|
8 | 8 |
|
9 | 9 | Installer-provisioned installation involves a number of hardware node requirements:
|
10 | 10 |
|
11 |
| -- **CPU architecture:** All nodes must use `x86_64` CPU architecture. |
| 11 | +- *CPU architecture:* All nodes must use `x86_64` CPU architecture. |
12 | 12 |
|
13 |
| -- **Similar nodes:** Red Hat recommends nodes have an identical configuration per role. That is, Red Hat recommends nodes be the same brand and model with the same CPU, memory and storage configuration. |
| 13 | +- *Similar nodes:* Red Hat recommends nodes have an identical configuration per role. That is, Red Hat recommends nodes be the same brand and model with the same CPU, memory, and storage configuration. |
14 | 14 |
|
15 | 15 | ifeval::[{product-version} < 4.5]
|
16 |
| -- **Intelligent Platform Management Interface (IPMI):** Installer-provisioned installation requires IPMI enabled on each node. |
| 16 | +- *Intelligent Platform Management Interface (IPMI):* Installer-provisioned installation requires IPMI enabled on each node. |
17 | 17 | endif::[]
|
18 | 18 |
|
19 | 19 | ifeval::[{product-version} > 4.4]
|
20 |
| -- **Baseboard Management Controller:** The `provisioner` node must be able to access the baseboard management controller (BMC) of each {product-title} cluster node. You may use IPMI, RedFish, or a proprietary protocol. |
| 20 | +- *Baseboard Management Controller:* The `provisioner` node must be able to access the baseboard management controller (BMC) of each {product-title} cluster node. You may use IPMI, Redfish, or a proprietary protocol. |
21 | 21 | endif::[]
|
22 | 22 |
|
23 | 23 | ifndef::openshift-origin[]
|
24 |
| -- **Latest generation:** Nodes must be of the most recent generation. Installer-provisioned installation relies on BMC protocols, which must be compatible across nodes. Additionally, {op-system-base} 8 ships with the most recent drivers for RAID controllers. Ensure that the nodes are recent enough to support {op-system-base} 8 for the `provisioner` node and {op-system} 8 for the control plane and worker nodes. |
| 24 | +- *Latest generation:* Nodes must be of the most recent generation. Installer-provisioned installation relies on BMC protocols, which must be compatible across nodes. Additionally, {op-system-base} 8 ships with the most recent drivers for RAID controllers. Ensure that the nodes are recent enough to support {op-system-base} 8 for the `provisioner` node and {op-system} 8 for the control plane and worker nodes. |
25 | 25 | endif::[]
|
26 | 26 | ifdef::openshift-origin[]
|
27 |
| -- **Latest generation:** Nodes must be of the most recent generation. Installer-provisioned installation relies on BMC protocols, which must be compatible across nodes. Additionally, {op-system-first} ships with the most recent drivers for RAID controllers. Ensure that the nodes are recent enough to support {op-system} for the `provisioner` node and {op-system} for the control plane and worker nodes. |
| 27 | +- *Latest generation:* Nodes must be of the most recent generation. Installer-provisioned installation relies on BMC protocols, which must be compatible across nodes. Additionally, {op-system-first} ships with the most recent drivers for RAID controllers. Ensure that the nodes are recent enough to support {op-system} for the `provisioner` node and {op-system} for the control plane and worker nodes. |
28 | 28 | endif::[]
|
29 | 29 |
|
30 |
| -- **Registry node:** Optional: If setting up a disconnected mirrored registry, it is recommended the registry reside in its own node. |
| 30 | +- *Registry node:* (Optional) If setting up a disconnected mirrored registry, it is recommended the registry reside in its own node. |
31 | 31 |
|
32 |
| -- **Provisioner node:** Installer-provisioned installation requires one `provisioner` node. |
| 32 | +- *Provisioner node:* Installer-provisioned installation requires one `provisioner` node. |
33 | 33 |
|
34 |
| -- **Control plane:** Installer-provisioned installation requires three control plane nodes for high availability. |
| 34 | +- *Control plane:* Installer-provisioned installation requires three control plane nodes for high availability. |
35 | 35 |
|
36 |
| -- **Worker nodes:** While not required, a typical production cluster has one or more worker nodes. Smaller clusters are more resource efficient for administrators and developers during development, production, and testing. |
| 36 | +- *Worker nodes:* While not required, a typical production cluster has one or more worker nodes. Smaller clusters are more resource efficient for administrators and developers during development, production, and testing. |
37 | 37 |
|
38 |
