- Overview
- Requirements
- Recommended: Deployment templates
- Manual: Preparing the installation
- Manual: Preparing the installation
- Step 1: Configuring the OCI-compliant registry for offline installations
- Step 2: Configuring the external objectstore
- Step 3: Configuring High Availability Add-on
- Step 4: Configuring Microsoft SQL Server
- Step 5: Configuring the load balancer
- Step 6: Configuring the DNS
- Step 7: Configuring the disks
- Step 8: Configuring kernel and OS level settings
- Step 9: Configuring the node ports
- Step 10: Applying miscellaneous settings
- Step 12: Validating and installing the required RPM packages
- Step 13: Generating cluster_config.json
- Cluster_config.json Sample
- General configuration
- Profile configuration
- Certificate configuration
- Database configuration
- External Objectstore configuration
- Pre-signed URL configuration
- ArgoCD configuration
- External OCI-compliant registry configuration
- Disaster recovery: Active/Passive and Active/Active configurations
- High Availability Add-on configuration
- Orchestrator-specific configuration
- Insights-specific configuration
- Process Mining-specific configuration
- Document Understanding-specific configuration
- Automation Suite Robots-specific configuration
- AI Center-specific configuration
- Monitoring configuration
- Optional: Configuring the proxy server
- Optional: Enabling resilience to zonal failures in a multi-node HA-ready production cluster
- Optional: Passing custom resolv.conf
- Optional: Increasing fault tolerance
- Adding a dedicated agent node with GPU support
- Adding a dedicated agent Node for Task Mining
- Connecting Task Mining application
- Adding a Dedicated Agent Node for Automation Suite Robots
- Step 15: Configuring the temporary Docker registry for offline installations
- Step 16: Validating the prerequisites for the installation
- Manual: Performing the installation
- Post-installation
- Cluster administration
- Managing products
- Getting Started with the Cluster Administration portal
- Migrating objectstore from persistent volume to raw disks
- Migrating from in-cluster to external High Availability Add-on
- Migrating data between objectstores
- Migrating in-cluster objectstore to external objectstore
- Migrating to an external OCI-compliant registry
- Switching to the secondary cluster manually in an Active/Passive setup
- Disaster Recovery: Performing post-installation operations
- Converting an existing installation to multi-site setup
- Guidelines on upgrading an Active/Passive or Active/Active deployment
- Guidelines on backing up and restoring an Active/Passive or Active/Active deployment
- Monitoring and alerting
- Migration and upgrade
- Migrating between Automation Suite clusters
- Upgrading Automation Suite
- Downloading the installation packages and getting all the files on the first server node
- Retrieving the latest applied configuration from the cluster
- Updating the cluster configuration
- Configuring the OCI-compliant registry for offline installations
- Executing the upgrade
- Performing post-upgrade operations
- Applying a patch
- Product-specific configuration
- Best practices and maintenance
- Troubleshooting
- How to troubleshoot services during installation
- How to uninstall the cluster
- How to clean up offline artifacts to improve disk space
- How to clear Redis data
- How to enable Istio logging
- How to manually clean up logs
- How to clean up old logs stored in the sf-logs bucket
- How to disable streaming logs for AI Center
- How to debug failed Automation Suite installations
- How to delete images from the old installer after upgrade
- How to disable TX checksum offloading
- How to manually set the ArgoCD log level to Info
- How to expand AI Center storage
- How to generate the encoded pull_secret_value for external registries
- How to address weak ciphers in TLS 1.2
- How to check the TLS version
- How to schedule Ceph backup and restore data
- Unable to run an offline installation on RHEL 8.4 OS
- Error in downloading the bundle
- Offline installation fails because of missing binary
- Certificate issue in offline installation
- SQL connection string validation error
- Prerequisite check for selinux iscsid module fails
- Azure disk not marked as SSD
- Failure after certificate update
- Antivirus causes installation issues
- Automation Suite not working after OS upgrade
- Automation Suite requires backlog_wait_time to be set to 0
- Volume unable to mount due to not being ready for workloads
- Support bundle log collection failure
- Data loss when reinstalling or upgrading Insights following Automation Suite upgrade
- Unable to access Automation Hub following upgrade to Automation Suite 2024.10.0
- Single-node upgrade fails at the fabric stage
