Jump To Close Expand all Collapse all Table of contents Director Installation and Usage 1. Introduction Expand section "1. Introduction" Collapse section "1. Introduction" 1.1. Undercloud 1.2. Overcloud 1.3. High Availability 1.4. Containerization 1.5. Ceph Storage I. Director Installation and Configuration Expand section "I. Director Installation and Configuration" Collapse section "I. Director Installation and Configuration" 2. Planning your undercloud Expand section "2. Planning your undercloud" Collapse section "2. Planning your undercloud" 2.1. Containerized undercloud 2.2. Preparing your undercloud networking 2.3. Determining environment scale 2.4. Undercloud disk sizing 2.5. Virtualization support 2.6. Character encoding configuration 2.7. Considerations when running the undercloud with a proxy 2.8. Undercloud repositories 3. Preparing for director installation Expand section "3. Preparing for director installation" Collapse section "3. Preparing for director installation" 3.1. Preparing the undercloud 3.2. Installing ceph-ansible 3.3. Preparing container images 3.4. Container image preparation parameters 3.5. Layering image preparation entries 3.6. Excluding Ceph Storage container images 3.7. Obtaining container images from private registries 3.8. Modifying images during preparation 3.9. Updating existing packages on container images 3.10. Installing additional RPM files to container images 3.11. Modifying container images with a custom Dockerfile 3.12. Preparing a Satellite server for container images 4. Installing director Expand section "4. Installing director" Collapse section "4. Installing director" 4.1. Configuring the director 4.2. Director configuration parameters 4.3. Configuring the undercloud with environment files 4.4. Common Heat parameters for undercloud configuration 4.5. Configuring hieradata on the undercloud 4.6. Installing the director 4.7. Obtaining images for overcloud nodes Expand section "4.7. Obtaining images for overcloud nodes" Collapse section "4.7. Obtaining images for overcloud nodes" 4.7.1. Single CPU architecture overclouds 4.7.2. Multiple CPU architecture overclouds 4.7.3. Minimal overcloud image 4.8. Setting a nameserver for the control plane 4.9. Updating the undercloud configuration 4.10. Undercloud container registry 4.11. Next Steps II. Basic Overcloud Deployment Expand section "II. Basic Overcloud Deployment" Collapse section "II. Basic Overcloud Deployment" 5. Planning your overcloud Expand section "5. Planning your overcloud" Collapse section "5. Planning your overcloud" 5.1. Node roles 5.2. Overcloud networks 5.3. Overcloud storage 5.4. Overcloud security 5.5. Overcloud high availability 5.6. Controller node requirements 5.7. Compute node requirements 5.8. Ceph Storage node requirements 5.9. Object Storage node requirements 5.10. Overcloud repositories 6. Configuring a basic overcloud with CLI tools Expand section "6. Configuring a basic overcloud with CLI tools" Collapse section "6. Configuring a basic overcloud with CLI tools" 6.1. Registering Nodes for the Overcloud 6.2. Inspecting the hardware of nodes 6.3. Tagging nodes into profiles 6.4. Setting UEFI boot mode 6.5. Defining the root disk for multi-disk clusters 6.6. Using the overcloud-minimal image to avoid using a Red Hat subscription entitlement 6.7. Creating architecture specific roles 6.8. Environment files 6.9. Creating an environment file that defines node counts and flavors 6.10. Creating an environment file for undercloud CA trust 6.11. Deployment command 6.12. Deployment command options 6.13. Including environment files in an overcloud deployment 6.14. Validating the overcloud configuration before deployment operations 6.15. Overcloud deployment output 6.16. Accessing the overcloud 6.17. Next steps 7. Configuring a basic overcloud with pre-provisioned nodes Expand section "7. Configuring a basic overcloud with pre-provisioned nodes" Collapse section "7. Configuring a basic overcloud with pre-provisioned nodes" 7.1. Pre-provisioned node requirements 7.2. Creating a