Jump To Close Expand all Collapse all Table of contents Deploying Red Hat Hyperconverged Infrastructure 1. Known Issues I. Plan Expand section "I. Plan" Collapse section "I. Plan" 2. Architecture 3. Support Requirements Expand section "3. Support Requirements" Collapse section "3. Support Requirements" 3.1. Operating System 3.2. Physical Machines 3.3. Virtual Machines 3.4. Networking 3.5. Storage Expand section "3.5. Storage" Collapse section "3.5. Storage" 3.5.1. Architecture 3.5.2. RAID 3.5.3. JBOD 3.5.4. Volume Types 3.6. Support limitations 3.7. Disaster Recovery II. Deploy Expand section "II. Deploy" Collapse section "II. Deploy" 4. Deployment Workflow 5. Install Host Physical Machines 6. Configure Public Key based SSH Authentication 7. Configure Red Hat Gluster Storage for Hosted Engine using the Cockpit UI 8. Deploy the Hosted Engine using the Cockpit UI 9. Configure Red Hat Gluster Storage as a Red Hat Virtualization storage domain Expand section "9. Configure Red Hat Gluster Storage as a Red Hat Virtualization storage domain" Collapse section "9. Configure Red Hat Gluster Storage as a Red Hat Virtualization storage domain" 9.1. Create the logical network for gluster traffic 9.2. Create the master storage domain 9.3. Add remaining virtualization hosts to the hosted engine III. Troubleshoot Expand section "III. Troubleshoot" Collapse section "III. Troubleshoot" 10. Handling Hosted Engine Deployment Errors 11. Cleaning up Automated Red Hat Gluster Storage Deployment Errors IV. Verify Expand section "IV. Verify" Collapse section "IV. Verify" 12. Verify your deployment V. Reference Material Expand section "V. Reference Material" Collapse section "V. Reference Material" A. Configuring encryption during deployment Expand section "A. Configuring encryption during deployment" Collapse section "A. Configuring encryption during deployment" A.1. Configuring TLS/SSL during deployment using a Certificate Authority signed certificate Expand section "A.1. Configuring TLS/SSL during deployment using a Certificate Authority signed certificate" Collapse section "A.1. Configuring TLS/SSL during deployment using a Certificate Authority signed certificate" A.1.1. Before you begin A.1.2. Configuring TLS/SSL encryption using a CA-signed certificate A.2. Configuring TLS/SSL encryption during deployment using a self signed certificate B. Example cleanup configuration files for gdeploy C. Understanding the generated gdeploy configuration file Legal Notice Settings Close Language: English 한국어 日本語 简体中文 Language: English 한국어 日本語 简体中文 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English 한국어 日本語 简体中文 Language: English 한국어 日本語 简体中文 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Part IV. Verify Previous Next