`;
onCertManagerChange("Temp topology note");
expect($("div#topology-note-wrapper").css("display")).toEqual("none");
+ expect($("div#observability-operator-topology-wrapper").css("display")).toEqual("none");
});
});
@@ -718,7 +722,7 @@ describe("GIVEN displayCommands function", () => {
@@ -733,7 +737,7 @@ describe("GIVEN displayCommands function", () => {
expect($("#command-title").text()).toEqual("Run the following commands to install");
expect($("#command-note").text()).toEqual("Ensure that the namespaces and secrets are created before installing the helm chart");
expect($("#command1").text()).toEqual("helm repo add dell https://dell.github.io/helm-charts");
- expect($("#command2").text()).toEqual("helm install powerstore dell/container-storage-modules -n csi-powerstore --version 1.0.0 -f values.yaml");
+ expect($("#command2").text()).toEqual("helm install powerstore dell/container-storage-modules -n csi-powerstore --version 1.1.0 -f values.yaml");
});
test("SHOULD show expected commands: Installation Type: Operator", () => {
diff --git a/content/docs/deployment/csminstallationwizard/src/static/js/tests/utility.test.js b/content/docs/deployment/csminstallationwizard/src/static/js/tests/utility.test.js
index ec53d7a6e2..3d068b187e 100644
--- a/content/docs/deployment/csminstallationwizard/src/static/js/tests/utility.test.js
+++ b/content/docs/deployment/csminstallationwizard/src/static/js/tests/utility.test.js
@@ -45,10 +45,10 @@ const CONSTANT_PARAM = {
PROPERTIES: ".properties",
HELM: "helm",
OPERATOR: "operator",
- CSM_HELM_V170: "1.0.0",
CSM_HELM_V180: "1.1.0",
- CSM_HELM_V190: "1.2.0",
- CSM_HELM_V1100: "1.3.0",
+ CSM_HELM_V190: "1.2.2",
+ CSM_HELM_V1102: "1.3.2",
+ CSM_HELM_V1110: "1.4.0",
HELM_TAINTS: `
- key: "$KEY"
operator: "Exists"
diff --git a/content/docs/deployment/csminstallationwizard/src/static/js/ui-functions.js b/content/docs/deployment/csminstallationwizard/src/static/js/ui-functions.js
index f1b5139cae..56bb869db3 100644
--- a/content/docs/deployment/csminstallationwizard/src/static/js/ui-functions.js
+++ b/content/docs/deployment/csminstallationwizard/src/static/js/ui-functions.js
@@ -382,6 +382,7 @@ function displayModules(installationType, driverName, CONSTANTS_PARAM) {
$(".vgsnapshot").hide();
$(".storage-capacity").show();
$(".max-volumes-per-node").show();
+ $(".topology").show();
document.getElementById("driver-namespace").value = CONSTANTS_PARAM.POWERSCALE_NAMESPACE;
if (installationType === 'operator'){
$(".observability-operator").show();
@@ -402,6 +403,9 @@ function displayModules(installationType, driverName, CONSTANTS_PARAM) {
$(".cluster-prefix").show();
$(".port-groups").show();
$(".resiliency").hide();
+ if (document.getElementById("csm-version").value === "1.11.0") {
+ $(".resiliency").show();
+ }
$(".migration").show();
$(".vSphere").show();
$(".storage-capacity").show();
@@ -417,6 +421,10 @@ function displayModules(installationType, driverName, CONSTANTS_PARAM) {
$(".observability-operator").show();
$(".observability").hide();
+ $(".resiliency").hide();
+ if (document.getElementById("csm-version").value === "1.11.0") {
+ $(".resiliency-operator").show();
+ }
$(".replication-operator-clusterid").hide();
$(".image-repository").hide();
$(".cert-manager").hide();
@@ -463,20 +471,20 @@ function displayCommands(releaseNameValue, commandTitleValue, commandNoteValue,
installationType = document.getElementById("installation-type").value
var helmChartVersion;
switch (csmVersion) {
- case "1.7.0":
- helmChartVersion = CONSTANTS.CSM_HELM_V170;
- break;
case "1.8.0":
helmChartVersion = CONSTANTS.CSM_HELM_V180;
break;
- case "1.9.3":
- helmChartVersion = CONSTANTS.CSM_HELM_V193;
+ case "1.9.0":
+ helmChartVersion = CONSTANTS.CSM_HELM_V190;
break;
case "1.10.2":
helmChartVersion = CONSTANTS.CSM_HELM_V1102;
break;
+ case "1.11.0":
+ helmChartVersion = CONSTANTS.CSM_HELM_V1110;
+ break;
default:
- helmChartVersion = CONSTANTS.CSM_HELM_V1102;
+ helmChartVersion = CONSTANTS.CSM_HELM_V1110;
break;
}
$("#command-text-area").show();
diff --git a/content/docs/deployment/csminstallationwizard/src/templates/helm/csm-1.7.0-values.template b/content/docs/deployment/csminstallationwizard/src/templates/helm/csm-1.11.0-values.template
similarity index 69%
rename from content/docs/deployment/csminstallationwizard/src/templates/helm/csm-1.7.0-values.template
rename to content/docs/deployment/csminstallationwizard/src/templates/helm/csm-1.11.0-values.template
index 665673aff8..cf17bedfbd 100644
--- a/content/docs/deployment/csminstallationwizard/src/templates/helm/csm-1.7.0-values.template
+++ b/content/docs/deployment/csminstallationwizard/src/templates/helm/csm-1.11.0-values.template
@@ -4,9 +4,23 @@
##########################################
csi-powerstore:
enabled: $POWERSTORE_ENABLED
- version: v2.7.0
+ version: v2.11.0
images:
- driverRepository: $IMAGE_REPOSITORY
+ # "driver" defines the container image, used for the driver container.
+ driver: dellemc/csi-powerstore:v2.11.0
+ # CSI sidecars
+ attacher: registry.k8s.io/sig-storage/csi-attacher:v4.6.1
+ provisioner: registry.k8s.io/sig-storage/csi-provisioner:v5.0.1
+ snapshotter: registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1
+ resizer: registry.k8s.io/sig-storage/csi-resizer:v1.11.1
+ registrar: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1
+ healthmonitor: registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.12.0
+
+ # CSM sidecars
+ replication: dellemc/dell-csi-replicator:v1.9.0
+ vgsnapshotter: dellemc/csi-volumegroup-snapshotter:v1.6.0
+ podmon: dellemc/podmon:v1.10.0
+ metadataretriever: dellemc/csi-metadata-retriever:v1.8.0
## Controller ATTRIBUTES
controller:
controllerCount: $CONTROLLER_COUNT
@@ -17,11 +31,8 @@ csi-powerstore:
tolerations: $CONTROLLER_TOLERATIONS
replication:
enabled: $REPLICATION_ENABLED
- image: dellemc/dell-csi-replicator:v1.5.0
vgsnapshot:
enabled: $VG_SNAPSHOT_ENABLED
- image: dellemc/csi-volumegroup-snapshotter:v1.2.0
- metadataretriever: dellemc/csi-metadata-retriever:v1.4.0
snapshot:
enabled: $SNAPSHOT_ENABLED
snapNamePrefix: $SNAP_NAME_PREFIX
@@ -62,7 +73,6 @@ csi-powerstore:
enabled: $STORAGE_CAPACITY_ENABLED
podmon:
enabled: $RESILIENCY_ENABLED
- image: dellemc/podmon:v1.6.0
controller:
args:
- "--csisock=unix:/var/run/csi/csi.sock"
@@ -87,28 +97,49 @@ csi-powerstore:
- "--driverPodLabelValue=dell-storage"
- "--ignoreVolumelessPods=false"
+ maxPowerstoreVolumesPerNode: $MAX_VOLUMES_PER_NODE
+ podmonAPIPort: 8083
+
## K8S/CSI-PowerMax ATTRIBUTES
##########################################
csi-powermax:
enabled: $POWERMAX_ENABLED
global:
- storageArrays:
- - storageArrayId: "$POWERMAX_STORAGE_ARRAY_ID"
- endpoint: $POWERMAX_STORAGE_ARRAY_ENDPOINT_URL
- backupEndpoint: $POWERMAX_STORAGE_ARRAY_BACKUP_ENDPOINT_URL
- - storageArrayId: "$TARGET_ARRAY_ID"
- endpoint: $TARGET_UNISPHERE
- managementServers:
- - endpoint: $POWERMAX_MANAGEMENT_SERVERS_ENDPOINT_URL
- - endpoint: $TARGET_UNISPHERE
- version: v2.7.0
+ storageArrays:
+ - storageArrayId: "$POWERMAX_STORAGE_ARRAY_ID"
+ endpoint: $POWERMAX_STORAGE_ARRAY_ENDPOINT_URL
+ backupEndpoint: $POWERMAX_STORAGE_ARRAY_BACKUP_ENDPOINT_URL
+ - storageArrayId: "$TARGET_ARRAY_ID"
+ endpoint: $TARGET_UNISPHERE
+ managementServers:
+ - endpoint: $POWERMAX_MANAGEMENT_SERVERS_ENDPOINT_URL
+ - endpoint: $TARGET_UNISPHERE
+ version: v2.11.0
images:
- driverRepository: $IMAGE_REPOSITORY
+ # "driver" defines the container image, used for the driver container.
+ driver: dellemc/csi-powermax:v2.11.0
+ csireverseproxy: dellemc/csipowermax-reverseproxy:v2.10.0
+ # CSI sidecars
+ attacher: registry.k8s.io/sig-storage/csi-attacher:v4.6.1
+ provisioner: registry.k8s.io/sig-storage/csi-provisioner:v5.0.1
+ snapshotter: registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1
+ resizer: registry.k8s.io/sig-storage/csi-resizer:v1.11.1
+ registrar: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1
+ healthmonitor: registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.12.0
+ # CSM sidecars
+ replication: dellemc/dell-csi-replicator:v1.9.0
+ authorization: dellemc/csm-authorization-sidecar:v1.11.0
+ migration: dellemc/dell-csi-migrator:v1.3.0
+ noderescan: dellemc/dell-csi-node-rescanner:v1.2.0
clusterPrefix: $POWERMAX_CLUSTER_PREFIX
portGroups: "$POWERMAX_PORT_GROUPS"
fsGroupPolicy: "$FSGROUP_POLICY"
+ maxPowerMaxVolumesPerNode: $MAX_VOLUMES_PER_NODE
+ podmonAPIPort: 8083
enableCHAP: $ISCSI_CHAP_ENABLED
transportProtocol: "$NODE_TRANSPORT_PROTOCOL"
+ storageCapacity:
+ enabled: $STORAGE_CAPACITY_ENABLED
controller:
controllerCount: $CONTROLLER_COUNT
volumeNamePrefix: $VOLUME_NAME_PREFIX
@@ -138,20 +169,42 @@ csi-powermax:
operator: "Exists"
effect: "NoExecute"
csireverseproxy:
- image: dellemc/csipowermax-reverseproxy:v2.6.0
deployAsSidecar: true
replication:
enabled: $REPLICATION_ENABLED
- image: dellemc/dell-csi-replicator:v1.5.0
+ podmon:
+ enabled: $RESILIENCY_ENABLED
+ controller:
+ args:
+ - "--csisock=unix:/var/run/csi/csi.sock"
+ - "--labelvalue=csi-powermax"
+ - "--arrayConnectivityPollRate=60"
+ - "--driverPath=csi-powermax.dellemc.com"
+ - "--mode=controller"
+ - "--skipArrayConnectionValidation=false"
+ - "--driver-config-params=/powermax-config-params/driver-config-params.yaml"
+ - "--driverPodLabelValue=dell-storage"
+ - "--ignoreVolumelessPods=false"
+
+ node:
+ args:
+ - "--csisock=unix:/var/lib/kubelet/plugins/powermax.emc.dell.com/csi_sock"
+ - "--labelvalue=csi-powermax"
+ - "--arrayConnectivityPollRate=60"
+ - "--driverPath=csi-powermax.dellemc.com"
+ - "--mode=node"
+ - "--leaderelection=false"
+ - "--driver-config-params=/powermax-config-params/driver-config-params.yaml"
+ - "--driverPodLabelValue=dell-storage"
+ - "--ignoreVolumelessPods=false"
migration:
enabled: $MIGRATION_ENABLED
- image: dellemc/dell-csi-migrator:v1.1.1
- nodeRescanSidecarImage: dellemc/dell-csi-node-rescanner:v1.0.1
authorization:
enabled: $AUTHORIZATION_ENABLED
- sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.7.0
proxyHost: $AUTHORIZATION_PROXY_HOST
skipCertificateValidation: $AUTHORIZATION_SKIP_CERTIFICATE_VALIDATION
+ storageCapacity:
+ enabled: $STORAGE_CAPACITY_ENABLED
vSphere:
enabled: $VSPHERE_ENABLED
fcPortGroup: "$VSPHERE_FC_PORT_GROUP"
@@ -163,15 +216,28 @@ csi-powermax:
##########################################
csi-vxflexos:
enabled: $POWERFLEX_ENABLED
- version: v2.7.0
+ version: v2.11.0
images:
- driverRepository: $IMAGE_REPOSITORY
- powerflexSdc: dellemc/sdc:3.6.0.6
+ # "driver" defines the container image, used for the driver container.
+ driver: dellemc/csi-vxflexos:v2.11.0
+ # "powerflexSdc" defines the SDC image for init container.
+ powerflexSdc: dellemc/sdc:4.5.2.1
+ # CSI sidecars
+ attacher: registry.k8s.io/sig-storage/csi-attacher:v4.6.1
+ provisioner: registry.k8s.io/sig-storage/csi-provisioner:v5.0.1
+ snapshotter: registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1
+ resizer: registry.k8s.io/sig-storage/csi-resizer:v1.11.1
+ registrar: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1
+ healthmonitor: registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.12.0
+ # CSM sidecars
+ replication: dellemc/dell-csi-replicator:v1.9.0
+ vgsnapshotter: dellemc/csi-volumegroup-snapshotter:v1.6.0
+ podmon: dellemc/podmon:v1.10.0
+ authorization: dellemc/csm-authorization-sidecar:v1.11.0
certSecretCount: $CERT_SECRET_COUNT
controller:
replication:
enabled: $REPLICATION_ENABLED
- image: dellemc/dell-csi-replicator:v1.5.0
healthMonitor:
enabled: $HEALTH_MONITOR_ENABLED
controllerCount: $CONTROLLER_COUNT
@@ -211,14 +277,16 @@ csi-vxflexos:
# - key: "isilon.podmon.storage.dell.com"
# operator: "Exists"
# effect: "NoSchedule"
+ storageCapacity:
+ enabled: $STORAGE_CAPACITY_ENABLED
+ enableQuota: $QUOTA_ENABLED
+ externalAccess:
monitor:
enabled: $MONITOR_ENABLED
vgsnapshotter:
enabled: $VG_SNAPSHOT_ENABLED
- image: dellemc/csi-volumegroup-snapshotter:v1.2.0
podmon:
enabled: $RESILIENCY_ENABLED
- image: dellemc/podmon:v1.6.0
controller:
args:
- "--csisock=unix:/var/run/csi/csi.sock"
@@ -239,50 +307,52 @@ csi-vxflexos:
- "--ignoreVolumelessPods=false"
authorization:
enabled: $AUTHORIZATION_ENABLED
- sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.7.0
proxyHost: $AUTHORIZATION_PROXY_HOST
skipCertificateValidation: $AUTHORIZATION_SKIP_CERTIFICATE_VALIDATION
+ maxPowerflexVolumesPerNode: $MAX_VOLUMES_PER_NODE
## K8S/CSI-PowerScale ATTRIBUTES
##########################################
csi-isilon:
enabled: $POWERSCALE_ENABLED
- version: "v2.7.0"
+ version: "v2.11.0"
images:
- driverRepository: $IMAGE_REPOSITORY
- certSecretCount: $CERT_SECRET_COUNT
+ # "driver" defines the container image, used for the driver container.
+ driver: dellemc/csi-isilon:v2.11.0
+ # CSI sidecars
+ attacher: registry.k8s.io/sig-storage/csi-attacher:v4.6.1
+ provisioner: registry.k8s.io/sig-storage/csi-provisioner:v5.0.1
+ snapshotter: registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1
+ resizer: registry.k8s.io/sig-storage/csi-resizer:v1.11.1
+ registrar: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1
+ healthmonitor: registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.12.0
+ # CSM sidecars
+ replication: dellemc/dell-csi-replicator:v1.9.0
+ podmon: dellemc/podmon:v1.10.0
+ authorization: dellemc/csm-authorization-sidecar:v1.11.0
+ metadataretriever: dellemc/csi-metadata-retriever:v1.8.0
+ encryption: dellemc/csm-encryption:v0.3.0
+ certSecretCount: $CERT_SECRET_COUNT
allowedNetworks: []
-
verbose: 1
-
enableCustomTopology: false
-
fsGroupPolicy: $FSGROUP_POLICY
-
storageCapacity:
enabled: $STORAGE_CAPACITY_ENABLED
-
maxIsilonVolumesPerNode: $MAX_VOLUMES_PER_NODE
-
controller:
controllerCount: $CONTROLLER_COUNT
volumeNamePrefix: $VOLUME_NAME_PREFIX
-
replication:
enabled: $REPLICATION_ENABLED
- image: dellemc/dell-csi-replicator:v1.5.0
-
snapshot:
enabled: $SNAPSHOT_ENABLED
snapNamePrefix: $SNAP_NAME_PREFIX
-
resizer:
enabled: $RESIZER_ENABLED
-
healthMonitor:
enabled: $HEALTH_MONITOR_ENABLED
-
nodeSelector: $CONTROLLER_POD_NODE_SELECTOR
tolerations: $CONTROLLER_TOLERATIONS
node:
@@ -319,17 +389,13 @@ csi-isilon:
healthMonitor:
enabled: $HEALTH_MONITOR_ENABLED
-
authorization:
enabled: $AUTHORIZATION_ENABLED
- sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.7.0
proxyHost: $AUTHORIZATION_PROXY_HOST
skipCertificateValidation: $AUTHORIZATION_SKIP_CERTIFICATE_VALIDATION
-
# Enable this feature only after contact support for additional information
podmon:
enabled: $RESILIENCY_ENABLED
- image: dellemc/podmon:v1.6.0
controller:
args:
- "--csisock=unix:/var/run/csi/csi.sock"
@@ -353,15 +419,27 @@ csi-isilon:
- "--driver-config-params=/csi-isilon-config-params/driver-config-params.yaml"
- "--driverPodLabelValue=dell-storage"
- "--ignoreVolumelessPods=false"
+ podmonAPIPort: 8083
## K8S/CSI-Unity ATTRIBUTES
##########################################
csi-unity:
enabled: $UNITY_ENABLED
- version: v2.7.0
+ version: v2.11.0
images:
- driverRepository: $IMAGE_REPOSITORY
+ # "driver" defines the container image, used for the driver container.
