diff --git a/docs/en-US/management_server_multi_node_install.xml b/docs/en-US/hypervisor-host-install-agent.xml
similarity index 52%
rename from docs/en-US/management_server_multi_node_install.xml
rename to docs/en-US/hypervisor-host-install-agent.xml
index 30f6af9f6a7..d1b774a7a30 100644
--- a/docs/en-US/management_server_multi_node_install.xml
+++ b/docs/en-US/hypervisor-host-install-agent.xml
@@ -1,5 +1,5 @@
-
%BOOK_ENTITIES;
]>
@@ -11,9 +11,9 @@
to you under the Apache License, Version 2.0 (the
"License"); you may not use this file except in compliance
with the License. You may obtain a copy of the License at
-
+
http://www.apache.org/licenses/LICENSE-2.0
-
+
Unless required by applicable law or agreed to in writing,
software distributed under the License is distributed on an
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
@@ -22,9 +22,13 @@
under the License.
-->
-
- Management Server Multi-Node Installation
-
-
-
-
+
+ Install and configure the Agent
+ To manage KVM instances on the host &PRODUCT; uses a Agent. This Agent communicates with the Management server and controls all the instances on the host.
+ First we start by installing the agent:
+ In RHEL or CentOS:
+ yum install cloud-agent
+ In Ubuntu:
+ apt-get install cloud-agent
+ The host is now ready to be added to a cluster. This is covered in a later section, see . It is recommended that you continue to read the documentation before adding the host!
+
\ No newline at end of file
diff --git a/docs/en-US/hypervisor-host-install-firewall.xml b/docs/en-US/hypervisor-host-install-firewall.xml
index 9efca5ed43b..e99c88e4882 100644
--- a/docs/en-US/hypervisor-host-install-firewall.xml
+++ b/docs/en-US/hypervisor-host-install-firewall.xml
@@ -36,11 +36,18 @@
It depends on the firewall you are using how to open these ports. Below you'll find examples how to open these ports in RHEL/CentOS and Ubuntu.
Open ports in RHEL/CentOS
- TODO: How to open ports
+ RHEL and CentOS use iptables for firewalling the system, you can open extra ports by executing the following iptable commands:
+ iptables -I INPUT -p tcp -m tcp --dport 22 -j ACCEPT
+ iptables -I INPUT -p tcp -m tcp --dport 1798 -j ACCEPT
+ iptables -I INPUT -p tcp -m tcp --dport 16509 -j ACCEPT
+ iptables -I INPUT -p tcp -m tcp --dport 5900:6100 -j ACCEPT
+ iptables -I INPUT -p tcp -m tcp --dport 49152:492160 -j ACCEPT
+ These iptable settings are not persistent accross reboots, we have to save them first.
+ iptables-save > /etc/sysconfig/iptables
Open ports in Ubuntu
- The default firewall under Ubuntu is UFW (Uncomplicated FireWall), although not enabled.
+ The default firewall under Ubuntu is UFW (Uncomplicated FireWall), which is a Python wrapper around iptables.
To open the required ports, execute the following commands:
ufw allow proto tcp from any to any port 22
ufw allow proto tcp from any to any port 1798
diff --git a/docs/en-US/hypervisor-host-install-flow.xml b/docs/en-US/hypervisor-host-install-flow.xml
index af1daa744e3..74668c8f423 100644
--- a/docs/en-US/hypervisor-host-install-flow.xml
+++ b/docs/en-US/hypervisor-host-install-flow.xml
@@ -30,4 +30,5 @@
+
\ No newline at end of file
diff --git a/docs/en-US/hypervisor-host-install-libvirt.xml b/docs/en-US/hypervisor-host-install-libvirt.xml
index b3b691c3754..15cfde2efa7 100644
--- a/docs/en-US/hypervisor-host-install-libvirt.xml
+++ b/docs/en-US/hypervisor-host-install-libvirt.xml
@@ -35,15 +35,15 @@
In order to have live migration working libvirt has to listen for unsecured TCP connections.
- # vi /etc/libvirt/libvirtd.conf
+ vi /etc/libvirt/libvirtd.conf
Set the following paramaters:
listen_tls = 0
listen_tcp = 1
tcp_port = 16059
- auth_tcp none
+ auth_tcp = "none"
- In order to have libvirt listening on TCP we have to change the execution arguments.
+ Turning on "listen_tcp" in libvirtd.conf is not enough, we have to change the parameters as well:
On RHEL or CentOS:
vi /etc/sysconfig/libvirtd
Uncomment the following line:
diff --git a/docs/en-US/hypervisor-host-install-network.xml b/docs/en-US/hypervisor-host-install-network.xml
index e4f668e0c4b..8f6a10cdd69 100644
--- a/docs/en-US/hypervisor-host-install-network.xml
+++ b/docs/en-US/hypervisor-host-install-network.xml
@@ -25,18 +25,20 @@
Configure the network bridges
This is a very important section, please make sure you read this thoroughly.
- In order to forward traffic to your instances you will need at least two bridges: public and private.
- By default these bridges are called cloudbr0 and cloudbr1, but you do have to make sure they are available on each hypervisor.
+ In order to forward traffic to your instances you will need at least two bridges: public and private.
+ By default these bridges are called cloudbr0 and cloudbr1, but you do have to make sure they are available on each hypervisor.
+ The most important factor is that you keep the configuration consistent on all your hypervisors.
Network example
There are many ways to configure your network. In the Basic networking mode you should have two (V)LAN's, one for your private network and one for the public network.
- The hypervisor has one NIC (eth0) with three VLAN's:
+ We assume that the hypervisor has one NIC (eth0) with three tagged VLAN's:
VLAN 100 for management of the hypervisor
VLAN 200 for public network of the instances (cloudbr0)
VLAN 300 for private network of the instances (cloudbr1)
On VLAN 100 we give the Hypervisor the IP-Address 192.168.42.11/24 with the gateway 192.168.42.1
+ The Hypervisor and Management server don't have to be in the same subnet!