Pre-Requisites for ADCM Installation

ADCM required installed Docker package on your system. Currently ADCM Docker image tested in CentOS/RHEL 7 OS.

Docker Installation


Please check all requirements before Docker and ADCM installation.

OS requirements

To install Docker, you need a maintained version of CentOS 7, . Archived versions aren’t supported or tested.

The centos-extras repository must be enabled. This repository is enabled by default, but if you have disabled it, you need to re-enable it.

The overlay2 storage driver is recommended.

Install Docker

You can install Docker in different ways, depending on your needs:

Most users set up Docker’s repositories and install from them, for ease of installation and upgrade tasks. This is the recommended approach.

Some users download the RPM package and install it manually and manage upgrades completely manually. This is useful in situations such as installing Docker on air-gapped systems with no access to the internet.

In testing and development environments, some users choose to use automated convenience scripts to install Docker.

Install using the repository Before you install Docker for the first time on a new host machine, you need to set up the Docker repository. Afterward, you can install and update Docker from the repository.

Install Necessary Packages

Install required packages. yum-utils provides the yum-config-manager utility, and device-mapper-persistent-data and lvm2 are required by the devicemapper storage driver.

sudo yum install -y yum-utils docker\
device-mapper-persistent-data \

Start docker

sudo systemctl start docker

Enable docker as system service

sudo systemctl enable docker

Disable Selinux

SELinux must be disabled for ADCM. To temporarily disable SELinux, run the following command on each host in your cluster:

setenforce 0

Permanently disabling SELinux so that on system reboot it does not restart is strongly recommended.

vi /etc/selinux/config

# This file controls the state of SELinux on the system.
# SELINUX= can take one of these three values:
#       enforcing - SELinux security policy is enforced.
#       permissive - SELinux prints warnings instead of enforcing.
#       disabled - SELinux is fully disabled.
# SELINUXTYPE= type of policy in use. Possible values are:
#       targeted - Only targeted network daemons are protected.
#       strict - Full SELinux protection.