+ driver: dellemc/csi-unity:v2.11.0
+ # CSI sidecars
+ attacher: registry.k8s.io/sig-storage/csi-attacher:v4.6.1
+ provisioner: registry.k8s.io/sig-storage/csi-provisioner:v5.0.1
+ snapshotter: registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1
+ resizer: registry.k8s.io/sig-storage/csi-resizer:v1.11.1
+ registrar: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1
+ healthmonitor: registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.12.0
+ # CSM sidecars
+ podmon: dellemc/podmon:v1.10.0
certSecretCount: $CERT_SECRET_COUNT
+ allowedNetworks:
fsGroupPolicy: $FSGROUP_POLICY
controller:
controllerCount: $CONTROLLER_COUNT
@@ -408,9 +486,11 @@ csi-unity:
# - key: "isilon.podmon.storage.dell.com"
# operator: "Exists"
# effect: "NoSchedule"
+ storageCapacity:
+ enabled: $STORAGE_CAPACITY_ENABLED
+ maxUnityVolumesPerNode: $MAX_VOLUMES_PER_NODE
podmon:
enabled: $RESILIENCY_ENABLED
- image: dellemc/podmon:v1.6.0
controller:
args:
- "--csisock=unix:/var/run/csi/csi.sock"
diff --git a/content/docs/deployment/csminstallationwizard/src/templates/helm/csm-1.7.1-values.template b/content/docs/deployment/csminstallationwizard/src/templates/helm/csm-1.7.1-values.template
deleted file mode 100644
index 06dfecc3ca..0000000000
--- a/content/docs/deployment/csminstallationwizard/src/templates/helm/csm-1.7.1-values.template
+++ /dev/null
@@ -1,444 +0,0 @@
-## K8S/DRIVER ATTRIBUTES
-##########################################
-## K8S/CSI-PowerStore ATTRIBUTES
-##########################################
-csi-powerstore:
- enabled: $POWERSTORE_ENABLED
- version: v2.7.0
- images:
- driverRepository: $IMAGE_REPOSITORY
- ## Controller ATTRIBUTES
- controller:
- controllerCount: $CONTROLLER_COUNT
- volumeNamePrefix: $VOLUME_NAME_PREFIX
- healthMonitor:
- enabled: $HEALTH_MONITOR_ENABLED
- nodeSelector: $CONTROLLER_POD_NODE_SELECTOR
- tolerations: $CONTROLLER_TOLERATIONS
- replication:
- enabled: $REPLICATION_ENABLED
- image: dellemc/dell-csi-replicator:v1.5.0
- vgsnapshot:
- enabled: $VG_SNAPSHOT_ENABLED
- image: dellemc/csi-volumegroup-snapshotter:v1.2.0
- metadataretriever: dellemc/csi-metadata-retriever:v1.4.0
- snapshot:
- enabled: $SNAPSHOT_ENABLED
- snapNamePrefix: $SNAP_NAME_PREFIX
- resizer:
- enabled: $RESIZER_ENABLED
- ## Node ATTRIBUTES
- node:
- healthMonitor:
- enabled: $HEALTH_MONITOR_ENABLED
- nodeSelector: $NODE_POD_NODE_SELECTOR
- tolerations: $NODE_TOLERATIONS
- # Uncomment if CSM for Resiliency and CSI Driver pods monitor are enabled
- # - key: "offline.vxflexos.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "vxflexos.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "offline.unity.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "unity.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "offline.isilon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "isilon.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "offline.powerstore.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "powerstore.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- storageCapacity:
- enabled: $STORAGE_CAPACITY_ENABLED
- podmon:
- enabled: $RESILIENCY_ENABLED
- image: dellemc/podmon:v1.6.0
- #controller:
- # args:
- # - "--csisock=unix:/var/run/csi/csi.sock"
- # - "--labelvalue=csi-powerstore"
- # - "--arrayConnectivityPollRate=60"
- # - "--driverPath=csi-powerstore.dellemc.com"
- # - "--mode=controller"
- # - "--skipArrayConnectionValidation=false"
- # - "--driver-config-params=/powerstore-config-params/driver-config-params.yaml"
- # - "--driverPodLabelValue=dell-storage"
- # - "--ignoreVolumelessPods=false"
-
- #node:
- # args:
- # - "--csisock=unix:/var/lib/kubelet/plugins/csi-powerstore.dellemc.com/csi_sock"
- # - "--labelvalue=csi-powerstore"
- # - "--arrayConnectivityPollRate=60"
- # - "--driverPath=csi-powerstore.dellemc.com"
- # - "--mode=node"
- # - "--leaderelection=false"
- # - "--driver-config-params=/powerstore-config-params/driver-config-params.yaml"
- # - "--driverPodLabelValue=dell-storage"
- # - "--ignoreVolumelessPods=false"
-
-## K8S/CSI-PowerMax ATTRIBUTES
-##########################################
-csi-powermax:
- enabled: $POWERMAX_ENABLED
- global:
- storageArrays:
- - storageArrayId: "$POWERMAX_STORAGE_ARRAY_ID"
- endpoint: $POWERMAX_STORAGE_ARRAY_ENDPOINT_URL
- backupEndpoint: $POWERMAX_STORAGE_ARRAY_BACKUP_ENDPOINT_URL
- managementServers:
- - endpoint: $POWERMAX_MANAGEMENT_SERVERS_ENDPOINT_URL
- version: v2.7.0
- images:
- driverRepository: $IMAGE_REPOSITORY
- clusterPrefix: $POWERMAX_CLUSTER_PREFIX
- portGroups: "$POWERMAX_PORT_GROUPS"
- controller:
- controllerCount: $CONTROLLER_COUNT
- volumeNamePrefix: $VOLUME_NAME_PREFIX
- snapshot:
- enabled: $SNAPSHOT_ENABLED
- snapNamePrefix: $SNAP_NAME_PREFIX
- resizer:
- enabled: $RESIZER_ENABLED
- healthMonitor:
- enabled: $HEALTH_MONITOR_ENABLED
- nodeSelector: $CONTROLLER_POD_NODE_SELECTOR
- tolerations: $CONTROLLER_TOLERATIONS
- node:
- healthMonitor:
- enabled: $HEALTH_MONITOR_ENABLED
- nodeSelector: $NODE_POD_NODE_SELECTOR
- tolerations: $NODE_TOLERATIONS
- - key: "node.kubernetes.io/memory-pressure"
- operator: "Exists"
- effect: "NoExecute"
- - key: "node.kubernetes.io/disk-pressure"
- operator: "Exists"
- effect: "NoExecute"
- - key: "node.kubernetes.io/network-unavailable"
- operator: "Exists"
- effect: "NoExecute"
- csireverseproxy:
- image: dellemc/csipowermax-reverseproxy:v2.6.0
- deployAsSidecar: true
- replication:
- enabled: $REPLICATION_ENABLED
- image: dellemc/dell-csi-replicator:v1.5.0
- migration:
- enabled: $MIGRATION_ENABLED
- image: dellemc/dell-csi-migrator:v1.1.1
- nodeRescanSidecarImage: dellemc/dell-csi-node-rescanner:v1.0.1
- authorization:
- enabled: $AUTHORIZATION_ENABLED
- sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.7.0
- proxyHost: $AUTHORIZATION_PROXY_HOST
- skipCertificateValidation: $AUTHORIZATION_SKIP_CERTIFICATE_VALIDATION
- vSphere:
- enabled: $VSPHERE_ENABLED
- fcPortGroup: "$VSPHERE_FC_PORT_GROUP"
- fcHostName: "$VSPHERE_FC_HOST_NAME"
- vCenterHost: "$VSPHERE_VCENTER_HOST"
- vCenterCredSecret: $VSPHERE_VCENTER_CRED_SECRET
-
-## K8S/CSI-PowerFlex ATTRIBUTES
-##########################################
-csi-vxflexos:
- enabled: $POWERFLEX_ENABLED
- version: v2.7.1
- images:
- driverRepository: $IMAGE_REPOSITORY
- powerflexSdc: dellemc/sdc:3.6.0.6
- certSecretCount: $CERT_SECRET_COUNT
- controller:
- replication:
- enabled: $REPLICATION_ENABLED
- image: dellemc/dell-csi-replicator:v1.5.0
- healthMonitor:
- enabled: $HEALTH_MONITOR_ENABLED
- controllerCount: $CONTROLLER_COUNT
- volumeNamePrefix: $VOLUME_NAME_PREFIX
- snapshot:
- enabled: $SNAPSHOT_ENABLED
- resizer:
- enabled: $RESIZER_ENABLED
- nodeSelector: $CONTROLLER_POD_NODE_SELECTOR
- tolerations: $CONTROLLER_TOLERATIONS
- node:
- healthMonitor:
- enabled: $HEALTH_MONITOR_ENABLED
- nodeSelector: $NODE_POD_NODE_SELECTOR
- tolerations: $NODE_TOLERATIONS
- # Uncomment if CSM for Resiliency and CSI Driver pods monitor is enabled
- # - key: "offline.vxflexos.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "vxflexos.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "offline.unity.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "unity.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "offline.isilon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "isilon.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- monitor:
- enabled: $MONITOR_ENABLED
- vgsnapshotter:
- enabled: $VG_SNAPSHOT_ENABLED
- image: dellemc/csi-volumegroup-snapshotter:v1.2.0
- podmon:
- enabled: $RESILIENCY_ENABLED
- image: dellemc/podmon:v1.6.0
- # controller:
- # args:
- # - "--csisock=unix:/var/run/csi/csi.sock"
- # - "--labelvalue=csi-vxflexos"
- # - "--mode=controller"
- # - "--skipArrayConnectionValidation=false"
- # - "--driver-config-params=/vxflexos-config-params/driver-config-params.yaml"
- # - "--driverPodLabelValue=dell-storage"
- # - "--ignoreVolumelessPods=false"
- # node:
- # args:
- # - "--csisock=unix:/var/lib/kubelet/plugins/vxflexos.emc.dell.com/csi_sock"
- # - "--labelvalue=csi-vxflexos"
- # - "--mode=node"
- # - "--leaderelection=false"
- # - "--driver-config-params=/vxflexos-config-params/driver-config-params.yaml"
- # - "--driverPodLabelValue=dell-storage"
- # - "--ignoreVolumelessPods=false"
- authorization:
- enabled: $AUTHORIZATION_ENABLED
- sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.7.0
- proxyHost: $AUTHORIZATION_PROXY_HOST
- skipCertificateValidation: $AUTHORIZATION_SKIP_CERTIFICATE_VALIDATION
-
-## K8S/CSI-PowerScale ATTRIBUTES
-##########################################
-csi-isilon:
- enabled: $POWERSCALE_ENABLED
- version: "v2.7.0"
- certSecretCount: $CERT_SECRET_COUNT
-
- allowedNetworks: []
-
- verbose: 1
-
- enableCustomTopology: false
-
- fsGroupPolicy: $FSGROUP_POLICY
-
- storageCapacity:
- enabled: $STORAGE_CAPACITY_ENABLED
-
- controller:
- controllerCount: $CONTROLLER_COUNT
- volumeNamePrefix: $VOLUME_NAME_PREFIX
-
- replication:
- enabled: $REPLICATION_ENABLED
- image: dellemc/dell-csi-replicator:v1.5.0
-
- snapshot:
- enabled: $SNAPSHOT_ENABLED
- snapNamePrefix: $SNAP_NAME_PREFIX
-
- resizer:
- enabled: $RESIZER_ENABLED
-
- healthMonitor:
- enabled: $HEALTH_MONITOR_ENABLED
-
- nodeSelector: $CONTROLLER_POD_NODE_SELECTOR
- tolerations: $CONTROLLER_TOLERATIONS
- node:
- nodeSelector: $NODE_POD_NODE_SELECTOR
- tolerations: $NODE_TOLERATIONS
- # - key: "node.kubernetes.io/memory-pressure"
- # operator: "Exists"
- # effect: "NoExecute"
- # - key: "node.kubernetes.io/disk-pressure"
- # operator: "Exists"
- # effect: "NoExecute"
- # - key: "node.kubernetes.io/network-unavailable"
- # operator: "Exists"
- # effect: "NoExecute"
- # Uncomment if CSM for Resiliency and CSI Driver pods monitor are enabled
- # - key: "offline.vxflexos.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "vxflexos.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "offline.unity.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "unity.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "offline.isilon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "isilon.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
-
- healthMonitor:
- enabled: $HEALTH_MONITOR_ENABLED
-
- authorization:
- enabled: $AUTHORIZATION_ENABLED
- sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.7.0
- proxyHost: $AUTHORIZATION_PROXY_HOST
- skipCertificateValidation: $AUTHORIZATION_SKIP_CERTIFICATE_VALIDATION
-
- # Enable this feature only after contact support for additional information
- podmon:
- enabled: $RESILIENCY_ENABLED
- image: dellemc/podmon:v1.6.0
- #controller:
- # args:
- # - "--csisock=unix:/var/run/csi/csi.sock"
- # - "--labelvalue=csi-isilon"
- # - "--arrayConnectivityPollRate=60"
- # - "--driverPath=csi-isilon.dellemc.com"
- # - "--mode=controller"
- # - "--skipArrayConnectionValidation=false"
- # - "--driver-config-params=/csi-isilon-config-params/driver-config-params.yaml"
- # - "--driverPodLabelValue=dell-storage"
- # - "--ignoreVolumelessPods=false"
-
- #node:
- # args:
- # - "--csisock=unix:/var/lib/kubelet/plugins/csi-isilon/csi_sock"
- # - "--labelvalue=csi-isilon"
- # - "--arrayConnectivityPollRate=60"
- # - "--driverPath=csi-isilon.dellemc.com"
- # - "--mode=node"
- # - "--leaderelection=false"
- # - "--driver-config-params=/csi-isilon-config-params/driver-config-params.yaml"
- # - "--driverPodLabelValue=dell-storage"
- # - "--ignoreVolumelessPods=false"
-
- images:
- driverRepository: $IMAGE_REPOSITORY
-
-## K8S/CSI-Unity ATTRIBUTES
-##########################################
-csi-unity:
- enabled: $UNITY_ENABLED
- version: v2.7.0
- images:
- driverRepository: $IMAGE_REPOSITORY
- certSecretCount: $CERT_SECRET_COUNT
- fsGroupPolicy: $FSGROUP_POLICY
- controller:
- controllerCount: $CONTROLLER_COUNT
- volumeNamePrefix: $VOLUME_NAME_PREFIX
- snapshot:
- enabled: $SNAPSHOT_ENABLED
- snapNamePrefix: $SNAP_NAME_PREFIX
- resizer:
- enabled: $RESIZER_ENABLED
- nodeSelector: $CONTROLLER_POD_NODE_SELECTOR
- tolerations: $CONTROLLER_TOLERATIONS
- healthMonitor:
- enabled: $HEALTH_MONITOR_ENABLED
- node:
- healthMonitor:
- enabled: $HEALTH_MONITOR_ENABLED
- nodeSelector: $NODE_POD_NODE_SELECTOR
- tolerations: $NODE_TOLERATIONS
- # - key: "node.kubernetes.io/memory-pressure"
- # operator: "Exists"
- # effect: "NoExecute"
- # - key: "node.kubernetes.io/disk-pressure"
- # operator: "Exists"
- # effect: "NoExecute"
- # - key: "node.kubernetes.io/network-unavailable"
- # operator: "Exists"
- # effect: "NoExecute"
- # Uncomment if CSM for Resiliency and CSI Driver pods monitor are enabled
- # - key: "offline.vxflexos.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "vxflexos.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "offline.unity.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "unity.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "offline.isilon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- # - key: "isilon.podmon.storage.dell.com"
- # operator: "Exists"
- # effect: "NoSchedule"
- podmon:
- enabled: $RESILIENCY_ENABLED
- image: dellemc/podmon:v1.6.0
- controller:
- args:
- - "--csisock=unix:/var/run/csi/csi.sock"
- - "--labelvalue=csi-unity"
- - "--driverPath=csi-unity.dellemc.com"
- - "--mode=controller"
- - "--skipArrayConnectionValidation=false"
- - "--driver-config-params=/unity-config/driver-config-params.yaml"
- - "--driverPodLabelValue=dell-storage"
- - "--ignoreVolumelessPods=false"
- node:
- args:
- - "--csisock=unix:/var/lib/kubelet/plugins/unity.emc.dell.com/csi_sock"
- - "--labelvalue=csi-unity"
- - "--driverPath=csi-unity.dellemc.com"
- - "--mode=node"
- - "--leaderelection=false"
- - "--driver-config-params=/unity-config/driver-config-params.yaml"
- - "--driverPodLabelValue=dell-storage"
- - "--ignoreVolumelessPods=false"
-
-## K8S/Replication Module ATTRIBUTES
-##########################################
-csm-replication:
- enabled: $REPLICATION_ENABLED
-
-## K8S/Observability Module ATTRIBUTES
-##########################################
-karavi-observability:
- enabled: $OBSERVABILITY_ENABLED
- karaviMetricsPowerstore:
- enabled: $POWERSTORE_OBSERVABILITY_METRICS_ENABLED
- karaviMetricsPowerMax:
- enabled: $POWERMAX_OBSERVABILITY_METRICS_ENABLED
- karaviMetricsPowerflex:
- enabled: $POWERFLEX_OBSERVABILITY_METRICS_ENABLED
- karaviMetricsPowerscale:
- enabled: $POWERSCALE_OBSERVABILITY_METRICS_ENABLED
- cert-manager:
- enabled: $OBSERVABILITY_CERT_MANAGER_ENABLED
-
-## K8S/Cert-manager ATTRIBUTES
-##########################################
-cert-manager:
- enabled: $CERT_MANAGER_ENABLED
diff --git a/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-isilon-1.7.0.template b/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-isilon-1.11.0.template
similarity index 95%
rename from content/docs/deployment/csminstallationwizard/src/templates/operator/csm-isilon-1.7.0.template
rename to content/docs/deployment/csminstallationwizard/src/templates/operator/csm-isilon-1.11.0.template
index 5f6e36e28d..5bc5d912c4 100644
--- a/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-isilon-1.7.0.template
+++ b/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-isilon-1.11.0.template
@@ -16,16 +16,16 @@ spec:
# true: enable storage capacity tracking
# false: disable storage capacity tracking
storageCapacity: $STORAGE_CAPACITY_ENABLED
- # Config version for CSI PowerScale v2.7.0 driver
- configVersion: v2.7.0
+ # Config version for CSI PowerScale v2.11.0 driver
+ configVersion: v2.11.0
authSecret: isilon-creds
replicas: $CONTROLLER_COUNT
dnsPolicy: ClusterFirstWithHostNet
# Uninstall CSI Driver and/or modules when CR is deleted
forceRemoveDriver: true
common:
- # Image for CSI PowerScale driver v2.7.0
- image: "dellemc/csi-isilon:v2.7.0"
+ # Image for CSI PowerScale driver v2.11.0
+ image: "dellemc/csi-isilon:v2.11.0"
imagePullPolicy: IfNotPresent
envs:
# X_CSI_VERBOSE: Indicates what content of the OneFS REST API message should be logged in debug level logs
@@ -165,11 +165,11 @@ spec:
# Leave as blank to consider all nodes
# Allowed values: map of key-value pairs
# Default value: None
- nodeSelector:$CONTROLLER_POD_NODE_SELECTOR
+ nodeSelector: $CONTROLLER_POD_NODE_SELECTOR
# tolerations: Define tolerations for the controller deployment, if required.
# Default value: None
- tolerations:$CONTROLLER_TOLERATIONS
+ tolerations: $CONTROLLER_TOLERATIONS
node:
envs:
@@ -212,11 +212,11 @@ spec:
# Leave as blank to consider all nodes
# Allowed values: map of key-value pairs
# Default value: None
- nodeSelector:$NODE_POD_NODE_SELECTOR
+ nodeSelector: $NODE_POD_NODE_SELECTOR
# tolerations: Define tolerations for the node daemonset, if required.
# Default value: None
- tolerations:$NODE_TOLERATIONS
+ tolerations: $NODE_TOLERATIONS
# - key: "node.kubernetes.io/memory-pressure"
# operator: "Exists"
# effect: "NoExecute"
@@ -245,10 +245,10 @@ spec:
- name: authorization
# enable: Enable/Disable csm-authorization
enabled: $AUTHORIZATION_ENABLED
- configVersion: v1.7.0
+ configVersion: v1.11.0
components:
- name: karavi-authorization-proxy
- image: dellemc/csm-authorization-sidecar:v1.7.0
+ image: dellemc/csm-authorization-sidecar:v1.11.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
@@ -267,13 +267,13 @@ spec:
# false: disable replication feature(do not install dell-csi-replicator sidecar)
# Default value: false
enabled: $REPLICATION_ENABLED
- configVersion: v1.5.0
+ configVersion: v1.9.0
components:
- name: dell-csi-replicator
# image: Image to use for dell-csi-replicator. This shouldn't be changed
# Allowed values: string
# Default value: None
- image: dellemc/dell-csi-replicator:v1.5.0
+ image: dellemc/dell-csi-replicator:v1.9.0
envs:
# replicationPrefix: prefix to prepend to storage classes parameters
# Allowed values: string
@@ -289,7 +289,7 @@ spec:
- name: dell-replication-controller-manager
# image: Defines controller image. This shouldn't be changed
# Allowed values: string
- image: dellemc/dell-replication-controller:v1.5.0
+ image: dellemc/dell-replication-controller:v1.9.0
envs:
# TARGET_CLUSTERS_IDS: comma separated list of cluster IDs of the targets clusters. DO NOT include the source(wherever CSM Operator is deployed) cluster ID
# Set the value to "self" in case of stretched/single cluster configuration
@@ -317,23 +317,18 @@ spec:
- name: "RETRY_INTERVAL_MAX"
value: "5m"
- - name: dell-replication-controller-init
- # image: Defines replication init container image. This shouldn't be changed
- # Allowed values: string
- image: dellemc/dell-replication-init:v1.0.1
-
# observability: allows to configure observability
- name: observability
# enabled: Enable/Disable observability
enabled: $OBSERVABILITY_OPERATOR_ENABLED
- configVersion: v1.5.0
+ configVersion: v1.9.0
components:
- name: topology
# enabled: Enable/Disable topology
enabled: $OBSERVABILITY_OPERATOR_TOPOLOGY
# image: Defines karavi-topology image. This shouldn't be changed
# Allowed values: string
- image: dellemc/csm-topology:v1.5.0
+ image: dellemc/csm-topology:v1.9.0
envs:
# topology log level
# Valid values: TRACE, DEBUG, INFO, WARN, ERROR, FATAL, PANIC
@@ -367,7 +362,7 @@ spec:
enabled: $OBSERVABILITY_OPERATOR_METRICS
# image: Defines PowerScale metrics image. This shouldn't be changed
# Allowed values: string
- image: dellemc/csm-metrics-powerscale:v1.2.0
+ image: dellemc/csm-metrics-powerscale:v1.6.0
envs:
# POWERSCALE_MAX_CONCURRENT_QUERIES: set the default max concurrent queries to PowerScale
# Allowed values: int
@@ -436,10 +431,10 @@ spec:
# false: disable Resiliency feature(do not deploy podmon sidecar)
# Default value: false
enabled: $OPERATOR_RESILIENCY_ENABLED
- configVersion: v1.6.0
+ configVersion: v1.10.0
components:
- name: podmon-controller
- image: dellemc/podmon:v1.6.0
+ image: dellemc/podmon:v1.10.0
imagePullPolicy: IfNotPresent
args:
- "--labelvalue=$LABEL_VALUE"
@@ -454,7 +449,7 @@ spec:
- "--driverPath=csi-isilon.dellemc.com"
- "--driver-config-params=/csi-isilon-config-params/driver-config-params.yaml"
- name: podmon-node
- image: dellemc/podmon:v1.6.0
+ image: dellemc/podmon:v1.10.0
imagePullPolicy: IfNotPresent
envs:
# podmonAPIPort: Defines the port to be used within the kubernetes cluster
diff --git a/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powermax-1.7.0.template b/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powermax-1.11.0.template
similarity index 66%
rename from content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powermax-1.7.0.template
rename to content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powermax-1.11.0.template
index 660e40ede4..ac38800db8 100644
--- a/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powermax-1.7.0.template
+++ b/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powermax-1.11.0.template
@@ -26,8 +26,13 @@ spec:
# Allowed values: ReadWriteOnceWithFSType, File , None
# Default value: ReadWriteOnceWithFSType
fSGroupPolicy: "$FSGROUP_POLICY"
- # Config version for CSI PowerMax v2.7.0 driver
- configVersion: v2.7.0
+ # storageCapacity: Helps the scheduler to schedule the pod on a node satisfying the topology constraints, only if the requested capacity is available on the storage array
+ # Allowed values:
+ # true: enable storage capacity tracking
+ # false: disable storage capacity tracking
+ storageCapacity: $STORAGE_CAPACITY_ENABLED
+ # Config version for CSI PowerMax v2.11.0 driver
+ configVersion: v2.11.0
# replica: Define the number of PowerMax controller nodes
# to deploy to the Kubernetes release
# Allowed values: n, where n > 0
@@ -39,8 +44,8 @@ spec:
forceUpdate: false
forceRemoveDriver: true
common:
- # Image for CSI PowerMax driver v2.7.0
- image: dellemc/csi-powermax:v2.7.0
+ # Image for CSI PowerMax driver v2.11.0
+ image: dellemc/csi-powermax:v2.11.0
# imagePullPolicy: Policy to determine if the image should be pulled prior to starting the container.
# Allowed values:
# Always: Always pull the image.
@@ -177,6 +182,11 @@ spec:
# Default value: false
- name: X_CSI_TOPOLOGY_CONTROL_ENABLED
value: "$TOPOLOGY_ENABLED"
+ # X_CSI_MAX_VOLUMES_PER_NODE: Defines the maximum PowerMax volumes that the controller can schedule on the node
+ # Allowed values: Any value greater than or equal to 0
+ # Default value: "0"
+ - name: X_CSI_MAX_VOLUMES_PER_NODE
+ value: "$MAX_VOLUMES_PER_NODE"
# nodeSelector: Define node selection constraints for node pods.
# For the pod to be eligible to run on a node, the node must have each
# of the indicated key-value pairs as labels.
@@ -210,20 +220,26 @@ spec:
- name: external-health-monitor
enabled: $HEALTH_MONITOR_ENABLED
args: [ "--monitor-interval=60s" ]
+
+ # Uncomment the following to configure how often external-provisioner polls the driver to detect changed capacity
+ # Configure only when the storageCapacity is set as "true"
+ # Allowed values: 1m,2m,3m,...,10m,...,60m etc. Default value: 5m
+ #- name: provisioner
+ # args: ["--capacity-poll-interval=5m"]
modules:
# CSI Powermax Reverseproxy is a mandatory module for Powermax
- name: csireverseproxy
# enabled: Always set to true
enabled: true
- configVersion: v2.6.0
+ configVersion: v2.10.0
forceRemoveModule: true
components:
- name: csipowermax-reverseproxy
# image: Define the container images used for the reverse proxy
# Default value: None
- # Example: "csipowermax-reverseproxy:v2.6.0"
- image: dellemc/csipowermax-reverseproxy:v2.6.0
+ # Example: "csipowermax-reverseproxy:v2.10.0"
+ image: dellemc/csipowermax-reverseproxy:v2.10.0
envs:
# "tlsSecret" defines the TLS secret that is created with certificate
# and its associated key
@@ -240,10 +256,10 @@ spec:
- name: authorization
# enabled: Enable/Disable csm-authorization
enabled: $AUTHORIZATION_ENABLED
- configVersion: v1.7.0
+ configVersion: v1.11.0
components:
- name: karavi-authorization-proxy
- image: dellemc/csm-authorization-sidecar:v1.7.0
+ image: dellemc/csm-authorization-sidecar:v1.11.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
@@ -261,13 +277,13 @@ spec:
# false: disable replication feature(do not install dell-csi-replicator sidecar)
# Default value: false
enabled: $REPLICATION_ENABLED
- configVersion: v1.5.0
+ configVersion: v1.9.0
components:
- name: dell-csi-replicator
# image: Image to use for dell-csi-replicator. This shouldn't be changed
# Allowed values: string
# Default value: None
- image: dellemc/dell-csi-replicator:v1.5.0
+ image: dellemc/dell-csi-replicator:v1.9.0
envs:
# replicationPrefix: prefix to prepend to storage classes parameters
# Allowed values: string
@@ -283,7 +299,7 @@ spec:
- name: dell-replication-controller-manager
# image: Defines controller image. This shouldn't be changed
# Allowed values: string
- image: dellemc/dell-replication-controller:v1.5.0
+ image: dellemc/dell-replication-controller:v1.9.0
envs:
# TARGET_CLUSTERS_IDS: comma separated list of cluster IDs of the targets clusters. DO NOT include the source(wherever CSM Operator is deployed) cluster ID
# Set the value to "self" in case of stretched/single cluster configuration
@@ -310,7 +326,128 @@ spec:
- name: "RETRY_INTERVAL_MAX"
value: "5m"
- - name: dell-replication-controller-init
- # image: Defines replication init container image. This shouldn't be changed
+ # observability: allows to configure observability
+ - name: observability
+ # enabled: Enable/Disable observability
+ enabled: $OBSERVABILITY_OPERATOR_ENABLED
+ configVersion: v1.9.0
+ components:
+ - name: topology
+ # enabled: Enable/Disable topology
+ enabled: $OBSERVABILITY_OPERATOR_TOPOLOGY
+ # image: Defines karavi-topology image. This shouldn't be changed
+ # Allowed values: string
+ image: dellemc/csm-topology:v1.9.0
+ envs:
+ # topology log level
+ # Valid values: TRACE, DEBUG, INFO, WARN, ERROR, FATAL, PANIC
+ # Default value: "INFO"
+ - name: "TOPOLOGY_LOG_LEVEL"
+ value: "INFO"
+
+ - name: otel-collector
+ # enabled: Enable/Disable OpenTelemetry Collector
+ enabled: $OBSERVABILITY_OPERATOR_OTEL
+ # image: Defines otel-collector image. This shouldn't be changed
# Allowed values: string
- image: dellemc/dell-replication-init:v1.0.1
+ image: otel/opentelemetry-collector:0.42.0
+ envs:
+ # image of nginx proxy image
+ # Allowed values: string
+ # Default value: "nginxinc/nginx-unprivileged:1.20"
+ - name: "NGINX_PROXY_IMAGE"
+ value: "nginxinc/nginx-unprivileged:1.20"
+
+ - name: metrics-powermax
+ # enabled: Enable/Disable PowerMax metrics
+ enabled: $OBSERVABILITY_OPERATOR_METRICS
+ # image: Defines PowerMax metrics image. This shouldn't be changed
+ image: dellemc/csm-metrics-powermax:v1.4.0
+ envs:
+ # POWERMAX_MAX_CONCURRENT_QUERIES: set the default max concurrent queries to PowerMax
+ # Allowed values: int
+ # Default value: 10
+ - name: "POWERMAX_MAX_CONCURRENT_QUERIES"
+ value: "10"
+ # POWERMAX_CAPACITY_METRICS_ENABLED: enable/disable collection of capacity metrics
+ # Allowed values: ture, false
+ # Default value: true
+ - name: "POWERMAX_CAPACITY_METRICS_ENABLED"
+ value: "true"
+ # POWERMAX_PERFORMANCE_METRICS_ENABLED: enable/disable collection of volume performance metrics
+ # Allowed values: ture, false
+ # Default value: true
+ - name: "POWERMAX_PERFORMANCE_METRICS_ENABLED"
+ value: "true"
+ # POWERMAX_CAPACITY_POLL_FREQUENCY: set polling frequency to get capacity metrics data
+ # Allowed values: int
+ # Default value: 10
+ - name: "POWERMAX_CAPACITY_POLL_FREQUENCY"
+ value: "10"
+ # POWERMAX_PERFORMANCE_POLL_FREQUENCY: set polling frequency to get volume performance data
+ # Allowed values: int
+ # Default value: 10
+ - name: "POWERMAX_PERFORMANCE_POLL_FREQUENCY"
+ value: "10"
+ # PowerMax metrics log level
+ # Valid values: TRACE, DEBUG, INFO, WARN, ERROR, FATAL, PANIC
+ # Default value: "INFO"
+ - name: "POWERMAX_LOG_LEVEL"
+ value: "INFO"
+ # PowerMax Metrics Output logs in the specified format
+ # Valid values: TEXT, JSON
+ # Default value: "TEXT"
+ - name: "POWERMAX_LOG_FORMAT"
+ value: "TEXT"
+ # otel collector address
+ # Allowed values: String
+ # Default value: "otel-collector:55680"
+ - name: "COLLECTOR_ADDRESS"
+ value: "otel-collector:55680"
+ # configMap name which has all array/endpoint related info
+ - name: "X_CSI_CONFIG_MAP_NAME"
+ value: "powermax-reverseproxy-config"
+ - name: resiliency
+ # enabled: Enable/Disable Resiliency feature
+ # Allowed values:
+ # true: enable Resiliency feature(deploy podmon sidecar)
+ # false: disable Resiliency feature(do not deploy podmon sidecar)
+ # Default value: false
+ enabled: $OPERATOR_RESILIENCY_ENABLED
+ configVersion: v1.10.0
+ components:
+ - name: podmon-controller
+ image: dellemc/podmon:v1.10.0
+ imagePullPolicy: IfNotPresent
+ args:
+ - "--labelvalue=$LABEL_VALUE"
+ - "--arrayConnectivityPollRate=$POLL_RATE"
+ - "--skipArrayConnectionValidation=$SKIP_ARRAY_CONNECTION_VALIDATION"
+ - "--driverPodLabelValue=$DRIVER_POD_LABEL_VALUE"
+ - "--ignoreVolumelessPods=$IGNORE_VOLUMELESS_PODS"
+ - "--arrayConnectivityConnectionLossThreshold=$ARRAY_THRESHOLD"
+ # Below 4 args should not be modified.