user on pre-provisioned nodes 7.3. Registering the operating system for pre-provisioned nodes 7.4. Configuring SSL/TLS access to director 7.5. Configuring networking for the control plane 7.6. Using a separate network for pre-provisioned nodes 7.7. Mapping pre-provisioned node hostnames 7.8. Configuring Ceph Storage for Pre-Provisioned Nodes 7.9. Creating the Overcloud with Pre-Provisioned Nodes 7.10. Overcloud deployment output 7.11. Accessing the overcloud 7.12. Scaling pre-provisioned nodes 7.13. Removing a Pre-Provisioned Overcloud 7.14. Next steps 8. Deploying multiple overclouds Expand section "8. Deploying multiple overclouds" Collapse section "8. Deploying multiple overclouds" 8.1. Deploying additional overclouds 8.2. Managing multiple overclouds III. Post Deployment Operations Expand section "III. Post Deployment Operations" Collapse section "III. Post Deployment Operations" 9. Performing overcloud post-installation tasks Expand section "9. Performing overcloud post-installation tasks" Collapse section "9. Performing overcloud post-installation tasks" 9.1. Checking overcloud deployment status 9.2. Creating basic overcloud flavors 9.3. Creating a default tenant network 9.4. Creating a default floating IP network 9.5. Creating a default provider network 9.6. Creating additional bridge mappings 9.7. Validating the overcloud 9.8. Protecting the overcloud from removal 10. Performing basic overcloud administration tasks Expand section "10. Performing basic overcloud administration tasks" Collapse section "10. Performing basic overcloud administration tasks" 10.1. Managing containerized services 10.2. Modifying the overcloud environment 10.3. Importing virtual machines into the overcloud 10.4. Running the dynamic inventory script 10.5. Removing the overcloud 11. Configuring the overcloud with Ansible Expand section "11. Configuring the overcloud with Ansible" Collapse section "11. Configuring the overcloud with Ansible" 11.1. Ansible-based overcloud configuration (config-download) 11.2. config-download working directory 11.3. Enabling access to config-download working directories 11.4. Checking config-download log 11.5. Running config-download manually 11.6. Performing Git operations on the working directory 11.7. Creating config-download files manually 11.8. config-download top level files 11.9. config-download tags 11.10. config-download deployment steps 11.11. Next Steps 12. Scaling overcloud nodes Expand section "12. Scaling overcloud nodes" Collapse section "12. Scaling overcloud nodes" 12.1. Adding nodes to the overcloud 12.2. Increasing node counts for roles 12.3. Removing Compute nodes 12.4. Replacing Ceph Storage nodes 12.5. Replacing Object Storage nodes 12.6. Blacklisting nodes 13. Replacing Controller Nodes Expand section "13. Replacing Controller Nodes" Collapse section "13. Replacing Controller Nodes" 13.1. Preparing for Controller replacement 13.2. Removing a Ceph Monitor daemon 13.3. Preparing the cluster for Controller replacement 13.4. Replacing a Controller node 13.5. Triggering the Controler node replacement 13.6. Cleaning up after Controller node replacement 14. Rebooting nodes Expand section "14. Rebooting nodes" Collapse section "14. Rebooting nodes" 14.1. Rebooting the undercloud node 14.2. Rebooting Controller and composable nodes 14.3. Rebooting standalone Ceph MON nodes 14.4. Rebooting a Ceph Storage (OSD) cluster 14.5. Rebooting Compute nodes IV. Additional Director Operations and Configuration Expand section "IV. Additional Director Operations and Configuration" Collapse section "IV. Additional Director Operations and Configuration" 15. Configuring custom SSL/TLS certificates Expand section "15. Configuring custom SSL/TLS certificates" Collapse section "15. Configuring custom SSL/TLS certificates" 15.1. Initializing the signing host 15.2. Creating a certificate authority 15.3. Adding the certificate authority to clients 15.4. Creating an SSL/TLS key 15.5. Creating an SSL/TLS certificate signing request 15.6. Creating the SSL/TLS certificate 15.7. Adding