Skip to content

Controller Installation

Installing the two controller nodes is the core of every VergeOS deployment. Node 1 bootstraps a brand-new system — setting the system name, admin account, networking, licensing, encryption, and storage tiers. Node 2 joins the existing system and mirrors those settings, giving you an immediately redundant cluster. This page walks through both installations in detail.


Node 1 creates the VergeOS system. Every configuration choice you make here establishes the baseline that Node 2 and all subsequent nodes will follow.

  1. Boot from USB — Insert the VergeOS installation media and boot the server. The full installer loads into memory; loading time varies by media speed.
  2. Select “Install (Standard)” — This is the default. Non-standard options should only be used when working directly with VergeOS Support.
  3. Select “Controller” — The first two nodes in any system must be controller nodes.
  4. Select “Yes” to confirm this is a New Install (new vSAN).
  1. NTP configuration — Enter a space-delimited list of NTP servers (e.g., pool.ntp.org time.google.com), or accept the defaults.

  2. Date and time — Carefully confirm the current date and time. Node 1 controls NTP for the entire system after installation, so accuracy here is critical.

  3. System name — Enter a descriptive name for your VergeOS system (e.g., “Production HCI Cluster”). This name appears in the dashboard, alerts, reports, and site-sync configurations. It can be changed post-install in System Settings.

  1. Administrator username — Accept the default (admin) or enter a custom username.
  2. Password — Enter a strong password (minimum 8 characters). Store it in your password repository immediately.
  3. Email address — Enter the admin email. This is used for password resets and receiving subscription alerts. An email address is required during installation.

This is where your pre-installation NIC documentation pays off. You will configure every detected NIC on the node.

  1. Select Core1 NIC — Choose the physical NIC connected to your Core Fabric 1 switch.

  2. Configure Core1 settings:

    • Name — A descriptive name (e.g., the switch hostname or your naming convention)
    • MTU — Default is 9192; must match the physical switch MTU (jumbo frames)
    • Core — Leave set to “Yes”
    • VLAN — Enter the Core1 VLAN ID, or leave blank/0 for PVID (untagged) ports
  3. Select Core2 NIC — Choose the physical NIC connected to your Core Fabric 2 switch.

  4. Configure Core2 settings — Same pattern as Core1 but using the Core2 VLAN ID.

  1. Select External NIC(s) — Choose the NIC(s) connected to your external/management switch. Port bonding (LACP) is supported here for redundancy.

  2. Configure External settings:

    • Name — Descriptive name for the external network
    • MTU — Typically 1500 (standard Ethernet)
    • Core — Change to “No”
    • VLAN — Enter the management VLAN ID if applicable (PVID preferred)
    • IP address — Static address in CIDR format (e.g., 10.0.0.2/24), or enter dhcp for DHCP (test/evaluation only)
    • Gateway — Default gateway IP address
    • DNS — DNS server addresses
  3. Configure remaining NICs — Any unused or unplugged NICs should still be assigned a name (e.g., “unused”) during installation. Select [Done] when all NICs are configured.

  1. Select license server — Choose between Production or Trial/NFR server.
  2. Enter credentials — Provide the license username and password from your VergeOS account team. Store these securely.
  1. Enable or disable encryption — VergeOS supports AES-256 at-rest encryption for the vSAN.
    • If enabling, enter an encryption key passphrase (8—64 characters)
    • Optionally write the encryption key to a USB drive (highly recommended for production)
    • Verify the correct USB device is selected before confirming
  1. Select vSAN drives — All detected drives are displayed and selected by default (marked with an asterisk). Deselect any drives that should be excluded:

    • Removable devices (USB drives)
    • Drives dedicated to storing an encryption key
    • Any drive not intended for vSAN use
  2. Assign storage tiers — The installer auto-detects a tier for each drive. Select “Yes” to review and optionally change tier assignments:

    • Tier 0 — Metadata storage (NVMe, high write endurance recommended, 5—10 GB per 1 TB usable vSAN)
    • Tier 1 — High-performance, write-intensive workloads (high-endurance NVMe)
    • Tier 2 — Mixed workloads, general-purpose VMs (mid-range SSD)
    • Tier 3 — Read-optimized workloads (read-optimized SSD)
    • Tier 4 — Capacity / infrequently accessed data (HDD)
    • Tier 5 — Archive / cold storage (archival HDD)

Select [Done] when tier assignments are correct.

