Jump To Close Expand all Collapse all Table of contents Deploying Red Hat Hyperconverged Infrastructure for Virtualization Making open source more inclusive I. Plan Expand section "I. Plan" Collapse section "I. Plan" 1. Architecture Expand section "1. Architecture" Collapse section "1. Architecture" 1.1. Understanding VDO 2. Support requirements Expand section "2. Support requirements" Collapse section "2. Support requirements" 2.1. Operating system Expand section "2.1. Operating system" Collapse section "2.1. Operating system" 2.1.1. Browser requirements 2.2. Physical machines 2.3. Virtual machines 2.4. Hosted Engine virtual machine 2.5. Networking 2.6. Storage Expand section "2.6. Storage" Collapse section "2.6. Storage" 2.6.1. Disks 2.6.2. RAID 2.6.3. JBOD 2.6.4. Logical volumes 2.6.5. Red Hat Gluster Storage volumes 2.6.6. Volume types 2.7. Disk encryption 2.8. Virtual Data Optimizer (VDO) 2.9. Scaling 2.10. Existing Red Hat Gluster Storage configurations 2.11. Disaster recovery Expand section "2.11. Disaster recovery" Collapse section "2.11. Disaster recovery" 2.11.1. Prerequisites for geo-replication 2.11.2. Prerequisites for failover and failback configuration 2.12. Additional requirements for single node deployments 3. Recommendations Expand section "3. Recommendations" Collapse section "3. Recommendations" 3.1. General recommendations 3.2. Security recommendations 3.3. Host recommendations 3.4. Networking recommendations Expand section "3.4. Networking recommendations" Collapse section "3.4. Networking recommendations" 3.4.1. Recommended practices for configuring host networks 3.5. Self-hosted engine recommendations II. Deploy Expand section "II. Deploy" Collapse section "II. Deploy" 4. Deployment workflow 5. Installing operating systems Expand section "5. Installing operating systems" Collapse section "5. Installing operating systems" 5.1. Installing hyperconverged hosts Expand section "5.1. Installing hyperconverged hosts" Collapse section "5.1. Installing hyperconverged hosts" 5.1.1. Installing a hyperconverged host with Red Hat Virtualization 4 Expand section "5.1.1. Installing a hyperconverged host with Red Hat Virtualization 4" Collapse section "5.1.1. Installing a hyperconverged host with Red Hat Virtualization 4" 5.1.1.1. Downloading the Red Hat Virtualization 4 operating system 5.1.1.2. Installing the Red Hat Virtualization 4 operating system on hyperconverged hosts 5.2. Installing Network-Bound Disk Encryption key servers Expand section "5.2. Installing Network-Bound Disk Encryption key servers" Collapse section "5.2. Installing Network-Bound Disk Encryption key servers" 5.2.1. Installing an NBDE key server with Red Hat Enterprise Linux 8 Expand section "5.2.1. Installing an NBDE key server with Red Hat Enterprise Linux 8" Collapse section "5.2.1. Installing an NBDE key server with Red Hat Enterprise Linux 8" 5.2.1.1. Downloading the Red Hat Enterprise Linux 8 operating system 5.2.1.2. Installing the Red Hat Enterprise Linux 8 operating system on Network-Bound Disk Encryption key servers 5.2.2. Installing an NBDE key server with Red Hat Enterprise Linux 7 Expand section "5.2.2. Installing an NBDE key server with Red Hat Enterprise Linux 7" Collapse section "5.2.2. Installing an NBDE key server with Red Hat Enterprise Linux 7" 5.2.2.1. Downloading the Red Hat Enterprise Linux 7 operating system 5.2.2.2. Installing the Red Hat Enterprise Linux 7 operating system on Network-Bound Disk Encryption key servers 6. Install additional software Expand section "6. Install additional software" Collapse section "6. Install additional software" 6.1. Configuring software access Expand section "6.1. Configuring software access" Collapse section "6.1. Configuring software access" 6.1.1. Configuring software repository access using the Web Console 6.2. Installing software Expand section "6.2. Installing software" Collapse section "6.2. Installing software" 6.2.1. Installing disk encryption software 7. Modifying firewall rules Expand section "7. Modifying firewall rules" Collapse