+ - "--csisock=unix:/var/run/csi/csi.sock"
+ - "--mode=controller"
+ - "--driver-config-params=/powermax-config-params/driver-config-params.yaml"
+ - "--driverPath=csi-powermax.dellemc.com"
+ - name: podmon-node
+ image: dellemc/podmon:v1.10.0
+ imagePullPolicy: IfNotPresent
+ envs:
+ # podmonAPIPort: Defines the port to be used within the kubernetes cluster
+ # Allowed values: Any valid and free port (string)
+ # Default value: 8083
+ - name: "X_CSI_PODMON_API_PORT"
+ value: "8083"
+ args:
+ - "--labelvalue=$LABEL_VALUE"
+ - "--arrayConnectivityPollRate=$POLL_RATE"
+ - "--leaderelection=$LEADER_ELECTION"
+ - "--driverPodLabelValue=$DRIVER_POD_LABEL_VALUE"
+ - "--ignoreVolumelessPods=$IGNORE_VOLUMELESS_PODS"
+ # Below 4 args should not be modified.
+ - "--csisock=unix:/var/lib/kubelet/plugins/powermax.emc.dell.com/csi_sock"
+ - "--mode=node"
+ - "--driver-config-params=/powermax-config-params/driver-config-params.yaml"
+ - "--driverPath=csi-powermax.dellemc.com"
diff --git a/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powerstore-1.7.0.template b/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powerstore-1.11.0.template
similarity index 90%
rename from content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powerstore-1.7.0.template
rename to content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powerstore-1.11.0.template
index 96f64a0ff8..3eeb1c1519 100644
--- a/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powerstore-1.7.0.template
+++ b/content/docs/deployment/csminstallationwizard/src/templates/operator/csm-powerstore-1.11.0.template
@@ -31,8 +31,8 @@ spec:
# true: enable storage capacity tracking
# false: disable storage capacity tracking
storageCapacity: $STORAGE_CAPACITY_ENABLED
- # Config version for CSI PowerStore v2.7.0 driver
- configVersion: v2.7.0
+ # Config version for CSI PowerStore v2.11.0 driver
+ configVersion: v2.11.0
# authSecret: This is the secret used to validate the default PowerStore secret used for installation
# Allowed values:
-config
# For example: If the metadataName is set to powerstore, authSecret value should be set to powerstore-config
@@ -43,8 +43,8 @@ spec:
forceUpdate: false
forceRemoveDriver: true
common:
- # Image for CSI PowerStore driver v2.7.0
- image: "dellemc/csi-powerstore:v2.7.0"
+ # Image for CSI PowerStore driver v2.11.0
+ image: "dellemc/csi-powerstore:v2.11.0"
imagePullPolicy: IfNotPresent
envs:
- name: X_CSI_POWERSTORE_NODE_NAME_PREFIX
@@ -109,12 +109,12 @@ spec:
# Leave as blank to consider all nodes
# Allowed values: map of key-value pairs
# Default value: None
- nodeSelector:$CONTROLLER_POD_NODE_SELECTOR
+ nodeSelector: $CONTROLLER_POD_NODE_SELECTOR
# tolerations: Define tolerations for the controllers, if required.
# Leave as blank to install controller on worker nodes
# Default value: None
- tolerations:$CONTROLLER_TOLERATIONS
+ tolerations: $CONTROLLER_TOLERATIONS
node:
envs:
@@ -129,6 +129,11 @@ spec:
# Default value: false
- name: X_CSI_HEALTH_MONITOR_ENABLED
value: "$HEALTH_MONITOR_ENABLED"
+ # X_CSI_POWERSTORE_MAX_VOLUMES_PER_NODE: Defines the maximum PowerStore volumes that can be created per node
+ # Allowed values: Any value greater than or equal to 0
+ # Default value: "0"
+ - name: X_CSI_POWERSTORE_MAX_VOLUMES_PER_NODE
+ value: "$MAX_VOLUMES_PER_NODE"
# nodeSelector: Define node selection constraints for node pods.
# For the pod to be eligible to run on a node, the node must have each
@@ -136,13 +141,13 @@ spec:
# Leave as blank to consider all nodes
# Allowed values: map of key-value pairs
# Default value: None
- nodeSelector:$NODE_POD_NODE_SELECTOR
+ nodeSelector: $NODE_POD_NODE_SELECTOR
# tolerations: Define tolerations for the controllers, if required.
# Leave as blank to install controller on worker nodes
# Default value: None
- tolerations:$NODE_TOLERATIONS
-
+ tolerations: $NODE_TOLERATIONS
+
modules:
- name: resiliency
# enabled: Enable/Disable Resiliency feature
@@ -151,10 +156,10 @@ spec:
# false: disable Resiliency feature(do not deploy podmon sidecar)
# Default value: false
enabled: $OPERATOR_RESILIENCY_ENABLED
- configVersion: v1.6.0
+ configVersion: v1.10.0
components:
- name: podmon-controller
- image: dellemc/podmon:v1.6.0
+ image: dellemc/podmon:v1.10.0
imagePullPolicy: IfNotPresent
args:
- "--labelvalue=$LABEL_VALUE"
@@ -169,7 +174,7 @@ spec:
- "--driver-config-params=/powerstore-config-params/driver-config-params.yaml"
- "--driverPath=csi-powerstore.dellemc.com"
- name: podmon-node
- image: dellemc/podmon:v1.6.0
+ image: dellemc/podmon:v1.10.0
imagePullPolicy: IfNotPresent
envs:
# podmonAPIPort: Defines the port to be used within the kubernetes cluster
@@ -187,4 +192,4 @@ spec:
- "--csisock=unix:/var/lib/kubelet/plugins/csi-powerstore.dellemc.com/csi_sock"
- "--mode=node"
- "--driver-config-params=/powerstore-config-params/driver-config-params.yaml"
- - "--driverPath=csi-powerstore.dellemc.com"
\ No newline at end of file
+ - "--driverPath=csi-powerstore.dellemc.com"
diff --git a/content/docs/deployment/csmoperator/_index.md b/content/docs/deployment/csmoperator/_index.md
index d6839c4238..8a1234d71f 100644
--- a/content/docs/deployment/csmoperator/_index.md
+++ b/content/docs/deployment/csmoperator/_index.md
@@ -3,23 +3,46 @@ title: "CSM Operator"
linkTitle: "CSM Operator"
description: Container Storage Modules Operator
weight: 2
+weight: 2
---
The Dell Container Storage Modules Operator is a Kubernetes Operator, which can be used to install and manage the CSI Drivers and CSM Modules provided by Dell for various storage platforms. This operator is available as a community operator for upstream Kubernetes and can be deployed using OperatorHub.io. The operator can be installed using OLM (Operator Lifecycle Manager) or manually.
## Supported CSM Components
-Exhaustive sample files for the CRs are available [here (current version: v1.5.1)](https://github.com/dell/csm-operator/tree/v1.5.1/samples).
+The table below lists the driver and modules versions installable with the CSM Operator:
+
+| CSI Driver | Version | CSM Authorization | CSM Replication | CSM Observability | CSM Resiliency |
+| ------------------ |---------|-------------------|-----------------|-------------------|----------------|
+| CSI PowerScale | 2.11.0 | â 1.11.0 | â 1.9.0 | â 1.9.0 | â 1.10.0 |
+| CSI PowerScale | 2.10.0 | â 1.10.0 | â 1.8.0 | â 1.8.0 | â 1.9.0 |
+| CSI PowerScale | 2.9.0 | â 1.9.0 | â 1.7.0 | â 1.7.0 | â 1.8.0 |
+| CSI PowerFlex | 2.11.0 | â 1.11.0 | â 1.9.0 | â 1.9.0 | â 1.10.0 |
+| CSI PowerFlex | 2.10.0 | â 1.10.0 | â 1.8.0 | â 1.8.0 | â 1.9.0 |
+| CSI PowerFlex | 2.9.0 | â 1.9.0 | â 1.7.0 | â 1.7.0 | â 1.8.0 |
+| CSI PowerStore | 2.11.0 | â | â | â | â 1.10.0 |
+| CSI PowerStore | 2.10.0 | â | â | â | â 1.9.0 |
+| CSI PowerStore | 2.9.0 | â | â | â | â 1.8.0 |
+| CSI PowerMax | 2.11.0 | â 1.11.0 | â 1.9.0 | â 1.9.0 | â |
+| CSI PowerMax | 2.10.0 | â 1.10.0 | â 1.8.0 | â 1.8.0 | â |
+| CSI PowerMax | 2.9.0 | â 1.9.0 | â 1.7.0 | â 1.7.0 | â |
+| CSI Unity XT | 2.11.0 | â | â | â | â |
+| CSI Unity XT | 2.10.0 | â | â | â | â |
+| CSI Unity XT | 2.9.0 | â | â | â | â |
These CR will be used for new deployment or upgrade. In most case, it is recommended to use the latest available version.
The full compatibility matrix of CSI/CSM versions for the CSM Operator is available [here](../../prerequisites/#csm-operator-compatibility-matrix)
+
## Installation
+
Dell CSM Operator can be installed manually or via Operator Hub.
Once installed you will be able to deploy [drivers](drivers) and [modules](modules) from the Operator.
### OpenShift Installation via Operator Hub
+>NOTE: You cannot update the resource requests and limits when you are deploying operator using Operator Hub
+
`dell-csm-operator` can be installed via Operator Hub on upstream Kubernetes clusters & Red Hat OpenShift Clusters.
The installation process involves the creation of a `Subscription` object either via the _OperatorHub_ UI or using `kubectl/oc`. While creating the `Subscription` you can set the Approval strategy for the `InstallPlan` for the operator to:
@@ -29,24 +52,37 @@ The installation process involves the creation of a `Subscription` object either
![OpenShit Operator Hub CSM install](operator_hub_install.gif)
### Certified vs Community
+
Dell CSM Operator is distributed as both `Certified` & `Community` editions.
Both editions have the same codebase and are supported by Dell Technologies, the only differences are:
+
* The `Certified` version is officially supported by Redhat by partnering with software vendors.
* The `Certified` version is often released couple of days/weeks after the `Community` version.
* The `Certified` version is specific to Openshift and can only be installed on specific Openshift versions where it is certified.
* The `Community` can be installed on any Kubernetes distributions.
### Manual Installation on a cluster without OLM
+>NOTE: You can update the resource requests and limits when you are deploying operator using manual installation without OLM
1. Install volume snapshot CRDs. For detailed snapshot setup procedure, [click here](../../snapshots/#volume-snapshot-feature).
2. Clone and checkout the required csm-operator version using
```bash
-git clone -b v1.5.1 https://github.com/dell/csm-operator.git
+git clone -b v1.6.0 https://github.com/dell/csm-operator.git
```
3. `cd csm-operator`
4. _(Optional)_ If using a local Docker image, edit the `deploy/operator.yaml` file and set the image name for the CSM Operator Deployment.
-5. _(Optional)_ If **CSM Replication** is planned for use and will be deployed using two clusters in an environment where the DNS is not configured, and cluster API endpoints are FQDNs, in order to resolve queries to remote API endpoints, it is necessary to edit the `deploy/operator.yaml` file and add the `hostAliases` field and associated `:` mappings to the CSM Operator Controller Manager Deployment under `spec.template.spec`. More information on host aliases can be found, [here](https://kubernetes.io/docs/tasks/network/customize-hosts-file-for-pods/).
+5. _(Optional)_ The Dell CSM Operator might need more resources if users have larger environment (>1000 Pods). You can modify the default resource requests and limits in the files `deploy/operator.yaml`, `config/manager/manager.yaml` and increase the values for cpu and memory. More information on setting the resource requests and limits can be found [here](https://sdk.operatorframework.io/docs/best-practices/managing-resources/). Current default values are set as below:
+ ```yaml
+ resources:
+ limits:
+ cpu: 200m
+ memory: 512Mi
+ requests:
+ cpu: 100m
+ memory: 192Mi
+ ```
+6. _(Optional)_ If **CSM Replication** is planned for use and will be deployed using two clusters in an environment where the DNS is not configured, and cluster API endpoints are FQDNs, in order to resolve queries to remote API endpoints, it is necessary to edit the `deploy/operator.yaml` file and add the `hostAliases` field and associated `:` mappings to the CSM Operator Controller Manager Deployment under `spec.template.spec`. More information on host aliases can be found, [here](https://kubernetes.io/docs/tasks/network/customize-hosts-file-for-pods/).
```yaml
# example config
apiVersion: apps/v1
@@ -61,13 +97,20 @@ git clone -b v1.5.1 https://github.com/dell/csm-operator.git
- "remote.FQDN"
ip: "255.255.255.1"
```
-6. Run `bash scripts/install.sh` to install the operator.
+7. Run `bash scripts/install.sh` to install the operator.
>NOTE: Dell CSM Operator will be installed in the `dell-csm-operator` namespace.
+>NOTE: If you want to update the resource requests and limits configuration after the operator is installed. Follow the steps below:
+
+ * Uninstall the operator following the steps [here](https://dell.github.io/csm-docs/v3/deployment/csmoperator/#uninstall)
+
+ * Update the resource configuration as mentioned in step 5 and install the operator using the step 7 above
+
+
{{< imgproc install.JPG Resize "2500x" >}}{{< /imgproc >}}
-6. Run the command to validate the installation.
+8. Run the command to validate the installation.
```bash
kubectl get pods -n dell-csm-operator
```
@@ -76,6 +119,7 @@ kubectl get pods -n dell-csm-operator
{{< imgproc install_pods.jpg Resize "2500x" >}}{{< /imgproc >}}
### Offline Bundle Installation on a cluster without OLM
+
The `csm-offline-bundle.sh` script can be used to create a package usable for offline installation of Dell CSI Drivers via CSM Operator
#### Dependencies
@@ -90,16 +134,17 @@ Preparing an offline bundle requires the following utilities:
| Dependency | Usage |
| --------------------- | ----- |
-| `docker` or `podman` | `docker` or `podman` will be used to pull images from public image registries, tag them, and push them to a private registry. |
+| `docker` or `podman` | `docker` or `podman` will be used to pull images from public image registries, tag them, and push them to a private registry. |
| | One of these will be required on both the system building the offline bundle as well as the system preparing for installation. |
-| | Tested version(s) are `docker` 24.0.5 and `podman` 4.4.1
-| `git` | `git` will be used to manually clone one of the above repositories in order to create an offline bundle.
-| | This is only needed on the system preparing the offline bundle.
-| | Tested version(s) are `git` 2.39.3 but any version should work.
+| | Tested version(s) are `docker` 24.0.5 and `podman` 4.4.1 |
+| `git` | `git` will be used to manually clone one of the above repositories in order to create an offline bundle. |
+| | This is only needed on the system preparing the offline bundle. |
+| | Tested version(s) are `git` 2.39.3 but any version should work. |
#### Workflow
To perform an offline installation, the following steps should be performed:
+
1. Build an offline bundle
2. Unpack the offline bundle created in Step 1 and prepare for installation
3. Perform operator installation using the files obtained after unpacking in Step 2
@@ -114,7 +159,7 @@ This needs to be performed on a Linux system with access to the Internet as a gi
To build an offline bundle, the following steps are needed:
1. Clone and checkout the required csm-operator version using
```bash
-git clone -b v1.5.1 https://github.com/dell/csm-operator.git
+git clone -b v1.6.0 https://github.com/dell/csm-operator.git
```
2. `cd csm-operator`
3. Run the `csm-offline-bundle.sh` script which will be found in the `scripts` directory with an argument of `-c` in order to create an offline bundle
@@ -129,42 +174,40 @@ The script will perform the following steps:
- Build a `tar.gz` file containing the images as well as files required to install the Operator and drivers.
Here is the output of a request to build an offline bundle for the Dell CSM Operator:
+
```
-*
* Building image manifest file
Processing file /root/csm-operator/operatorconfig/driverconfig/common/default.yaml
Processing file /root/csm-operator/bundle/manifests/dell-csm-operator.clusterserviceversion.yaml
-*
* Pulling and saving container images
- dellemc/csi-isilon:v2.10.1
- dellemc/csi-metadata-retriever:v1.6.0
- dellemc/csipowermax-reverseproxy:v2.9.0
- dellemc/csi-powermax:v2.10.1
- dellemc/csi-powerstore:v2.10.1
- dellemc/csi-unity:v2.10.1
- dellemc/csi-vxflexos:v2.10.1
- dellemc/csm-authorization-sidecar:v1.10.0
- dellemc/csm-metrics-powerflex:v1.8.0
- dellemc/csm-metrics-powerscale:v1.5.0
- dellemc/csm-topology:v1.7.0
- dellemc/dell-csi-replicator:v1.8.0
- dellemc/dell-replication-controller:v1.8.0
- dellemc/sdc:4.5
- docker.io/dellemc/dell-csm-operator:v1.5.1
+ dellemc/csi-isilon:v2.11.0
+ dellemc/csi-metadata-retriever:v1.8.0
+ dellemc/csipowermax-reverseproxy:v2.10.0
+ dellemc/csi-powermax:v2.11.0
+ dellemc/csi-powerstore:v2.11.0
+ dellemc/csi-unity:v2.11.0
+ dellemc/csi-vxflexos:v2.11.0
+ dellemc/csm-authorization-sidecar:v1.11.0
+ dellemc/csm-metrics-powerflex:v1.9.0
+ dellemc/csm-metrics-powerscale:v1.6.0
+ dellemc/csm-topology:v1.9.0
+ dellemc/dell-csi-replicator:v1.9.0
+ dellemc/dell-replication-controller:v1.9.0
+ dellemc/sdc:4.5.1
+ docker.io/dellemc/dell-csm-operator:v1.6.0
gcr.io/kubebuilder/kube-rbac-proxy:v0.8.0
nginxinc/nginx-unprivileged:1.20
otel/opentelemetry-collector:0.42.0
- registry.k8s.io/sig-storage/csi-attacher:v4.4.2
- registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.10.0
- registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.9.2
- registry.k8s.io/sig-storage/csi-provisioner:v3.6.2
- registry.k8s.io/sig-storage/csi-resizer:v1.9.2
- registry.k8s.io/sig-storage/csi-snapshotter:v6.3.2
-
-*
+ registry.k8s.io/sig-storage/csi-attacher:v4.6.1
+ registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.11.0
+ registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1
+ registry.k8s.io/sig-storage/csi-provisioner:v5.0.1
+ registry.k8s.io/sig-storage/csi-resizer:v1.11.1
+ registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1
+
* Copying necessary files
/root/csm-operator/deploy
@@ -174,7 +217,6 @@ Here is the output of a request to build an offline bundle for the Dell CSM Oper
/root/csm-operator/README.md
/root/csm-operator/LICENSE
-*
* Compressing release
dell-csm-operator-bundle/
@@ -189,11 +231,11 @@ dell-csm-operator-bundle/deploy/olm/operator_community.yaml
dell-csm-operator-bundle/README.md
dell-csm-operator-bundle/LICENSE
-*
* Complete
Offline bundle file is: /root/csm-operator/dell-csm-operator-bundle.tar.gz
```
+
The resulting offline bundle file can be copied to another machine, if necessary, to gain access to the desired image registry.
#### Unpacking the offline bundle and preparing for installation
@@ -234,43 +276,38 @@ The script will then perform the following steps:
- Push the newly tagged images to the registry
- Modify the Operator configuration to refer to the newly tagged/pushed images
-
Here is the output for preparing the bundle for installation (`localregistry:5000` refers to an image registry accessible to Kubernetes/OpenShift. `dell-csm-operator` refers to the folder created within the registry.):
```
Preparing a offline bundle for installation
-*
* Loading docker images
-Loaded image: docker.io/dellemc/csi-powerstore:v2.10.1
-Loaded image: docker.io/dellemc/csi-isilon:v2.10.1
+Loaded image: docker.io/dellemc/csi-powerstore:v2.11.0
+Loaded image: docker.io/dellemc/csi-isilon:v2.11.0
...
...
-Loaded image: registry.k8s.io/sig-storage/csi-resizer:v1.9.2
-Loaded image: registry.k8s.io/sig-storage/csi-snapshotter:v6.3.2
+Loaded image: registry.k8s.io/sig-storage/csi-resizer:v1.11.1
+Loaded image: registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1
-*
* Tagging and pushing images
- dellemc/csi-isilon:v2.10.1 -> localregistry:5000/dell-csm-operator/csi-isilon:v2.10.1
- dellemc/csi-metadata-retriever:v1.6.0 -> localregistry:5000/dell-csm-operator/csi-metadata-retriever:v1.6.0
+ dellemc/csi-isilon:v2.11.0 -> localregistry:5000/dell-csm-operator/csi-isilon:v2.11.0
+ dellemc/csi-metadata-retriever:v1.8.0 -> localregistry:5000/dell-csm-operator/csi-metadata-retriever:v1.8.0
...
