Pre-requisites
This document describes the infrastructure pre-requisites to get your Private Cloud Director private cloud up and running. If you're looking to deploy Self-Hosted version of Private Cloud Director, please follow Self Hosted Pre Requisites first.
Hypervisor Host Prerequisites
Each physical server or host that you will use as a hypervisor with Private Cloud Director must meet the following requirements:
x86 server
Running Ubuntu 22.04 LTS (Jammy Jellyfish) AMD64 cloud image with the following resources. Note: A full server distribution is not required, and the minimal distribution is not supported.
8 vCPUs
16GB RAM
250GB of disk space (95GB If Cinder volumes are used for VM storage)
sudoaccess enabled to log into the server and install the Platform9 agentThe host name should contain at least one non-numeric character
When using SaaS hosted deployment model, outbound connectivity (port 443) must be enabled on each server so that the Platform9 agent can connect to the Private Cloud Director SaaS management plane.
In case of multi-domain environment , host onboarding should be done by the admin user in the
defaultdomain and not the secondary domains.If you want to use virtual machine high availability feature (VM HA) (read more in Cluster Resource Management), there must be at least 4 hosts in the cluster for successful VM recovery.
Storage Prerequisites
Private Cloud Director supports a wide variety of enterprise storage solutions, using the OpenStack Cinder driver. Verify you have access to the administrative console of your storage solution and can lookup the required configuration information from your admin console.
See the list of supported storage drivers
See also: latest compatibility matrix of Cinder storage drivers and devices as maintained by the OpenStack project.
If you plan to enable Virtual Machine High Availability (VM HA), virtual machines and associated volumes must be using shared storage that is accessible to all hypervisor hosts in the cluster.
Networking Prerequisites
Hosts should have a minimum of 1 network interface, and ideally 4 network interfaces to enable redundancy across network interface failure. A typical configuration would look like:
bond0 mapped to two adapters: eth0 and eth1
bond1 mapped to two adapters: eth2 and eth3
Key Networking Decisions
Your key decisions before configuring networking in Private Cloud Director are:
Use of bonded network interfaces (recommended) to ensure availability if a physical network interface fails
Desired network topology and separation:
Management network
Workload network (e.g. a VM network)
Storage network
Backup/DR network
Use of physical networks vs "virtual" software defined networks:
A common use case is that external north-south connectivity is available via an existing physical network in your infrastructure; but a group of users may want to use a virtual network that doesn't need to consume ports from this external network
You may have limitations on the VLANs that are available to use, and may want to expand the logical network range by using an IP overlay such as VXLAN or GENEVE networking
Groups of users and workloads that have overlapping IP ranges can be isolated easily using virtual networks
External firewall (outside cluster) vs in-cluster firewall
Segregation of traffic can be done within the Private Cloud Director if you aren't already using VLAN or VXLAN based network segments.
For further reading, see Typical Network Architectures.
Outbound Connectivity Requirements
You would need to configure outbound access on port 443 from your hosts for atleast the below domain names to ensure they can be onboarded to our management plane successfully.
Private Cloud Director management plane url is accessed over port 443.
For
cloud-ctlCLI download on hosts, https://cloud-ctl.s3.us-west-1.amazonaws.comAPT sources list for installing packages on the Ubuntu host using
cloud-ctl prep-node:
Image Library Prerequisites
The Image Library service manages virtual machine images in the Private Cloud Director environment. To enable its proper operation, the following prerequisites must be met.
Ensure that port
9494is allowed, used by the Image Library API for image operations.The Image Library service must operate with
adminpermissions to read and write image files to persistent storage.
External Connectivity
The hypervisor node that you've assigned image library role (the image library node) must have external connectivity to be accessible via a browser. This requirement is necessary for:
Uploading images through the Private Cloud Director UI.
Verifying and accepting self-signed certificates.
Self-Signed Certificates
The image library node uses self-signed certificates. To enable image uploads from the UI, users need to:
Navigate to the image library endpoint in a browser.
Click Access & Security Menu -> API Access -> and look for glance-cluster.
Accept the insecure certificate when prompted.
Why Self-Signed Certificate?
The self-signed certificate is needed because the image library node secures communication with SSL/TLS and uses a self-generated certificate instead of one from a public CA.
Since browsers and CLI tools trust only publicly verified certificates, users must manually accept the self-signed certificate when accessing the Image Library Admin endpoint.
Similarly, the --insecure flag is required for the OpenStack CLI to bypass certificate verification during image uploads.
Load Balancer As a Service (LBaaS) Prerequisites
These pre-requisites only apply if you plan to deploy Load Balancer as a Service (LBaaS) implementation offered by Private Cloud Director to create one or more software-defined load balancers for your application services.
CLI Update
You need to install the Octavia extension to the OpenStack CLI in order to use the LBaaS specific OpenStack CLI commands. Run the following command on a machine where you want to run OpenStack CLI to install both packages.
Alternatively, run the following command on the machine where you already have OpenStack CLI running, to add the LBaaS extension.
Network Requirements
You will need:
An internal network (a physical or virtual network) that will be used both by your load balancer instance, and your pool of virtual machines that will run the service and receive client requests.
(Optionally) An external network if you plan to use public (floating) IPs for your load balancer.
Pool of Virtual Machines
The pool of virtual machines that will run your application that requires load balancing must meet the following requirements:
Be running and in an 'active' state
Have a valid IP address assigned from the same tenant network that you will use to create a new load balancer instance.
Have your application (e.g., web server) running and accessible
Router Configuration
If you plan to use public (floating) IPs for your load balancer, you need:
A router connecting the tenant network used by the load balancer and the pool of VMs, and your external network.
Available public (floating) IPs in your quota
Kubernetes Pre-requisites
Read Kubernetes Pre-requisites for requirements to setup a Kubernetes cluster in Private Cloud Director
Last updated
Was this helpful?
