Jump To Close Expand all Collapse all Table of contents Director Installation and Usage 1. Introduction to director Expand section "1. Introduction to director" Collapse section "1. Introduction to director" 1.1. Undercloud 1.2. Understanding the overcloud 1.3. Understanding high availability in Red Hat OpenStack Platform 1.4. Understanding containerization in Red Hat OpenStack Platform 1.5. Working with Ceph Storage in Red Hat OpenStack Platform I. Director installation and configuration Expand section "I. Director installation and configuration" Collapse section "I. Director installation and configuration" 2. Planning your undercloud Expand section "2. Planning your undercloud" Collapse section "2. Planning your undercloud" 2.1. Containerized undercloud 2.2. Preparing your undercloud networking 2.3. Determining environment scale 2.4. Undercloud disk sizing 2.5. Virtualization support 2.6. Character encoding configuration 2.7. Considerations when running the undercloud with a proxy 2.8. Undercloud repositories 3. Preparing for director installation Expand section "3. Preparing for director installation" Collapse section "3. Preparing for director installation" 3.1. Preparing the undercloud 3.2. Installing ceph-ansible 3.3. Preparing container images 3.4. Container image preparation parameters 3.5. Layering image preparation entries 3.6. Excluding Ceph Storage container images 3.7. Obtaining container images from private registries 3.8. Modifying images during preparation 3.9. Updating existing packages on container images 3.10. Installing additional RPM files to container images 3.11. Modifying container images with a custom Dockerfile 3.12. Preparing a Satellite server for container images 4. Installing director Expand section "4. Installing director" Collapse section "4. Installing director" 4.1. Configuring director 4.2. Director configuration parameters 4.3. Configuring the undercloud with environment files 4.4. Common heat parameters for undercloud configuration 4.5. Configuring hieradata on the undercloud 4.6. Configuring the undercloud for bare metal provisioning over IPv6 4.7. Installing director 4.8. Obtaining images for overcloud nodes Expand section "4.8. Obtaining images for overcloud nodes" Collapse section "4.8. Obtaining images for overcloud nodes" 4.8.1. Single CPU architecture overclouds 4.8.2. Multiple CPU architecture overclouds 4.8.3. Minimal overcloud image 4.9. Setting a nameserver for the control plane 4.10. Updating the undercloud configuration 4.11. Undercloud container registry 4.12. Next steps 5. Installing undercloud minions Expand section "5. Installing undercloud minions" Collapse section "5. Installing undercloud minions" 5.1. Undercloud minion 5.2. Undercloud minion requirements 5.3. Preparing a minion 5.4. Copying the undercloud configuration files to the minion 5.5. Copying the undercloud certificate authority 5.6. Configuring the minion 5.7. Minion configuration parameters 5.8. Installing the minion 5.9. Verifying the minion installation 5.10. Next Steps II. Basic overcloud deployment Expand section "II. Basic overcloud deployment" Collapse section "II. Basic overcloud deployment" 6. Planning your overcloud Expand section "6. Planning your overcloud" Collapse section "6. Planning your overcloud" 6.1. Node roles 6.2. Overcloud networks 6.3. Overcloud storage 6.4. Overcloud security 6.5. Overcloud high availability 6.6. Controller node requirements 6.7. Compute node requirements 6.8. Ceph Storage node requirements 6.9. Object Storage node requirements 6.10. Overcloud repositories 6.11. Provisioning methods 7. Configuring a basic overcloud with CLI tools Expand section "7. Configuring a basic overcloud with CLI tools" Collapse section "7. Configuring a basic overcloud with CLI tools" 7.1. Registering nodes for the overcloud 7.2. Validating the introspection requirements 7.3. Inspecting the hardware of nodes 7.4. Tagging nodes into profiles 7.5. Setting UEFI boot mode 7.6. Enabling virtual media boot 7.7. Defining the root disk for multi-disk clusters 7.8. Using the overcloud-minimal image to avoid using a Red Hat subscription entitlement 7.9. Creating architecture specific roles 7.10. Environment files 7.11. Creating an environment file that defines node counts and flavors 7.12. Creating an environment file for undercloud CA trust 7.13. Deployment command 7.14. Deployment command options 7.15. Including environment files in an overcloud deployment 7.16. Validating the deployment requirements 7.17. Overcloud deployment output 7.18. Accessing the overcloud 7.19. Validating the