Contents Menu Expand Light mode Dark mode Auto light/dark mode
Documentation Portal
  • 3.6 (current)
  • 3.5
  • 3.4
Logo
Mirantis Kubernetes Engine
  • Product Overview
  • Reference Architecture
    • Introduction to MKE
    • MKE hardware requirements
    • MKE software requirements
    • Manager nodes
    • Worker nodes
    • Admission controllers
    • Pause containers
    • Volumes
    • Configuration
    • Web UI and CLI
    • MKE limitations
  • Installation Guide
    • Plan the deployment
      • Default install directories
      • Host name strategy
      • MCR considerations
        • default-address-pools
        • docker0
        • docker_gwbridge
        • Docker swarm
        • Kubernetes
        • docker data-root
        • no-new-privileges
    • Perform pre-deployment configuration
      • Configure networking
        • IP considerations
        • Open ports to incoming traffic
        • Calico networking
        • Enable ESP traffic
        • Avoid firewall conflicts
        • DNS entry in hosts file
      • Preconfigure an SLES installation
      • Verify the timeout settings
      • Configure time synchronization
      • Configure a load balancer
      • Configure IPVS
      • Use an External Certificate Authority
      • Customize named volumes
      • Configure kernel parameters
    • Install the MKE image
    • Obtain the license
    • Install MKE on AWS
      • Prerequisites
      • Install MKE
    • Install MKE on Azure
      • Prerequisites
      • Networking
      • Azure configuration file
      • Guidelines for IPAM configuration
      • Manually provision IP address pools as part of an Azure VM scale set
      • Adjust the IP count value
      • Azure custom roles
    • Install MKE offline
    • Uninstall MKE
  • Operations Guide
    • Access an MKE cluster
      • Access the MKE web UI
      • Download and configure the client bundle
        • Download the client bundle
        • Configure the client bundle
      • Configure kubectl with MKE
    • Administer an MKE cluster
      • Add labels to cluster nodes
        • Apply labels to a node
        • Deploy a service with constraints
        • Add or remove a service constraint using the MKE web UI
      • Add SANs to cluster certificates
      • Collect MKE cluster metrics with Prometheus
        • MKE metrics types
        • Metrics labels
        • MKE Metrics exposed by Prometheus
        • Deploy Prometheus on worker nodes
        • Configure external Prometheus to scrape metrics from MKE
      • Configure native Kubernetes role-based access control
        • Create a Kubernetes role
        • Create a Kubernetes role grant
      • MKE audit logging
        • Logging levels
        • Enable MKE audit logging
        • Access audit logs using the docker CLI
        • API endpoints logging constraints
      • Enable MKE telemetry
      • Enable and integrate SAML authentication
        • Configure SAML integration on identity provider
        • Configure SAML integration on MKE
        • SAML security considerations
      • Enable Helm with MKE
      • Integrate SCIM
        • Configure SCIM for MKE
        • Supported SCIM API endpoints
      • Integrate with an LDAP directory
      • Manage services node deployment
        • Restrict services deployment to Swarm worker nodes
        • Restrict services deployment to Kubernetes worker nodes
        • Allow services deployment on Kubernetes MKE manager or MSR nodes
      • Run only the images you trust
      • Set user session properties
      • Configure an MKE cluster
        • Use an MKE configuration file
        • Configuration options
      • Scale an MKE cluster
      • KMS plugin support for MKE
      • Use a local node network in a swarm
      • Use your own TLS certificates
      • Manage and deploy private images
      • Set the node orchestrator
        • Select the node orchestrator
        • Change the node orchestrator
      • View Kubernetes objects in a namespace
      • Join Nodes
        • Set up high availability
        • Join Linux nodes
        • Join Windows worker nodes
        • Use a load balancer
      • Improve network performance with Route Reflectors
      • Use two-factor authentication
      • Migrate an MKE cluster to a new OS
    • Authorize role-based access
      • Access control model
      • Create organizations, teams, and users
      • Enable LDAP and sync teams and users
      • Define roles with authorized API operations
      • Use collections and namespaces
        • Swarm collection labels
        • Default and built-in Swarm collections
        • Group and isolate cluster resources
      • Create grants
      • Grant users permission to pull images
      • Reset passwords
      • RBAC tutorials
        • Deploy a simple stateless app with RBAC
        • Isolate volumes to specific teams
        • Isolate nodes
          • Isolate cluster nodes with Swarm
          • Isolate cluster nodes with Kubernetes
        • Access control design
        • Access control design using additional security requirements
    • Upgrade an MKE installation
      • Verify your environment
      • Perform the upgrade
      • Troubleshoot the upgrade process
    • Deploy applications with Swarm
      • Deploy a single-service application
      • Deploy a multi-service application
      • Deploy services to a Swarm collection
      • Use secrets in Swarm deployments
      • Interlock
        • Layer 7 routing
        • Optimize Interlock deployments
        • Configure
          • Configure layer 7 routing service
            • Configure the Interlock service
            • Configuration file options for layer 7 routing
            • Create a proxy service
          • Configure host mode networking
          • Configure NGINX
          • Tune the proxy service
          • Update Interlock services
        • Deploy
          • Deploy a layer 7 routing solution
          • Configure layer 7 routing for production
          • Offline installation considerations
        • Routing traffic to services
          • Route traffic to a Swarm service
          • Publish a service as a canary instance
          • Use context or path-based routing
          • Configure a routing mode
            • Routing modes
            • Specify a routing mode
          • Configure redirects
          • Create service clusters
            • Configure service clusters
            • Deploy services in separate service clusters
          • Use persistent sessions
          • Secure services with TLS
            • Proxy-managed TLS
            • Service-managed TLS
          • Use websockets
    • Deploy applications with Kubernetes
      • Use Kubernetes on Windows Server nodes
      • Access Kubernetes resources
      • Deploy a workload to a Kubernetes cluster
        • Deploy a workload using the MKE web UI
        • Deploy a workload using the CLI
      • Deploying a Compose-based app to a Kubernetes cluster
      • Use Pod Security Policies
        • Configure Kubernetes access for PSPs
        • Default Pod security policies in MKE
        • Use the unprivileged policy
        • Reenable the privileged PSP for all users
        • PSP examples
      • Use admission controllers for access
      • Create a service account for a Kubernetes app
      • Install an unmanaged CNI plugin
      • Kubernetes network encryption
      • Persistent Kubernetes Storage
        • Use NFS Storage
        • Use Azure Disk Storage
        • Use Azure Files Storage
        • Use AWS EBS Storage
        • Use vSphere Volumes
        • Configure iSCSI
        • Use CSI drivers
      • GPU support for Kubernetes workloads
      • Use Istio Ingress for Kubernetes
        • Configure Istio Ingress
        • Use cases
    • Monitor an MKE cluster
    • Troubleshoot an MKE cluster
      • Troubleshoot MKE node states
      • Troubleshoot using logs
      • Troubleshoot cluster configurations
    • Disaster recovery
      • Swarm disaster recovery
        • Recover from losing the quorum
        • Force the swarm to rebalance
      • MKE Disaster Recovery
      • Back up Swarm
      • Backup MKE
      • Restore Swarm
      • Restore MKE
    • Customer feedback
  • Launchpad
    • System requirements
    • Get started with Launchpad
    • Networking considerations
    • Upgrade components with Launchpad
    • Manage nodes
    • Launchpad CLI reference
    • Launchpad Configuration File
  • Get support