| -- **Network interfaces:** Each node must have at least one 10GB network interface for the routable `baremetal` network. Each node must have one 10GB network interface for a `provisioning` network *when using the `provisioning` network* for deployment. Using the `provisioning` network is the default configuration. Network interface names must follow the same naming convention across all nodes. For example, the first NIC name on a node, such as `eth0` or `eno1`, must be the same name on all of the other nodes. The same principle applies to the remaining NICs on each node. |
| 38 | +- *Network interfaces:* Each node must have at least one 10GB network interface for the routable `baremetal` network. Each node must have one 10GB network interface for a `provisioning` network *when using the `provisioning` network* for deployment. Using the `provisioning` network is the default configuration. Network interface names must follow the same naming convention across all nodes. For example, the first NIC name on a node, such as `eth0` or `eno1`, must be the same name on all of the other nodes. The same principle applies to the remaining NICs on each node. |
39 | 39 |
|
40 | 40 | ifeval::[{product-version} > 4.3]
|
41 |
| -- **Unified Extensible Firmware Interface (UEFI):** Installer-provisioned installation requires UEFI boot on all {product-title} nodes when using IPv6 addressing on the `provisioning` network. In addition, UEFI Device PXE Settings must be set to use the IPv6 protocol on the `provisioning` network NIC, but *omitting the `provisioning` network removes this requirement.* |
| 41 | +- *Unified Extensible Firmware Interface (UEFI):* Installer-provisioned installation requires UEFI boot on all {product-title} nodes when using IPv6 addressing on the `provisioning` network. In addition, UEFI Device PXE Settings must be set to use the IPv6 protocol on the `provisioning` network NIC, but omitting the `provisioning` network removes this requirement. |
42 | 42 | endif::[]
|
43 | 43 |
|
44 |
| -ifeval::[{product-version} > 4.6] |
45 |
| -- **Secure Boot:** Many production scenarios require nodes with Secure Boot enabled to verify the node only boots with trusted software, such as UEFI firmware drivers, EFI applications and the operating system. To deploy a {product-title} cluster with Secure Boot, you must enable UEFI boot mode and Secure Boot on each control plane node and each worker node. Red Hat supports Secure Boot **only** when installer-provisioned installation uses Red Fish Virtual Media. Red Hat **does not** support Secure Boot with self-generated keys. |
| 44 | +ifeval::[{product-version} == 4.7] |
| 45 | +- *Secure Boot:* Many production scenarios require nodes with Secure Boot enabled to verify the node only boots with trusted software, such as UEFI firmware drivers, EFI applications, and the operating system. To deploy an {product-title} cluster with Secure Boot, you must enable UEFI boot mode and Secure Boot on each control plane node and each worker node. Red Hat supports Secure Boot only when installer-provisioned installations use Red Fish Virtual Media. Red Hat does not support Secure Boot with self-generated keys. |
| 46 | +endif::[] |
| 47 | + |
| 48 | +ifeval::[{product-version} > 4.7] |
| 49 | +- *Secure Boot:* Many production scenarios require nodes with Secure Boot enabled to verify the node only boots with trusted software, such as UEFI firmware drivers, EFI applications, and the operating system. You may deploy with Secure Boot manually or managed. |
| 50 | ++ |
| 51 | +. *Manually:* To deploy an {product-title} cluster with Secure Boot manually, you must enable UEFI boot mode and Secure Boot on each control plane node and each worker node. Red Hat supports Secure Boot with manually enabled UEFI and Secure Boot only when installer-provisioned installations use Redfish virtual media. See "Configuring nodes for Secure Boot manually" in the "Configuring nodes" section for additional details. |
| 52 | ++ |
| 53 | +. *Managed:* To deploy an {product-title} cluster with managed Secure Boot, you must set the `bootMode` value to `UEFISecureBoot` in the `install-config.yaml` file. Red Hat only supports installer-provisioned installation with managed Secure Boot on 10th generation HPE hardware and 13th generation Dell hardware running firmware version `2.75.75.75` or greater. Deploying with managed Secure Boot does not require Redfish virtual media. See "Configuring managed Secure Boot" in the "Setting up the environment for an OpenShift installation" section for details. |
| 54 | ++ |
| 55 | +[NOTE] |
| 56 | +==== |
| 57 | +Red Hat does not support Secure Boot with self-generated keys. |
| 58 | +==== |
46 | 59 | endif::[]
|
0 commit comments