Jump To Close Expand all Collapse all Table of contents Maintaining Red Hat Hyperconverged Infrastructure I. Configuration Tasks Expand section "I. Configuration Tasks" Collapse section "I. Configuration Tasks" 1. Add Compute and Storage Resources Expand section "1. Add Compute and Storage Resources" Collapse section "1. Add Compute and Storage Resources" 1.1. Scaling RHHI deployments Expand section "1.1. Scaling RHHI deployments" Collapse section "1.1. Scaling RHHI deployments" 1.1.1. Before you begin 1.1.2. Scaling RHHI by adding additional volumes on new nodes 2. Configure High Availability using Fencing Policies Expand section "2. Configure High Availability using Fencing Policies" Collapse section "2. Configure High Availability using Fencing Policies" 2.1. Configuring Fencing Policies for Gluster Storage 3. Configure Disaster Recovery using Geo-replication Expand section "3. Configure Disaster Recovery using Geo-replication" Collapse section "3. Configure Disaster Recovery using Geo-replication" 3.1. Configuring geo-replication for disaster recovery Expand section "3.1. Configuring geo-replication for disaster recovery" Collapse section "3.1. Configuring geo-replication for disaster recovery" 3.1.1. Before you begin 3.1.2. Configuring a geo-replication session 3.1.3. Configuring synchronization schedule 3.1.4. Deleting synchronization schedule 4. Configure Encryption with Transport Layer Security (TLS/SSL) Expand section "4. Configure Encryption with Transport Layer Security (TLS/SSL)" Collapse section "4. Configure Encryption with Transport Layer Security (TLS/SSL)" 4.1. Configuring TLS/SSL using self-signed certificates 4.2. Configuring TLS/SSL using Certificate Authority signed certificates II. Maintenance Tasks Expand section "II. Maintenance Tasks" Collapse section "II. Maintenance Tasks" 5. Updating Red Hat Hyperconverged Infrastructure Expand section "5. Updating Red Hat Hyperconverged Infrastructure" Collapse section "5. Updating Red Hat Hyperconverged Infrastructure" 5.1. Update workflow 5.2. Before you update 5.3. Updating the Hosted Engine virtual machine 5.4. Updating the physical hosts 6. Replacing the Primary Gluster Storage Node 7. Replacing a Gluster Storage Node Expand section "7. Replacing a Gluster Storage Node" Collapse section "7. Replacing a Gluster Storage Node" 7.1. Replacing a Gluster Storage Node (Different FQDN) 7.2. Replacing a Gluster Storage Node (Same FQDN) 8. Restoring a volume from a geo-replicated backup III. Reference Material Expand section "III. Reference Material" Collapse section "III. Reference Material" A. Fencing Policies for Red Hat Gluster Storage B. Example gdeploy configuration files Expand section "B. Example gdeploy configuration files" Collapse section "B. Example gdeploy configuration files" B.1. Example gdeploy configuration file for setting up TLS/SSL B.2. Example gdeploy configuration file for preparing to replace a node B.3. Example gdeploy configuration file for scaling to additional nodes Legal Notice Settings Close Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Part III. Reference Material Previous Next