the certificate to the undercloud 16. Additional introspection operations Expand section "16. Additional introspection operations" Collapse section "16. Additional introspection operations" 16.1. Performing Individual Node Introspection 16.2. Performing Node Introspection after Initial Introspection 16.3. Performing Network Introspection for Interface Information 17. Automatically Discover Bare Metal Nodes Expand section "17. Automatically Discover Bare Metal Nodes" Collapse section "17. Automatically Discover Bare Metal Nodes" 17.1. Requirements 17.2. Enable Auto-discovery 17.3. Test Auto-discovery 17.4. Use Rules to Discover Different Vendor Hardware 18. Configuring automatic profile tagging Expand section "18. Configuring automatic profile tagging" Collapse section "18. Configuring automatic profile tagging" 18.1. Policy file syntax 18.2. Policy file example 18.3. Importing policy files 19. Creating whole disk images Expand section "19. Creating whole disk images" Collapse section "19. Creating whole disk images" 19.1. Security hardening measures 19.2. Whole disk image workflow 19.3. Downloading the base cloud image 19.4. Disk image environment variables 19.5. Customizing the disk layout 19.6. Modifying the partitioning schema 19.7. Modifying the image size 19.8. Building the whole disk image 19.9. Uploading the whole disk image 20. Configuring Direct Deploy Expand section "20. Configuring Direct Deploy" Collapse section "20. Configuring Direct Deploy" 20.1. Configuring the direct deploy interface on the undercloud 21. Creating virtualized control planes Expand section "21. Creating virtualized control planes" Collapse section "21. Creating virtualized control planes" 21.1. Virtualized control plane architecture 21.2. Benefits and limitations of virtualizing your RHOSP overcloud control plane 21.3. Provisioning virtualized controllers using the Red Hat Virtualization driver V. Troubleshooting and Tips Expand section "V. Troubleshooting and Tips" Collapse section "V. Troubleshooting and Tips" 22. Troubleshooting director errors Expand section "22. Troubleshooting director errors" Collapse section "22. Troubleshooting director errors" 22.1. Troubleshooting node registration 22.2. Troubleshooting hardware introspection 22.3. Troubleshooting workflows and executions 22.4. Troubleshooting overcloud creation and deployment 22.5. Troubleshooting node provisioning 22.6. Troubleshooting IP address conflicts during provisioning 22.7. Troubleshooting "No Valid Host Found" errors 22.8. Troubleshooting overcloud configuration 22.9. Troubleshooting container configuration 22.10. Troubleshooting Compute node failures 22.11. Creating an sosreport 22.12. Log locations 23. Tips for undercloud and overcloud services Expand section "23. Tips for undercloud and overcloud services" Collapse section "23. Tips for undercloud and overcloud services" 23.1. Review the database flush intervals 23.2. Tuning deployment performance 23.3. Running swift-ring-builder in a container 23.4. Changing the SSL/TLS cipher rules for HAProxy VI. Appendices Expand section "VI. Appendices" Collapse section "VI. Appendices" A. Power Management Drivers Expand section "A. Power Management Drivers" Collapse section "A. Power Management Drivers" A.1. Intelligent Platform Management Interface (IPMI) A.2. Redfish A.3. Dell Remote Access Controller (DRAC) A.4. Integrated Lights-Out (iLO) A.5. Cisco Unified Computing System (UCS) A.6. Fujitsu Integrated Remote Management Controller (iRMC) A.7. Red Hat Virtualization A.8. manual-management Driver B. Red Hat OpenStack Platform for POWER Expand section "B. Red Hat OpenStack Platform for POWER" Collapse section "B. Red Hat OpenStack Platform for POWER" B.1. Ceph Storage B.2. Composable Services Legal Notice Settings Close Language: 日本語 English 한국어 简体中文 Language: 日本語 English 한국어 简体中文 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 English 한국어 简体中文 Language: 日本語 English 한국어 简体中文 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Part V. Troubleshooting and Tips Previous Next