post-deployment state 7.20. Next steps 8. Provisioning bare metal nodes before deploying the overcloud Expand section "8. Provisioning bare metal nodes before deploying the overcloud" Collapse section "8. Provisioning bare metal nodes before deploying the overcloud" 8.1. Registering nodes for the overcloud 8.2. Inspecting the hardware of nodes 8.3. Provisioning bare metal nodes 8.4. Scaling up bare metal nodes 8.5. Scaling down bare metal nodes 8.6. Bare metal node provisioning attributes 9. Configuring a basic overcloud with pre-provisioned nodes Expand section "9. Configuring a basic overcloud with pre-provisioned nodes" Collapse section "9. Configuring a basic overcloud with pre-provisioned nodes" 9.1. Pre-provisioned node requirements 9.2. Creating a user on pre-provisioned nodes 9.3. Registering the operating system for pre-provisioned nodes 9.4. Configuring SSL/TLS access to director 9.5. Configuring networking for the control plane 9.6. Using a separate network for pre-provisioned nodes 9.7. Mapping pre-provisioned node hostnames 9.8. Configuring Ceph Storage for pre-provisioned nodes 9.9. Creating the overcloud with pre-provisioned nodes 9.10. Overcloud deployment output 9.11. Accessing the overcloud 9.12. Scaling pre-provisioned nodes 9.13. Removing a pre-provisioned overcloud 9.14. Next steps 10. Deploying multiple overclouds Expand section "10. Deploying multiple overclouds" Collapse section "10. Deploying multiple overclouds" 10.1. Deploying additional overclouds 10.2. Managing multiple overclouds III. Post deployment operations Expand section "III. Post deployment operations" Collapse section "III. Post deployment operations" 11. Performing overcloud post-installation tasks Expand section "11. Performing overcloud post-installation tasks" Collapse section "11. Performing overcloud post-installation tasks" 11.1. Checking overcloud deployment status 11.2. Creating basic overcloud flavors 11.3. Creating a default tenant network 11.4. Creating a default floating IP network 11.5. Creating a default provider network 11.6. Creating additional bridge mappings 11.7. Validating the overcloud 11.8. Protecting the overcloud from removal 12. Performing basic overcloud administration tasks Expand section "12. Performing basic overcloud administration tasks" Collapse section "12. Performing basic overcloud administration tasks" 12.1. Managing containerized services 12.2. Modifying the overcloud environment 12.3. Importing virtual machines into the overcloud 12.4. Running the dynamic inventory script 12.5. Removing the overcloud 13. Configuring the overcloud with Ansible Expand section "13. Configuring the overcloud with Ansible" Collapse section "13. Configuring the overcloud with Ansible" 13.1. Ansible-based overcloud configuration (config-download) 13.2. config-download working directory 13.3. Enabling access to config-download working directories 13.4. Checking config-download log 13.5. Separating the provisioning and configuration processes 13.6. Running config-download manually 13.7. Performing Git operations on the working directory 13.8. Creating config-download files manually 13.9. config-download top level files 13.10. config-download tags 13.11. config-download deployment steps 13.12. Next Steps 14. Using the validation framework Expand section "14. Using the validation framework" Collapse section "14. Using the validation framework" 14.1. Ansible-based validations 14.2. Listing validations 14.3. Running validations 14.4. In-flight validations 15. Scaling overcloud nodes Expand section "15. Scaling overcloud nodes" Collapse section "15. Scaling overcloud nodes" 15.1. Adding nodes to the overcloud 15.2. Increasing node counts for roles 15.3. Removing Compute nodes 15.4. Replacing Ceph Storage nodes 15.5. Replacing Object Storage nodes 15.6. Blacklisting nodes 16. Replacing Controller nodes Expand section "16. Replacing Controller nodes" Collapse section "16. Replacing Controller nodes" 16.1. Preparing for Controller replacement 16.2. Removing a Ceph Monitor daemon 16.3. Preparing the cluster for Controller node replacement 16.4. Replacing a Controller node 16.5. Triggering the Controller node replacement 16.6. Cleaning up after Controller node replacement 17. Rebooting nodes Expand section "17. Rebooting nodes" Collapse section "17. Rebooting nodes" 17.1. Rebooting the undercloud node 17.2. Rebooting Controller and composable nodes 17.3. Rebooting standalone Ceph MON nodes 17.4. Rebooting a Ceph Storage (OSD) cluster 17.5. Rebooting Compute nodes IV. Additional director operations and configuration Expand section "IV. Additional director operations and configuration" Collapse section "IV. Additional director operations and configuration" 18. Configuring custom SSL/TLS certificates Expand section "18. Configuring custom SSL/TLS certificates" Collapse section "18. Configuring custom SSL/TLS certificates" 18.1. Initializing the signing host 18.2. Creating a certificate authority 18.3. Adding the certificate authority to clients 18.4. Creating an SSL/TLS key 18.5. Creating an SSL/TLS certificate signing request 18.6. Creating the SSL/TLS certificate 18.7. Adding the certificate to the undercloud 19. Additional introspection operations Expand section "19. Additional introspection operations" Collapse section "19. Additional introspection operations" 19.1. Performing individual node introspection 19.2. Performing node introspection after initial introspection 19.3. Performing network introspection for interface information 20. Automatically discovering bare metal nodes Expand section "20. Automatically discovering bare metal nodes" Collapse section "20. Automatically discovering bare metal nodes" 20.1. Prerequisites 20.2. Enabling auto-discovery 20.3. Testing auto-discovery 20.4. Using rules to discover different vendor hardware 21. Configuring automatic profile tagging Expand section "21. Configuring automatic profile tagging" Collapse section "21. Configuring automatic profile tagging" 21.1. Policy file syntax 21.2. Policy file example 21.3. Importing policy files 22. Creating whole disk images Expand section "22. Creating whole disk images" Collapse section "22. Creating whole disk images" 22.1. Security hardening measures 22.2. Whole disk image workflow 22.3. Downloading the base cloud image 22.4. Disk image environment variables 22.5. Customizing the disk layout 22.6. Modifying the partitioning schema 22.7. Modifying the image size 22.8. Building the whole disk image 22.9. Uploading the whole disk image 23. Configuring Direct Deploy Expand section "23. Configuring Direct Deploy" Collapse section "23. Configuring Direct Deploy" 23.1. Configuring the direct deploy interface on the undercloud 24. Creating virtualized control planes Expand section "24. Creating virtualized control planes" Collapse section "24. Creating virtualized control planes" 24.1. Virtualized control plane architecture 24.2. Benefits and limitations of virtualizing your RHOSP overcloud control plane 24.3. Provisioning virtualized controllers using the Red Hat Virtualization driver V. Troubleshooting and tips Expand section "V. Troubleshooting and tips" Collapse section "V. Troubleshooting and tips" 25. Troubleshooting director errors Expand section "25. Troubleshooting director errors" Collapse section "25. Troubleshooting director errors" 25.1. Troubleshooting node registration 25.2. Troubleshooting hardware introspection 25.3. Troubleshooting workflows and executions 25.4. Troubleshooting overcloud creation and deployment 25.5. Troubleshooting node provisioning 25.6. Troubleshooting IP address conflicts during provisioning 25.7. Troubleshooting "No Valid Host Found" errors 25.8. Troubleshooting overcloud configuration 25.9. Troubleshooting container configuration 25.10. Troubleshooting Compute node failures 25.11. Creating an sosreport 25.12. Log locations 26. Tips for undercloud and overcloud services Expand section "26. Tips for undercloud and overcloud services" Collapse section "26. Tips for undercloud and overcloud services" 26.1. Review the database flush intervals 26.2. Tuning deployment performance 26.3. Running swift-ring-builder in a container 26.4. Changing the SSL/TLS cipher rules for HAProxy VI. Appendices Expand section "VI. Appendices" Collapse section "VI. Appendices" A. Power management drivers Expand section "A. Power management drivers" Collapse section "A. Power management drivers" A.1. Intelligent Platform Management Interface (IPMI) A.2. Redfish A.3. Dell Remote Access Controller (DRAC) A.4. Integrated Lights-Out (iLO) A.5. Fujitsu Integrated Remote Management Controller (iRMC) A.6. Red Hat Virtualization A.7. manual-management Driver B. Red Hat OpenStack Platform for POWER Expand section "B. Red Hat OpenStack Platform for POWER" Collapse section "B. Red Hat OpenStack Platform for POWER" B.1. Ceph Storage B.2. Composable services Legal Notice Settings Close Language: 日本語 English 한국어 简体中文 Language: 日本語 English 한국어 简体中文 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 English 한국어 简体中文 Language: 日本語 English 한국어 简体中文 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Part I. Director installation and configuration Previous Next