Jump To Close Expand all Collapse all Table of contents Deploying Red Hat Hyperconverged Infrastructure for Virtualization I. Plan Expand section "I. Plan" Collapse section "I. Plan" 1. Architecture Expand section "1. Architecture" Collapse section "1. Architecture" 1.1. Understanding VDO 2. Support requirements Expand section "2. Support requirements" Collapse section "2. Support requirements" 2.1. Operating system 2.2. Physical machines 2.3. Hosted Engine virtual machine 2.4. Networking 2.5. Storage Expand section "2.5. Storage" Collapse section "2.5. Storage" 2.5.1. Disks 2.5.2. RAID 2.5.3. JBOD 2.5.4. Logical volumes 2.5.5. Red Hat Gluster Storage volumes 2.5.6. Volume types 2.6. Virtual Data Optimizer (VDO) 2.7. Scaling 2.8. Existing Red Hat Gluster Storage configurations 2.9. Disaster recovery Expand section "2.9. Disaster recovery" Collapse section "2.9. Disaster recovery" 2.9.1. Prerequisites for geo-replication 2.9.2. Prerequisites for failover and failback configuration 2.10. Additional requirements for single node deployments II. Deploy Expand section "II. Deploy" Collapse section "II. Deploy" 3. Deployment workflow 4. Install Host Physical Machines 5. Configure Public Key based SSH Authentication without a password 6. Configure Red Hat Gluster Storage for Hosted Engine using the Cockpit UI 7. Deploy the Hosted Engine using the Cockpit UI 8. Configure Red Hat Gluster Storage as a Red Hat Virtualization storage domain Expand section "8. Configure Red Hat Gluster Storage as a Red Hat Virtualization storage domain" Collapse section "8. Configure Red Hat Gluster Storage as a Red Hat Virtualization storage domain" 8.1. Create the logical network for gluster traffic 8.2. Add additional virtualization hosts to the hosted engine III. Verify Expand section "III. Verify" Collapse section "III. Verify" 9. Verify your deployment IV. Next steps Expand section "IV. Next steps" Collapse section "IV. Next steps" 10. Post-deployment configuration suggestions Expand section "10. Post-deployment configuration suggestions" Collapse section "10. Post-deployment configuration suggestions" 10.1. Configure a logical volume cache for improved performance 10.2. Configure fencing for high availability 10.3. Configure backup and recovery options V. Troubleshoot Expand section "V. Troubleshoot" Collapse section "V. Troubleshoot" 11. Log file locations 12. Viewing Hosted Engine deployment errors Expand section "12. Viewing Hosted Engine deployment errors" Collapse section "12. Viewing Hosted Engine deployment errors" 12.1. Failed to prepare virtual machine 12.2. Failed to deploy hosted engine 13. Cleaning up automated Red Hat Gluster Storage deployment errors VI. Reference material Expand section "VI. Reference material" Collapse section "VI. Reference material" A. Configuring encryption during deployment Expand section "A. Configuring encryption during deployment" Collapse section "A. Configuring encryption during deployment" A.1. Configuring TLS/SSL during deployment using a Certificate Authority signed certificate Expand section "A.1. Configuring TLS/SSL during deployment using a Certificate Authority signed certificate" Collapse section "A.1. Configuring TLS/SSL during deployment using a Certificate Authority signed certificate" A.1.1. Prerequisites A.1.2. Configuring TLS/SSL encryption using a CA-signed certificate A.2. Configuring TLS/SSL encryption during deployment using a self signed certificate B. Example cleanup configuration files for gdeploy C. Understanding the generated gdeploy configuration file D. Example gdeploy configuration file for configuring compression and deduplication Legal Notice Settings Close Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Part VI. Reference material Previous Next