Jump To Close Expand all Collapse all Table of contents Deploying Red Hat Hyperconverged Infrastructure 1. Known Issues I. Plan Expand section "I. Plan" Collapse section "I. Plan" 2. Architecture 3. Support Requirements Expand section "3. Support Requirements" Collapse section "3. Support Requirements" 3.1. Operating System 3.2. Physical Machines 3.3. Virtual Machines 3.4. Networking 3.5. Storage Expand section "3.5. Storage" Collapse section "3.5. Storage" 3.5.1. Disks 3.5.2. JBOD 3.5.3. Logical Volumes 3.5.4. Red Hat Gluster Storage Volumes 3.5.5. Volume Types 3.6. Support limitations 3.7. Disaster Recovery II. Deploy Expand section "II. Deploy" Collapse section "II. Deploy" 4. Deployment Workflow 5. Install Host Physical Machines 6. Configure Public Key based SSH Authentication 7. Configure Red Hat Gluster Storage for Hosted Engine using the Cockpit UI 8. Deploy the Hosted Engine using the Cockpit UI 9. Configure Red Hat Gluster Storage as a Red Hat Virtualization storage domain Expand section "9. Configure Red Hat Gluster Storage as a Red Hat Virtualization storage domain" Collapse section "9. Configure Red Hat Gluster Storage as a Red Hat Virtualization storage domain" 9.1. Create the logical network for gluster traffic 9.2. Create the master storage domain 9.3. Add additional virtualization hosts to the hosted engine III. Verify Expand section "III. Verify" Collapse section "III. Verify" 10. Verify your deployment IV. Next Steps Expand section "IV. Next Steps" Collapse section "IV. Next Steps" 11. Post-deployment configuration suggestions Expand section "11. Post-deployment configuration suggestions" Collapse section "11. Post-deployment configuration suggestions" 11.1. Configure a logical volume cache for improved performance 11.2. Configure fencing for high availability 11.3. Configure geo-replication for disaster recovery V. Troubleshoot Expand section "V. Troubleshoot" Collapse section "V. Troubleshoot" 12. Log File Locations 13. Viewing Hosted Engine Deployment Errors 14. Cleaning up Automated Red Hat Gluster Storage Deployment Errors VI. Reference Material Expand section "VI. Reference Material" Collapse section "VI. Reference Material" A. Configuring encryption during deployment Expand section "A. Configuring encryption during deployment" Collapse section "A. Configuring encryption during deployment" A.1. Configuring TLS/SSL during deployment using a Certificate Authority signed certificate Expand section "A.1. Configuring TLS/SSL during deployment using a Certificate Authority signed certificate" Collapse section "A.1. Configuring TLS/SSL during deployment using a Certificate Authority signed certificate" A.1.1. Before you begin A.1.2. Configuring TLS/SSL encryption using a CA-signed certificate A.2. Configuring TLS/SSL encryption during deployment using a self signed certificate B. Example cleanup configuration files for gdeploy C. Understanding the generated gdeploy configuration file Legal Notice Settings Close Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Part V. Troubleshoot Previous Next