A-B Cable Map
Document which NIC on each node connects to which switch and port. Label both ends of every cable.
A successful VergeOS deployment starts well before the first USB drive is plugged in. This page covers every prerequisite you must verify — from BIOS settings and disk controller modes to switch configuration and boot media preparation — so that installation day proceeds smoothly and without surprises.
Before scheduling installation, confirm that all physical hardware is racked, cabled, and meets VergeOS requirements.
The disk controller is one of the most common sources of installation problems. VergeOS requires direct access to every individual drive — it does not work with hardware RAID arrays.
| Controller Type | Requirement |
|---|---|
| HBA (Host Bus Adapter) | Preferred — passes drives directly to the OS |
| RAID Controller | Must be set to JBOD / IT mode (passthrough) — no RAID arrays |
| NVMe Drives | Verify the controller supports booting from NVMe if all drives are NVMe |
Every node must have its BIOS configured consistently before installation begins. Inconsistent BIOS settings across nodes are a common cause of installation delays.
| Setting | Required Value | Notes |
|---|---|---|
| Boot Mode | UEFI (preferred) or Legacy/Dual | UEFI is required if all drives are NVMe |
| Hardware Virtualization | Enabled (VT-x / AMD-V) | Required for VergeHV hypervisor operation |
| Hyperthreading | Enabled | Recommended for workload density |
| All Processor Cores | Enabled | Do not disable cores to “save power” |
| Secure Boot | Disabled | VergeOS implements its own boot integrity verification |
| System Clocks | Set correctly (all nodes within seconds of each other) | Node 1 controls NTP for the entire system after installation |
VergeOS does not use traditional UEFI Secure Boot. Instead, VergeOS implements its own boot integrity verification that prevents tampered images from booting. This approach provides practical tamper protection without the limitations of UEFI Secure Boot (which requires operating systems to be signed with keys registered in the firmware — a process controlled by a small number of certificate authorities).
The key difference:
For production environments, this provides equivalent practical security. Any attempt to modify VergeOS system files will be detected and prevent boot. Physical security controls should complement software-level integrity verification.
Before installation, complete a hardware burn-in to identify early failures:
The VergeOS installation is delivered as a single ISO image containing all packages for the complete system (hypervisor, storage, networking, and management). You will need a bootable USB drive for each node being installed.
dd from the command line)Always test your boot media before installation day:
Network configuration is the most complex pre-installation task. VergeOS requires two distinct network types, and the physical switches must be configured before installation begins.
The core fabric is a private, high-speed network carrying vSAN storage traffic, cluster coordination, and VM migration. It is the backbone of the VergeOS system.
Switch port requirements for core fabric:
| Setting | Value | Rationale |
|---|---|---|
| Port Mode | Access (untagged, single VLAN) | One VLAN per core network |
| VLAN | Dedicated, isolated VLANs (e.g., 900 for Core1, 901 for Core2) | Must be isolated from ALL other traffic |
| MTU | 9216 (jumbo frames) | Required for storage efficiency and tenant overhead |
| Spanning Tree | Disabled on core ports | Not needed for dedicated point-to-point core links |
| Speed | 10 Gbps or higher | Minimum recommendation for production |
Each core switch must use a dedicated VLAN — for example, VLAN 900 for Core Fabric 1 and VLAN 901 for Core Fabric 2. These VLANs must be completely isolated from external traffic.
External networks connect VMs and workloads to users, the internet, and existing infrastructure.
Switch port requirements for external networks:
| Setting | Value | Rationale |
|---|---|---|
| Port Mode | Trunk (multiple VLANs) | Supports management and workload VLANs |
| VLANs | Management + workload VLANs as needed | Trunk only the VLANs required |
| MTU | 1500 (standard) | Unless workloads require jumbo frames |
| Bonding | LACP or Active-Backup (optional) | Recommended for redundancy |
Before installation, map every physical NIC to its intended role:
Allocate and document the following before installation:
10.0.0.2/24)Thorough documentation before installation prevents delays and simplifies troubleshooting. Prepare the following:
A-B Cable Map
Document which NIC on each node connects to which switch and port. Label both ends of every cable.
Rack Elevation
Record the physical position of each node, switch, and PDU in the rack.
Network Design Drawings
Layer 2 (VLAN assignments, trunk/access ports) and Layer 3 (IP subnets, gateways, routing) diagrams.
IP Allocation Spreadsheet
All IP addresses, CIDR masks, gateways, DNS servers, and VLAN IDs in one reference document.
Several decisions must be made before installation because they cannot be easily changed afterward:
VergeOS supports AES-256 at-rest encryption for the vSAN. This decision is made during installation and cannot be changed post-install — switching from encrypted to unencrypted (or vice versa) requires a full reinstall.
If enabling encryption:
During installation planning, decide between two approaches:
| Approach | Trade-Off |
|---|---|
| More Usable Memory | Allocate more RAM to workloads, accepting slightly reduced HA failover capacity |
| Stricter N+1 HA | Reserve more RAM for failover scenarios, reducing available workload memory |
This setting is configurable post-install but should be planned in advance to match your SLA requirements.
Within 24 hours of the scheduled installation, perform these final verifications:
write mem)| Category | Key Items |
|---|---|
| Hardware | 64-bit CPU with VT-x/AMD-V, 16 GB+ RAM, HBA or JBOD mode, IPMI configured |
| BIOS | UEFI (required for all-NVMe), virtualization enabled, Secure Boot disabled, clocks synchronized |
| Boot Media | ISO from VergeOS support, Rufus (DD mode) or BalenaEtcher, tested before install day |
| Network | Core fabric: dedicated VLANs, MTU 9216, no bonding. External: trunk ports, optional LACP bonding |
| Documentation | Cable map, rack elevation, network diagrams, IP allocation spreadsheet |
| Decisions | Encryption (yes/no, not reversible), RAM reservation preference, installation timeline |
With all prerequisites verified and documentation in hand, you are ready to proceed to the controller installation: Controller Installation →