Jump To Close Expand all Collapse all Table of contents Maintaining Red Hat Hyperconverged Infrastructure for Virtualization I. Configuration tasks Expand section "I. Configuration tasks" Collapse section "I. Configuration tasks" 1. Add compute and storage resources Expand section "1. Add compute and storage resources" Collapse section "1. Add compute and storage resources" 1.1. Expanding the hyperconverged cluster by adding a new volume on new nodes using Cockpit 2. Configure high availability using fencing policies Expand section "2. Configure high availability using fencing policies" Collapse section "2. Configure high availability using fencing policies" 2.1. Configuring Fencing Policies in the Cluster 2.2. Configuring Fencing Parameters on the Hosts 3. Configuring backup and recovery options Expand section "3. Configuring backup and recovery options" Collapse section "3. Configuring backup and recovery options" 3.1. Prerequisites Expand section "3.1. Prerequisites" Collapse section "3.1. Prerequisites" 3.1.1. Prerequisites for geo-replication 3.1.2. Prerequisites for failover and failback configuration 3.2. Supported backup and recovery configurations 3.3. Configuring backup to a secondary volume Expand section "3.3. Configuring backup to a secondary volume" Collapse section "3.3. Configuring backup to a secondary volume" 3.3.1. Prerequisites Expand section "3.3.1. Prerequisites" Collapse section "3.3.1. Prerequisites" 3.3.1.1. Enable shared storage on the source volume 3.3.1.2. Match encryption on source and target volumes 3.3.2. Create a suitable target volume for geo-replication 3.3.3. Configuring geo-replication for backing up volumes Expand section "3.3.3. Configuring geo-replication for backing up volumes" Collapse section "3.3.3. Configuring geo-replication for backing up volumes" 3.3.3.1. Creating a geo-replication session 3.3.3.2. Verifying creation of a geo-replication session 3.3.3.3. Synchronizing volume state using the Administration Portal 3.3.4. Scheduling regular backups using geo-replication 3.4. Configuring failover to and failback from a secondary cluster Expand section "3.4. Configuring failover to and failback from a secondary cluster" Collapse section "3.4. Configuring failover to and failback from a secondary cluster" 3.4.1. Creating a secondary cluster for failover 3.4.2. Creating a mapping file between source and target clusters 3.4.3. Creating a failover playbook between source and target clusters 3.4.4. Creating a failover cleanup playbook for your primary cluster 3.4.5. Create a failback playbook between source and target clusters 4. Configure encryption with Transport Layer Security (TLS/SSL) Expand section "4. Configure encryption with Transport Layer Security (TLS/SSL)" Collapse section "4. Configure encryption with Transport Layer Security (TLS/SSL)" 4.1. Configuring TLS/SSL using self-signed certificates 4.2. Configuring TLS/SSL using Certificate Authority signed certificates 5. Configure performance improvements Expand section "5. Configure performance improvements" Collapse section "5. Configure performance improvements" 5.1. Improving volume performance by changing shard size Expand section "5.1. Improving volume performance by changing shard size" Collapse section "5.1. Improving volume performance by changing shard size" 5.1.1. Prerequisites 5.1.2. Safely changing the shard block size parameter value 5.2. Configuring a logical volume cache (lvmcache) for improved performance 6. Configure monitoring Expand section "6. Configure monitoring" Collapse section "6. Configure monitoring" 6.1. Configuring event notifications II. Maintenance tasks Expand section "II. Maintenance tasks" Collapse section "II. Maintenance tasks" 7. Basic Operations Expand section "7. Basic Operations" Collapse section "7. Basic Operations" 7.1. Creating a shutdown playbook 7.2. Shutting down RHHI for Virtualization 7.3. Starting up a hyperconverged cluster 8. Upgrading to Red Hat Hyperconverged Infrastructure for Virtualization 1.5 Expand section "8. Upgrading to Red Hat Hyperconverged Infrastructure for Virtualization 1.5" Collapse section "8. Upgrading to Red Hat Hyperconverged Infrastructure for Virtualization 1.5" 8.1. Major changes in version 1.5 8.2. Upgrade workflow 8.3. Preparing to upgrade Expand section "8.3. Preparing to upgrade" Collapse section "8.3. Preparing to upgrade" 8.3.1. Verify brick mount options 8.3.2. Update to the latest version of the previous release 8.3.3. Update subscriptions 8.3.4. Verify that data is not currently being synchronized using geo-replication 8.4. Upgrading Red Hat Hyperconverged Infrastructure for Virtualization Expand section "8.4. Upgrading Red Hat Hyperconverged Infrastructure for Virtualization" Collapse section "8.4. Upgrading Red Hat Hyperconverged Infrastructure for Virtualization" 8.4.1. Upgrading the Hosted Engine virtual machine 8.4.2. Upgrading the virtualization hosts 8.4.3. Cleaning up after upgrading 9. Monitoring Red Hat Hyperconverged Infrastructure for Virtualization Expand section "9. Monitoring Red Hat Hyperconverged Infrastructure for Virtualization" Collapse section "9. Monitoring Red Hat Hyperconverged Infrastructure for Virtualization" 9.1. Monitoring Virtual Data Optimizer (VDO) Expand section "9.1. Monitoring Virtual Data Optimizer (VDO)" Collapse section "9.1. Monitoring Virtual Data Optimizer (VDO)" 9.1.1. Monitoring VDO using the command line interface 9.1.2. Monitoring VDO using the Cockpit UI 10. Add virtualization hosts to Red Hat Virtualization Manager 11. Reinstalling a virtualization host 12. Replacing the primary storage host 13. Replacing a Gluster Storage Host Expand section "13. Replacing a Gluster Storage Host" Collapse section "13. Replacing a Gluster Storage Host" 13.1. Replacing a Gluster Storage Host (Different FQDN) 13.2. Replacing a Gluster Storage Node (Same FQDN) 14. Recovering from disaster Expand section "14. Recovering from disaster" Collapse section "14. Recovering from disaster" 14.1. Manually restoring data from a backup volume Expand section "14.1. Manually restoring data from a backup volume" Collapse section "14.1. Manually restoring data from a backup volume" 14.1.1. Restoring a volume from a geo-replicated backup 14.2. Failing over to a secondary cluster 14.3. Failing back to a primary cluster 14.4. Stopping a geo-replication session using RHV Manager 14.5. Turning off scheduled backups by deleting the geo-replication schedule III. Reference material Expand section "III. Reference material" Collapse section "III. Reference material" A. Fencing Policies for Red Hat Gluster Storage B. Example gdeploy configuration files Expand section "B. Example gdeploy configuration files" Collapse section "B. Example gdeploy configuration files" B.1. Example gdeploy configuration file for setting up TLS/SSL B.2. Example gdeploy configuration file for preparing a replacement host B.3. Example gdeploy configuration file for scaling to additional nodes Legal Notice Settings Close Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Part I. Configuration tasks Previous Next