Chapter 8. Installing Red Hat Enterprise Virtualization Hypervisor Hosts
- 8.1. Red Hat Enterprise Virtualization Hypervisor Installation Overview
- 8.2. Installing the Red Hat Enterprise Virtualization Hypervisor Packages
- 8.3. Preparing Hypervisor Installation Media
- 8.4. Installing the Hypervisor
- 8.5. Configuring the Hypervisor
- 8.5.1. Logging into the Hypervisor
- 8.5.2. Selecting Hypervisor Keyboard
- 8.5.3. Viewing Hypervisor Status
- 8.5.4. Configuring Hypervisor Network
- 8.5.5. Configuring Hypervisor Security
- 8.5.6. Configuring Hypervisor Simple Network Management Protocol
- 8.5.7. Configuring Hypervisor Common Information Model
- 8.5.8. Configuring Logging
- 8.5.9. Configuring the Hypervisor for Red Hat Network
- 8.5.10. Configuring Hypervisor Kernel Dumps
- 8.5.11. Configuring Hypervisor Remote Storage
- 8.6. Attaching the Hypervisor to the Red Hat Enterprise Virtualization Manager
8.1. Red Hat Enterprise Virtualization Hypervisor Installation Overview
Before commencing Hypervisor installation you must be aware that:
- The Red Hat Enterprise Virtualization Hypervisor must be installed on a physical server. It must not be installed in a Virtual Machine.
- The installation process will reconfigure the selected storage device and destroy all data. Therefore, ensure that any data to be retained is successfully backed up before proceeding.
- All Hypervisors in an environment must have unique hostnames and IP addresses, in order to avoid network conflicts.
- Instructions for using Network (PXE) Boot to install the Hypervisor are contained in the Red Hat Enterprise Linux - Installation Guide, available at https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux.
- Red Hat Enterprise Virtualization Hypervisors can use Storage Attached Networks (SANs) and other network storage for storing virtualized guest images. However, a local storage device is required for installing and booting the Hypervisor.
Note
Red Hat Enterprise Virtualization Hypervisor installations can be automated or conducted without interaction. This type of installation is only recommended for advanced users.