Show Table of Contents Hide Table of Contents English English Multi-page HTML Single-page HTML PDF ePub Deploying Red Hat Hyperconverged Infrastructure for VirtualizationI. Plan1. Architecture1.1. Understanding VDO2. Support requirements2.1. Operating system2.2. Physical machines2.3. Hosted Engine virtual machine2.4. Networking2.5. Storage2.5.1. Disks2.5.2. RAID2.5.3. JBOD2.5.4. Logical volumes2.5.5. Red Hat Gluster Storage volumes2.5.6. Volume types2.6. Virtual Data Optimizer (VDO)2.7. Scaling2.8. Existing Red Hat Gluster Storage configurations2.9. Disaster recovery2.9.1. Prerequisites for geo-replication2.9.2. Prerequisites for failover and failback configuration2.10. Additional requirements for single node deploymentsII. Deploy3. Deployment workflow4. Install Host Physical Machines5. Configure Public Key based SSH Authentication without a password6. Configure Red Hat Gluster Storage for Hosted Engine using the Cockpit UI7. Deploy the Hosted Engine using the Cockpit UI8. Configure Red Hat Gluster Storage as a Red Hat Virtualization storage domain8.1. Create the logical network for gluster traffic8.2. Add additional virtualization hosts to the hosted engineIII. Verify9. Verify your deploymentIV. Next steps10. Post-deployment configuration suggestions10.1. Configure a logical volume cache for improved performance10.2. Configure fencing for high availability10.3. Configure backup and recovery optionsV. Troubleshoot11. Log file locations12. Viewing Hosted Engine deployment errors12.1. Failed to prepare virtual machine12.2. Failed to deploy hosted engine13. Cleaning up automated Red Hat Gluster Storage deployment errorsVI. Reference materialA. Configuring encryption during deploymentA.1. Configuring TLS/SSL during deployment using a Certificate Authority signed certificateA.1.1. PrerequisitesA.1.2. Configuring TLS/SSL encryption using a CA-signed certificateA.2. Configuring TLS/SSL encryption during deployment using a self signed certificateB. Example cleanup configuration files for gdeployC. Understanding the generated gdeploy configuration fileD. Example gdeploy configuration file for configuring compression and deduplicationLegal Notice Part VI. Reference material 13. Cleaning up automated Red Hat Gluster Storage deployment errors A. Configuring encryption during deployment Where did the comment section go?Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.