Outposts server maintenance
Under the shared responsibility model
Warning
Data on instance store volumes is lost if the underlying disk drive fails, or if the instance terminates. To prevent data loss, we recommend that you back up your long-term data on instance store volumes to persistent storage, such as an Amazon S3 bucket or a network storage device in your on-premises network.
Contents
Update contact details
If the Outpost owner changes, contact AWS Support Center
Hardware maintenance
If AWS detects an irreparable issue with hardware during the server provisioning process or while hosting Amazon EC2 instances running on your Outposts server, we will notify the Outpost owner and the owner of the instances that the affected instances are scheduled for retirement. For more information, see Instance retirement in the Amazon EC2 User Guide.
AWS terminates the affected instances on the instance retirement date. The data on instance store volumes does not persist after instance termination. Therefore, it is important that you take action before the instance retirement date. First, transfer your long-term data from the instance store volumes for each affected instance to persistent storage, such as an Amazon S3 bucket or a network storage device in your network.
A replacement server will be shipped to the Outpost site. Then, do the following:
-
Remove the network and power cables from the irreparable server and if necessary remove it from your rack.
-
Install the replacement server in the same location. Follow the installation instructions in Outposts server installation.
-
Pack the irreparable server to AWS in the same packaging that the replacement server arrived in.
-
Use the pre-paid return shipment label that is available in the console attached to the order configuration details or the replacement server order.
-
Return the server to AWS. For more information, see Return an AWS Outposts server.
Firmware updates
Updating the Outpost firmware does not typically affect the instances on your Outpost. In the rare case that we need to reboot the Outpost equipment to install an update, you will receive an instance retirement notice for any instances running on that capacity.
Best practices for power and network events
As stated in the AWS Service Terms
Power events
With complete power outages, there is an inherent risk that an AWS Outposts resource may not return to service automatically. In addition to deploying redundant power and backup power solutions, we recommend that you do the following in advance to mitigate the impact of some of the worst-case scenarios:
-
Move your services and applications off the Outposts equipment in a controlled fashion, using DNS-based or off-rack load-balancing changes.
-
Stop containers, instances, databases in an ordered incremental fashion and use the reverse order when restoring them.
-
Test plans for the controlled moving or stopping of services.
-
Back-up critical data and configurations and store it outside the Outposts.
-
Keep power downtimes to a minimum.
-
Avoid repeated switching of the power feeds (off-on-off-on) during the maintenance.
-
Allow for extra time within the maintenance window to deal with the unexpected.
-
Manage the expectations of your users and customers by communicating a wider maintenance window time-frame than you would normally need.
-
After power is restored, create a case at AWS Support Center
to request verification that AWS Outposts and the related services are running.
Network connectivity events
The service link connection between your Outpost and the AWS Region or Outposts home Region will typically automatically recover from network interruptions or issues that may occur in your upstream corporate network devices or in the network of any third party connectivity provider once the network maintenance is completed. During the time the service link connection is down, your Outposts operations are limited to local network activities.
Amazon EC2 instances, LNI networking, and instance storage volumes on the Outposts server will continue to operate normally and can be accessed locally through the local network and LNI. Similarly, AWS service resources such as Amazon ECS worker nodes continue to run locally. However, API availability will be degraded. For example, the run, start, stop, and terminate APIs might not work. Instance metrics and logs will continue to be cached locally for a few hours, and will be pushed to the AWS Region when connectivity returns. Disconnection beyond a few hours however might result in loss of metrics and logs.
If the service link is down because of an on-site power issue or the loss of network connectivity, the AWS Health Dashboard sends a notification to the account that owns the Outposts. Neither you nor AWS can suppress the notification of a service link interruption, even if the interruption is expected. For more information, see Getting started with your AWS Health Dashboard in the AWS Health User Guide.
In the case of a planned service maintenance that will affect network connectivity, take the following proactive steps to limit the impact of potential problematic scenarios:
-
If you are in control of the network maintenance, limit the duration of downtime for the service link. Include a step in your maintenance process that verifies that the network has recovered.
-
If you are not in control of the network maintenance, monitor the service link downtime with respect to the announced maintenance window and escalate early to the party in charge of the planned network maintenance if the service link is not back up at the end of the announced maintenance window.
Resources
Here are some monitoring related resources that can provide reassurance that the Outposts is operating normally after a planned or unplanned power or network event:
-
The AWS blog Monitoring best practices for AWS Outposts
covers observability and event management best practices specific to Outposts. -
The AWS blog Debugging tool for network connectivity from Amazon VPC
explains the AWSSupport-SetupIPMonitoringFromVPC tool. This tool is an AWS Systems Manager document (SSM document) that creates an Amazon EC2 Monitor Instance in a subnet specified by you and monitors target IP addresses. The document runs ping, MTR, TCP trace-route and trace-path diagnostic tests and stores the results in Amazon CloudWatch Logs which can be visualized in a CloudWatch dashboard (e.g. latency, packet loss). For Outposts monitoring, the Monitor Instance should be in one subnet of the parent AWS Region and configured to monitor one or more of your Outpost instances using its private IP(s) - this will provide packet loss graphs and latency between AWS Outposts and the parent AWS Region. -
The AWS blog Deploying an automated Amazon CloudWatch dashboard for AWS Outposts using AWS CDK
describes the steps involved in deploying an automated dashboard. -
If you have questions or need more information, see Creating a support case in the AWS Support User Guide.
Cryptographically shred server data
The Nitro Security Key (NSK) is required to decrypt data on the server. When you return the server to AWS, either because you are replacing the server or discontinuing the service, you can destroy the NSK to cryptographically shred the data on the server.
To cryptographically shred data on the server
-
Remove the NSK from the server before shipping the server back to AWS.
-
Ensure that you have the correct NSK that shipped with the server.
-
Remove the small hex tool / Allen wrench from under the sticker.
-
Use the hex tool to turn the small screw under the sticker three full turns. This action destroys the NSK and cryptographically shreds all data on the server.