You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ipi-install-configuring-nodes.adoc
+24-2Lines changed: 24 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,8 @@ While the cluster nodes can contain more than two NICs, the installation process
24
24
25
25
NIC1 is a non-routable network (`provisioning`) that is only used for the installation of the {product-title} cluster.
26
26
27
-
The {op-system-base-full} 8.x installation process on the provisioner node might vary. To install {op-system-base-full} 8.x using a local satellite server or a PXE server, PXE-enable NIC2.
27
+
The {op-system-base-full} 8.x installation process on the provisioner node might vary. To install {op-system-base-full} 8.x using a local Satellite server or a PXE server, PXE-enable NIC2.
28
+
28
29
29
30
|===
30
31
|PXE |Boot order
@@ -44,6 +45,8 @@ Configure the control plane and worker nodes as follows:
44
45
| NIC1 PXE-enabled (provisioning network) | 1
45
46
|===
46
47
48
+
ifeval::[{release} > 4.3]
49
+
47
50
.Configuring nodes without the `provisioning` network
48
51
49
52
The installation process requires one NIC:
@@ -53,4 +56,23 @@ The installation process requires one NIC:
53
56
| NICx | `baremetal` | <baremetal-vlan>
54
57
|===
55
58
56
-
NICx is a routable network (`baremetal`) that is used for the installation of the {product-title} cluster, and routable to the Internet.
59
+
NICx is a routable network (`baremetal`) that is used for the installation of the {product-title} cluster, and routable to the internet.
60
+
61
+
endif::[]
62
+
63
+
ifeval::[{release} > 4.6]
64
+
.Configuring nodes for Secure Boot
65
+
66
+
Secure Boot prevents a node from booting unless it verifies the node is using only trusted software, such as UEFI firmware drivers, EFI applications and the operating system. Red Hat only supports Secure Boot when deploying with RedFish Virtual Media.
67
+
68
+
To enable Secure Boot, refer to the hardware guide for the node. To enable Secure Boot, execute the following:
69
+
70
+
. Boot the node and enter the BIOS menu.
71
+
. Set the node's boot mode to UEFI Enabled.
72
+
. Enable Secure Boot.
73
+
+
74
+
[IMPORTANT]
75
+
====
76
+
Red Hat does not support Secure Boot with self-generated keys.
0 commit comments