Jump To Close Expand all Collapse all Table of contents Director Installation and Usage 1. Introduction Expand section "1. Introduction" Collapse section "1. Introduction" 1.1. Undercloud 1.2. Overcloud 1.3. High Availability 1.4. Containerization 1.5. Ceph Storage I. Director Installation and Configuration Expand section "I. Director Installation and Configuration" Collapse section "I. Director Installation and Configuration" 2. Planning your undercloud Expand section "2. Planning your undercloud" Collapse section "2. Planning your undercloud" 2.1. Containerized undercloud 2.2. Preparing your undercloud networking 2.3. Determining environment scale 2.4. Undercloud disk sizing 2.5. Undercloud repositories 3. Preparing for director installation Expand section "3. Preparing for director installation" Collapse section "3. Preparing for director installation" 3.1. Preparing the undercloud 3.2. Configuring an undercloud proxy 3.3. Installing ceph-ansible 3.4. Preparing container images 3.5. Container image preparation parameters 3.6. Layering image preparation entries 3.7. Modifying images during preparation 3.8. Updating existing packages on container images 3.9. Installing additional RPM files to container images 3.10. Modifying container images with a custom Dockerfile 3.11. Preparing a Satellite server for container images 4. Installing director Expand section "4. Installing director" Collapse section "4. Installing director" 4.1. Configuring the director 4.2. Director configuration parameters 4.3. Configuring the undercloud with environment files 4.4. Common Heat parameters for undercloud configuration 4.5. Configuring hieradata on the undercloud 4.6. Installing the director 4.7. Obtaining images for overcloud nodes Expand section "4.7. Obtaining images for overcloud nodes" Collapse section "4.7. Obtaining images for overcloud nodes" 4.7.1. Single CPU architecture overclouds 4.7.2. Multiple CPU architecture overclouds 4.8. Setting a nameserver for the control plane 4.9. Updating the undercloud configuration 4.10. Next Steps II. Basic Overcloud Deployment Expand section "II. Basic Overcloud Deployment" Collapse section "II. Basic Overcloud Deployment" 5. Planning your overcloud Expand section "5. Planning your overcloud" Collapse section "5. Planning your overcloud" 5.1. Node roles 5.2. Overcloud networks 5.3. Overcloud storage 5.4. Overcloud security 5.5. Overcloud high availability 5.6. Controller node requirements 5.7. Compute node requirements 5.8. Ceph Storage node requirements 5.9. Object Storage node requirements 5.10. Overcloud repositories 6. Configuring a basic overcloud with CLI tools Expand section "6. Configuring a basic overcloud with CLI tools" Collapse section "6. Configuring a basic overcloud with CLI tools" 6.1. Registering Nodes for the Overcloud 6.2. Inspecting the hardware of nodes 6.3. Tagging nodes into profiles 6.4. Setting UEFI boot mode 6.5. Defining the root disk 6.6. Using the overcloud-minimal image to avoid using a Red Hat subscription entitlement 6.7. Creating architecture specific roles 6.8. Environment files 6.9. Creating an environment file that defines node counts and flavors 6.10. Creating an environment file for undercloud CA trust 6.11. Deployment command 6.12. Deployment command options 6.13. Including environment files in an overcloud deployment 6.14. Validating the overcloud configuration before deployment operations 6.15. Overcloud deployment output 6.16. Accessing the overcloud 6.17. Next steps 7. Configuring a Basic Overcloud using Pre-Provisioned Nodes Expand section "7. Configuring a Basic Overcloud using Pre-Provisioned Nodes" Collapse section "7. Configuring a Basic Overcloud using Pre-Provisioned Nodes" 7.1. Creating a User for Configuring Nodes 7.2. Registering the Operating System for Nodes 7.3. Configuring SSL/TLS Access to the Director 7.4. Configuring Networking for the Control Plane 7.5. Using a Separate Network for Overcloud Nodes 7.6. Mapping pre-provisioned node hostnames 