System requirements¶
Mirantis Launchpad is a static binary that works on following operating systems:
Linux (x64)
MacOS (x64)
Windows (x64)
Important
The setup must meet MKE system requirements, in addition to the requirements for running Launchpad.
The following operating systems support MKE:
CentOS 7
CentOS 8
Oracle Linux 7
Redhat Enterprise Linux 7
Redhat Enterprise Linux 8
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 15
Ubuntu 18.04
Ubuntu 20.04
Windows Server 2019
Hardware¶
8GB of RAM for manager nodes
4GB of RAM for worker nodes
2 vCPUs for manager nodes
10GB of free disk space for the /var partition on manager nodes (A minimum of 6GB is recommended.)
Recommended for Production
16GB of RAM for manager nodes
4 vCPUs for manager nodes
25-100GB of free disk space
Note
Windows container images are typically larger than Linux container images, and thus it is necessary to provision more local storage for Windows nodes.
Remote management¶
Launchpad connects through the use of a cryptographic network protocol (SSH on Linux systems, SSH or WinRM on Windows systems), and as such these must be set up on all host instances.
Note
Only passwordless sudo capable SSH Key-Based authentication is currently supported. On Windows the user must have administrator privileges.
OpenSSH¶
OpenSSH is the open-source version of the Secure Shell (SSH) tools used by administrators of Linux and other non-Windows operating systems for cross-platform management of remote systems. It is included in Windows Server 2019.
To enable SSH on Windows, you can run the following PowerShell snippets, modified for your specific configuration, on each Windows host.
# Install OpenSSH Add-WindowsCapability -Online -Name OpenSSH.Client~~~~0.0.1.0 Add-WindowsCapability -Online -Name OpenSSH.Server~~~~0.0.1.0 Start-Service sshd Set-Service -Name sshd -StartupType 'Automatic' # Configure ssh key authentication mkdir c:\Users\Administrator\.ssh\ $sshdConf = 'c:\ProgramData\ssh\sshd_config' (Get-Content $sshdConf).replace('#PubkeyAuthentication yes', 'PubkeyAuthentication yes') | Set-Content $sshdConf (Get-Content $sshdConf).replace('Match Group administrators', '#Match Group administrators') | Set-Content $sshdConf (Get-Content $sshdConf).replace(' AuthorizedKeysFile __PROGRAMDATA__/ssh/administrators_authorized_keys', '# AuthorizedKeysFile __PROGRAMDATA__/ssh/administrators_authorized_keys') | Set-Content $sshdConf restart-service sshd
Transfer your SSH public key from your local machine to the host, using the following example but with your own values.
# Transfer SSH Key to Server scp ~/.ssh/id_rsa.pub Administrator@1.2.1.2:C:\Users\Administrator\.ssh\authorized_keys ssh --% Administrator@1.2.1.2 powershell -c $ConfirmPreference = 'None'; Repair-AuthorizedKeyPermission C:\Users\Administrator\.ssh\authorized_keys
WinRM¶
As an alternative to SSH, WinRM can be used on Windows hosts.
Ports Used¶
When installing an MKE cluster, a series of ports must be opened to incoming traffic.