You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Installing a cluster on {rh-virtualization} in a restricted network
3
+
include::modules/common-attributes.adoc[]
4
+
:context: installing-rhv-restricted-network
5
+
6
+
toc::[]
7
+
8
+
In {product-title} version {product-version}, you can install a
9
+
customized {product-title} cluster on {rh-virtualization-first} in a restricted network by creating an internal mirror of the installation release content.
10
+
11
+
== Prerequisites
12
+
13
+
The following items are required to install an {product-title} cluster on a {rh-virtualization} environment.
14
+
15
+
* You have a supported combination of versions in the link:https://access.redhat.com/articles/5485861[Support Matrix for {product-title} on {rh-virtualization}].
16
+
* You are familiar with the xref:../../architecture/architecture-installation.adoc#architecture-installation[{product-title} installation and update] processes.
17
+
* xref:../../installing/install_config/installing-restricted-networks-preparations.adoc#installing-restricted-networks-preparations[Create a registry on your mirror host] and obtain the `imageContentSources` data for your version of {product-title}.
18
+
+
19
+
[IMPORTANT]
20
+
====
21
+
Because the installation media is on the mirror host, you can use that computer
22
+
to complete all installation steps.
23
+
====
24
+
* Provision
25
+
xref:../../storage/understanding-persistent-storage.adoc#understanding-persistent-storage[persistent storage] for your cluster. To deploy a private image registry, your storage must provide ReadWriteMany access modes.
26
+
* Review details about the xref:../../architecture/architecture-installation.adoc#architecture-installation[{product-title} installation and update] processes.
27
+
* If you use a firewall and plan to use telemetry, you must xref:../../installing/install_config/configuring-firewall.adoc#configuring-firewall[configure the firewall to allow the sites] that your cluster requires access to.
28
+
+
29
+
[NOTE]
30
+
====
31
+
Be sure to also review this site list if you are configuring a proxy.
@@ -39,12 +43,12 @@ installation media. You can create this registry on a mirror host, which can
39
43
access both the Internet and your closed network, or by using other methods
40
44
that meet your restrictions.
41
45
42
-
ifndef::osp[]
46
+
ifndef::osp,rhv[]
43
47
[IMPORTANT]
44
48
====
45
49
Because of the complexity of the configuration for user-provisioned installations, consider completing a standard user-provisioned infrastructure installation before you attempt a restricted network installation using user-provisioned infrastructure. Completing this test installation might make it easier to isolate and troubleshoot any issues that might arise during your installation in a restricted network.
ifdef::ibm-power[IBM Power Systems infrastructure.]
190
+
ifdef::rhv[RHV infrastructure.]
180
191
<11> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
0 commit comments