...
- registry.k8s.io/sig-storage/csi-resizer:v1.9.2 -> localregistry:5000/dell-csm-operator/csi-resizer:v1.9.2
- registry.k8s.io/sig-storage/csi-snapshotter:v6.3.2 -> localregistry:5000/dell-csm-operator/csi-snapshotter:v6.3.2
+ registry.k8s.io/sig-storage/csi-resizer:v1.11.1 -> localregistry:5000/dell-csm-operator/csi-resizer:v1.11.1
+ registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1 -> localregistry:5000/dell-csm-operator/csi-snapshotter:v8.0.1
-*
* Preparing files within /root/dell-csm-operator-bundle
- changing: dellemc/csi-isilon:v2.10.1 -> localregistry:5000/dell-csm-operator/csi-isilon:v2.10.1
- changing: dellemc/csi-metadata-retriever:v1.6.0 -> localregistry:5000/dell-csm-operator/csi-metadata-retriever:v1.6.0
+ changing: dellemc/csi-isilon:v2.11.0 -> localregistry:5000/dell-csm-operator/csi-isilon:v2.11.0
+ changing: dellemc/csi-metadata-retriever:v1.8.0 -> localregistry:5000/dell-csm-operator/csi-metadata-retriever:v1.8.0
...
...
- changing: registry.k8s.io/sig-storage/csi-resizer:v1.9.2 -> localregistry:5000/dell-csm-operator/csi-resizer:v1.9.2
- changing: registry.k8s.io/sig-storage/csi-snapshotter:v6.3.2 -> localregistry:5000/dell-csm-operator/csi-snapshotter:v6.3.2
+ changing: registry.k8s.io/sig-storage/csi-resizer:v1.11.1 -> localregistry:5000/dell-csm-operator/csi-resizer:v1.11.1
+ changing: registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1 -> localregistry:5000/dell-csm-operator/csi-snapshotter:v8.0.1
-*
* Complete
```
@@ -283,13 +320,17 @@ bash scripts/install.sh
>NOTE: Dell CSM Operator would install to the 'dell-csm-operator' namespace by default.
## Uninstall
+
### Operator uninstallation on a cluster without OLM
+
To uninstall a CSM operator, run `bash scripts/uninstall.sh`. This will uninstall the operator in `dell-csm-operator` namespace.
{{< imgproc uninstall.jpg Resize "2500x" >}}{{< /imgproc >}}
## Upgrade
+
### Dell CSM Operator
+
Dell CSM Operator can be upgraded in 2 ways:
1. Using Operator Lifecycle Manager (OLM)
@@ -297,6 +338,7 @@ Dell CSM Operator can be upgraded in 2 ways:
2. Using script (for non-OLM based installation)
#### Using OLM
+
The upgrade of the Dell CSM Operator is done via Operator Lifecycle Manager.
The `Update approval` (**`InstallPlan`** in OLM terms) strategy plays a role while upgrading dell-csm-operator on OpenShift. This option can be set during installation of dell-csm-operator on OpenShift via the console and can be either set to `Manual` or `Automatic`.
@@ -306,9 +348,10 @@ The `Update approval` (**`InstallPlan`** in OLM terms) strategy plays a role whi
>NOTE: The recommended version of OLM for Upstream Kubernetes is **`v0.25.0`**.
#### Using Installation Script
+
1. Clone and checkout the required csm-operator version using
```bash
-git clone -b v1.5.0 https://github.com/dell/csm-operator.git
+git clone -b v1.6.0 https://github.com/dell/csm-operator.git
```
2. `cd csm-operator`
3. Execute `bash scripts/install.sh --upgrade` . This command will install the latest version of the operator.
@@ -316,6 +359,7 @@ git clone -b v1.5.0 https://github.com/dell/csm-operator.git
>NOTE: Dell CSM Operator would install to the 'dell-csm-operator' namespace by default.
### Upgrade driver using Dell CSM Operator:
+
The CSI Drivers installed by the Dell CSM Operator can be updated like any Kubernetes resource.
* Modifying the installation directly via `kubectl edit`
```
@@ -342,16 +386,24 @@ The following notes explain some of the general items to take care of.
1. If you are trying to upgrade the CSI driver from an older version, make sure to modify the _configVersion_ field.
```yaml
driver:
- configVersion: v2.10.0
+ configVersion: v2.11.0
```
+### Upgrade Modules using Dell CSM Operator
+
+* Refer [Upgrade Obsevability Module](./modules/observability/#upgrade-observability) to upgrade the Observability Module via Operator
+
+* Refer [Upgrade Authorization Module](./modules/authorization/#upgrade-csm-authorization) to upgrade the Authorization Module via Operator
+
## Custom Resource Definitions
+
As part of the Dell CSM Operator installation, a CRD representing configuration for the CSI Driver and CSM Modules is also installed.
`containerstoragemodule` CRD is installed in API Group `storage.dell.com`.
Drivers and modules can be installed by creating a `customResource`.
### Custom Resource Specification
+
Each CSI Driver and CSM Module installation is represented by a Custom Resource.
The specification for the Custom Resource is the same for all the drivers.Below is a list of all the mandatory and optional fields in the Custom Resource specification
@@ -385,3 +437,5 @@ The specification for the Custom Resource is the same for all the drivers.Below
**nodeSelector** - Used to specify node selectors for the driver StatefulSet/Deployment and DaemonSet.
>NOTE: The `image` field should point to the correct image tag for version of the driver you are installing.
+
+>NOTE: The CSM Operator 1.6 is pre-requisite for onboarding brownfield clusters with Apex Navigator For Kubernetes. When the Dell connectivity client is installed, a role and rolebinding will be established in the namespace containing CSM objects, and these will be removed when the client is uninstalled. If the client is already present in the cluster and CSM is deployed or deleted, the roles and rolebindings will be correspondingly created or removed during CSM reconciliation. This process ensures that the client can access the secrets in the namespace.
diff --git a/content/docs/deployment/csmoperator/drivers/powerflex.md b/content/docs/deployment/csmoperator/drivers/powerflex.md
index 722e6c1530..9b59103adb 100644
--- a/content/docs/deployment/csmoperator/drivers/powerflex.md
+++ b/content/docs/deployment/csmoperator/drivers/powerflex.md
@@ -31,7 +31,7 @@ kubectl get csm --all-namespaces
- Optionally, enable sdc monitor by setting the enable flag for the sdc-monitor to true. Please note:
- **If using sidecar**, you will need to edit the value fields under the HOST_PID and MDM fields by filling the empty quotes with host PID and the MDM IPs.
- **If not using sidecar**, leave the enabled field set to false.
-##### Example CR: [samples/storage_csm_powerflex_v2101.yaml](https://github.com/dell/csm-operator/blob/main/samples/storage_csm_powerflex_v2101.yaml)
+##### Example CR: [samples/storage_csm_powerflex_v2110.yaml](https://github.com/dell/csm-operator/blob/main/samples/storage_csm_powerflex_v2110.yaml)
```yaml
sideCars:
# sdc-monitor is disabled by default, due to high CPU usage
@@ -47,7 +47,7 @@ kubectl get csm --all-namespaces
#### Manual SDC Deployment
-For detailed PowerFlex installation procedure, see the _Dell PowerFlex Deployment Guide_. Install the PowerFlex SDC using this procedure:
+For detailed PowerFlex installation procedure, see the [Dell PowerFlex Deployment Guide](https://docs.delltechnologies.com/bundle/VXF_DEPLOY/page/GUID-DD20489C-42D9-42C6-9795-E4694688CC75.html). Install the PowerFlex SDC using this procedure:
**Steps**
@@ -67,6 +67,7 @@ For detailed PowerFlex installation procedure, see the _Dell PowerFlex Deploymen
Example: secret.yaml
+ ```yaml
```yaml
# Username for accessing PowerFlex system.
# If authorization is enabled, username will be ignored.
@@ -111,7 +112,7 @@ For detailed PowerFlex installation procedure, see the _Dell PowerFlex Deploymen
If replication feature is enabled, ensure the secret includes all the PowerFlex arrays involved in replication.
- After editing the file, run this command to create a secret called `vxflexos-config`. If you are using a different namespace/secret name, just substitute those into the command.
+ After editing the file, run this command to create a secret called `vxflexos-config`.
```bash
kubectl create secret generic vxflexos-config -n vxflexos --from-file=config=secret.yaml
diff --git a/content/docs/deployment/csmoperator/drivers/powermax.md b/content/docs/deployment/csmoperator/drivers/powermax.md
index 4d3f5dffa9..fa52d44c7f 100644
--- a/content/docs/deployment/csmoperator/drivers/powermax.md
+++ b/content/docs/deployment/csmoperator/drivers/powermax.md
@@ -15,6 +15,7 @@ The CSI Driver for Dell PowerMax can create PVC with different storage protocols
* direct Fiber Channel
* direct iSCSI
* NFS
+* NVMeTCP
* Fiber Channel via VMware Raw Device Mapping
In most cases, you will use one protocol only; therefore you should comply with the according prerequisites and not the others.
@@ -33,6 +34,27 @@ CSI Driver for Dell PowerMax supports Fibre Channel communication. Ensure that t
- Ensure that the HBA WWNs (initiators) appear on the list of initiators that are logged into the array.
- If the number of volumes that will be published to nodes is high, then configure the maximum number of LUNs for your HBAs on each node. See the appropriate HBA document to configure the maximum number of LUNs.
+### NVMeTCP requirements
+If you want to use the protocol, set up the NVMe initiators as follows:
+- Setup on Array
+Once the NVMe endpoint is created on the array, follow the following step to update endpoint name to adhere with CSI driver.
+ - Perform a ```nvme discover --transport=tcp --traddr= --trsvcid=4420```. is the placeholder for actual IP address of NVMe Endpoint.
+ - Fetch the _subnqn_, for e.g., _nqn.1988-11.com.dell:PowerMax_2500:00:000120001100_, this will be used as the subnqn holder while updating NVMe endpoint name.
+ - Update the NVMe endpoint name as ```:>```. Here is an example how it should look, _nqn.1988-11.com.dell:PowerMax_2500:00:000120001100:OR1C000_
+- Setup on Host
+ - The driver requires NVMe management command-line interface (nvme-cli) to use configure, edit, view or start the NVMe client and target. The nvme-cli utility provides a command-line and interactive shell option. The NVMe CLI tool is installed in the host using the below command.
+```bash
+sudo apt install nvme-cli
+```
+**Requirements for NVMeTCP**
+- Modules including the nvme, nvme_core, nvme_fabrics, and nvme_tcp are required for using NVMe over Fabrics using TCP. Load the NVMe and NVMe-OF Modules using the below commands:
+```bash
+modprobe nvme
+modprobe nvme_tcp
+```
+- The NVMe modules may not be available after a node reboot. Loading the modules at startup is recommended.
+- Generate and update the _/etc/nvme/hostnqn_ with hostNQN details.
+
### iSCSI Requirements
The CSI Driver for Dell PowerMax supports iSCSI connectivity. These requirements are applicable for the nodes that use iSCSI initiator to connect to the PowerMax arrays.
diff --git a/content/docs/deployment/csmoperator/drivers/unity.md b/content/docs/deployment/csmoperator/drivers/unity.md
index 3c936941fd..8e0996dfbf 100644
--- a/content/docs/deployment/csmoperator/drivers/unity.md
+++ b/content/docs/deployment/csmoperator/drivers/unity.md
@@ -72,6 +72,7 @@ kubectl get csm --all-namespaces
| X_CSI_HEALTH_MONITOR_ENABLED | Enable/Disable health monitor of CSI volumes from Controller plugin - volume condition | No | false |
| ***Node parameters*** |
| X_CSI_HEALTH_MONITOR_ENABLED | Enable/Disable health monitor of CSI volumes from Controller plugin - volume condition | No | false |
+| X_CSI_ALLOWED_NETWORKS | Custom networks for Unity export. List of networks that can be used for NFS I/O traffic, CIDR format should be used "ip/prefix, ip/prefix" | No | empty |
4. Execute the following command to create Unity XT custom resource:
```bash
diff --git a/content/docs/deployment/csmoperator/modules/authorization v2.0 Tech Preview.md b/content/docs/deployment/csmoperator/modules/authorization v2.0 Tech Preview.md
new file mode 100644
index 0000000000..bb150e731b
--- /dev/null
+++ b/content/docs/deployment/csmoperator/modules/authorization v2.0 Tech Preview.md
@@ -0,0 +1,366 @@
+---
+title: Authorization v2.0 Tech Preview
+linkTitle: "Authorization v2.0 Tech Preview"
+description: >
+ Installing Authorization v2.0 Tech Preview via Dell CSM Operator
+---
+
+{{% pageinfo color="primary" %}}
+The CSM Authorization karavictl CLI is no longer actively maintained or supported. It will be deprecated in CSM 2.0.
+{{% /pageinfo %}}
+
+## Install CSM Authorization via Dell CSM Operator
+
+The CSM Authorization module for supported Dell CSI Drivers can be installed via the Dell CSM Operator.
+To deploy the Operator, follow the instructions available [here](../../#installation).
+
+### Prerequisite
+
+1. [Install Vault or configure an existing Vault](#vault-server-installation).
+
+2. Execute `kubectl create namespace authorization` to create the authorization namespace (if not already present). Note that the namespace can be any user-defined name, in this example, we assume that the namespace is 'authorization'.
+
+3. Install cert-manager CRDs
+ ```bash
+ kubectl apply --validate=false -f https://github.com/jetstack/cert-manager/releases/download/v1.11.0/cert-manager.crds.yaml
+ ```
+
+4. Prepare [samples/authorization/config.yaml](https://github.com/dell/csm-operator/blob/main/samples/authorization/config.yaml) which contains the JWT signing secret. The following table lists the configuration parameters.
+
+ | Parameter | Description | Required | Default |
+ | --------- | ------------------------------------------------------------ | -------- | ------- |
+ | web.jwtsigningsecret | String used to sign JSON Web Tokens | true | secret |.
+
+ Example:
+
+ ```yaml
+ web:
+ jwtsigningsecret: randomString123
+ ```
+
+ After editing the file, run this command to create a secret called `karavi-config-secret`:
+
+ ```bash
+
+ kubectl create secret generic karavi-config-secret -n authorization --from-file=config.yaml=samples/authorization/config.yaml
+ ```
+
+ Use this command to replace or update the secret:
+
+ ```bash
+
+ kubectl create secret generic karavi-config-secret -n authorization --from-file=config.yaml=samples/authorization/config.yaml -o yaml --dry-run=client | kubectl replace -f -
+ ```
+
+
+>__Note__:
+> - If you are installing CSM Authorization in a different namespace than `authorization`, edit the `namespace` field in this file to your namespace.
+
+
+### Install CSM Authorization Proxy Server
+
+1. Follow all the [prerequisites](#prerequisite).
+
+2. Create a CR (Custom Resource) for Authorization from a [sample manifest](https://github.com/dell/csm-operator/blob/main/samples/authorization/csm_authorization_proxy_server_v200-alpha.yaml). This file can be modified to use custom parameters if needed.
+
+3. Users should configure the parameters in the CR. This table lists the primary configurable parameters of the Authorization Proxy Server and their default values:
+
+ | Parameter | Description | Required | Default |
+ | --------- | ----------- | -------- |-------- |
+ | **nginx** | This section configures the enablement of the NGINX Ingress Controller. | - | - |
+ | enabled | For Kubernetes Container Platform only: Enable/Disable deployment of the NGINX Ingress Controller. Set to false if you already have an Ingress Controller installed. | No | true |
+ | **cert-manager** | This section configures the enablement of cert-manager. | - | - |
+ | enabled | Enable/Disable deployment of cert-manager. Set to false if you already have cert-manager installed. | No | true |
+ | **authorization** | This section configures the CSM-Authorization components. | - | - |
+ | certificate | The base64-encoded certificate for the certificate/private-key to configure the proxy-service Ingress. Leave empty to use self-signed certificate. | No | - |
+ | privateKey | The base64-encoded private key for the certificate/private-key to configure the proxy-service Ingress. Leave empty to use self-signed certificate. | No | - |
+ | hostname | The hostname to configure the self-signed certificate (if applicable), and the proxy service Ingress. | No | csm-authorization.com |
+ | proxyServerIngress.ingressClassName | The ingressClassName of the proxy-service Ingress. | Yes | nginx |
+ | proxyServerIngress.hosts | Additional host rules to be applied to the proxy-service Ingress. | No | - |
+ | proxyServerIngress.annotations | Additional annotations for the proxy-service Ingress. | No | - |
+ | **redis** | This section configures the Redis components. | - | - |
+ | storageclass | The storage class for Redis to use for persistence. If not supplied, a locally provisioned volume is used. | No | - |
+
+ **Additional v2.0 Technical Preview Parameters:**
+ | Parameter | Description | Required | Default |
+ | --------- | ----------- | -------- |-------- |
+ | **redis** | This section configures the Redis components. | - | - |
+ | redisName | The prefix of the redis pods. The number of pods is determined by the number of replicas. | Yes | redis-csm |
+ | redisCommander | The prefix of the redis commander pod. | Yes | rediscommander |
+ | sentinel | The prefix of the redis sentinel pods. The number of pods is determined by the number of replicas. | Yes | sentinel |
+ | redisReplicas | The number of replicas for the sentinel and redis pods. | Yes | 5 |
+ | storageclass | The storage class for Redis to use for persistence. If not supplied, a locally provisioned volume is used. | No | - |
+ | **vault** | This section configures the vault components. | - | - |
+ | vaultAddress | The address where vault is hosted with the credentials to the array (`https://10.0.0.1:`). | Yes | - |
+ | vaultRole | The configured authentication role in vault. | Yes | csm-authorization |
+ | kvEnginePath | The vault path where the credentials are stored. | Yes | secret |
+ | certificate | The base64-encoded certificate for the certificate/private-key pair to connect to Vault. Leave empty to use self-signed certificate. | No | - |
+ | privateKey | The base64-encoded private key for the certificate/private-key pair to connect to Vault. Leave empty to use self-signed certificate. | No | - |
+ | certificateAuthority | The base64-encoded certificate authority for validating the Vault server. | No | - |
+
+>__Note__:
+> - If you are installing CSM Authorization in a different namespace than `authorization`, edit the `namespace` fields in this file to your namespace.
+> - If you specify `storageclass`, the storage class must NOT be provisioned by the Dell CSI Driver to be configured with this installation of CSM Authorization.
+
+**Optional:**
+To enable reporting of trace data with [Zipkin](https://zipkin.io/), use the `csm-config-params` configMap in the sample CR or dynamically by editing the configMap.
+
+ Add the Zipkin values to the configMap where `ZIPKIN_ADDRESS` is the IP address or hostname of the Zipkin server.
+ ```bash
+ ZIPKIN_URI: "http://ZIPKIN_ADDRESS:9411/api/v2/spans"
+ ZIPKIN_PROBABILITY: "1.0"
+ ```
+
+4. Execute this command to create the Authorization CR:
+
+ ```bash
+
+ kubectl create -f
+ ```
+
+ >__Note__:
+ > - This command will deploy the Authorization Proxy Server in the namespace specified in the input YAML file.
+
+### Verify Installation of the CSM Authorization Proxy Server
+Once the Authorization CR is created, you can verify the installation as mentioned below:
+
+ ```bash
+ kubectl describe csm/ -n authorization
+ ```
+
+### Install dellctl
+
+Follow the instructions for [Installing dellctl](../../../../support/cli/#installation-instructions).
+
+### Configure the CSM Authorization Proxy Server
+
+Follow the instructions available in CSM Authorization for [Configuring the CSM Authorization Proxy Server](../../../../authorization/v2.0-tech-preview/configuration/proxy-server/).
+
+### Configure a Dell CSI Driver with CSM Authorization
+
+Follow the instructions available in CSM Authorization for [Configuring PowerFlex with Authorization](../../../../authorization/v2.0-tech-preview/configuration/powerflex).
+
+## Vault Server Installation
+
+If there is already a Vault server available, skip to [Minimum Server Configuration](#minimum-server-configuration).
+
+If there is no Vault server available to use with CSM Authorization, it can be installed in many ways following [Hashicorp Vault documentation](https://www.vaultproject.io/docs).
+
+For testing environment, however, a simple deployment suggested in this section may suffice.
+It creates a standalone server with in-memory (non-persistent) storage, running in a Docker container.
+
+> **NOTE**: With in-memory storage, the data in Vault is permanently destroyed upon the server's termination.
+
+### Generate TLS certificates for server and client
+
+Create server CA private key and certificate:
+
+```shell
+openssl req -x509 -sha256 -days 365 -newkey rsa:2048 -nodes \
+ -subj "/CN=Vault Root CA" \
+ -keyout server-ca.key \
+ -out server-ca.crt
+```
+
+Create server private key and CSR:
+
+```shell
+openssl req -newkey rsa:2048 -nodes \
+ -subj "/CN=vault-demo-server" \
+ -keyout server.key \
+ -out server.csr
+```
+
+Create server certificate signed by the CA:
+
+> Replace `` with an IP address by which CSM Authorization can reach the Vault server.
+This may be the address of the Docker host where the Vault server will be running.
+
+```shell
+cat > cert.ext <
+EOF
+
+openssl x509 -req \
+ -CA server-ca.crt -CAkey server-ca.key \
+ -in server.csr \
+ -out server.crt \
+ -days 365 \
+ -extfile cert.ext \
+ -CAcreateserial
+
+cat server-ca.crt >> server.crt
+```
+
+Create client CA private key and certificate:
+
+```shell
+openssl req -x509 -sha256 -days 365 -newkey rsa:2048 -nodes \
+ -subj "/CN=Client Root CA" \
+ -keyout client-ca.key \
+ -out client-ca.crt
+```
+
+Create client private key and CSR:
+
+```shell
+openssl req -newkey rsa:2048 -nodes \
+ -subj "/CN=vault-client" \
+ -keyout client.key \
+ -out client.csr
+```
+
+Create client certificate signed by the CA:
+// todo check ip?
+```shell
+cat > cert.ext <> client.crt
+```
+
+### Create server hcl file
+
+```shell
+cat >server.hcl < Variable `CONF_DIR` below refers to the directory containing files *server.crt*, *server.key*, *client-ca.crt* and *server.hcl*.
+```shell
+VOL_DIR="$CONF_DIR"
+VOL_DIR_D="/var/vault"
+ROOT_TOKEN="DemoRootToken"
+VAULT_IMG="vault:1.13.3"
+
+docker run --rm -d \
+ --name="vault-server" \
+ -p 8200:8200 -p 8400:8400 \
+ -v $VOL_DIR:$VOL_DIR_D -w $VOL_DIR_D \
+ -e VAULT_DEV_ROOT_TOKEN_ID=$ROOT_TOKEN \
+ -e VAULT_ADDR="http://127.0.0.1:8200" \
+ -e VAULT_TOKEN=$ROOT_TOKEN \
+ $VAULT_IMG \
+ sh -c 'vault server -dev -dev-listen-address 0.0.0.0:8200 -config=server.hcl'
+```
+
+## Minimum Server Configuration
+
+> **NOTE:** this configuration is a bare minimum to support CSM Authorization and is not intended for use in production environment.
+Refer to the [Hashicorp Vault documentation](https://www.vaultproject.io/docs) for recommended configuration options.
+
+> If a [test instance of Vault](#vault-server-installation) is used, the `vault` commands below can be executed in the Vault server container shell.
+> To enter the shell, run `docker exec -it vault-server sh`. After completing the configuration process, exit the shell by typing `exit`.
+>
+> Alternatively, you can [download the vault binary](https://www.vaultproject.io/downloads) and run it anywhere.
+> It will require two environment variables to communicate with the Vault server:
+> - `VAULT_ADDR` - URL similar to `http://127.0.0.1:8200`. You may need to change the address in the URL to the address of
+the Docker host where the server is running.
+> - `VAULT_TOKEN` - Authentication token, e.g. the root token `DemoRootToken` used in the [test instance of Vault](#vault-server-installation).
+
+### Enable Key/Value secret engine
+
+```shell
+vault secrets enable -version=2 -path=csm-authorization/ kv
+```
+
+Key/Value secret engine is used to store array credentials.
+
+### Enable Kubernetes authentication
+
+```shell
+vault auth enable kubernetes
+```
+
+### Configure Kubernetes authentication
+
+```shell
+vault write auth/kubernetes/config kubernetes_host="$KUBERNETES_HOST" kubernetes_ca_cert="$KUBERNETES_CA_CERT"
+```
+
+### Create a policy
+
+```shell
+vault policy write csm-authorization - <__Note__:
+> - If you are installing CSM Authorization in a different namespace than `authorization`, edit the `namespace` field in this file to your namespace.