7.7. Configuring Ceph Storage for Pre-Provisioned Nodes 7.8. Creating the Overcloud with Pre-Provisioned Nodes 7.9. Overcloud deployment output 7.10. Accessing the Overcloud 7.11. Scaling Pre-Provisioned Nodes 7.12. Removing a Pre-Provisioned Overcloud 7.13. Completing the Overcloud Creation III. Post Deployment Operations Expand section "III. Post Deployment Operations" Collapse section "III. Post Deployment Operations" 8. Performing Tasks after Overcloud Creation Expand section "8. Performing Tasks after Overcloud Creation" Collapse section "8. Performing Tasks after Overcloud Creation" 8.1. Checking overcloud deployment status 8.2. Managing containerized services 8.3. Creating the Overcloud Tenant Network 8.4. Creating the Overcloud External Network 8.5. Creating Additional Floating IP Networks 8.6. Creating the Overcloud Provider Network 8.7. Creating a basic Overcloud flavor 8.8. Validating the Overcloud 8.9. Modifying the Overcloud Environment 8.10. Running the dynamic inventory script 8.11. Importing Virtual Machines into the Overcloud 8.12. Migrating instances from a Compute node 8.13. Protecting the Overcloud from Removal 8.14. Removing the Overcloud 8.15. Review the Token Flush Interval 9. Configuring the overcloud with Ansible Expand section "9. Configuring the overcloud with Ansible" Collapse section "9. Configuring the overcloud with Ansible" 9.1. Ansible-based overcloud configuration (config-download) 9.2. config-download working directory 9.3. Enabling access to config-download working directories 9.4. Checking config-download log 9.5. Running config-download manually 9.6. Performing Git operations on the working directory 9.7. Creating config-download files manually 9.8. config-download top level files 9.9. config-download tags 9.10. config-download deployment steps 9.11. Next Steps 10. Scaling overcloud nodes Expand section "10. Scaling overcloud nodes" Collapse section "10. Scaling overcloud nodes" 10.1. Adding nodes to the overcloud 10.2. Increasing node counts for roles 10.3. Removing Compute nodes 10.4. Replacing Ceph Storage nodes 10.5. Replacing Object Storage nodes 10.6. Blacklisting nodes 11. Replacing Controller Nodes Expand section "11. Replacing Controller Nodes" Collapse section "11. Replacing Controller Nodes" 11.1. Preparing for Controller replacement 11.2. Removing a Ceph Monitor daemon 11.3. Preparing the cluster for Controller replacement 11.4. Replacing a Controller node 11.5. Triggering the Controler node replacement 11.6. Cleaning up after Controller node replacement 12. Rebooting Nodes Expand section "12. Rebooting Nodes" Collapse section "12. Rebooting Nodes" 12.1. Rebooting the undercloud node 12.2. Rebooting controller and composable nodes 12.3. Rebooting standalone Ceph MON nodes 12.4. Rebooting a Ceph Storage (OSD) cluster 12.5. Rebooting compute nodes IV. Additional Director Operations and Configuration Expand section "IV. Additional Director Operations and Configuration" Collapse section "IV. Additional Director Operations and Configuration" 13. Additional introspection operations Expand section "13. Additional introspection operations" Collapse section "13. Additional introspection operations" 13.1. Performing Individual Node Introspection 13.2. Performing Node Introspection after Initial Introspection 13.3. Performing Network Introspection for Interface Information 14. Automatically Discover Bare Metal Nodes Expand section "14. Automatically Discover Bare Metal Nodes" Collapse section "14. Automatically Discover Bare Metal Nodes" 14.1. Requirements 14.2. Enable Auto-discovery 14.3. Test Auto-discovery 14.4. Use Rules to Discover Different Vendor Hardware 15. Creating virtualized control planes Expand section "15. Creating virtualized control planes" Collapse section "15. Creating virtualized control planes" 15.1. Virtualized control plane architecture 15.2. Benefits and limitations of virtualizing your RHOSP overcloud control plane 15.3. Provisioning virtualized controllers using