- Overview
- Requirements
- Pre-installation
- Preparing the installation
- Downloading the installation packages
- Configuring the OCI-compliant registry
- Granting installation permissions
- Disaster recovery: Active/Passive configurations
- Generating the configuration file using a wizard
- input.json example
- Installing and configuring the service mesh
- Installing and configuring the GitOps tool
- Installing the External Secrets Operator
- Deploying Redis through OperatorHub
- Applying miscellaneous configurations
- Running uipathctl
- Installation
- Post-installation
- Migration and upgrade
- Monitoring and alerting
- Cluster administration
- Product-specific configuration
- Troubleshooting

Automation Suite on OpenShift installation guide
Some Automation Suite products are not supported in Disaster Recovery - Active/Passive . You can install these products while installing the primary cluster only. For details, see Disaster recovery - Active/Passive.
input.json parameters:
-
For Active/Passive deployments: configure the parameters listed in the following table.
|
Parameter |
Description |
|---|---|
fqdn |
It represents the FQDN that, at the time of installation, points to the load balancer of the primary cluster. For details, refer to DNS routing logic. |
cluster_fqdn |
It represents the cluster-specific FQDN (DNS) that points to the load balancer of the cluster you set up using the
input.json file.
For details, refer to DNS routing logic. |
|
|
It indicates that Automation Suite must be configured to work multi-site. It must be set to
true.
|
|
|
It indicates that this cluster is a primary cluster and must be set to
true. It defaults to false to denote the secondary cluster.
|
|
|
It indicates the base64-encoded kubeconfig file of another cluster. While installing the primary Automation Suite cluster, this value is unavailable and can be left as is. However, you must provide the value when rebuilding the primary automation suite later during recovery. |
This page describes how to set up a multi-site configuration with a primary and secondary cluster. The primary cluster is active and the secondary cluster is passive.
-
In the configuration for the primary cluster option, the
enabledoption must be set to true."multisite": { "enabled": true, "primary": true }"multisite": { "enabled": true, "primary": true } -
In the configuration for the secondary cluster, the
primaryoption must be set to false:"multisite": { "enabled": true, "primary": false, "other_kube_config": "[base64 encoded kubeconfig]" }"multisite": { "enabled": true, "primary": false, "other_kube_config": "[base64 encoded kubeconfig]" }You must supply the primary kubeconfig in base64 encoded string.
- Services that are not compatible with being in a passive state must be disabled. For more details on services that do not support Active/Passive mode, refer to the Disaster recovery - Active/Passive page.
- Ensure the certificates are consistent across the primary and secondary cluster, as this is not automatically checked or enforced.