Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 2. Requirements for bare metal provisioning


To enable cloud users to launch bare-metal instances, your Red Hat OpenStack Services on OpenShift (RHOSO) environment must have the required hardware and network configuration.

2.1. Hardware requirements

The hardware requirements for the bare-metal machines that you want to make available to your cloud users for provisioning depend on the operating system. For information about the hardware requirements for Red Hat Enterprise Linux installations, see the Product Documentation for Red Hat Enterprise Linux.

All bare-metal machines that you want to make available to your cloud users for provisioning must have the following capabilities:

  • A NIC to connect to the bare-metal network.
  • The Redfish power management type, which is connected to a network that is reachable from the ironic-conductor container.

    Note

    Do not use the IPMI power management type due to security concerns. Use Redfish as the power management type to optimize the performance of the Bare Metal Provisioning service.

  • If the Bare Metal Provisioning service is configured to use PXE or iPXE for provisioning, then PXE boot must be enabled on the network interface that is attached to the bare-metal network, and disabled on all other network interfaces for that bare-metal node. This is not a requirement if the Bare Metal Provisioning service is configured to use virtual media for provisioning.
  • If the Bare Metal Provisioning service is configured to use virtual media for provisioning, through Redfish or a vendor-specific boot interface on each node, then the bare-metal nodes must be able to reach cluster resources for virtual media disks or other disk images.

2.2. Networking requirements

The cloud operator must create a private bare-metal network for the Bare Metal Provisioning service to use for the following operations:

  • The provisioning and management of the bare-metal nodes that host the bare-metal instances.
  • Cleaning bare-metal nodes when a node is unprovisioned.
  • Project access to the bare-metal nodes.

In order for the Bare Metal Provisioning service to serve PXE boot and DHCP requests, the bare-metal node must be attached either to a port that does not use a VLAN, or to a port that is a VLAN trunk where the native VLAN is the bare-metal network.

The Bare Metal Provisioning service is designed for a trusted tenant environment because the bare-metal nodes have direct access to the control plane network of your Red Hat OpenStack Services on OpenShift (RHOSO) environment.

Cloud users have direct access to the public OpenStack APIs, and to the bare-metal network. A flat bare-metal network can introduce security concerns because cloud users have indirect access to the control plane network. To mitigate this risk, you can configure an isolated bare metal provisioning network for the Bare Metal Provisioning service that does not have access to the control plane.

The bare-metal network must be untagged for provisioning, and must also have access to the Bare Metal Provisioning API.

You must provide access to the bare-metal network for the following:

  • The control plane that hosts the Bare Metal Provisioning service.
  • The NIC from which the bare-metal machine is configured to PXE-boot.
Red Hat logoGithubredditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance. Découvrez nos récentes mises à jour.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez le Blog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

Theme

© 2026 Red Hat
Retour au début