the Red Hat Virtualization driver 16. Configuring Direct Deploy Expand section "16. Configuring Direct Deploy" Collapse section "16. Configuring Direct Deploy" 16.1. Configuring the direct deploy interface on the undercloud V. Troubleshooting Expand section "V. Troubleshooting" Collapse section "V. Troubleshooting" 17. Troubleshooting Director Issues Expand section "17. Troubleshooting Director Issues" Collapse section "17. Troubleshooting Director Issues" 17.1. Troubleshooting Node Registration 17.2. Troubleshooting Hardware Introspection 17.3. Troubleshooting Workflows and Executions 17.4. Troubleshooting Overcloud Creation Expand section "17.4. Troubleshooting Overcloud Creation" Collapse section "17.4. Troubleshooting Overcloud Creation" 17.4.1. Accessing deployment command history 17.4.2. Orchestration 17.4.3. Bare Metal Provisioning 17.4.4. Checking overcloud configuration failures 17.5. Troubleshooting IP Address Conflicts on the Provisioning Network 17.6. Troubleshooting "No Valid Host Found" Errors 17.7. Troubleshooting the Overcloud after Creation Expand section "17.7. Troubleshooting the Overcloud after Creation" Collapse section "17.7. Troubleshooting the Overcloud after Creation" 17.7.1. Overcloud Stack Modifications 17.7.2. Controller Service Failures 17.7.3. Containerized Service Failures 17.7.4. Compute Service Failures 17.7.5. Ceph Storage Service Failures 17.8. Creating an sosreport 17.9. Important Logs for Undercloud and Overcloud VI. Appendices Expand section "VI. Appendices" Collapse section "VI. Appendices" A. SSL/TLS Certificate Configuration Expand section "A. SSL/TLS Certificate Configuration" Collapse section "A. SSL/TLS Certificate Configuration" A.1. Initializing the Signing Host A.2. Creating a Certificate Authority A.3. Adding the Certificate Authority to Clients A.4. Creating an SSL/TLS Key A.5. Creating an SSL/TLS Certificate Signing Request A.6. Creating the SSL/TLS Certificate A.7. Using the Certificate with the Undercloud B. Power Management Drivers Expand section "B. Power Management Drivers" Collapse section "B. Power Management Drivers" B.1. Intelligent Platform Management Interface (IPMI) B.2. Redfish B.3. Dell Remote Access Controller (DRAC) B.4. Integrated Lights-Out (iLO) B.5. Cisco Unified Computing System (UCS) B.6. Fujitsu Integrated Remote Management Controller (iRMC) B.7. Red Hat Virtualization B.8. Manual Management C. Whole Disk Images Expand section "C. Whole Disk Images" Collapse section "C. Whole Disk Images" C.1. Downloading the Base Cloud Image C.2. Disk Image Environment Variables C.3. Customizing the Disk Layout Expand section "C.3. Customizing the Disk Layout" Collapse section "C.3. Customizing the Disk Layout" C.3.1. Modifying the Partitioning Schema C.3.2. Modifying the Image Size C.4. Creating a Security Hardened Whole Disk Image C.5. Uploading a Security Hardened Whole Disk Image D. Alternative Boot Modes Expand section "D. Alternative Boot Modes" Collapse section "D. Alternative Boot Modes" D.1. Standard PXE E. Automatic Profile Tagging Expand section "E. Automatic Profile Tagging" Collapse section "E. Automatic Profile Tagging" E.1. Policy File Syntax E.2. Policy File Example E.3. Importing Policy Files E.4. Automatic Profile Tagging Properties F. Security Enhancements Expand section "F. Security Enhancements" Collapse section "F. Security Enhancements" F.1. Changing the SSL/TLS Cipher and Rules for HAProxy G. Red Hat OpenStack Platform for POWER Expand section "G. Red Hat OpenStack Platform for POWER" Collapse section "G. Red Hat OpenStack Platform for POWER" G.1. Ceph Storage G.2. Composable Services Legal Notice Settings Close Language: 简体中文 English 日本語 한국어 Language: 简体中文 English 日本語 한국어 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 简体中文 English 日本語 한국어 Language: 简体中文 English 日本語 한국어 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Red Hat Training A Red Hat training course is available for Red Hat OpenStack Platform Part V. Troubleshooting Previous Next