+
### Install CSM Authorization Proxy Server
1. Follow all the [prerequisites](#prerequisite).
-2. Create a CR (Custom Resource) for Authorization from a [sample manifest](https://github.com/dell/csm-operator/tree/main/samples/authorization). This file can be modified to use custom parameters if needed.
+2. Create a CR (Custom Resource) for Authorization from a [sample manifest](https://github.com/dell/csm-operator/blob/main/samples/authorization/csm_authorization_proxy_server_v1110.yaml). This file can be modified to use custom parameters if needed.
3. Users should configure the parameters in the CR. This table lists the primary configurable parameters of the Authorization Proxy Server and their default values:
| Parameter | Description | Required | Default |
| --------- | ----------- | -------- |-------- |
- | **authorization** | This section configures the CSM-Authorization components. | - | - |
- | PROXY_HOST | The hostname to configure the self-signed certificate (if applicable), and the proxy service Ingress. | Yes | csm-authorization.com |
- | PROXY_INGRESS_CLASSNAME | The ingressClassName of the proxy-service Ingress. | Yes | nginx |
- | PROXY_INGRESS_HOSTS | Additional host rules to be applied to the proxy-service Ingress. | No | authorization-ingress-nginx-controller.authorization.svc.cluster.local |
- | REDIS_STORAGE_CLASS | The storage class for Redis to use for persistence. If not supplied, a locally provisioned volume is used. | No | - |
- | **ingress-nginx** | This section configures the enablement of the NGINX Ingress Controller. | - | - |
- | enabled | Enable/Disable deployment of the NGINX Ingress Controller. Set to false if you already have an Ingress Controller installed. | No | true |
+ | openshift | For OpenShift Container Platform only: Enable/Disable use of the OpenShift Ingress Controller. Set to false if you already have an Ingress Controller installed. | No | False |
+ | **nginx** | This section configures the enablement of the NGINX Ingress Controller. | - | - |
+ | enabled | For Kubernetes Container Platform only: Enable/Disable deployment of the NGINX Ingress Controller. Set to false if you already have an Ingress Controller installed. | No | true |
| **cert-manager** | This section configures the enablement of cert-manager. | - | - |
| enabled | Enable/Disable deployment of cert-manager. Set to false if you already have cert-manager installed. | No | true |
+ | **authorization** | This section configures the CSM-Authorization components. | - | - |
+ | certificate | The base64-encoded certificate for the certificate/private-key to configure the proxy-service Ingress. Leave empty to use self-signed certificate. | No | - |
+ | privateKey | The base64-encoded private key for the certificate/private-key to configure the proxy-service Ingress. Leave empty to use self-signed certificate. | No | - |
+ | hostname | The hostname to configure the self-signed certificate (if applicable), and the proxy service Ingress. | No | csm-authorization.com |
+ | proxyServerIngress.ingressClassName | The ingressClassName of the proxy-service Ingress. | Yes | nginx |
+ | proxyServerIngress.hosts | Additional host rules to be applied to the proxy-service Ingress. | No | - |
+ | proxyServerIngress.annotations | Additional annotations for the proxy-service Ingress. | No | - |
+ | **redis** | This section configures the Redis components. | - | - |
+ | storageclass | The storage class for Redis to use for persistence. If not supplied, a locally provisioned volume is used. | No | - |
+
>__Note__:
-> - If you specify `REDIS_STORAGE_CLASS`, the storage class must NOT be provisioned by the Dell CSI Driver to be configured with this installation of CSM Authorization.
+> - If you are installing CSM Authorization in a different namespace than `authorization`, edit the `namespace` fields in this file to your namespace.
+> - If you specify `storageclass`, the storage class must NOT be provisioned by the Dell CSI Driver to be configured with this installation of CSM Authorization.
**Optional:**
To enable reporting of trace data with [Zipkin](https://zipkin.io/), use the `csm-config-params` configMap in the sample CR or dynamically by editing the configMap.
@@ -102,28 +111,11 @@ To enable reporting of trace data with [Zipkin](https://zipkin.io/), use the `cs
>__Note__:
> - This command will deploy the Authorization Proxy Server in the namespace specified in the input YAML file.
-5. Create the `karavi-auth-tls` secret using your own certificate or by using a self-signed certificate generated via cert-manager.
-
- If using your own certificate that is valid for each Ingress hostname, use this command to create the `karavi-auth-tls` secret:
-
- ```bash
-
- kubectl create secret tls karavi-auth-tls -n authorization --key --cert
- ```
-
- If using a self-signed certificate, prepare a certificate file provided [here](https://github.com/dell/csm-operator/tree/main/samples/authorization). An entry for each hostname specified in the CR must be added under `dnsNames` for the certificate to be valid for each Ingress.
-
- Use this command to create the `karavi-auth-tls` secret:
-
- ```bash
- kubectl create -f
- ```
-
### Verify Installation of the CSM Authorization Proxy Server
Once the Authorization CR is created, you can verify the installation as mentioned below:
```bash
- kubectl describe csm/ -n
+ kubectl describe csm/ -n authorization
```
### Install Karavictl
@@ -132,8 +124,88 @@ Follow the instructions available in CSM Authorization for [Installing karavictl
### Configure the CSM Authorization Proxy Server
+**Authorization v1.x GA**
+
Follow the instructions available in CSM Authorization for [Configuring the CSM Authorization Proxy Server](../../../helm/modules/installation/authorization/#configuring-the-csm-authorization-proxy-server).
+
### Configure a Dell CSI Driver with CSM Authorization
+**Authorization v1.x GA**
+
Follow the instructions available in CSM Authorization for [Configuring a Dell CSI Driver with CSM for Authorization](../../../helm/modules/installation/authorization/#configuring-a-dell-csi-driver-with-csm-for-authorization).
+
+### Upgrade CSM Authorization
+
+This section outlines the upgrade steps for Container Storage Modules (CSM) for Authorization. The upgrade of CSM for Authorization is handled in 2 parts:
+1) Upgrading the Authorization proxy server
+2) Upgrading CSI Driver, Authorization sidecar with Authorization module enabled
+
+
+## Upgrading the Authorization Proxy Server
+
+ 1. Modifying the existing Authorization Proxy Server installation directly via `kubectl edit`
+
+ ```sh
+ kubectl get csm -n
+ ```
+
+ For example - If the Authorization Proxy Server is installed in authorization namespace then run this command to get the object name
+
+ ```sh
+ $ kubectl get csm -n authorization
+ ```
+
+ use the object name in `kubectl edit` command.
+
+ ```sh
+ kubectl edit csm -n
+ ```
+
+ For example - If the object name is authorization then use the name as authorization and if the namespace is authorization, then run this command to edit the object
+
+ ```sh
+ kubectl edit csm authorization -n authorization
+ ```
+
+ 2. Modify the installation
+
+ - Update the CSM Authorization Proxy Server configVersion
+ - Update the images for proxyService, tenantService, roleService and storageService
+
+
+## Upgrading CSI Driver, Authorization sidecar with Authorization module enabled
+
+ 1. Modifying the existing driver and module installation directly via `kubectl edit`
+
+ ```sh
+ kubectl get -n
+ ```
+
+ For example - If the CSI PowerFlex driver is installed in vxflexos namepace then run this command to get the object name
+
+ ```sh
+ kubectl get csm -n vxflexos
+ ```
+
+ use the object name in `kubectl edit` command.
+
+ ```sh
+ kubectl edit csm / -n
+ ```
+
+ For example - If the object name is vxflexos then use the name as vxflexos and if the driver is installed in vxflexos namespace, then run this command to edit the object
+
+ ```sh
+ kubectl edit csm vxflexos -n vxflexos
+ ```
+
+ 2. Modify the installation
+
+ - Update the driver config version and image tag
+ - Update the Authorization config version and karavi-authorization-proxy image.
+
+>NOTE:
+
+- In Authorization module upgrade, only `n-1` to `n` upgrade is supported, e.g. if the current observability version is `v1.8.x`, it can be upgraded to `1.9.x`.
+
diff --git a/content/docs/deployment/csmoperator/modules/observability.md b/content/docs/deployment/csmoperator/modules/observability.md
index 1e2dd58e5d..2e03727bd0 100644
--- a/content/docs/deployment/csmoperator/modules/observability.md
+++ b/content/docs/deployment/csmoperator/modules/observability.md
@@ -10,13 +10,16 @@ The CSM Observability module for supported Dell CSI Drivers can be installed via
## Prerequisites
- Create a namespace `karavi`
+
```bash
kubectl create namespace karavi
```
+
- Enable Observability module and components in [sample manifests](https://github.com/dell/csm-operator/tree/main/samples). If cert-manager has already been installed, don't enable it.
- To use Observablity with CSM Authorization, the [Authorization Proxy Server](../authorization/) should be installed and configured first. Then, enable the Authorization module along with the Observability module in the sample manifest.
- Observability will deploy with self-signed certificates by default. If you want to have custom certificates created instead, please generate certificates and private keys, encode them in base64, and insert them into the sample file as shown below for whichever components you are enabling:
-```
+
+```yaml
# observability: allows to configure observability
- name: observability
...
@@ -44,13 +47,52 @@ The CSM Observability module for supported Dell CSI Drivers can be installed via
privateKey: ""
...
```
+
- Notes:
- - If you enable `metrics-powerscale` or `metrics-powerflex`, you must enable `otel-collector` as well.
- - otel-collector cannot be enabled without a metrics component also enabled.
- - If you are deploying multiple drivers, only enable topology, otel-collector, and cert-manager in the first driver. For subsequent drivers, only enable the metrics component. When deleting the deployment, the driver that was created first must be deleted last.
+ - If you enable `metrics-powerscale` or `metrics-powerflex`, you must enable `otel-collector` as well.
+ - otel-collector cannot be enabled without a metrics component also enabled.
+ - If you are deploying multiple drivers, only enable topology, otel-collector, and cert-manager in the first driver. For subsequent drivers, only enable the metrics component. When deleting the deployment, the driver that was created first must be deleted last.
## Install Observability
- Once you have prepared the sample file(s) (one per driver being installed), deploy by running `kubectl apply -f ` on the sample file.
+## Upgrade Observability
+
+The Observability module installed by the Dell CSM Operator can be updated like any Kubernetes resource.
+
+- Modifying the existing driver and module installation directly via `kubectl edit`
+
+ ```sh
+ kubectl get -n
+ ```
+
+ For example - If the CSI PowerScale driver is installed then run this command to get the object name
+
+ ```sh
+ # Replace driver-namespace with the namespace where the CSI PowerScale driver is installed
+ $ kubectl get csm -n
+ ```
+
+ use the object name in `kubectl edit` command.
+
+ ```sh
+ kubectl edit csm / -n
+ ```
+
+ For example - If the object name is isilon then use the name as isilon
+
+ ```sh
+ # Replace object-name with the isilon
+ kubectl edit csm isilon -n
+ ```
+
+- Modify the installation
+
+ - Update the driver config version and image tag
+ - Update the Observability config version, csm-topology image and the driver metrics images(e.g. for CSI PowerScale driver, the metrics driver image would be `csm-metrics-powerscale`)
+
+>NOTE:
+- In observability module upgrade, only `n-1` to `n` upgrade is supported, e.g. if the current observability version is `v1.7.x`, it can be upgraded to `1.8.x`.
+- Upgrade to csm-operator and csi-driver first which support the corresponding observability module version.
diff --git a/content/docs/deployment/csmoperator/modules/replication.md b/content/docs/deployment/csmoperator/modules/replication.md
index c2775c3a68..6a5df95419 100644
--- a/content/docs/deployment/csmoperator/modules/replication.md
+++ b/content/docs/deployment/csmoperator/modules/replication.md
@@ -31,14 +31,14 @@ This change will need to be made to the /etc/hosts file on:
The [csm-replication](https://github.com/dell/csm-replication.git) GitHub repository is cloned to your source cluster as part of the installation. On your source cluster run the following to clone and build the repctl tool:
```bash
-git clone -b v1.8.0 https://github.com/dell/csm-replication.git
+git clone -b v1.9.0 https://github.com/dell/csm-replication.git
cd csm-replication/repctl
make build
```
Alternately, you can download a pre-built repctl binary from our [Releases](https://github.com/dell/csm-replication/releases) page.
```shell
-wget https://github.com/dell/csm-replication/releases/download/v1.8.0/repctl-linux-amd64
+wget https://github.com/dell/csm-replication/releases/download/v1.9.0/repctl-linux-amd64
mv repctl-linux-amd64 repctl
chmod +x repctl
```
diff --git a/content/docs/deployment/csmoperator/modules/resiliency.md b/content/docs/deployment/csmoperator/modules/resiliency.md
index a4fb29fd7b..349e61782d 100644
--- a/content/docs/deployment/csmoperator/modules/resiliency.md
+++ b/content/docs/deployment/csmoperator/modules/resiliency.md
@@ -18,6 +18,14 @@ When utilizing CSM for Resiliency module, it is crucial to note that it will sol
```bash
kubectl get pods -A -l podmon.dellemc.com/driver=csi-vxflexos
```
+Similarly, labels for for csi-powerscale, csi-unity, csi-powerstore and csi-powermax would be as:
+ ```bash
+ podmon.dellemc.com/driver:csi-isilon
+ podmon.dellemc.com/driver:csi-unity
+ podmon.dellemc.com/driver:csi-powerstore
+ podmon.dellemc.com/driver:csi-powermax
+```
+
```
NAMESPACE NAME READY STATUS RESTARTS AGE
pmtu1 podmontest-0 1/1 Running 0 3m7s
@@ -40,7 +48,7 @@ To enable this module, user should choose the sample file for the respective dri
# false: disable Resiliency feature(do not deploy podmon sidecar)
# Default value: false
enabled: true
- configVersion: v1.9.0
+ configVersion: v1.10.0
components:
- name: podmon-controller
args:
diff --git a/content/docs/deployment/csmoperator/release/_index.md b/content/docs/deployment/csmoperator/release/_index.md
index 165479c0dd..4b3e08a979 100644
--- a/content/docs/deployment/csmoperator/release/_index.md
+++ b/content/docs/deployment/csmoperator/release/_index.md
@@ -6,7 +6,7 @@ Description: >
Release notes for Dell Container Storage Modules Operator
---
-## Release Notes - Container Storage Modules Operator v1.5.1
+## Release Notes - Container Storage Modules Operator v1.6.0
@@ -32,4 +32,4 @@ Description: >
| Issue | Workaround |
|-------|------------|
| When CSM Operator creates a deployment that includes secrets (e.g., application-mobility, observability, cert-manager, velero), these secrets are not deleted on uninstall and will be left behind. For example, the `karavi-topology-tls`, `otel-collector-tls`, and `cert-manager-webhook-ca` secrets will not be deleted. | This should not cause any issues on the system, but all secrets present on the cluster can be found with `kubectl get secrets -A`, and any unwanted secrets can be deleted with `kubectl delete secret -n `|
-| CSM Operator does not support dynamic namespaces for Authorization. Despite successful installation in a namespace other than "authorization", errors may arise during volume creation. | Use the default namespace "authorization" for installing Authorization using CSM Operator|
+| In certain environments, users have encountered difficulties in installing drivers using the CSM Operator due to the 'OOM Killed' issue. This issue is attributed to the default resource requests and limits configured in the CSM Operator, which fail to meet the resource requirements of the user environments. OOM error occurs when a process in the container tries to consume more memory than the limit specified in resource configuration.| Before deploying the CSM Operator, it is crucial to adjust the memory and CPU requests and limits in the files [config/manager.yaml](https://github.com/dell/csm-operator/blob/main/config/manager/manager.yaml#L100), [deploy/operator.yaml](https://github.com/dell/csm-operator/blob/main/deploy/operator.yaml#L1330) to align with the user's environment requirements. If the containers running on the pod exceed the specified CPU and memory limits, the pod may get evicted. Currently CSM Operator do not support updating this configuration dynamically. CSM Operator needs to be redeployed for these updates to take effect in case it is already installed. Steps to manually update the resource configuration and then redeploy CSM Operator are available [here](https://dell.github.io/csm-docs/docs/deployment/csmoperator/#installation)|
\ No newline at end of file
diff --git a/content/docs/deployment/helm/drivers/installation/isilon.md b/content/docs/deployment/helm/drivers/installation/isilon.md
index 5d1cae3cb9..160fa59119 100644
--- a/content/docs/deployment/helm/drivers/installation/isilon.md
+++ b/content/docs/deployment/helm/drivers/installation/isilon.md
@@ -94,13 +94,16 @@ CRDs should be configured during replication prepare stage with repctl as descri
**Steps**
-1. Run `git clone -b v2.10.1 https://github.com/dell/csi-powerscale.git` to clone the git repository.
+1. Run `git clone -b v2.11.0 https://github.com/dell/csi-powerscale.git` to clone the git repository.
2. Ensure that you have created the namespace where you want to install the driver. You can run `kubectl create namespace isilon` to create a new one. The use of "isilon" as the namespace is just an example. You can choose any name for the namespace.
3. Collect information from the PowerScale Systems like IP address, IsiPath, username, and password. Make a note of the value for these parameters as they must be entered in the *secret.yaml*.
-4. Download `wget -O my-isilon-settings.yaml https://raw.githubusercontent.com/dell/helm-charts/csi-isilon-2.10.1/charts/csi-isilon/values.yaml` into `cd ../dell-csi-helm-installer` to customize settings for installation.
+
+ **Note**: The 'clusterName' serves as a logical, unique identifier for the array that should remain unchanged once it is included in the volume handle. Altering this identifier is not advisable, as it would result in the failure of all operations associated with the volume that was created earlier.
+
+4. Download `wget -O my-isilon-settings.yaml https://raw.githubusercontent.com/dell/helm-charts/csi-isilon-2.11.0/charts/csi-isilon/values.yaml` into `cd ../dell-csi-helm-installer` to customize settings for installation.
5. Edit *my-isilon-settings.yaml* to set the following parameters for your installation:
The following table lists the primary configurable parameters of the PowerScale driver Helm chart and their default values. More detailed information can be
- found in the [`values.yaml`](https://github.com/dell/helm-charts/blob/csi-isilon-2.10.1/charts/csi-isilon/values.yaml) file in this repository.
+ found in the [`values.yaml`](https://github.com/dell/helm-charts/blob/csi-isilon-2.11.0/charts/csi-isilon/values.yaml) file in this repository.
| Parameter | Description | Required | Default |
| --------- | ----------- | -------- |-------- |
@@ -210,10 +213,13 @@ Create isilon-creds secret using the following command:
8. Install the driver using `csi-install.sh` bash script and default yaml by running
```bash
- cd dell-csi-helm-installer && wget -O my-isilon-settings.yaml https://raw.githubusercontent.com/dell/helm-charts/csi-isilon-2.10.1/charts/csi-isilon/values.yaml &&
- ./csi-install.sh --namespace isilon --values my-isilon-settings.yaml
+ cd dell-csi-helm-installer && wget -O my-isilon-settings.yaml https://raw.githubusercontent.com/dell/helm-charts/csi-isilon-2.10.0/charts/csi-isilon/values.yaml &&
+ ./csi-install.sh --namespace isilon --values my-isilon-settings.yaml --helm-charts-version
```
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerscale/blob/main/dell-csi-helm-installer/csi-install.sh#L16) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerscale` directory if it was cloned before.
+
## Certificate validation for OneFS REST API calls
The CSI driver exposes an install parameter 'skipCertificateValidation' which determines if the driver
diff --git a/content/docs/deployment/helm/drivers/installation/powerflex.md b/content/docs/deployment/helm/drivers/installation/powerflex.md
index ddad908371..7113d19ddd 100644
--- a/content/docs/deployment/helm/drivers/installation/powerflex.md
+++ b/content/docs/deployment/helm/drivers/installation/powerflex.md
@@ -74,7 +74,7 @@ When the driver is installed using values generated by installation wizard, then
## Install the Driver
**Steps**
-1. Run `git clone -b v2.10.1 https://github.com/dell/csi-powerflex.git` to clone the git repository.
+1. Run `git clone -b v2.11.0 https://github.com/dell/csi-powerflex.git` to clone the git repository.
2. A namespace for the driver is expected prior to running the command below. If one is not created already, you can run `kubectl create namespace vxflexos` to create a new one.
Note that the namespace can be any user-defined name that follows the conventions for namespaces outlined by Kubernetes. In this example we assume that the namespace is 'vxflexos'
@@ -137,6 +137,7 @@ Use the below command to replace or update the secret:
*NOTE:*
+- It is mandatory to use SDC 4.5.2.1 for OpenShift 4.16 and above.
- The user needs to validate the YAML syntax and array-related key/values while replacing the vxflexos-creds secret.
- If you want to create a new array or update the MDM values in the secret, you will need to reinstall the driver. If you change other details, such as login information, the secret will dynamically update -- see [dynamic-array-configuration](../../../../../csidriver/features/powerflex#dynamic-array-configuration) for more details.
- Old `json` format of the array configuration file is still supported in this release. If you already have your configuration in `json` format, you may continue to maintain it or you may transfer this configuration to `yaml`format and replace/update the secret.
@@ -153,7 +154,7 @@ Use the below command to replace or update the secret:
7. Download the default values.yaml file
```bash
- cd dell-csi-helm-installer && wget -O myvalues.yaml https://github.com/dell/helm-charts/raw/csi-vxflexos-2.10.2/charts/csi-vxflexos/values.yaml
+ cd dell-csi-helm-installer && wget -O myvalues.yaml https://github.com/dell/helm-charts/raw/csi-vxflexos-2.11.0/charts/csi-vxflexos/values.yaml
```
8. If you are using custom images, check the fields under `images` in `my-vxflexos-settings.yaml` to make sure that they are pointing to the correct image repository.
@@ -162,9 +163,9 @@ Use the below command to replace or update the secret:
| Parameter | Description | Required | Default |
| ------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------- | ------- |
-| version | Set to verify the values file version matches driver version and used to pull the image as part of the image name. | Yes | 2.10.1 |
+| version | Set to verify the values file version matches driver version and used to pull the image as part of the image name. | Yes | 2.11.0 |
| images | List all the images used by the CSI driver and CSM. If you use a private repository, change the registries accordingly. | Yes | "" |
-| images.powerflexSdc | Set to give the location of the SDC image used if automatic SDC deployment is being utilized. | Yes | dellemc/sdc:4.5 |
+| images.powerflexSdc | Set to give the location of the SDC image used if automatic SDC deployment is being utilized. | Yes | dellemc/sdc:4.5.2.1 |
| certSecretCount | Represents the number of certificate secrets, which the user is going to create for SSL authentication. | No | 0 |
| logLevel | CSI driver log level. Allowed values: "error", "warn"/"warning", "info", "debug". | Yes | "debug" |
| logFormat | CSI driver log format. Allowed values: "TEXT" or "JSON". | Yes | "TEXT" |
@@ -213,11 +214,11 @@ Use the below command to replace or update the secret:
| skipCertificateValidation | A boolean that enables/disables certificate validation of the csm-authorization proxy server. | No | true |
-10. Install the driver using `csi-install.sh` bash script by running `cd dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values myvalues.yaml --helm-charts-version csi-vxflexos-2.10.2`. You may modify the release name with the `--release` arg. If arg is not provided, release will be named `vxflexos` by default.
+10. Install the driver using `csi-install.sh` bash script by running `cd dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values myvalues.yaml --helm-charts-version `. You may modify the release name with the `--release` arg. If arg is not provided, release will be named `vxflexos` by default.
Alternatively, to do a helm install solely with Helm charts (without shell scripts), refer to `helm/README.md`.
*NOTE:*
-- If you do not specify the `--helm-charts-version` flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerflex/blob/main/dell-csi-helm-installer/csi-install.sh#L24) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerflex` directory if it was cloned before.
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerflex/blob/main/dell-csi-helm-installer/csi-install.sh#L24) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerflex` directory if it was cloned before.
- For detailed instructions on how to run the install scripts, refer to the README.md in the dell-csi-helm-installer folder.