- Upgrade fails due to unhealthy Ceph
- RKE2 not getting started due to space issue
- Volume unable to mount and remains in attach/detach loop state
- Upgrade fails due to classic objects in the Orchestrator database
- Ceph cluster found in a degraded state after side-by-side upgrade
- Unhealthy Insights component causes the migration to fail
- Service upgrade fails for Apps
- In-place upgrade timeouts
- Docker registry migration stuck in PVC deletion stage
- AI Center provisioning failure after upgrading to 2023.10 or later
- Upgrade fails in offline environments
- SQL validation fails during upgrade
- snapshot-controller-crds pod in CrashLoopBackOff state after upgrade
- Setting a timeout interval for the management portals
- Authentication not working after migration
- Kinit: Cannot find KDC for realm <AD Domain> while getting initial credentials
- Kinit: Keytab contains no suitable keys for *** while getting initial credentials
- GSSAPI operation failed due to invalid status code
- Alarm received for failed Kerberos-tgt-update job
- SSPI provider: Server not found in Kerberos database
- Login failed for AD user due to disabled account
- ArgoCD login failed
- Update the underlying directory connections
- Partial failure to restore backup in Automation Suite 2024.10.0
- Failure to get the sandbox image
- Pods not showing in ArgoCD UI
- Redis probe failure
- RKE2 server fails to start
- Secret not found in UiPath namespace
- ArgoCD goes into progressing state after first installation
- MongoDB pods in CrashLoopBackOff or pending PVC provisioning after deletion
- Pods stuck in Init:0/X
- Missing Ceph-rook metrics from monitoring dashboards
- Running High Availability with Process Mining
- Process Mining ingestion failed when logged in using Kerberos
- After Disaster Recovery Dapr is not working properly for Process Mining
- Unable to connect to AutomationSuite_ProcessMining_Warehouse database using a pyodbc format connection string
- Airflow installation fails with sqlalchemy.exc.ArgumentError: Could not parse rfc1738 URL from string ''
- How to add an IP table rule to use SQL Server port 1433
- Automation Suite certificate is not trusted from the server where CData Sync is running
- Task Mining troubleshooting
- Running the diagnostics tool
- Using the Automation Suite support bundle
- Exploring Logs
Automation Suite on Linux Installation Guide
Storage alerts
This alert indicates that disk usage is very high on the Kubernetes node.
If this alert fires, try to see which pod is consuming more disk:
-
Confirm if the node is under
DiskPressure
using the following command:kubectl describe node <node-name>
kubectl describe node <node-name>Identify for theDiskPressure
condition in the output. -
Check the disk space usage on the affected node:
df -h
df -hThis shows disk usage on all mounted file systems. Identify where the high usage.
-
If the disk is full and cleanup is insufficient, consider resizing the disk for the node (especially in cloud environments such as AWS or GCP). This process may involve expanding volumes, depending on your infrastructure.
This alert indicates that memory usage is very high on the Kubernetes node.
MemoryPressure
incident type occurs when a Kubernetes cluster node is running low on memory, which can be caused by a memory leak in an
application. This incident type requires immediate attention to prevent any downtime and ensure the proper functioning of
the Kubernetes cluster.
If this alert fires, try to identify the pod on the node that is consuming more memory, by taking these steps:
-
Retrieve the nodes CPU and memory stats:
kubectl top node
kubectl top node -
Retrieve the pods running on the node:
kubectl get pods --all-namespaces -o wide --field-selector spec.nodeName=${NODE_NAME}
kubectl get pods --all-namespaces -o wide --field-selector spec.nodeName=${NODE_NAME} -
Check the memory usage for pods in a namespace using:
kubectl top pod --namespace <namespace> kubectl logs -f <pod-name> -n <ns>
kubectl top pod --namespace <namespace> kubectl logs -f <pod-name> -n <ns>
If you are able to identify any pod with high memory usage, check the logs of the pod and look for memory leak errors.
To address the issue, increase the memory spec for the nodes if possible.
If the issue persists, generate the support bundle and contact UiPath® Support.
When Warning: The available space is less than 30% and is likely to fill up within four days.
When Critical: The available space is less than 10%.
For any services that run out of space, data may be difficult to recover, so volumes should be resized before hitting 0% available space.
For instructions, see Configuring the cluster.
For Prometheus-specific alerts, see PrometheusStorageUsage for more details and instructions.
The filesystem on a particular node is filling up.
