Server Maintenance Commands
The cfy cluster command is used to manage clusters of tenants in Cloudify Manager. Optional flags These will work on each command -v, --verbose - Show verbose output. You can supply this up to three times (i.e. -vvv) -h, --help - Show this message and exit. Commands Start Usage cfy cluster start [OPTIONS] Start a Cloudify Manager cluster with the current manager as the master. This initializes all the Cloudify Manager cluster components on the current manager, and marks it as the master.
The cfy init command is used to initialize a working Cloudify directory. Before you can use cfy, you must initialize a working directory for it, in which relevant functional information will be stored. Running cfy intall or cfy profiles use initializes an environment automatically. Usage cfy init [OPTIONS] [BLUEPRINT_PATH] Initialize a Cloudify environment. This is required to perform many actions and should be the first action performed after installing Cloudify.
The cfy ldap command is used to set LDAP authentication to enable you to integrate your LDAP users and groups with Cloudify. Optional flags These will work on each command: -v, --verbose - Show verbose output. You can supply this up to three times (i.e. -vvv) -h, --help - Show this message and exit. Commands set Usage cfy LDAP set [OPTIONS] Set Cloudify Manager to use the LDAP authenticator.
The cfy profiles command is used to manage Cloudify profiles. Each profile can have its own credentials for managers and Cloudify various environmental settings Optional flags These will work on each command: -v, --verbose - Show verbose output. You can supply this up to three times (i.e. -vvv) -h, --help - Show this message and exit. Commands list Usage cfy profiles list [OPTIONS] List all profiles.
The cfy rollback command is used to rollback a manager to the previous version of Cloudify. You can only rollback to the version of Cloudify installed before the last cfy upgrade. Usage cfy rollback [OPTIONS] BLUEPRINT_PATH Rollback Cloudify Manager to its previous version BLUEPRINT_PATH is the path of the Manager blueprint to use for rollback. Optional flags -i, --inputs TEXT - Inputs for the deployment (Can be provided as wildcard based paths (*.
The cfy snapshots command is used to manage data snapshots of Cloudify manager. You must have admin credentials to create and restore snapshots. You can use the command to create, upload, download, delete and list snapshots and also to restore a Manager using a snapshot archive. For more about working with snapshots, go to: snapshots. Optional flags These will work on each command: -v, --verbose - Show verbose output.
The cfy ssh command is used to connect to a Cloudify manager via SSH. You can use the command to create a new terminal session, run a command, or connect to a shared tmux-based session. Usage cfy ssh [OPTIONS] Connects to a running manager via SSH. host starts a tmux session (e.g. tmux new -s “ssh_session_vi120m”) after which a command for a client is printed in the tmux session for the host to send to the client (i.
The cfy tenants command is used to create and manage tenants on Cloudify Manager. You can run commands on a tenant other than the one that you are logged into by specifying the name of the tenant to which the command applies. For example, cfy tenants add-user USERNAME -t TENANT_NAME can be used to add a user to a different tenant. Requirements To use the command you must have Cloudify sys_admin credentials.
The cfy user-groups command is used to define and manage user groups on Cloudify Manager. To use the command you must have Cloudify admin credentials. If your Cloudify Manager is integrated with LDAP/AD. ensure that the group names that you define exactly match those defined in LDAP. Requirements To use the command you must have Cloudify admin credentials. User names and passwords must conform to the following requirements:
The cfy users command is used to manage users and passwords on Cloudify Manager. If you choose not to integrate Cloudify Manager with LDAP-based user management system, you must add each user individually with a unique username and a password. You can also create user groups and add users to them. The users and user groups can be assigned to one or more tenants, with different roles in each tenant.