System requirements

Mirantis Launchpad is a static binary that works on the following operating systems:

  • Linux (x64)

  • MacOS (x64)

  • Windows (x64)


The setup must meet MKE system requirements, in addition to the requirements for running Launchpad.

The following operating systems support MKE:

  • CentOS 7

  • Oracle Linux 7

  • Redhat Enterprise Linux 7

  • Redhat Enterprise Linux 8

  • Rocky Linux 8

  • SUSE Linux Enterprise Server 12

  • SUSE Linux Enterprise Server 15

  • Ubuntu 18.04

  • Ubuntu 20.04

  • Windows Server 2022, 2019

Hardware requirements

Manager nodes

Worker nodes

Minimum hardware requirements

  • 16 GB of RAM

  • 2 vCPUs

  • 25 GB of free disk space for the /var partition

4 GB of RAM

Recommended hardware requirements

  • 24 - 32 GB of RAM

  • 4 vCPUs

  • 25 - 100 GB of free disk space


Windows container images are typically larger than Linux container images, and thus it is necessary to provision more local storage for Windows nodes.

Remote management

Launchpad connects through the use of a cryptographic network protocol (SSH on Linux systems, SSH or WinRM on Windows systems), and as such these must be set up on all host instances.


Only passwordless sudo capable SSH Key-Based authentication is currently supported. On Windows the user must have administrator privileges.


OpenSSH is the open-source version of the Secure Shell (SSH) tools used by administrators of Linux and other non-Windows operating systems for cross-platform management of remote systems. It is included in Windows Server 2019.

  1. To enable SSH on Windows, you can run the following PowerShell snippets, modified for your specific configuration, on each Windows host.

    # Install OpenSSH
    Add-WindowsCapability -Online -Name OpenSSH.Client~~~~
    Add-WindowsCapability -Online -Name OpenSSH.Server~~~~
    Start-Service sshd
    Set-Service -Name sshd -StartupType 'Automatic'
    # Configure ssh key authentication
    mkdir c:\Users\Administrator\.ssh\
    $sshdConf = 'c:\ProgramData\ssh\sshd_config'
    (Get-Content $sshdConf).replace('#PubkeyAuthentication yes', 'PubkeyAuthentication yes') | Set-Content $sshdConf
    (Get-Content $sshdConf).replace('Match Group administrators', '#Match Group administrators') | Set-Content $sshdConf
    (Get-Content $sshdConf).replace('       AuthorizedKeysFile __PROGRAMDATA__/ssh/administrators_authorized_keys', '#       AuthorizedKeysFile __PROGRAMDATA__/ssh/administrators_authorized_keys') | Set-Content $sshdConf
    restart-service sshd
  2. Transfer your SSH public key from your local machine to the host, using the following example but with your own values.

    # Transfer SSH Key to Server
    scp ~/.ssh/ Administrator@\Users\Administrator\.ssh\authorized_keys
    ssh --% Administrator@ powershell -c $ConfirmPreference = 'None'; Repair-AuthorizedKeyPermission C:\Users\Administrator\.ssh\authorized_keys


As an alternative to SSH, WinRM can be used on Windows hosts.

Ports Used

When installing an MKE cluster, a series of ports must be opened to incoming traffic.