Reference documentation

  • API Reference Updated
  • CLI Reference
    • backup
    • dump-certs
    • example-config
    • id
    • images
    • install
    • port-check-server
    • restore
    • support
    • uninstall-ucp
    • upgrade

Release notes

  • Release Notes
    • 3.3.17
    • 3.3.16
    • 3.3.15
    • 3.3.14
    • 3.3.13
    • 3.3.12
    • 3.3.11
    • 3.3.10 (discontinued)
    • 3.3.9
    • 3.3.8
    • 3.3.7
    • 3.3.6
    • 3.3.5
    • 3.3.4
    • 3.3.3
    • 3.3.2
    • 3.3.1
    • 3.3.0
  • Release Compatibility Matrix
    • MKE 3.3 Compatibility Matrix
    • MKE and MSR Browser compatibility
    • MKE, MSR, and MCR Maintenance Lifecycle
  • Open Source Components and Licenses

Swarm disaster recovery¶

This section describes how to recover after losing quorum and how to force your swarm to rebalance.

Note

Perform the procedures in this section prior to those described in MKE Disaster Recovery.

  • Recover from losing the quorum
  • Force the swarm to rebalance
Next
Recover from losing the quorum
Previous
Disaster recovery
  • Multi-page view
  • Single-page view

Mirantis Inc. 900 E Hamilton Avenue, Suite 650, Campbell, CA 95008 +1-650-963-9828

© 2005 - 2023 Mirantis, Inc. All rights reserved. "Mirantis" and "FUEL" are registered trademarks of Mirantis, Inc. All other trademarks are the property of their respective owners.