  1. Select swap tier — Choose which storage tier to use for swap space. Avoid Tier 0 drives when possible; select the next fastest tier. Never select HDD drives for swap unless the node contains only HDDs.
  2. Enter swap per drive — Specify swap in MB per drive (e.g., 2048 across 8 drives = 16 GB total). Generally, no more than 16 GB of swap per node should be configured.
  3. Confirm the swap summary and select “Yes”.
  1. The installer formats each selected drive (large drives may take several minutes) and initializes the vSAN.
  2. When installation completes, remove the USB media and press [Enter] to reboot.

After reboot, verify the primary controller is healthy before proceeding to Node 2:

CheckExpected Result
Console screenBlue VergeOS user menu appears
UI accessNavigate to the configured IP address in a browser; login with admin credentials
Status indicatorsAll indicators green on the main dashboard
vSAN healthvSAN mounted and healthy (shown on dashboard)

Node 2 joins the system created by Node 1. The installer will auto-detect most network configuration, making this process faster than Node 1.

  1. Boot from USB — Insert the VergeOS installation media on the second server and boot.

  2. Select “Standard Install” (default).

  3. Select “Controller” (default).

  4. Select “No” — This is NOT a new install. You are joining the system already created on Node 1.

  5. Enter admin credentials — Provide the admin username and password created during the Node 1 installation.

  6. Automatic network detection — Select “Yes” to auto-detect network configuration. The installer will discover both core networks from Node 1. This is the recommended approach as it avoids manual network misconfiguration.

  7. Verify detected networks — For each detected core network, review the displayed configuration and press [Enter] to confirm.

  8. Configure encryption — Encryption settings must match Node 1. If Node 1 uses encryption, Node 2 must also use encryption with the same passphrase.

  9. Select vSAN drives and assign tiers — Drive and tier selections should match the pattern established on Node 1 (same tier assignments for equivalent drive types).

  10. Configure swap — Match the swap configuration from Node 1.

  11. When the installer finishes, remove the USB media and press [Enter] to reboot.

CheckExpected Result
Console screenBlue VergeOS user menu appears
UI loginAccess the same IP address used for Node 1; both nodes visible in the dashboard
Node statusBoth nodes show healthy (green) status in the Nodes dashboard
vSAN redundancyvSAN shows redundant status (N+1) with both nodes contributing storage

N+2 Redundancy (Optional Third Controller)

Section titled “N+2 Redundancy (Optional Third Controller)”

Two controller nodes provide the default N+1 redundancy — two copies of every data block. For environments requiring higher resilience, VergeOS also supports N+2 redundancy with three controller nodes, maintaining three copies of each data block.

To configure N+2:

  1. Install a third controller node following the same Node 2 process (join existing system)
  2. Adding a third controller node to achieve N+2 redundancy should be performed in coordination with VergeOS Support, as the process and requirements may vary by version

Irreversible Decisions

Encryption (Yes/No) cannot be changed after installation without a full reinstall. Decide before you begin.

Changeable Post-Install

System name, admin credentials, email, swap configuration, and network names can all be modified through the UI after installation.

Must Match Across Nodes

Encryption settings and tier assignment patterns must be consistent between Node 1 and Node 2 (and all subsequent controller nodes).

Troubleshooting

Press Esc for a command prompt. Use yb-install to resume or yb-install --restart to restart the installation.


StepNode 1 SelectionNode 2 Selection
Install typeStandard InstallStandard Install
RoleControllerController
New install?Yes (new vSAN)No (join existing)
NTP / TimeConfigure manuallyNot prompted (inherits from Node 1)
System nameEnter nameNot prompted (inherits from Node 1)
Admin accountCreate newEnter existing credentials
Network configManual per-NICAuto-detect recommended
LicenseEnter credentialsNot prompted (inherits from Node 1)
EncryptionChoose Yes/NoMust match Node 1
Disk/tier selectionFull selectionMust match Node 1 pattern
SwapConfigureConfigure (match Node 1)

With both controller nodes installed and verified, you can proceed to add additional capacity: