Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Installing flexVDI 3.1

flexVDI 3.1 consists of a repository of RPM packages that can be installed on either Red Hat Enterprise Linux 7 or CentOS 7 (downloadable here). So, first of all you have to install one of these two operating systems.

Info

During the installation, please follow these simple guidelines:

  • The minimal edition is enough to have flexVDI up and running. Although we do our best to avoid problems, installing other packages, in particular qemu-kvm and its dependencies, may result in conflicts.
  • On Red Hat Enterprise Linux 7, you will have to enable the rhel-server-extras-rpms yum repository for some of the flexVDI dependencies.

  • Upgrade to the latest revision of the distribution with yum update, and reboot if the kernel version has been upgraded too.
  • Do not create a normal user named "flexvdi". Some flexVDI components make use of a user account with that name and they may fail in unexpected ways if you also use it to log in.

  • Give your hosts a meaningful domain name. They do not need to be resolvable, but they must be different. Do not use the default "localhost.localdomain" for all your hosts, or you will not be able to register them with your platform.


Info

Since flexVDI 3.1, there is the possibility of directly assigning a PCI storage device (e.g. NVMe) to a Guest, with minimum overhead, using the KVM's PCI Passthrough feature. For this feature to work, you will need to enable IOMMU groups in the kernel. Add the following parameters to your kernel command line and reboot:

  • intel_iommu=on iommu=pt # on Intel processors

  • amd_iommu=on iommu=pt   # on AMD processors

If you do not know what this is about, you can skip this step.

Then, the flexVDI 3.1 installer will help you configure the access to the repository. Download it to your first host and run it:

No Format
# chmod u+x ./flexvdi-installer-3.1
# sudo ./flexvdi-installer-3.1

The installer will first show you the End User License Agreement. You must accept it in order to install flexVDI 3.1. You can use "space" key to move forward, and "q" to end viewing the license terms (as you do when using the "less" command). Then, follow the instructions to log in the Customer Portal:

No Format
1.- Subscribe this host with the flexVDI Customer Portal
   Enter a name for this host [flexhost01.example.com]:
   Enter your Customer Portal username: test
   Enter your Customer Portal password: ********
Successfully logged in the Customer Portal!

The next step will show you a list with your currently active contracts, and you can select one of them. If there is only one, it is selected for you:

No Format
2.- Configure yum repositories

- Repository flexVDI 3.1 needs an active contract.
  Using contract flexVDI 3.1 30-day Evaluation (2017-08-22 - 2017-09-21)

Finally, the installer will use yum to install the flexVDI packages for you. Once done, you can continue configuring your first flexVDI host.

Info

If you have any problem during package installation, you do not have to run the installer again. Just run 'yum install flexvdi' as you would do with any other package.

Updating flexVDI 3.1

In general, updating the flexVDI packages when a new version is published is as easy as running yum update on your hosts. However, always take these considerations into account:

  1. For binary compatibility issues, there must be a different kmod-ocfs2-flexvdi package for each CentOS/RHEL release. If you install a new kernel for which a compatible kmod-ocfs2 package version does not exist yet, your OCFS2 Volumes will not be accessible if you boot into it. Always check that your kmod-ocfs2-flexvdi package version matches your kernel release. Besides, if you update your kernel, you have to manually install the appropriate kmod-ocfs2-flexvdi package, because it is not automatically updated.
  2. Although they seldom change, updating ocfs2-tools-* packages will restart the ocfs2/o2cb service. This, in turn, will remount your OCFS2 volumes, killing any virtual machine that was using a virtual disk image in any of these volumes. So, better cleanly stop your virtual machines before updating these packages.

...