If this alert fires, consider the following steps:
-
Confirm if the node is under
DiskPressure
using the following command:kubectl describe node <node-name>
kubectl describe node <node-name>Identify for theDiskPressure
condition in the output.
-
Clear the logs and temporary files. Check for large log files in
/var/log/
and clean them, if possible.
-
Check the disk space usage on the affected node:
df -h
df -hThis shows disk usage on all mounted file systems. Identify where the high usage.
-
If the disk is full and cleanup is insufficient, consider resizing the disk for the node (especially in cloud environments such as AWS or GCP). This process may involve expanding volumes, depending on your infrastructure.
The filesystem on a particular node is filling up. Provision more space by adding a disk or mounting unused disks.
The filesystem on a particular node is filling up. Provision more space by adding a disk or mounting unused disks.
The filesystem on a particular node is filling up. Provision more space by adding a disk or mounting unused disks.
These errors indicate that the network driver is reporting a high number of failures. This can be caused by physicall hardware failures, or misconfiguration in the physical network. This issue pertains to the OS and is not controlled by the UiPath® application.
/proc/net/dev
counter that the linux kernel provides.
Contact your network admin and the team that manages the physical infrastructure.
These errors indicate that the network driver is reporting a high number of failures. This can be caused by physicall hardware failures, or misconfiguration in the physical network. This issue pertains to the OS and is not controlled by the UiPath® application.
/proc/net/dev
counter that the linux kernel provides.
Contact your network admin and the team that manages the physical infrastructure.
This alert indicates that the Ceph storage cluster has been in error state for more than 10m.
rook-ceph-mgr
job has been in error state for an unacceptable amount of time. Check for other alerts that might have triggered prior to
this one and troubleshoot those first.
kubectl describe cephcluster -n rook-ceph
kubectl describe cephcluster -n rook-ceph
This alert indicates that storage cluster quorum is low.
Multiple mons work together to provide redundancy; this is possible because each keeps a copy of the metadata. The cluster is deployed with 3 mons, and requires 2 or more mons to be up and running for quorum and for the storage operations to run. If quorum is lost, access to data is at risk.
If this alert fires, check if any OSDs are in terminating state, if there are any, force delete those pods, and wait for some time for the operator to reconcile. If the issue persists, contact UiPath® support.
This alert indicates that Ceph Manager has disappeared from Prometheus target discovery.
If this alert fires, check and ensure the the Ceph manager pod is up and running and healthy. If the pod is healthy please check the logs and check if the pod is enable to emit Prometheus metrics.
This alert indicates thata node running Ceph pods is down. While storage operations continue to function as Ceph is designed to deal with a node failure, it is recommended to resolve the issue to minimize the risk of another node going down and affecting storage functions.
rook-ceph
namespace are running and in healthy state in the new node.
You can check the node failure by describing the node using the following command:
kubectl get nodes
kubectl get nodes
Check the node to identify the root cause of the issue and contact UiPath® support.
This alert indicates that the Ceph storage cluster utilization has crossed 75% and will become read-only at 85%.
If this alert fires, free up some space in Ceph by deleting some unused datasets in AI Center or Task Mining or expand the storage available for Ceph PVC.
Before resizing PVC, make sure you meet the storage requirements. For details, see Evaluating your storage needs.
This alert indicates that Ceph storage cluster utilization has crossed 80% and will become read-only at 85%.
If this alert fires, free up some space in Ceph by deleting some unused datasets in AI Center or Task Mining or expand the storage available for Ceph PVC.
Before resizing PVC, make sure you meet the storage requirements. For details, see Evaluating your storage needs.
This alert indicates that Ceph storage cluster utilization has crossed 85% and will become read-only now. Free up some space or expand the storage cluster immediately.
If this alert fires, free up some space in Ceph by deleting some unused datasets in AI Center or Task Mining or expand the storage available for Ceph PVC.
Before resizing PVC, make sure you meet the storage requirements. For details, see Evaluating your storage needs.
When the alert severity is Critical, the available space is less than 20%.
For any services that run out of space, data may be difficult to recover, so you should resize volumes before hitting 10% available space. See the following instructions: Configuring the cluster.
This alert indicates that the Ceph storage cluster utilization has crossed 75% and will become read-only at 85%.
If this alert fires, free up some space in Ceph by deleting some unused datasets in AI Center or Task Mining or expand the storage available for Ceph PVC.