- Install script will validate MDM IP(s) in `vxflexos-config` secret and creates a new field consumed by the init container and sdc-monitor container
- This install script also runs the `verify.sh` script. You will be prompted to enter the credentials for each of the Kubernetes nodes.
diff --git a/content/docs/deployment/helm/drivers/installation/powermax.md b/content/docs/deployment/helm/drivers/installation/powermax.md
index 2946bed78b..28b2041d2d 100644
--- a/content/docs/deployment/helm/drivers/installation/powermax.md
+++ b/content/docs/deployment/helm/drivers/installation/powermax.md
@@ -15,6 +15,7 @@ The following requirements must be met before installing CSI Driver for Dell Pow
- Fibre Channel requirements
- iSCSI requirements
- NFS requirements
+- NVMeTCP requirements
- Auto RDM for vSphere over FC requirements
- Certificate validation for Unisphere REST API calls
- Mount propagation is enabled on container runtime that is being used
@@ -81,6 +82,27 @@ CSI Driver for Dell PowerMax supports NFS communication. Ensure that the followi
- PowerMax Embedded Management guest to access Unisphere for PowerMax.
- Create the NAS server. Please refer [here](https://dl.dell.com/content/manual55638050-dell-powermax-file-quick-start-guide.pdf?language=en-us&ps=true) for more details.
+### NVMeTCP requirements
+If you want to use the protocol, set up the NVMe initiators as follows:
+- Setup on Array
+Once the NVMe endpoint is created on the array, follow the following step to update endpoint name to adhere with CSI driver.
+ - Perform a ```nvme discover --transport=tcp --traddr= --trsvcid=4420```. is the placeholder for actual IP address of NVMe Endpoint.
+ - Fetch the _subnqn_, for e.g., _nqn.1988-11.com.dell:PowerMax_2500:00:000120001100_, this will be used as the subnqn holder while updating NVMe endpoint name.
+ - Update the NVMe endpoint name as ```:>```. Here is an example how it should look, _nqn.1988-11.com.dell:PowerMax_2500:00:000120001100:OR1C000_
+- Setup on Host
+ - The driver requires NVMe management command-line interface (nvme-cli) to use configure, edit, view or start the NVMe client and target. The nvme-cli utility provides a command-line and interactive shell option. The NVMe CLI tool is installed in the host using the below command.
+```bash
+sudo apt install nvme-cli
+```
+**Requirements for NVMeTCP**
+- Modules including the nvme, nvme_core, nvme_fabrics, and nvme_tcp are required for using NVMe over Fabrics using TCP. Load the NVMe and NVMe-OF Modules using the below commands:
+```bash
+modprobe nvme
+modprobe nvme_tcp
+```
+- The NVMe modules may not be available after a node reboot. Loading the modules at startup is recommended.
+- Generate and update the _/etc/nvme/hostnqn_ with hostNQN details.
+
### Auto RDM for vSphere over FC requirements
The CSI Driver for Dell PowerMax supports auto RDM for vSphere over FC. These requirements are applicable for the clusters deployed on ESX/ESXi using virtualized environement.
@@ -238,7 +260,7 @@ CRDs should be configured during replication prepare stage with repctl as descri
**Steps**
-1. Run `git clone -b v2.10.1 https://github.com/dell/csi-powermax.git` to clone the git repository. This will include the Helm charts and dell-csi-helm-installer scripts.
+1. Run `git clone -b v2.11.0 https://github.com/dell/csi-powermax.git` to clone the git repository. This will include the Helm charts and dell-csi-helm-installer scripts.
2. Ensure that you have created a namespace where you want to install the driver. You can run `kubectl create namespace powermax` to create a new one
3. Edit the `samples/secret/secret.yaml` file,to point to the correct namespace, and replace the values for the username and password parameters.
These values can be obtained using base64 encoding as described in the following example:
@@ -253,7 +275,7 @@ CRDs should be configured during replication prepare stage with repctl as descri
```
5. Download the default values.yaml file
```bash
- cd dell-csi-helm-installer && wget -O my-powermax-settings.yaml https://github.com/dell/helm-charts/raw/csi-powermax-2.10.1/charts/csi-powermax/values.yaml
+ cd dell-csi-helm-installer && wget -O my-powermax-settings.yaml https://github.com/dell/helm-charts/raw/csi-powermax-2.11.0/charts/csi-powermax/values.yaml
```
6. Ensure the unisphere have 10.0 REST endpoint support by clicking on Unisphere -> Help (?) -> About in Unisphere for PowerMax GUI.
7. Edit the newly created file and provide values for the following parameters
@@ -261,92 +283,92 @@ CRDs should be configured during replication prepare stage with repctl as descri
vi my-powermax-settings.yaml
```
-| Parameter | Description | Required | Default |
-|-----------|--------------|------------|----------|
-| **global**| This section refers to configuration options for both CSI PowerMax Driver and Reverse Proxy | - | - |
-|defaultCredentialsSecret| This secret name refers to:
1 The proxy credentials if the driver is installed with proxy in StandAlone mode.
2. The default Unisphere credentials if credentialsSecret is not specified for a management server.| Yes | powermax-creds |
-| storageArrays| This section refers to the list of arrays managed by the driver and Reverse Proxy in StandAlone mode.| - | - |
-| storageArrayId | This refers to PowerMax Symmetrix ID.| Yes | 000000000001|
-| endpoint | This refers to the URL of the Unisphere server managing _storageArrayId_. If authorization is enabled, endpoint should be the HTTPS localhost endpoint that the authorization sidecar will listen on| Yes if Reverse Proxy mode is _StandAlone_ | https://primary-1.unisphe.re:8443 |
-| backupEndpoint | This refers to the URL of the backup Unisphere server managing _storageArrayId_, if Reverse Proxy is installed in _StandAlone_ mode. If authorization is enabled, backupEndpoint should be the HTTPS localhost endpoint that the authorization sidecar will listen on| Yes | https://backup-1.unisphe.re:8443 |
-| managementServers | This section refers to the list of configurations for Unisphere servers managing powermax arrays.| - | - |
-| endpoint | This refers to the URL of the Unisphere server. If authorization is enabled, endpoint should be the HTTPS localhost endpoint that the authorization sidecar will listen on | Yes | https://primary-1.unisphe.re:8443 |
-| credentialsSecret| This refers to the user credentials for _endpoint_ | Yes| primary-1-secret|
-| skipCertificateValidation | This parameter should be set to false if you want to do client-side TLS verification of Unisphere for PowerMax SSL certificates.| No | "True" |
-| certSecret | The name of the secret in the same namespace containing the CA certificates of the Unisphere server | Yes, if skipCertificateValidation is set to false | Empty|
-| limits | This refers to various limits for Reverse Proxy | No | - |
-| maxActiveRead | This refers to the maximum concurrent READ request handled by the reverse proxy.| No | 5 |
-| maxActiveWrite | This refers to the maximum concurrent WRITE request handled by the reverse proxy.| No | 4 |
-| maxOutStandingRead | This refers to maximum queued READ request when reverse proxy receives more than _maxActiveRead_ requests. | No | 50 |
-| maxOutStandingWrite| This refers to maximum queued WRITE request when reverse proxy receives more than _maxActiveWrite_ requests.| No | 50 |
-| kubeletConfigDir | Specify kubelet config dir path | Yes | /var/lib/kubelet |
-| imagePullPolicy | The default pull policy is IfNotPresent which causes the Kubelet to skip pulling an image if it already exists. | Yes | IfNotPresent |
+| Parameter | Description | Required | Default |
+|-----------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------|----------|
+| **global**| This section refers to configuration options for both CSI PowerMax Driver and Reverse Proxy | - | - |
+|defaultCredentialsSecret| This secret name refers to:
1 The proxy credentials if the driver is installed with proxy in StandAlone mode.
2. The default Unisphere credentials if credentialsSecret is not specified for a management server. | Yes | powermax-creds |
+| storageArrays| This section refers to the list of arrays managed by the driver and Reverse Proxy in StandAlone mode. | - | - |
+| storageArrayId | This refers to PowerMax Symmetrix ID. | Yes | 000000000001|
+| endpoint | This refers to the URL of the Unisphere server managing _storageArrayId_. If authorization is enabled, endpoint should be the HTTPS localhost endpoint that the authorization sidecar will listen on | Yes if Reverse Proxy mode is _StandAlone_ | https://primary-1.unisphe.re:8443 |
+| backupEndpoint | This refers to the URL of the backup Unisphere server managing _storageArrayId_, if Reverse Proxy is installed in _StandAlone_ mode. If authorization is enabled, backupEndpoint should be the HTTPS localhost endpoint that the authorization sidecar will listen on | Yes | https://backup-1.unisphe.re:8443 |
+| managementServers | This section refers to the list of configurations for Unisphere servers managing powermax arrays. | - | - |
+| endpoint | This refers to the URL of the Unisphere server. If authorization is enabled, endpoint should be the HTTPS localhost endpoint that the authorization sidecar will listen on | Yes | https://primary-1.unisphe.re:8443 |
+| credentialsSecret| This refers to the user credentials for _endpoint_ | Yes| primary-1-secret|
+| skipCertificateValidation | This parameter should be set to false if you want to do client-side TLS verification of Unisphere for PowerMax SSL certificates. | No | "True" |
+| certSecret | The name of the secret in the same namespace containing the CA certificates of the Unisphere server | Yes, if skipCertificateValidation is set to false | Empty|
+| limits | This refers to various limits for Reverse Proxy | No | - |
+| maxActiveRead | This refers to the maximum concurrent READ request handled by the reverse proxy. | No | 5 |
+| maxActiveWrite | This refers to the maximum concurrent WRITE request handled by the reverse proxy. | No | 4 |
+| maxOutStandingRead | This refers to maximum queued READ request when reverse proxy receives more than _maxActiveRead_ requests. | No | 50 |
+| maxOutStandingWrite| This refers to maximum queued WRITE request when reverse proxy receives more than _maxActiveWrite_ requests. | No | 50 |
+| kubeletConfigDir | Specify kubelet config dir path | Yes | /var/lib/kubelet |
+| imagePullPolicy | The default pull policy is IfNotPresent which causes the Kubelet to skip pulling an image if it already exists. | Yes | IfNotPresent |
| clusterPrefix | Prefix that is used during the creation of various masking-related entities (Storage Groups, Masking Views, Hosts, and Volume Identifiers) on the array. The value that you specify here must be unique. Ensure that no other CSI PowerMax driver is managing the same arrays that are configured with the same prefix. The maximum length for this prefix is three characters. | Yes | "ABC" |
-| logLevel | CSI driver log level. Allowed values: "error", "warn"/"warning", "info", "debug". | Yes | "debug" |
-| logFormat | CSI driver log format. Allowed values: "TEXT" or "JSON". | Yes | "TEXT" |
-| kubeletConfigDir | kubelet config directory path. Ensure that the config.yaml file is present at this path. | Yes | /var/lib/kubelet |
-| defaultFsType | Used to set the default FS type for external provisioner | Yes | ext4 |
-| portGroups | List of comma-separated port group names. Any port group that is specified here must be present on all the arrays that the driver manages. | For iSCSI Only | "PortGroup1, PortGroup2, PortGroup3" |
-| skipCertificateValidation | Skip client-side TLS verification of Unisphere certificates | No | "True" |
-| transportProtocol | Set the preferred transport protocol for the Kubernetes cluster which helps the driver choose between FC and iSCSI when a node has both FC and iSCSI connectivity to a PowerMax array.| No | Empty|
-| nodeNameTemplate | Used to specify a template that will be used by the driver to create Host/IG names on the PowerMax array. To use the default naming convention, leave this value empty. | No | Empty|
-| modifyHostName | Change any existing host names. When nodenametemplate is set, it changes the name to the specified format else it uses driver default host name format. | No | false |
-| powerMaxDebug | Enables low level and http traffic logging between the CSI driver and Unisphere. Don't enable this unless asked to do so by the support team. | No | false |
-| enableCHAP | Determine if the driver is going to configure SCSI node databases on the nodes with the CHAP credentials. If enabled, the CHAP secret must be provided in the credentials secret and set to the key "chapsecret" | No | false |
-| fsGroupPolicy | Defines which FS Group policy mode to be used, Supported modes `None, File and ReadWriteOnceWithFSType` | No | "ReadWriteOnceWithFSType" |
-| version | Current version of the driver. Don't modify this value as this value will be used by the install script. | Yes | v2.10.1 |
-| images | List all the images used by the CSI driver and CSM. If you use a private repository, change the registries accordingly. | Yes | "" || driverRepository | Defines the registry of the container image used for the driver. | Yes | dellemc |
-| maxPowerMaxVolumesPerNode | Specifies the maximum number of volume that can be created on a node. | Yes| 0 |
-| **controller** | Allows configuration of the controller-specific parameters.| - | - |
-| controllerCount | Defines the number of csi-powerscale controller pods to deploy to the Kubernetes release| Yes | 2 |
-| volumeNamePrefix | Defines a string prefix for the names of PersistentVolumes created | Yes | "k8s" |
-| snapshot.enabled | Enable/Disable volume snapshot feature | Yes | true |
-| snapshot.snapNamePrefix | Defines a string prefix for the names of the Snapshots created | Yes | "snapshot" |
-| resizer.enabled | Enable/Disable volume expansion feature | Yes | true |
-| healthMonitor.enabled | Allows to enable/disable volume health monitor | No | false |
-| healthMonitor.interval | Interval of monitoring volume health condition | No | 60s |
-| nodeSelector | Define node selection constraints for pods of controller deployment | No | |
-| tolerations | Define tolerations for the controller deployment, if required | No | |
-| **node** | Allows configuration of the node-specific parameters.| - | - |
-| tolerations | Add tolerations as per requirement | No | - |
-| nodeSelector | Add node selectors as per requirement | No | - |
-| healthMonitor.enabled | Allows to enable/disable volume health monitor | No | false |
-| topologyControl.enabled | Allows to enable/disable topology control to filter topology keys | No | false |
-| **csireverseproxy**| This section refers to the configuration options for CSI PowerMax Reverse Proxy | - | - |
-| tlsSecret | This refers to the TLS secret of the Reverse Proxy Server.| Yes | csirevproxy-tls-secret |
-| deployAsSidecar | If set to _true_, the Reverse Proxy is installed as a sidecar to the driver's controller pod otherwise it is installed as a separate deployment.| Yes | "True" |
-| port | Specify the port number that is used by the NodePort service created by the CSI PowerMax Reverse Proxy installation| Yes | 2222 |
-| **certManager** | Auto-create TLS certificate for csi-reverseproxy | - | - |
-| selfSignedCert | Set selfSignedCert to use a self-signed certificate | No | true |
-| certificateFile | certificateFile has tls.key content in encoded format | No | tls.crt.encoded64 |
-| privateKeyFile | privateKeyFile has tls.key content in encoded format | No | tls.key.encoded64 |
-| **authorization** | [Authorization](../../../../../deployment/helm/modules/installation/authorization/) is an optional feature to apply credential shielding of the backend PowerMax. | - | - |
-| enabled | A boolean that enables/disables authorization feature. | No | false |
-| proxyHost | Hostname of the csm-authorization server. | No | Empty |
-| skipCertificateValidation | A boolean that enables/disables certificate validation of the csm-authorization proxy server. | No | true |
-| **migration** | [Migration](../../../../../replication/migration/migrating-volumes-same-array) is an optional feature to enable migration between storage classes | - | - |
-| enabled | A boolean that enables/disables migration feature. | No | false |
-| image | Image for dell-csi-migrator sidecar. | No | " " |
-| nodeRescanSidecarImage | Image for node rescan sidecar which rescans nodes for identifying new paths. | No | " " |
-| migrationPrefix | enables migration sidecar to read required information from the storage class fields | No | migration.storage.dell.com |
-| **replication** | [Replication](../../../../../deployment/helm/modules/installation/replication/) is an optional feature to enable replication & disaster recovery capabilities of PowerMax to Kubernetes clusters.| - | - |
-| enabled | A boolean that enables/disables replication feature. | No | false |
-| replicationContextPrefix | enables side cars to read required information from the volume context | No | powermax |
-| replicationPrefix | Determine if replication is enabled | No | replication.storage.dell.com |
-| **storageCapacity** | It is an optional feature that enable storagecapacity & helps the scheduler to check whether the requested capacity is available on the PowerMax array and allocate it to the nodes.| - | - |
-| enabled | A boolean that enables/disables storagecapacity feature. | - | true |
-| pollInterval | It configure how often external-provisioner polls the driver to detect changed capacity | - | 5m |
-| **vSphere**| This section refers to the configuration options for VMware virtualized environment support via RDM | - | - |
-| enabled | A boolean that enables/disables VMware virtualized environment support. | No | false |
-| fcPortGroup | Existing portGroup that driver will use for vSphere. | Yes | "" |
-| fcHostGroup | Existing host(initiator group)/hostgroup(cascaded initiator group) that driver will use for vSphere. | Yes | "" |
-| vCenterHost | URL/endpoint of the vCenter where all the ESX are present | Yes | "" |
-| vCenterCredSecret | Secret name for the vCenter credentials. | Yes | "" |
+| logLevel | CSI driver log level. Allowed values: "error", "warn"/"warning", "info", "debug". | Yes | "debug" |
+| logFormat | CSI driver log format. Allowed values: "TEXT" or "JSON". | Yes | "TEXT" |
+| kubeletConfigDir | kubelet config directory path. Ensure that the config.yaml file is present at this path. | Yes | /var/lib/kubelet |
+| defaultFsType | Used to set the default FS type for external provisioner | Yes | ext4 |
+| portGroups | List of comma-separated port group names. Any port group that is specified here must be present on all the arrays that the driver manages. | For iSCSI Only | "PortGroup1, PortGroup2, PortGroup3" |
+| skipCertificateValidation | Skip client-side TLS verification of Unisphere certificates | No | "True" |
+| transportProtocol | Set the preferred transport protocol for the Kubernetes cluster which helps the driver choose between FC, iSCSI and NVMeTCP, when a node has multiple protocol connectivity to a PowerMax array. | No | Empty|
+| nodeNameTemplate | Used to specify a template that will be used by the driver to create Host/IG names on the PowerMax array. To use the default naming convention, leave this value empty. | No | Empty|
+| modifyHostName | Change any existing host names. When nodenametemplate is set, it changes the name to the specified format else it uses driver default host name format. | No | false |
+| powerMaxDebug | Enables low level and http traffic logging between the CSI driver and Unisphere. Don't enable this unless asked to do so by the support team. | No | false |
+| enableCHAP | Determine if the driver is going to configure SCSI node databases on the nodes with the CHAP credentials. If enabled, the CHAP secret must be provided in the credentials secret and set to the key "chapsecret" | No | false |
+| fsGroupPolicy | Defines which FS Group policy mode to be used, Supported modes `None, File and ReadWriteOnceWithFSType` | No | "ReadWriteOnceWithFSType" |
+| version | Current version of the driver. Don't modify this value as this value will be used by the install script. | Yes | v2.10.0 |
+| images | List all the images used by the CSI driver and CSM. If you use a private repository, change the registries accordingly. | Yes | "" || driverRepository | Defines the registry of the container image used for the driver. | Yes | dellemc |
+| maxPowerMaxVolumesPerNode | Specifies the maximum number of volume that can be created on a node. | Yes| 0 |
+| **controller** | Allows configuration of the controller-specific parameters. | - | - |
+| controllerCount | Defines the number of csi-powerscale controller pods to deploy to the Kubernetes release | Yes | 2 |
+| volumeNamePrefix | Defines a string prefix for the names of PersistentVolumes created | Yes | "k8s" |
+| snapshot.enabled | Enable/Disable volume snapshot feature | Yes | true |
+| snapshot.snapNamePrefix | Defines a string prefix for the names of the Snapshots created | Yes | "snapshot" |
+| resizer.enabled | Enable/Disable volume expansion feature | Yes | true |
+| healthMonitor.enabled | Allows to enable/disable volume health monitor | No | false |
+| healthMonitor.interval | Interval of monitoring volume health condition | No | 60s |
+| nodeSelector | Define node selection constraints for pods of controller deployment | No | |
+| tolerations | Define tolerations for the controller deployment, if required | No | |
+| **node** | Allows configuration of the node-specific parameters. | - | - |
+| tolerations | Add tolerations as per requirement | No | - |
+| nodeSelector | Add node selectors as per requirement | No | - |
+| healthMonitor.enabled | Allows to enable/disable volume health monitor | No | false |
+| topologyControl.enabled | Allows to enable/disable topology control to filter topology keys | No | false |
+| **csireverseproxy**| This section refers to the configuration options for CSI PowerMax Reverse Proxy | - | - |
+| tlsSecret | This refers to the TLS secret of the Reverse Proxy Server. | Yes | csirevproxy-tls-secret |
+| deployAsSidecar | If set to _true_, the Reverse Proxy is installed as a sidecar to the driver's controller pod otherwise it is installed as a separate deployment. | Yes | "True" |
+| port | Specify the port number that is used by the NodePort service created by the CSI PowerMax Reverse Proxy installation | Yes | 2222 |
+| **certManager** | Auto-create TLS certificate for csi-reverseproxy | - | - |
+| selfSignedCert | Set selfSignedCert to use a self-signed certificate | No | true |
+| certificateFile | certificateFile has tls.key content in encoded format | No | tls.crt.encoded64 |
+| privateKeyFile | privateKeyFile has tls.key content in encoded format | No | tls.key.encoded64 |
+| **authorization** | [Authorization](../../../../../deployment/helm/modules/installation/authorization/) is an optional feature to apply credential shielding of the backend PowerMax. | - | - |
+| enabled | A boolean that enables/disables authorization feature. | No | false |
+| proxyHost | Hostname of the csm-authorization server. | No | Empty |
+| skipCertificateValidation | A boolean that enables/disables certificate validation of the csm-authorization proxy server. | No | true |
+| **migration** | [Migration](../../../../../replication/migration/migrating-volumes-same-array) is an optional feature to enable migration between storage classes | - | - |
+| enabled | A boolean that enables/disables migration feature. | No | false |
+| image | Image for dell-csi-migrator sidecar. | No | " " |
+| nodeRescanSidecarImage | Image for node rescan sidecar which rescans nodes for identifying new paths. | No | " " |
+| migrationPrefix | enables migration sidecar to read required information from the storage class fields | No | migration.storage.dell.com |
+| **replication** | [Replication](../../../../../deployment/helm/modules/installation/replication/) is an optional feature to enable replication & disaster recovery capabilities of PowerMax to Kubernetes clusters. | - | - |
+| enabled | A boolean that enables/disables replication feature. | No | false |
+| replicationContextPrefix | enables side cars to read required information from the volume context | No | powermax |
+| replicationPrefix | Determine if replication is enabled | No | replication.storage.dell.com |
+| **storageCapacity** | It is an optional feature that enable storagecapacity & helps the scheduler to check whether the requested capacity is available on the PowerMax array and allocate it to the nodes. | - | - |
+| enabled | A boolean that enables/disables storagecapacity feature. | - | true |
+| pollInterval | It configure how often external-provisioner polls the driver to detect changed capacity | - | 5m |
+| **vSphere**| This section refers to the configuration options for VMware virtualized environment support via RDM | - | - |
+| enabled | A boolean that enables/disables VMware virtualized environment support. | No | false |
+| fcPortGroup | Existing portGroup that driver will use for vSphere. | Yes | "" |
+| fcHostGroup | Existing host(initiator group)/hostgroup(cascaded initiator group) that driver will use for vSphere. | Yes | "" |
+| vCenterHost | URL/endpoint of the vCenter where all the ESX are present | Yes | "" |
+| vCenterCredSecret | Secret name for the vCenter credentials. | Yes | "" |
8. Install the driver using `csi-install.sh` bash script by running
```bash
- cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml
+ cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml --helm-charts-version
```
9. Or you can also install the driver using standalone helm chart using the command
```bash
@@ -354,6 +376,7 @@ CRDs should be configured during replication prepare stage with repctl as descri
```
*Note:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powermax/blob/main/dell-csi-helm-installer/csi-install.sh#L52) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powermax` directory if it was cloned before.
- For detailed instructions on how to run the install scripts, see the readme document in the dell-csi-helm-installer folder.
- There are a set of samples provided [here](#sample-values-file) to help you configure the driver with reverse proxy
- This script also runs the verify.sh script in the same directory. You will be prompted to enter the credentials for each of the Kubernetes nodes. The `verify.sh` script needs the credentials to check if the iSCSI initiators have been configured on all nodes. You can also skip the verification step by specifying the `--skip-verify-node` option
diff --git a/content/docs/deployment/helm/drivers/installation/powerstore.md b/content/docs/deployment/helm/drivers/installation/powerstore.md
index 6a707a5172..bfc47203e4 100644
--- a/content/docs/deployment/helm/drivers/installation/powerstore.md
+++ b/content/docs/deployment/helm/drivers/installation/powerstore.md
@@ -183,7 +183,7 @@ CRDs should be configured during replication prepare stage with repctl as descri
## Install the Driver
**Steps**
-1. Run `git clone -b v2.10.1 https://github.com/dell/csi-powerstore.git` to clone the git repository.
+1. Run `git clone -b v2.11.0 https://github.com/dell/csi-powerstore.git` to clone the git repository.
2. Ensure that you have created namespace where you want to install the driver. You can run `kubectl create namespace csi-powerstore` to create a new one. "csi-powerstore" is just an example. You can choose any name for the namespace.
But make sure to align to the same namespace during the whole installation.
3. Edit `samples/secret/secret.yaml` file and configure connection information for your PowerStore arrays changing following parameters:
@@ -210,7 +210,7 @@ CRDs should be configured during replication prepare stage with repctl as descri
> If you do not specify `arrayID` parameter in the storage class then the array that was specified as the default would be used for provisioning volumes.
6. Download the default values.yaml file
```bash
- cd dell-csi-helm-installer && wget -O my-powerstore-settings.yaml https://github.com/dell/helm-charts/raw/csi-powerstore-2.10.1/charts/csi-powerstore/values.yaml
+ cd dell-csi-helm-installer && wget -O my-powerstore-settings.yaml https://github.com/dell/helm-charts/raw/csi-powerstore-2.11.0/charts/csi-powerstore/values.yaml
```
7. Edit the newly created values file and provide values for the following parameters `vi my-powerstore-settings.yaml`:
@@ -249,11 +249,12 @@ CRDs should be configured during replication prepare stage with repctl as descri
8. Install the driver using `csi-install.sh` bash script by running
```bash
- ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml
+ ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml --helm-charts-version
```
- After that the driver should be installed, you can check the condition of driver pods by running `kubectl get all -n csi-powerstore`
*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerstore/blob/main/dell-csi-helm-installer/csi-install.sh#L13) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerstore` directory if it was cloned before.
- For detailed instructions on how to run the install scripts, refer to the readme document in the dell-csi-helm-installer folder.
- By default, the driver scans available SCSI adapters and tries to register them with the storage array under the SCSI hostname using `node.nodeNamePrefix` and the ID read from the file pointed to by `node.nodeIDPath`. If an adapter is already registered with the storage under a different hostname, the adapter is not used by the driver.
- A hostname the driver uses for registration of adapters is in the form `--`. By default, these are csi-node and the machine ID read from the file `/etc/machine-id`.
diff --git a/content/docs/deployment/helm/drivers/installation/unity.md b/content/docs/deployment/helm/drivers/installation/unity.md
index a008f1a6c0..38374967ab 100644
--- a/content/docs/deployment/helm/drivers/installation/unity.md
+++ b/content/docs/deployment/helm/drivers/installation/unity.md
@@ -78,7 +78,7 @@ Install CSI Driver for Unity XT using this procedure.
* As a pre-requisite for running this procedure, you must have the downloaded files, including the Helm chart from the source [git repository](https://github.com/dell/csi-unity) with the command
```bash
- git clone -b v2.10.1 https://github.com/dell/csi-unity.git
+ git clone -b v2.11.0 https://github.com/dell/csi-unity.git
```
* In the top-level dell-csi-helm-installer directory, there should be two scripts, `csi-install.sh` and `csi-uninstall.sh`.
* Ensure _unity_ namespace exists in Kubernetes cluster. Use the `kubectl create namespace unity` command to create the namespace if the namespace is not present.
@@ -98,12 +98,12 @@ Procedure
2. Get the required values.yaml using the command below:
```bash
-cd dell-csi-helm-installer && wget -O my-unity-settings.yaml https://github.com/dell/helm-charts/raw/csi-unity-2.10.1/charts/csi-unity/values.yaml
+cd dell-csi-helm-installer && wget -O my-unity-settings.yaml https://github.com/dell/helm-charts/raw/csi-unity-2.11.0/charts/csi-unity/values.yaml
```
3. Edit `values.yaml` to set the following parameters for your installation:
- The following table lists the primary configurable parameters of the Unity XT driver chart and their default values. More detailed information can be found in the [`values.yaml`](https://github.com/dell/helm-charts/blob/csi-unity-2.10.1/charts/csi-unity/values.yaml) file in this repository.
+ The following table lists the primary configurable parameters of the Unity XT driver chart and their default values. More detailed information can be found in the [`values.yaml`](https://github.com/dell/helm-charts/blob/csi-unity-2.11.0/charts/csi-unity/values.yaml) file in this repository.
| Parameter | Description | Required | Default |
| --------- | ----------- | -------- |-------- |
@@ -114,6 +114,7 @@ cd dell-csi-helm-installer && wget -O my-unity-settings.yaml https://github.com/
| syncNodeInfoInterval | Time interval to add node info to the array. Default 15 minutes. The minimum value should be 1 minute. | No | 15 |
| maxUnityVolumesPerNode | Maximum number of volumes that controller can publish to the node. | No | 0 |
| certSecretCount | Represents the number of certificate secrets, which the user is going to create for SSL authentication. (unity-cert-0..unity-cert-n). The minimum value should be 1. | No | 1 |
+ | [allowedNetworks](../../../../../csidriver/features/unity/#support-custom-networks-for-nfs-io-traffic) | Defines the list of networks that can be used for NFS I/O traffic, CIDR format must be used. | No | empty |
| imagePullPolicy | The default pull policy is IfNotPresent which causes the Kubelet to skip pulling an image if it already exists. | Yes | IfNotPresent |
| podmon.enabled | service to monitor failing jobs and notify | No | false |
| tenantName | Tenant name added while adding host entry to the array | No | |
@@ -245,8 +246,11 @@ cd dell-csi-helm-installer && wget -O my-unity-settings.yaml https://github.com/
7. Run the command to proceed with the installation using bash script.
```bash
- ./csi-install.sh --namespace unity --values ./myvalues.yaml
+ ./csi-install.sh --namespace unity --values ./myvalues.yaml --helm-charts-version
```
+ *NOTE:*
+ - The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-unity/blob/main/dell-csi-helm-installer/csi-install.sh#L22) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-unity` directory if it was cloned before.
+
A successful installation must display messages that look similar to the following samples:
```
------------------------------------------------------
@@ -327,7 +331,7 @@ cd dell-csi-helm-installer && wget -O my-unity-settings.yaml https://github.com/
**Syntax**:
```bash
- git clone -b csi-unity-2.10.1 https://github.com/dell/helm-charts
+ git clone -b csi-unity-2.11.0 https://github.com/dell/helm-charts
helm install dell/container-storage-modules -n --version -f
diff --git a/content/docs/deployment/helm/drivers/upgrade/isilon.md b/content/docs/deployment/helm/drivers/upgrade/isilon.md
index 924a0b0581..3ad84f97c7 100644
--- a/content/docs/deployment/helm/drivers/upgrade/isilon.md
+++ b/content/docs/deployment/helm/drivers/upgrade/isilon.md
@@ -8,28 +8,31 @@ Description: Upgrade PowerScale CSI driver
---
You can upgrade the CSI Driver for Dell PowerScale using Helm or Dell CSM Operator.
-## Upgrade Driver from version 2.9.0 to 2.10.1 using Helm
+## Upgrade Driver from version 2.10.1 to 2.11.0 using Helm
**Note:** While upgrading the driver via helm, controllerCount variable in myvalues.yaml can be at most one less than the number of worker nodes.
### Steps
-1. Clone the repository using `git clone -b v2.10.1 https://github.com/dell/csi-powerscale.git`
+1. Clone the repository using `git clone -b v2.11.0 https://github.com/dell/csi-powerscale.git`
2. Change to directory dell-csi-helm-installer to install the Dell PowerScale `cd dell-csi-helm-installer`
3. Download the default values.yaml using following command:
```bash
- wget -O my-isilon-settings.yaml https://raw.githubusercontent.com/dell/helm-charts/csi-isilon-2.10.1/charts/csi-isilon/values.yaml
+ wget -O my-isilon-settings.yaml https://raw.githubusercontent.com/dell/helm-charts/csi-isilon-2.11.0/charts/csi-isilon/values.yaml
```
Edit the _my-isilon-settings.yaml_ as per the requirements.
4. Upgrade the CSI Driver for Dell PowerScale using following command:
```bash
- ./csi-install.sh --namespace isilon --values ./my-isilon-settings.yaml --upgrade
+ ./csi-install.sh --namespace isilon --values ./my-isilon-settings.yaml --helm-charts-version --upgrade
```
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerscale/blob/main/dell-csi-helm-installer/csi-install.sh#L16) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerscale` directory if it was cloned before.
+
## Upgrade using Dell CSM Operator
**Note:** Upgrading the Operator does not upgrade the CSI Driver.
diff --git a/content/docs/deployment/helm/drivers/upgrade/powerflex.md b/content/docs/deployment/helm/drivers/upgrade/powerflex.md
index d85cb7618f..dcb1447430 100644
--- a/content/docs/deployment/helm/drivers/upgrade/powerflex.md
+++ b/content/docs/deployment/helm/drivers/upgrade/powerflex.md
@@ -10,24 +10,24 @@ Description: Upgrade PowerFlex CSI driver
You can upgrade the CSI Driver for Dell PowerFlex using Helm or Dell CSM Operator.
-## Update Driver from v2.9.2 to v2.10.1 using Helm
+## Update Driver from v2.10.1 to v2.11.0 using Helm
**Steps**
-1. Run `git clone -b v2.10.1 https://github.com/dell/csi-powerflex.git` to clone the git repository and get the v2.10.1 driver.
+1. Run `git clone -b v2.11.0 https://github.com/dell/csi-powerflex.git` to clone the git repository and get the v2.11.0 driver.
2. You need to create secret.yaml with the configuration of your system.
3. Update myvalues file as needed.
4. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
- cd ../dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --helm-charts-version csi-vxflexos-2.10.2 --upgrade
+ cd ../dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --helm-charts-version --upgrade
```
*NOTE:*
-- If you do not specify the `--helm-charts-version` flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerflex/blob/main/dell-csi-helm-installer/csi-install.sh#L24) file. If you wish to upgrade the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerflex` directory if it was cloned before.
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerflex/blob/main/dell-csi-helm-installer/csi-install.sh#L24) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerflex` directory if it was cloned before.
- If you are upgrading from a driver version that was installed using Helm v2, ensure that you install Helm3 before installing the driver.
- To update any installation parameter after the driver has been installed, change the `myvalues.yaml` file and run the install script with the option _\-\-upgrade_, for example:
```bash
- ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --helm-charts-version csi-vxflexos-2.10.2 --upgrade
+ ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --helm-charts-version --upgrade
```
- The logging configuration from v1.5 will not work in v2.1, since the log configuration parameters are now set in the myvalues.yaml file located at dell-csi-helm-installer/myvalues.yaml. Please set the logging configuration parameters in the myvalues.yaml file.
diff --git a/content/docs/deployment/helm/drivers/upgrade/powermax.md b/content/docs/deployment/helm/drivers/upgrade/powermax.md
index 131b9787b9..5a3578f540 100644
--- a/content/docs/deployment/helm/drivers/upgrade/powermax.md
+++ b/content/docs/deployment/helm/drivers/upgrade/powermax.md
@@ -16,18 +16,19 @@ You can upgrade CSI Driver for Dell PowerMax using Helm or Dell CSM Operator.
1. Upgrade the Unisphere to have 10.0 endpoint support.Please find the instructions [here.](https://dl.dell.com/content/manual34878027-dell-unisphere-for-powermax-10-0-0-installation-guide.pdf?language=en-us&ps=true)
2. Update the `my-powermax-settings.yaml` to have endpoint with 10.0 support.
-## Update Driver from v2.9 to v2.10.1 using Helm
+## Update Driver from v2.10.1 to v2.11.0 using Helm
**Steps**
-1. Run `git clone -b v2.10.1 https://github.com/dell/csi-powermax.git` to clone the git repository and get the driver.
+1. Run `git clone -b v2.11.0 https://github.com/dell/csi-powermax.git` to clone the git repository and get the driver.
2. Update the values file as needed.
3. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
- cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml --upgrade
+ cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml --upgrade --helm-charts-version
```
*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powermax/blob/main/dell-csi-helm-installer/csi-install.sh#L52) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powermax` directory if it was cloned before.
- If you are upgrading from a driver version that was installed using Helm v2, ensure that you install Helm3 before installing the driver.
- To update any installation parameter after the driver has been installed, change the `my-powermax-settings.yaml` file and run the install script with the option _\-\-upgrade_, for example:
```bash
diff --git a/content/docs/deployment/helm/drivers/upgrade/powerstore.md b/content/docs/deployment/helm/drivers/upgrade/powerstore.md
index 323cf98f70..831811b8dc 100644
--- a/content/docs/deployment/helm/drivers/upgrade/powerstore.md
+++ b/content/docs/deployment/helm/drivers/upgrade/powerstore.md
@@ -9,12 +9,12 @@ Description: Upgrade PowerStore CSI driver
You can upgrade the CSI Driver for Dell PowerStore using Helm.
-## Update Driver from v2.9.0 to v2.10.1 using Helm
+## Update Driver from v2.10.1 to v2.11.0 using Helm
Note: While upgrading the driver via helm, controllerCount variable in myvalues.yaml can be at most one less than the number of worker nodes.
**Steps**
-1. Run `git clone -b v2.10.1 https://github.com/dell/csi-powerstore.git` to clone the git repository and get the driver.
+1. Run `git clone -b v2.11.0 https://github.com/dell/csi-powerstore.git` to clone the git repository and get the driver.
2. Edit `samples/secret/secret.yaml` file and configure connection information for your PowerStore arrays changing the following parameters:
- *endpoint*: defines the full URL path to the PowerStore API.
- *globalID*: specifies what storage cluster the driver should use
@@ -38,13 +38,14 @@ Note: While upgrading the driver via helm, controllerCount variable in myvalues.
kubectl create secret generic powerstore-config -n csi-powerstore --from-file=config=secret.yaml
```
-5. Download the default values.yaml file `cd dell-csi-helm-installer && wget -O my-powerstore-settings.yaml https://github.com/dell/helm-charts/raw/csi-powerstore-2.10.1/charts/csi-powerstore/values.yaml` and update parameters as per the requirement.
+5. Download the default values.yaml file `cd dell-csi-helm-installer && wget -O my-powerstore-settings.yaml https://github.com/dell/helm-charts/raw/csi-powerstore-2.11.0/charts/csi-powerstore/values.yaml` and update parameters as per the requirement.
6. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
- ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml --upgrade
+ ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml --upgrade --helm-charts-version
```
-
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerstore/blob/main/dell-csi-helm-installer/csi-install.sh#L13) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerstore` directory if it was cloned before.
## Upgrade using Dell CSM Operator:
**Note:** Upgrading the Operator does not upgrade the CSI Driver.
diff --git a/content/docs/deployment/helm/drivers/upgrade/unity.md b/content/docs/deployment/helm/drivers/upgrade/unity.md
index 0e23dc090a..7d43489938 100644
--- a/content/docs/deployment/helm/drivers/upgrade/unity.md
+++ b/content/docs/deployment/helm/drivers/upgrade/unity.md
@@ -20,16 +20,19 @@ You can upgrade the CSI Driver for Dell Unity XT using Helm or Dell CSM Operator
Preparing myvalues.yaml is the same as explained in the install section.
-To upgrade the driver from csi-unity v2.9.0 to csi-unity v2.10.1
+To upgrade the driver from csi-unity v2.10.1 to csi-unity v2.11.0
-1. Get the latest csi-unity v2.10.1 code from Github using `git clone -b v2.10.1 https://github.com/dell/csi-unity.git`.
+1. Get the latest csi-unity v2.11.0 code from Github using `git clone -b v2.11.0 https://github.com/dell/csi-unity.git`.
2. Copy the helm/csi-unity/values.yaml to the new location csi-unity/dell-csi-helm-installer and rename it to myvalues.yaml. Customize settings for installation by editing myvalues.yaml as needed.
3. Navigate to csi-unity/dell-csi-hem-installer folder and execute this command:
```bash
- ./csi-install.sh --namespace unity --values ./myvalues.yaml --upgrade
+ ./csi-install.sh --namespace unity --values ./myvalues.yaml --helm-charts-version --upgrade
```
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-unity/blob/main/dell-csi-helm-installer/csi-install.sh#L22) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-unity` directory if it was cloned before.
+
### Upgrade using Dell CSM Operator:
**Note:**
Upgrading the Operator does not upgrade the CSI Driver.
diff --git a/content/docs/deployment/helm/modules/installation/authorization/_index.md b/content/docs/deployment/helm/modules/installation/authorization/_index.md
index 3a2231ab19..c6015fb6cb 100644
--- a/content/docs/deployment/helm/modules/installation/authorization/_index.md
+++ b/content/docs/deployment/helm/modules/installation/authorization/_index.md
@@ -9,6 +9,8 @@ description: >
The CSM Authorization karavictl CLI is no longer actively maintained or supported. It will be deprecated in a future release.
{{% /pageinfo %}}
+>> NOTE: Authorization v2.0 Tech Preview is not supported through Helm.
+
CSM Authorization can be installed by using the provided Helm v3 charts on Kubernetes platforms.
The following CSM Authorization components are installed in the specified namespace:
@@ -142,7 +144,7 @@ mv ./karavictl ~/.local/bin/karavictl
# and then append (or prepend) ~/.local/bin to $PATH
```
-Karavictl commands and intended use can be found [here](../../../../../authorization/cli/).
+Karavictl commands and intended use can be found [here](../../../../../authorization/v1.x-ga/cli/).
## Configuring the CSM Authorization Proxy Server
@@ -160,7 +162,7 @@ NAME CLASS HOSTS ADDRESS PORTS AG
proxy-server nginx csm-authorization.com 00, 000 86s
```
```bash
-kubectl -n auth get service
+kubectl -n authorization get service
```
```
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
@@ -182,13 +184,13 @@ On the machine running `karavictl`, the `/etc/hosts` file needs to be updated wi
csm-authorization.com
```
-Please continue following the steps outlined in the [proxy server](../../../../../authorization/configuration/proxy-server) configuration.
+Please continue following the steps outlined in the [proxy server](../../../../../authorization/v1.x-ga/configuration/proxy-server) configuration.
## Configuring a Dell CSI Driver with CSM for Authorization
The second part of CSM for Authorization deployment is to configure one or more of the [supported](../../../../../authorization#supported-csi-drivers) CSI drivers. This is controlled by the Kubernetes tenant admin.
-Please continue following the configuration steps for a specific CSI Driver [here](../../../../../authorization/configuration/).
+Please continue following the configuration steps for a specific CSI Driver [here](../../../../../authorization/v1.x-ga/configuration/).
## Updating CSM for Authorization Proxy Server Configuration
diff --git a/content/docs/deployment/helm/modules/installation/encryption/vault.md b/content/docs/deployment/helm/modules/installation/encryption/vault.md
index 086960a6cc..06992d454e 100644
--- a/content/docs/deployment/helm/modules/installation/encryption/vault.md
+++ b/content/docs/deployment/helm/modules/installation/encryption/vault.md
@@ -239,6 +239,6 @@ With the default server settings, role level values control TTL in this way:
`token_ttl=30m` - sets the default client token TTL to 30 minutes. 30 minutes are counted from the login time and from any following token renewal.
The client token will only be able to renew 3 times before reaching it total allowed TTL of 2 hours.
-Existing role values can be changed using `vault write auth/approle/role/dea-role token_ttl=30m token_explicit_max_ttl=2h`.
+Existing role values can be changed using `vault write auth/kubernetes/role/csm-authorization token_ttl=30m token_explicit_max_ttl=2h`.
> Selecting too short TTL values will result in excessive overhead in Encryption to remain authenticated to the Vault server.
diff --git a/content/docs/deployment/helm/modules/installation/replication/install-repctl.md b/content/docs/deployment/helm/modules/installation/replication/install-repctl.md
index 963785930b..7910f93334 100644
--- a/content/docs/deployment/helm/modules/installation/replication/install-repctl.md
+++ b/content/docs/deployment/helm/modules/installation/replication/install-repctl.md
@@ -13,14 +13,14 @@ Before you begin, make sure you have the repctl tool available.
You can download a pre-built repctl binary from our [Releases](https://github.com/dell/csm-replication/releases) page.
```shell
-wget https://github.com/dell/csm-replication/releases/download/v1.8.0/repctl-linux-amd64
+wget https://github.com/dell/csm-replication/releases/download/v1.9.0/repctl-linux-amd64
mv repctl-linux-amd64 repctl
chmod +x repctl
```
Alternately, if you want to build the binary yourself, you can follow these steps:
```shell
-git clone -b v1.8.0 https://github.com/dell/csm-replication.git
+git clone -b v1.9.0 https://github.com/dell/csm-replication.git
cd csm-replication/repctl
make build
```
diff --git a/content/docs/deployment/helm/modules/installation/replication/install-script.md b/content/docs/deployment/helm/modules/installation/replication/install-script.md
index 52506ba306..4a2429a101 100644
--- a/content/docs/deployment/helm/modules/installation/replication/install-script.md
+++ b/content/docs/deployment/helm/modules/installation/replication/install-script.md
@@ -9,11 +9,11 @@ description: Installation of CSM for Replication using script (Helm chart)
> **_NOTE:_** These steps should be repeated on all Kubernetes clusters where you want to configure replication.
```shell
-git clone -b v1.8.0 https://github.com/dell/csm-replication.git
+git clone -b v1.9.0 https://github.com/dell/csm-replication.git
cd csm-replication
kubectl create ns dell-replication-controller
# Download and modify the default values.yaml file if you wish to customize your deployment in any way
-wget -O myvalues.yaml https://raw.githubusercontent.com/dell/helm-charts/csm-replication-1.8.0/charts/csm-replication/values.yaml
+wget -O myvalues.yaml https://raw.githubusercontent.com/dell/helm-charts/csm-replication-1.9.0/charts/csm-replication/values.yaml
bash scripts/install.sh --values ./myvalues.yaml
```
>Note: Current installation method allows you to specify custom `:` entries to be appended to controller's `/etc/hosts` file. It can be useful if controller is being deployed in private environment where DNS is not set up properly, but kubernetes clusters use FQDN as API server's address.
diff --git a/content/docs/deployment/helm/modules/installation/resiliency/_index.md b/content/docs/deployment/helm/modules/installation/resiliency/_index.md
index 005c23c7b8..8d8f926ce8 100644
--- a/content/docs/deployment/helm/modules/installation/resiliency/_index.md
+++ b/content/docs/deployment/helm/modules/installation/resiliency/_index.md
@@ -16,6 +16,8 @@ For information on the PowerScale CSI driver, see [PowerScale CSI Driver](https:
For information on the PowerStore CSI driver, see [PowerStore CSI Driver](https://github.com/dell/csi-powerstore).
+For information on the PowerStore CSI driver, see [PowerMax CSI Driver](https://github.com/dell/csi-powermax).
+
Configure all the helm chart parameters described below before installing the drivers.
## Helm Chart Installation
@@ -194,6 +196,38 @@ podmon:
- "--ignoreVolumelessPods=false"
```
+## PowerMax Specific Recommendations
+
+Here is a typical installation used for testing:
+
+```yaml
+podmon:
+ enabled: false
+ controller:
+ args:
+ - "--csisock=unix:/var/run/csi/csi.sock"
+ - "--labelvalue=csi-powermax"
+ - "--arrayConnectivityPollRate=60"
+ - "--driverPath=csi-powermax.dellemc.com"
+ - "--mode=controller"
+ - "--skipArrayConnectionValidation=false"
+ - "--driver-config-params=/powermax-config-params/driver-config-params.yaml"
+ - "--driverPodLabelValue=dell-storage"
+ - "--ignoreVolumelessPods=false"
+
+ node:
+ args:
+ - "--csisock=unix:/var/lib/kubelet/plugins/powermax.emc.dell.com/csi_sock"
+ - "--labelvalue=csi-powermax"
+ - "--arrayConnectivityPollRate=60"
+ - "--driverPath=csi-powermax.dellemc.com"
+ - "--mode=node"
+ - "--leaderelection=false"
+ - "--driver-config-params=/powermax-config-params/driver-config-params.yaml"
+ - "--driverPodLabelValue=dell-storage"
+ - "--ignoreVolumelessPods=false"
+```
+
## Dynamic parameters
CSM for Resiliency has configuration parameters that can be updated dynamically, such as the logging level and format. This can be
diff --git a/content/docs/deployment/helm/modules/upgrade/observability.md b/content/docs/deployment/helm/modules/upgrade/observability.md
index 5189a21520..6a8b960e1a 100644
--- a/content/docs/deployment/helm/modules/upgrade/observability.md
+++ b/content/docs/deployment/helm/modules/upgrade/observability.md
@@ -28,7 +28,7 @@ helm search repo dell
```
```
NAME CHART VERSION APP VERSION DESCRIPTION
-dell/karavi-observability 1.8.0 1.8.0 CSM for Observability is part of the [Container...
