
|
|
{
|
|
"Index": 20,
|
|
"JobsWithoutVaultIdentity": [
|
|
{
|
|
"CreateIndex": 11,
|
|
"Datacenters": [
|
|
"*"
|
|
],
|
|
"ID": "example",
|
|
"JobModifyIndex": 11,
|
|
"JobSummary": null,
|
|
"ModifyIndex": 19,
|
|
"Multiregion": null,
|
|
"Name": "example",
|
|
"Namespace": "default",
|
|
"NodePool": "default",
|
|
"ParameterizedJob": false,
|
|
"ParentID": "",
|
|
"Periodic": false,
|
|
"Priority": 50,
|
|
"Status": "running",
|
|
"StatusDescription": "",
|
|
"Stop": false,
|
|
"SubmitTime": 1704995322434188000,
|
|
"Type": "service"
|
|
}
|
|
],
|
|
"KnownLeader": true,
|
|
"LastContact": 0,
|
|
"NextToken": "",
|
|
"OutdatedNodes": [
|
|
{
|
|
"Address": "192.168.0.186",
|
|
"CreateIndex": 8,
|
|
"Datacenter": "dc1",
|
|
"Drain": false,
|
|
"Drivers": {
|
|
"qemu": {
|
|
"Attributes": {
|
|
"driver.qemu": "true",
|
|
"driver.qemu.version": "8.1.1"
|
|
},
|
|
"Detected": true,
|
|
"HealthDescription": "Healthy",
|
|
"Healthy": true,
|
|
"UpdateTime": "2024-01-11T12:48:35.993541-05:00"
|
|
},
|
|
"exec": {
|
|
"Attributes": {},
|
|
"Detected": false,
|
|
"HealthDescription": "exec driver unsupported on client OS",
|
|
"Healthy": false,
|
|
"UpdateTime": "2024-01-11T12:48:35.958495-05:00"
|
|
},
|
|
"raw_exec": {
|
|
"Attributes": {
|
|
"driver.raw_exec": "true"
|
|
},
|
|
"Detected": true,
|
|
"HealthDescription": "Healthy",
|
|
"Healthy": true,
|
|
"UpdateTime": "2024-01-11T12:48:35.958539-05:00"
|
|
},
|
|
"java": {
|
|
"Attributes": {},
|
|
"Detected": false,
|
|
"HealthDescription": "",
|
|
"Healthy": false,
|
|
"UpdateTime": "2024-01-11T12:48:35.97141-05:00"
|
|
},
|
|
"docker": {
|
|
"Attributes": {
|
|
"driver.docker.bridge_ip": "172.17.0.1",
|
|
"driver.docker.runtimes": "io.containerd.runc.v2,runc",
|
|
"driver.docker.os_type": "linux",
|
|
"driver.docker": "true",
|
|
"driver.docker.version": "24.0.7"
|
|
},
|
|
"Detected": true,
|
|
"HealthDescription": "Healthy",
|
|
"Healthy": true,
|
|
"UpdateTime": "2024-01-11T12:48:35.989993-05:00"
|
|
}
|
|
},
|
|
"HostVolumes": null,
|
|
"ID": "049f7683-0cde-727f-428a-913a89f92bd8",
|
|
"LastDrain": null,
|
|
"ModifyIndex": 10,
|
|
"Name": "client-1",
|
|
"NodeClass": "",
|
|
"NodePool": "default",
|
|
"SchedulingEligibility": "eligible",
|
|
"Status": "ready",
|
|
"StatusDescription": "",
|
|
"Version": "1.6.4"
|
|
}
|
|
],
|
|
"VaultTokens": [
|
|
{
|
|
"Accessor": "czh9MPcRXzAhxBL9XKyb3Kh1",
|
|
"AllocID": "f00893d4-d9ef-4937-6a7a-ab495b68a971",
|
|
"CreateIndex": 14,
|
|
"CreationTTL": 60,
|
|
"NodeID": "049f7683-0cde-727f-428a-913a89f92bd8",
|
|
"Task": "redis"
|
|
}
|
|
]
|
|
}
|
|
```
|
|
|
|
#### Field Reference
|
|
|
|
- `JobsWithoutVaultIdentity` `(array<Job>)` - The list of jobs that have a
|
|
[`vault`][] block but do not have an [`identity`][] for Vault
|
|
authentication. These jobs can fail if they are not redeployed with an
|
|
identity for Vault before the configuration for Nomad servers are updated and
|
|
their access to Vault is removed.
|
|
|
|
- `OutdatedNodes` `(array<Node>)` - The list of nodes running a version of
|
|
Nomad that does not support workload identity authentication for Vault.
|
|
Allocations placed in these nodes will use the deprecated legacy flow to
|
|
retrieve Vault tokens. If the Nomad servers configuration is update to remove
|
|
their access to Vault before these nodes are upgraded, these allocations will
|
|
fail. Allocations that use workload identity for Vault will not be able to be
|
|
placed in these nodes until they are upgraded.
|
|
|
|
- `VaultTokens` `(array<VaultAccessor>)` - The list of Vault ACL tokens created
|
|
by Nomad servers using the deprecated legacy flow. They will continue to work
|
|
even after the migration to the workload identities, but they may not be
|
|
automatically revoked by Nomad and will only expire once their TTL reaches
|
|
zero.
|
|
|
|
|
|
[`identity`]: /nomad/docs/job-specification/identity
|
|
[`vault`]: /nomad/docs/job-specification/vault
|
|
[nomad_acl_vault_wid]: /nomad/docs/secure/vault/acl#nomad-workload-identities
|
|
|