Before resizing PVC, make sure you meet the storage requirements. For details, see Evaluating your storage needs.
This alert indicates that the Ceph storage cluster utilization has crossed 75% and will become read-only at 85%.
If this alert fires, free up some space in Ceph by deleting some unused datasets in AI Center or Task Mining or expand the storage available for Ceph PVC.
Before resizing PVC, make sure you meet the storage requirements. For details, see Evaluating your storage needs.
This alert indicates that the storage daemon has restarted more than 5 times in last 5 minutes.
If this alert fires, take the following steps:
-
Check the Ceph cluster health. Yuo must run
ceph status
in the Ceph toolbox to identify the flapping OSDs:You can identify the Ceph tools pod by listing the pods in the namespace:kubectl -n rook-ceph exec -it <ceph-tools-pod> -- ceph status
kubectl -n rook-ceph exec -it <ceph-tools-pod> -- ceph statuskubectl -n rook-ceph get pod | grep tools
kubectl -n rook-ceph get pod | grep tools -
Check the OSD logs for the flapping OSD pod to identify issues:
kubectl -n rook-ceph logs <osd-pod>
kubectl -n rook-ceph logs <osd-pod> -
Identify node level issues:
-
Check the resource usage:
kubectl top node <node-name>
kubectl top node <node-name> -
Check the disk health. You need to SSH into the node and run
df -h
anddmesg
to check disk errors.
-
-
Restart the OSD pod. If the issue is transient, you need to restart the flapping OSD pod:
kubectl -n rook-ceph delete pod <osd-pod>
kubectl -n rook-ceph delete pod <osd-pod> -
Ensure that there are no network connectivity issues between OSDs and Ceph monitors.
-
If needed, temporarily mark the flapping OSD as
out
:ceph osd out <osd-id>
ceph osd out <osd-id> -
Continue to monitor the cluster to ensure the problem does not recur.
This alert indicates that the host disk device is not responding.
If this alert fires, take the following steps:
-
Check the status of the Ceph cluster. You need to confirm the overall health of the Ceph cluster and get more details about the OSD status:
-
Run the following command inside the Ceph toolbox pod:
kubectl -n rook-ceph exec -it <ceph-tools-pod> -- ceph status
kubectl -n rook-ceph exec -it <ceph-tools-pod> -- ceph status -
Identify the Ceph tools pod by listing the pods in the namespace:
kubectl -n rook-ceph get pod | grep tools
kubectl -n rook-ceph get pod | grep tools
-
-
Check the OSD pod status. You need to check whether the OSD pods are running. Run the following command to check all OSD pod statuses:
kubectl -n rook-ceph get pods | grep osd
kubectl -n rook-ceph get pods | grep osdIf any OSD pod is in aCrashLoopBackOff
orPending
state, that could indicate an issue with the OSD disk or the underlying node. -
Restart the affected OSD pod. If an OSD pod is in a bad state (
CrashLoopBackOff
,Error
, etc.), you must restart the pod to see if the issue resolves itself. Kubernetes automatically attempts to reschedule the pod.kubectl -n rook-ceph delete pod <osd-pod>
kubectl -n rook-ceph delete pod <osd-pod>The OSD pod will be restarted, and if it is a transient issue, this may resolve it.
-
Check the OSD logs. If the restart did not resolve the issue, check the OSD pod logs for more details on why the disk is not responding:
kubectl -n rook-ceph logs <osd-pod>
kubectl -n rook-ceph logs <osd-pod>Look for disk-related errors or other issues (e.g., I/O errors, failed mounts).
-
Identify node level issues. If the OSD disk is not mounted properly or has been disconnected, you can log in to the affected node and check the disk mount status:
ssh <node> df -h
ssh <node> df -hLook for missing or unmounted disks that Ceph is expecting. If necessary, remount the disk or replace it if it has failed.
This alert indicates that the Ceph OSD disk not accessible on host.
