Jump To Close Expand all Collapse all Table of contents Automating RHHI for Virtualization deployment Making open source more inclusive 1. Ansible based deployment workflow 2. Support requirements Expand section "2. Support requirements" Collapse section "2. Support requirements" 2.1. Operating system Expand section "2.1. Operating system" Collapse section "2.1. Operating system" 2.1.1. Browser requirements 2.2. Physical machines 2.3. Virtual machines 2.4. Hosted Engine virtual machine 2.5. Networking 2.6. Storage Expand section "2.6. Storage" Collapse section "2.6. Storage" 2.6.1. Disks 2.6.2. RAID 2.6.3. JBOD 2.6.4. Logical volumes 2.6.5. Red Hat Gluster Storage volumes 2.6.6. Volume types 2.7. Disk encryption 2.8. Virtual Data Optimizer (VDO) 2.9. Scaling 2.10. Existing Red Hat Gluster Storage configurations 2.11. Disaster recovery Expand section "2.11. Disaster recovery" Collapse section "2.11. Disaster recovery" 2.11.1. Prerequisites for geo-replication 2.11.2. Prerequisites for failover and failback configuration 2.12. Additional requirements for single node deployments 3. Installing operating systems Expand section "3. Installing operating systems" Collapse section "3. Installing operating systems" 3.1. Installing hyperconverged hosts Expand section "3.1. Installing hyperconverged hosts" Collapse section "3.1. Installing hyperconverged hosts" 3.1.1. Installing a hyperconverged host with Red Hat Virtualization 4 Expand section "3.1.1. Installing a hyperconverged host with Red Hat Virtualization 4" Collapse section "3.1.1. Installing a hyperconverged host with Red Hat Virtualization 4" 3.1.1.1. Downloading the Red Hat Virtualization 4 operating system 3.1.1.2. Installing the Red Hat Virtualization 4 operating system on hyperconverged hosts 3.2. Installing Network-Bound Disk Encryption key servers Expand section "3.2. Installing Network-Bound Disk Encryption key servers" Collapse section "3.2. Installing Network-Bound Disk Encryption key servers" 3.2.1. Installing an NBDE key server with Red Hat Enterprise Linux 8 Expand section "3.2.1. Installing an NBDE key server with Red Hat Enterprise Linux 8" Collapse section "3.2.1. Installing an NBDE key server with Red Hat Enterprise Linux 8" 3.2.1.1. Downloading the Red Hat Enterprise Linux 8 operating system 3.2.1.2. Installing the Red Hat Enterprise Linux 8 operating system on Network-Bound Disk Encryption key servers 3.2.2. Installing an NBDE key server with Red Hat Enterprise Linux 7 Expand section "3.2.2. Installing an NBDE key server with Red Hat Enterprise Linux 7" Collapse section "3.2.2. Installing an NBDE key server with Red Hat Enterprise Linux 7" 3.2.2.1. Downloading the Red Hat Enterprise Linux 7 operating system 3.2.2.2. Installing the Red Hat Enterprise Linux 7 operating system on Network-Bound Disk Encryption key servers 4. Install additional software Expand section "4. Install additional software" Collapse section "4. Install additional software" 4.1. Configuring software access Expand section "4.1. Configuring software access" Collapse section "4.1. Configuring software access" 4.1.1. Configuring software repository access using the Web Console 4.2. Installing software Expand section "4.2. Installing software" Collapse section "4.2. Installing software" 4.2.1. Installing disk encryption software 5. Modifying firewall rules Expand section "5. Modifying firewall rules" Collapse section "5. Modifying firewall rules" 5.1. Modifying firewall rules for disk encryption 6. Configure Public Key based SSH Authentication without a password Expand section "6. Configure Public Key based SSH Authentication without a password" Collapse section "6. Configure Public Key based SSH Authentication without a password" 6.1. Generating SSH key pairs without a password 6.2. Copying SSH keys 7. Configure disk encryption Expand section "7. Configure disk encryption" Collapse section "7. Configure disk encryption" 7.1. Configuring Network-Bound Disk Encryption key servers 7.2. Configuring hyperconverged hosts as Network-Bound Disk Encryption clients Expand section "7.2. Configuring hyperconverged hosts as Network-Bound Disk Encryption clients" Collapse section "7.2. Configuring hyperconverged hosts as Network-Bound Disk Encryption clients" 7.2.1. Defining disk encryption configuration details 7.2.2. Executing the disk encryption configuration playbook 8. Defining deployment details 9. Executing the deployment playbook 10. Verify your deployment I. Troubleshoot Expand section "I. Troubleshoot" Collapse section "I. Troubleshoot" 11. Log file locations 12. Deployment errors Expand section "12. Deployment errors" Collapse section "12. Deployment errors" 12.1. Order of cleanup operations 12.2. Failed to deploy storage Expand section "12.2. Failed to deploy storage" Collapse section "12.2. Failed to deploy storage" 12.2.1. Cleaning up Network-Bound Disk Encryption after a failed deployment 12.2.2. Error: VDO signature detected on device 12.2.3. Manually cleaning up a VDO device 12.3. Failed to prepare virtual machine 12.4. Failed to deploy hosted engine II. Reference material Expand section "II. Reference material" Collapse section "II. Reference material" A. Working with files encrypted using Ansible Vault Expand section "A. Working with files encrypted using Ansible Vault" Collapse section "A. Working with files encrypted using Ansible Vault" A.1. Encrypting files A.2. Editing encrypted files A.3. Rekeying encrypted files to a new password B. Understanding the example configuration files Expand section "B. Understanding the example configuration files" Collapse section "B. Understanding the example configuration files" B.1. Understanding the luks_tang_inventory.yml file Expand section "B.1. Understanding the luks_tang_inventory.yml file" Collapse section "B.1. Understanding the luks_tang_inventory.yml file" B.1.1. Configuration parameters for disk encryption B.1.2. Example luks_tang_inventory.yml B.2. Understanding the gluster_inventory.yml file Expand section "B.2. Understanding the gluster_inventory.yml file" Collapse section "B.2. Understanding the gluster_inventory.yml file" B.2.1. Default host groups B.2.2. Configuration parameters for hyperconverged nodes Expand section "B.2.2. Configuration parameters for hyperconverged nodes" Collapse section "B.2.2. Configuration parameters for hyperconverged nodes" B.2.2.1. Multipath devices B.2.2.2. Deduplication and compression B.2.2.3. Cluster definition B.2.2.4. Storage infrastructure B.2.2.5. Firewall and network infrastructure B.2.2.6. Storage domains B.2.3. Example gluster_inventory.yml file B.3. Understanding the he_gluster_vars.json file Expand section "B.3. Understanding the he_gluster_vars.json file" Collapse section "B.3. Understanding the he_gluster_vars.json file" B.3.1. Required variables B.3.2. Required variables for static network configurations C. Example deployment using 3 hyperconverged nodes D. Example deployment using 6 hyperconverged nodes Legal Notice Settings Close Language: 日本語 English Language: 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 English Language: 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Part II. Reference material Previous Next