section "7. Modifying firewall rules" 7.1. Modifying firewall rules for disk encryption 8. Configure Public Key based SSH Authentication without a password Expand section "8. Configure Public Key based SSH Authentication without a password" Collapse section "8. Configure Public Key based SSH Authentication without a password" 8.1. Generating SSH key pairs without a password 8.2. Copying SSH keys 9. Configure disk encryption Expand section "9. Configure disk encryption" Collapse section "9. Configure disk encryption" 9.1. Configuring Network-Bound Disk Encryption key servers 9.2. Configuring hyperconverged hosts as Network-Bound Disk Encryption clients Expand section "9.2. Configuring hyperconverged hosts as Network-Bound Disk Encryption clients" Collapse section "9.2. Configuring hyperconverged hosts as Network-Bound Disk Encryption clients" 9.2.1. Defining disk encryption configuration details 9.2.2. Executing the disk encryption configuration playbook 10. Configure Red Hat Gluster Storage for Hosted Engine using the Web Console 11. Deploy the Hosted Engine using the Web Console 12. Configure the logical network for gluster traffic Expand section "12. Configure the logical network for gluster traffic" Collapse section "12. Configure the logical network for gluster traffic" 12.1. Defining the logical network details for gluster traffic 12.2. Executing the gluster network playbook 12.3. Verifying the logical network for gluster traffic 12.4. (Optional) Editing the logical network for Jumbo frames III. Verify Expand section "III. Verify" Collapse section "III. Verify" 13. Verify your deployment IV. Next steps Expand section "IV. Next steps" Collapse section "IV. Next steps" 14. Enabling the Red Hat Virtualization Manager Repositories 15. Post-deployment configuration suggestions Expand section "15. Post-deployment configuration suggestions" Collapse section "15. Post-deployment configuration suggestions" 15.1. Configure notifications 15.2. (Optional)Configure Host Power Management 15.3. Configure backup and recovery options V. Troubleshoot Expand section "V. Troubleshoot" Collapse section "V. Troubleshoot" 16. Log file locations 17. Deployment errors Expand section "17. Deployment errors" Collapse section "17. Deployment errors" 17.1. Order of cleanup operations 17.2. Failed to deploy storage Expand section "17.2. Failed to deploy storage" Collapse section "17.2. Failed to deploy storage" 17.2.1. Cleaning up Network-Bound Disk Encryption after a failed deployment 17.2.2. Error: VDO signature detected on device 17.2.3. Manually cleaning up a VDO device 17.3. Failed to prepare virtual machine 17.4. Failed to deploy hosted engine VI. Reference material Expand section "VI. Reference material" Collapse section "VI. Reference material" A. Working with files encrypted using Ansible Vault Expand section "A. Working with files encrypted using Ansible Vault" Collapse section "A. Working with files encrypted using Ansible Vault" A.1. Encrypting files A.2. Editing encrypted files A.3. Rekeying encrypted files to a new password B. Understanding the luks_tang_inventory.yml file Expand section "B. Understanding the luks_tang_inventory.yml file" Collapse section "B. Understanding the luks_tang_inventory.yml file" B.1. Configuration parameters for disk encryption B.2. Example luks_tang_inventory.yml C. Understanding the gluster_network_inventory.yml file Expand section "C. Understanding the gluster_network_inventory.yml file" Collapse section "C. Understanding the gluster_network_inventory.yml file" C.1. Configuration parameters for creation of gluster network C.2. Example gluster_network_inventory.yml D. Glossary of terms Expand section "D. Glossary of terms" Collapse section "D. Glossary of terms" D.1. Virtualization terms D.2. Storage terms D.3. Hyperconverged Infrastructure terms Legal Notice Settings Close Language: 日本語 English Language: 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 English Language: 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Part III. Verify Previous Next