If this alert fires, take the following steps:
-
Check the status of the Ceph cluster. You need to confirm the overall health of the Ceph cluster and get more details about the OSD status:
-
Run the following command inside the Ceph toolbox pod:
kubectl -n rook-ceph exec -it <ceph-tools-pod> -- ceph status
kubectl -n rook-ceph exec -it <ceph-tools-pod> -- ceph status -
Identify the Ceph tools pod by listing the pods in the namespace:
kubectl -n rook-ceph get pod | grep tools
kubectl -n rook-ceph get pod | grep tools
-
-
Check the OSD pod status. You need to check whether the OSD pods are running. Run the following command to check all OSD pod statuses:
kubectl -n rook-ceph get pods | grep osd
kubectl -n rook-ceph get pods | grep osdIf any OSD pod is in aCrashLoopBackOff
orPending
state, that could indicate an issue with the OSD disk or the underlying node. -
Restart the affected OSD pod. If an OSD pod is in a bad state (
CrashLoopBackOff
,Error
, etc.), you must restart the pod to see if the issue resolves itself. Kubernetes automatically attempts to reschedule the pod.kubectl -n rook-ceph delete pod <osd-pod>
kubectl -n rook-ceph delete pod <osd-pod>The OSD pod will be restarted, and if it is a transient issue, this may resolve it.
-
Check the OSD logs. If the restart did not resolve the issue, check the OSD pod logs for more details on why the disk is not responding:
kubectl -n rook-ceph logs <osd-pod>
kubectl -n rook-ceph logs <osd-pod>Look for disk-related errors or other issues (e.g., I/O errors, failed mounts).
If this alert fires, free up some space in Ceph by deleting some unused datasets in AI Center or Task Mining or expand the storage available for Ceph PVC.
Before resizing PVC, make sure you meet the storage requirements. For details, see Evaluating your storage needs.
This alert indicates that Ceph storage pool usage has crossed 90%.
If this alert fires, free up some space in CEPH by deleting some unused datasets in AI Center or Task Mining or expand the storage available for Ceph PVC.
Before resizing PVC, make sure you meet the storage requirements. For details, see Evaluating your storage needs.
/var/lib/rancher
partition is less than:
- 25% – the severity of the alert is critical
df -h /var/lib/rancher
to check the available disk space. If you are running low on space, consider the following options:
-
Clear out the unnecessary files. Over time, log files, temporary files, orphaned data, and backups can consume a significant amount of space. Regularly cleaning up these files can help maintain disk space.
-
Resize the partition. If your filesystem supports it, and if there is available unused space on your disk, you could resize the partition to give it more disk space.
-
Add more disk space. If the previous ptions are not sufficient, and if your infrastructure allows it, increase the size of the disk for proper functioning of Rancher.
-
Check the storage usage for any abnormally large files:
find /var/lib/rancher -type f -exec du -h {} + | sort -rh | head -n 10
find /var/lib/rancher -type f -exec du -h {} + | sort -rh | head -n 10 -
Check for any containers that are writing huge files into the disk.
/var/lib/kubelet
partition is less than:
-
25% – the severity of the alert is critical
If this alert fires, increase the size of the disk.
/var
partition is less than:
- 25% – the severity of the alert is critical
This can happen due to accumulation of container system logs.
If this alert fires, take the following steps:
-
Check the storage usage:
find /var/ -type f -exec du -h {} + | sort -rh | head -n 10
find /var/ -type f -exec du -h {} + | sort -rh | head -n 10 -
Increase the size of the disk.
- kubernetes-system
- KubernetesDiskPressure
- KubernetesMemoryPressure
- KubePersistentVolumeFillingUp
- KubePersistentVolumeErrors
- node-exporter
- NodeFilesystemSpaceFillingUp
- NodeFilesystemAlmostOutOfSpace
- NodeFilesystemFilesFillingUp
- NodeFilesystemAlmostOutOfFiles
- NodeNetworkReceiveErrs
- NodeNetworkTransmitErrs
- ceph.rules, cluster-state-alert.rules
- CephClusterErrorState
- CephMonQuorumAtRisk
- CephMgrIsAbsent
- CephNodeDown
- cluster-utilization-alert.rules
- CephClusterNearFull
- CephClusterCriticallyFull
- CephClusterReadOnly
- osd-alert.rules
- CephOSDCriticallyFull
- CephOSDNearFull
- PersistentVolumeUsageNearFull
- CephOSDFlapping
- CephOSDDiskNotResponding
- CephOSDDiskUnavailable
- persistent-volume-alert.rules
- PersistentVolumeUsageCritical
- pool-quota.rules
- CephPoolQuotaBytesCriticallyExhausted
- host-disk
- LowDiskForRancherPartition
- LowDiskForKubeletPartition
- LowDiskForVarPartition
- LowDiskForVarLogPartition