+dell/karavi-observability 1.9.0 1.9.0 CSM for Observability is part of the [Container...
```
>Note: If using cert-manager CustomResourceDefinitions older than v1.5.3, delete the old CRDs and install v1.5.3 of the CRDs prior to upgrade. See [Prerequisites](../../installation/observability/deployment#prerequisites) for location of CRDs.
diff --git a/content/docs/deployment/helm/modules/upgrade/replication.md b/content/docs/deployment/helm/modules/upgrade/replication.md
index 75c7a8f365..38f78188b5 100644
--- a/content/docs/deployment/helm/modules/upgrade/replication.md
+++ b/content/docs/deployment/helm/modules/upgrade/replication.md
@@ -45,7 +45,7 @@ On PowerScale systems, an additional step is needed when upgrading to CSM Replic
Make sure the appropriate release branch is available on the machine performing the upgrade by running:
```bash
-git clone -b v1.8.0 https://github.com/dell/csm-replication.git
+git clone -b v1.9.0 https://github.com/dell/csm-replication.git
```
### Upgrading with Helm
diff --git a/content/docs/deployment/offline/drivers/_index.md b/content/docs/deployment/offline/drivers/_index.md
index 0c262d3e4b..bbfa792d3c 100644
--- a/content/docs/deployment/offline/drivers/_index.md
+++ b/content/docs/deployment/offline/drivers/_index.md
@@ -65,7 +65,7 @@ The resulting offline bundle file can be copied to another machine, if necessary
For example, here is the output of a request to build an offline bundle for the Dell CSM Operator:
```bash
-git clone -b v1.5.1 https://github.com/dell/csm-operator.git
+git clone -b v1.6.0 https://github.com/dell/csm-operator.git
```
```bash
cd csm-operator
@@ -83,30 +83,30 @@ bash scripts/csm-offline-bundle.sh -c
*
* Pulling and saving container images
- dellemc/csi-isilon:v2.10.1
+ dellemc/csi-isilon:v2.11.0
dellemc/csi-metadata-retriever:v1.6.0
dellemc/csipowermax-reverseproxy:v2.6.0
- dellemc/csi-powermax:v2.10.1
- dellemc/csi-powerstore:v2.10.1
- dellemc/csi-unity:v2.10.1
- dellemc/csi-vxflexos:v2.10.1
- dellemc/csm-authorization-sidecar:v1.10.0
+ dellemc/csi-powermax:v2.10.0
+ dellemc/csi-powerstore:v2.10.0
+ dellemc/csi-unity:v2.10.0
+ dellemc/csi-vxflexos:v2.10.0
+ dellemc/csm-authorization-sidecar:v1.11.0
dellemc/csm-metrics-powerflex:v1.5.0
dellemc/csm-metrics-powerscale:v1.2.0
dellemc/csm-topology:v1.5.0
- dellemc/dell-csi-replicator:v1.8.0
- dellemc/dell-replication-controller:v1.8.0
+ dellemc/dell-csi-replicator:v1.9.0
+ dellemc/dell-replication-controller:v1.9.0
dellemc/sdc:4.5
- docker.io/dellemc/dell-csm-operator:v1.5.1
+ docker.io/dellemc/dell-csm-operator:v1.6.0
gcr.io/kubebuilder/kube-rbac-proxy:v0.8.0
nginxinc/nginx-unprivileged:1.20
otel/opentelemetry-collector:0.42.0
- registry.k8s.io/sig-storage/csi-attacher:v4.3.0
- registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.9.0
- registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0
- registry.k8s.io/sig-storage/csi-provisioner:v3.5.0
- registry.k8s.io/sig-storage/csi-resizer:v1.8.0
- registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2
+ registry.k8s.io/sig-storage/csi-attacher:v4.6.1
+ registry.k8s.io/sig-storage/csi-external-health-monitor-controller:v0.11.0
+ registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1
+ registry.k8s.io/sig-storage/csi-provisioner:v5.0.1
+ registry.k8s.io/sig-storage/csi-resizer:v1.11.1
+ registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1
*
* Copying necessary files
@@ -186,12 +186,12 @@ Preparing a offline bundle for installation
*
* Loading docker images
-Loaded image: docker.io/dellemc/csi-powerstore:v2.10.1
-Loaded image: docker.io/dellemc/csi-isilon:v2.10.1
+Loaded image: docker.io/dellemc/csi-powerstore:v2.11.0
+Loaded image: docker.io/dellemc/csi-isilon:v2.11.0
...
...
-Loaded image: registry.k8s.io/sig-storage/csi-resizer:v1.8.0
-Loaded image: registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2
+Loaded image: registry.k8s.io/sig-storage/csi-resizer:v1.11.1
+Loaded image: registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1
*
* Tagging and pushing images
@@ -200,8 +200,8 @@ Loaded image: registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2
dellemc/csi-metadata-retriever:v1.5.0 -> localregistry:5000/dell-csm-operator/csi-metadata-retriever:v1.5.0
...
...
- registry.k8s.io/sig-storage/csi-resizer:v1.8.0 -> localregistry:5000/dell-csm-operator/csi-resizer:v1.8.0
- registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2 -> localregistry:5000/dell-csm-operator/csi-snapshotter:v6.2.2
+ registry.k8s.io/sig-storage/csi-resizer:v1.11.1 -> localregistry:5000/dell-csm-operator/csi-resizer:v1.8.0
+ registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1 -> localregistry:5000/dell-csm-operator/csi-snapshotter:v6.2.2
*
* Preparing files within /root/dell-csm-operator-bundle
@@ -210,8 +210,8 @@ Loaded image: registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2
changing: dellemc/csi-metadata-retriever:v1.5.0 -> localregistry:5000/dell-csm-operator/csi-metadata-retriever:v1.5.0
...
...
- changing: registry.k8s.io/sig-storage/csi-resizer:v1.8.0 -> localregistry:5000/dell-csm-operator/csi-resizer:v1.8.0
- changing: registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2 -> localregistry:5000/dell-csm-operator/csi-snapshotter:v6.2.2
+ changing: registry.k8s.io/sig-storage/csi-resizer:v1.11.1 -> localregistry:5000/dell-csm-operator/csi-resizer:v1.8.0
+ changing: registry.k8s.io/sig-storage/csi-snapshotter:v8.0.1 -> localregistry:5000/dell-csm-operator/csi-snapshotter:v6.2.2
*
* Complete
diff --git a/content/docs/deployment/rpm/modules/installation/authorization/authorization.md b/content/docs/deployment/rpm/modules/installation/authorization/authorization.md
index 3110692a0b..69d03ef543 100644
--- a/content/docs/deployment/rpm/modules/installation/authorization/authorization.md
+++ b/content/docs/deployment/rpm/modules/installation/authorization/authorization.md
@@ -6,7 +6,7 @@ description: >
---
{{% pageinfo color="primary" %}}
-The CSM Authorization RPM is no longer actively maintained or supported. It will be deprecated in a future release. It is highly recommended that you use CSM Authorization Helm deployment or CSM Operator going forward.
+The CSM Authorization RPM will be deprecated in a future release. It is highly recommended that you use CSM Authorization Helm deployment or CSM Operator going forward.
{{% /pageinfo %}}
This section outlines the deployment steps for Container Storage Modules (CSM) for Authorization. The deployment of CSM for Authorization is handled in 2 parts:
@@ -123,19 +123,19 @@ A Storage Administrator can execute the shell script, install_karavi_auth.sh as
5. After installation, application data will be stored on the system under `/var/lib/rancher/k3s/storage/`.
-If errors occur during installation, review the [Troubleshooting](../../../../../../authorization/troubleshooting) section.
+If errors occur during installation, review the [Troubleshooting](../../../../../../authorization/v1.x-ga/troubleshooting) section.
## Configuring the CSM for Authorization Proxy Server
The first part of CSM for Authorization deployment is to configure the proxy server. This is controlled by the Storage Administrator.
-Please follow the steps outlined in the [proxy server](../../../../../../authorization/configuration/proxy-server) configuration.
+Please follow the steps outlined in the [proxy server](../../../../../../authorization/v1.x-ga/configuration/proxy-server) configuration.
## Configuring a Dell CSI Driver with CSM for Authorization
The second part of CSM for Authorization deployment is to configure one or more of the [supported](../../../../../../prerequisites/#supported-csm-modules) CSI drivers. This is controlled by the Kubernetes tenant administrator.
-Please follow the steps outlined in [PowerFlex](../../../../../../authorization/configuration/powerflex), [PowerMax](../../../../../../authorization/configuration/powermax), or [PowerScale](../../../../../../authorization/configuration/powerscale) to configure the CSI Driver to work with the Authorization sidecar.
+Please follow the steps outlined in [PowerFlex](../../../../../../authorization/v1.x-ga/configuration/powerflex), [PowerMax](../../../../../../authorization/v1.x-ga/configuration/powermax), or [PowerScale](../../../../../../authorization/v1.x-ga/configuration/powerscale) to configure the CSI Driver to work with the Authorization sidecar.
## Updating CSM for Authorization Proxy Server Configuration
diff --git a/content/docs/observability/release/_index.md b/content/docs/observability/release/_index.md
index b214e23918..a1227de7ce 100644
--- a/content/docs/observability/release/_index.md
+++ b/content/docs/observability/release/_index.md
@@ -6,7 +6,7 @@ Description: >
Dell Container Storage Modules (CSM) release notes for observability
---
-## Release Notes - CSM Observability 1.8.1
+## Release Notes - CSM Observability 1.9.0
diff --git a/content/docs/prerequisites/_index.md b/content/docs/prerequisites/_index.md
index 5804616dd4..2f3f0c8524 100644
--- a/content/docs/prerequisites/_index.md
+++ b/content/docs/prerequisites/_index.md
@@ -1,34 +1,33 @@
---
-title: "Prerequisites"
-linkTitle: "Prerequisites"
-description: Prerequisites for CSM
+title: "Prerequisites and Support Matrix"
+linkTitle: "Prerequisites and Support Matrix"
+description: Prerequisites and Support Matrix for CSM
weight: 1
---
## Supported Storage Platforms
{{}}
-| Platform | Version | OS Dependencies |
-|---------------|:-------------------:|:------------------------:|
+| Platform | Version | OS Dependencies |
+|---------------|:----------------:|:------------------------:|
| PowerMax | PowerMax 2500/8500 PowerMaxOS 10 (6079)
PowerMaxOS 10.0.1 (6079)
PowerMaxOS 10.1 (6079)
PowerMax 2000/8000 - 5978.711.711, 5978.714.714
5978.479.479
Unisphere 10.0,10.0.1,10.1 | iscsi-initiator-utils
multipathd or powerpath
nvme-cli
nfs-utils |
-| PowerFlex | 3.6.x, 4.0.x, 4.5.x | [SDC](https://www.dell.com/support/home/en-us/product-support/product/scaleio/drivers)|
-| Unity XT | 5.1.x, 5.2.x, 5.3.0 | iscsi-initiator-utils
multipathd
nfs-utils |
-| PowerScale | OneFS 9.3, 9.4, 9.5.0.x (x >= 5) | nfs-utils |
-| PowerStore | 3.0, 3.2, 3.5, 3.6 | iscsi-initiator-utils
multipathd
nvme-cli
nfs-utils |
-| ObjectScale | 1.2.x | - |
+| PowerFlex | 4.0.x, 4.5.x, 4.6.x | [SDC](https://www.dell.com/support/home/en-us/product-support/product/scaleio/drivers)|
+| Unity XT | 5.1.x, 5.2.x, 5.3.0 | iscsi-initiator-utils
multipathd
nfs-utils |
+| PowerScale | OneFS 9.3, 9.4, 9.5.0.x (x >= 5) | nfs-utils |
+| PowerStore | 3.0, 3.2, 3.5 | iscsi-initiator-utils
multipathd
nvme-cli
nfs-utils |
+| ObjectScale | 1.2.x | - |
{{
}}
> Notes:
> * The required OS dependencies are only for the protocol needed (e.g. if NVMe isn't the storage access protocol then nvme-cli is not required)..
> * It is important to note that any operations performed outside of the CSM and Kubernetes ecosystem, such as modifying storage configurations directly using GUI or CLI tools provided by the storage array, may not be supported or automatically picked up by the CSM. As a result, metadata and state information within Kubernetes, including Persistent Volume (PV) metadata, may not reflect changes made outside of the driver. For consistent and accurate management of storage resources, it is recommended to perform all operations through the CSM and Kubernetes API. If external modifications are necessary, corresponding updates should be manually synchronized with the Kubernetes cluster to ensure accurate metadata and functionality.
-
## Supported Container Orchestrator Platforms
{{}}
| Platform | Version |
|----------------------------|:----------------:|
-| Kubernetes | 1.27, 1.28, 1.29 |
-| Red Hat OpenShift | 4.14, 4.15 |
+| Kubernetes | 1.28, 1.29, 1.30 |
+| Red Hat OpenShift | 4.15, 4.16 |
| Mirantis Kubernetes Engine | 3.7.x |
| Google Anthos | 1.15 |
| Rancher Kubernetes Engine | 1.4.x |
@@ -37,7 +36,7 @@ weight: 1
> Notes:
> * Any orchestrator platform or version that's not mentioned here must be self-certified using [Cert-CSI](../support/cert-csi/) in order to be supported. Although not mandatory, we recommend users to use orchestrator platforms and versions that have not met their end of life.
-> * CSM Authorization is not supported on Red Hat OpenShift.
+> * CSM Authorization Server v1 is not supported on Red Hat OpenShift. However, it is supported to install CSM Authorization Server v1 on standard Kubernetes and a Dell CSI Drvier enabled with CSM Authorization on Red Hat OpenShift. CSM Authorization Server v2 is supported on Red Hat OpenShift.
## Tested Host Operating Systems
@@ -50,24 +49,25 @@ Container Storage Modules (CSM) does not officially support specific operating s
> Notes:
> * The host operating system/version being used must align with what each Dell Storage platform supports. Please visit [E-Lab Navigator](https://elabnavigator.dell.com/eln/modernHomeSSM) for specific Dell Storage platform host operating system level support matrices.
> * Any operating system or version that's not mentioned here must be self-certified using [Cert-CSI](../support/cert-csi/) in order to be supported. Although not mandatory, we recommend users to use operating systems and versions that have not met their end of life.
-
## Supported CSM Modules
{{}}
-| CSM Module | PowerMax | PowerFlex | Unity XT | PowerScale | PowerStore |
-|----------------------------------------|:--------:|:---------:|:--------:|:----------:|:----------:|
-| [CSM Authorization](../authorization/) | Yes | Yes | No | Yes | No |
-| [CSM Observability](../observability/) | Yes | Yes | No | Yes | Yes |
-| [CSM Replication](../replication/) | Yes | Yes | No | Yes | Yes |
-| [CSM Resiliency](../resiliency/) | No | Yes | Yes | Yes | Yes |
-| [CSM Encryption](../secure/encryption/)| No | No | No | Yes | No |
-| [CSM Application Mobility](../applicationmobility/) | Yes | Yes | Yes | Yes | Yes |
-| [Volume Group Snapshot](../snapshots/volume-group-snapshots/) | No | Yes | No | No | Yes |
+| CSM Module | PowerMax | PowerFlex | Unity XT | PowerScale | PowerStore |
+|---------------------------------------------------------------|:--------:|:---------:|:--------:|:----------:|:----------:|
+| [CSM Authorization - v1.x GA](../authorization/) | Yes | Yes | Yes | Yes | No |
+| [CSM Authorization - v2.0 Tech Preview](../authorization/) | No | Yes | No | No | No |
+| [CSM Observability](../observability/) | Yes | Yes | No | Yes | Yes |
+| [CSM Replication](../replication/) | Yes | Yes | No | Yes | Yes |
+| [CSM Resiliency](../resiliency/) | No | Yes | Yes | Yes | Yes |
+| [CSM Encryption](../secure/encryption/) | No | No | No | Yes | No |
+| [CSM Application Mobility](../applicationmobility/) | Yes | Yes | Yes | Yes | Yes |
+| [Volume Group Snapshot](../snapshots/volume-group-snapshots/) | No | Yes | No | No | Yes |
{{
}}
> Notes:
> * Encryption and Application Mobility are available as a Technical Preview only and are not officially supported.
+> * Authorization v2.0 is available as a Technical Preview only on PowerFlex.
## CSM Operator compatibility matrix
@@ -75,19 +75,19 @@ The table below lists the driver and modules versions installable with the CSM O
{{}}
| CSI Driver | Version | CSM Authorization | CSM Replication | CSM Observability | CSM Resiliency |
| ------------------ |---------|-------------------|-----------------|-------------------|----------------|
-| CSI PowerScale | 2.10.1 | â 1.10.1 | â 1.8.1 | â 1.8.1 | â 1.9.1 |
-| CSI PowerScale | 2.9.0 | â 1.9.0 | â 1.7.0 | â 1.7.0 | â 1.8.0 |
-| CSI PowerScale | 2.8.0 | â 1.8.0 | â 1.6.0 | â 1.6.0 | â 1.7.0 |
-| CSI PowerFlex | 2.10.1 | â 1.10.1 | â 1.8.1 | â 1.8.1 | â 1.9.1 |
-| CSI PowerFlex | 2.9.0 | â 1.9.0 | â 1.7.0 | â 1.7.0 | â 1.8.0 |
-| CSI PowerFlex | 2.8.0 | â 1.8.0 | â 1.6.0 | â 1.6.0 | â 1.7.0 |
-| CSI PowerStore | 2.10.1 | â | â | â | â 1.9.1 |
-| CSI PowerStore | 2.9.0 | â | â | â | â 1.8.0 |
-| CSI PowerStore | 2.8.0 | â | â | â | â 1.7.0 |
-| CSI PowerMax | 2.10.1 | â 1.10.1 | â 1.8.1 | â 1.8.1 | â |
-| CSI PowerMax | 2.9.0 | â 1.9.0 | â 1.7.0 | â 1.7.0 | â |
-| CSI PowerMax | 2.8.0 | â 1.8.0 | â 1.6.0 | â 1.6.0 | â |
-| CSI Unity XT | 2.10.1 | â | â | â | â |
-| CSI Unity XT | 2.9.0 | â | â | â | â |
-| CSI Unity XT | 2.8.0 | â | â | â | â |
+| CSI PowerScale | 2.11.0 | â 1.11.0 | â 1.9.0 | â 1.9.0 | â 1.10.0 |
+| CSI PowerScale | 2.10.0 | â 1.10.0 | â 1.8.0 | â 1.8.0 | â 1.9.0 |
+| CSI PowerScale | 2.9.0 | â 1.9.0 | â 1.7.0 | â 1.7.0 | â 1.8.0 |
+| CSI PowerFlex | 2.11.0 | â 1.11.0 | â 1.9.0 | â 1.9.0 | â 1.10.0 |
+| CSI PowerFlex | 2.10.0 | â 1.10.0 | â 1.8.0 | â 1.8.0 | â 1.9.0 |
+| CSI PowerFlex | 2.9.0 | â 1.9.0 | â 1.7.0 | â 1.7.0 | â 1.8.0 |
+| CSI PowerStore | 2.11.0 | â | â | â | â 1.10.0 |
+| CSI PowerStore | 2.10.0 | â | â | â | â 1.9.0 |
+| CSI PowerStore | 2.9.0 | â | â | â | â 1.8.0 |
+| CSI PowerMax | 2.11.0 | â 1.11.0 | â 1.9.0 | â 1.9.0 | â 1.10.0 |
+| CSI PowerMax | 2.10.1 | â 1.10.1 | â 1.8.1 | â 1.8.1 | â |
+| CSI PowerMax | 2.9.0 | â 1.9.0 | â 1.7.0 | â 1.7.0 | â |
+| CSI Unity XT | 2.11.0 | â | â | â | â |
+| CSI Unity XT | 2.10.0 | â | â | â | â |
+| CSI Unity XT | 2.9.0 | â | â | â | â |
{{
}}
diff --git a/content/docs/replication/release/_index.md b/content/docs/replication/release/_index.md
index 6049d69e24..ac3d7bf716 100644
--- a/content/docs/replication/release/_index.md
+++ b/content/docs/replication/release/_index.md
@@ -6,7 +6,7 @@ Description: >
Dell Container Storage Modules (CSM) release notes for replication
---
-## Release Notes - CSM Replication 1.8.1
+## Release Notes - CSM Replication 1.9.0
diff --git a/content/docs/resiliency/_index.md b/content/docs/resiliency/_index.md
index 78fa586121..f9d86c95ab 100644
--- a/content/docs/resiliency/_index.md
+++ b/content/docs/resiliency/_index.md
@@ -31,9 +31,9 @@ CSM for Resiliency provides the following capabilities:
{{}}
| Capability | PowerScale | Unity XT | PowerStore | PowerFlex | PowerMax |
| --------------------------------------- | :--------: | :------: | :--------: | :-------: | :------: |
-| Detect pod failures when: Node failure, K8S Control Plane Network failure, K8S Control Plane failure, Array I/O Network failure | yes | yes | yes | yes | no |
-| Cleanup pod artifacts from failed nodes | yes | yes | yes | yes | no |
-| Revoke PV access from failed nodes | yes | yes | yes | yes | no |
+| Detect pod failures when: Node failure, K8S Control Plane Network failure, K8S Control Plane failure, Array I/O Network failure | yes | yes | yes | yes | yes |
+| Cleanup pod artifacts from failed nodes | yes | yes | yes | yes | yes |
+| Revoke PV access from failed nodes | yes | yes | yes | yes | yes |
{{
}}
## Supported Operating Systems/Container Orchestrator Platforms
@@ -48,9 +48,9 @@ CSM for Resiliency provides the following capabilities:
## Supported Storage Platforms
{{}}
-| | PowerFlex | Unity XT | PowerScale | PowerStore |
-| ------------- | :----------: | :-------------------------------: | :-------------------------------------: | :---------------------------: |
-| Storage Array | 3.6.x, 4.0.x, 4.5 | 5.1.x, 5.2.x, 5.3.0 | OneFS 9.3, 9.4, 9.5.0.x (x >= 5) | 3.0, 3.2, 3.5, 3.6 |
+| | PowerFlex | Unity XT | PowerScale | PowerStore | PowerMax |
+| ------------- | :----------: | :-------------------------------: | :-------------------------------------: | :---------------------------: | :---------------------------: |
+| Storage Array | 3.6.x, 4.0.x, 4.5 | 5.1.x, 5.2.x, 5.3.0 | OneFS 9.3, 9.4, 9.5.0.x (x >= 5) | 3.0, 3.2, 3.5, 3.6 | 2500/8500 PowerMax OS 10 (6079), Unisphere 10.x |
{{
}}
## Supported CSI Drivers
@@ -63,6 +63,7 @@ CSM for Resiliency supports the following CSI drivers and versions.
| CSI Driver for Dell Unity XT | [csi-unity](https://github.com/dell/csi-unity) | v2.0.0 + |
| CSI Driver for Dell PowerScale | [csi-powerscale](https://github.com/dell/csi-powerscale) | v2.3.0 + |
| CSI Driver for Dell PowerStore | [csi-powerstore](https://github.com/dell/csi-powerstore) | v2.6.0 + |
+| CSI Driver for Dell PowerMax | [csi-powermax](https://github.com/dell/csi-powermax) | v2.11.0 + |
{{
}}
### PowerFlex Support
@@ -102,6 +103,14 @@ PowerStore is a highly scalable array that is very well suited to Kubernetes dep
* A robust mechanism to detect if Nodes are actively doing I/O to volumes.
* Low latency REST API supports fast CSI provisioning and de-provisioning operations.
+### PowerMax Support
+
+PowerMax is the highest performing block storage array that is very well suited to Kubernetes deployments. The CSM for Resiliency support for PowerMax leverages the following PowerMax features:
+
+* Detection of Array I/O Network Connectivity status changes.
+* A robust mechanism to detect if Nodes are actively doing I/O to volumes.
+* Low latency REST API supports fast CSI provisioning and de-provisioning operations.
+
## Limitations and Exclusions
This file contains information on Limitations and Exclusions that users should be aware of. Additionally, there are driver specific limitations and exclusions that may be called out in the [Deploying CSM for Resiliency](../deployment/helm/modules/installation/resiliency/) page.
@@ -161,10 +170,12 @@ pmtu3 podmontest-0 1/1 Running 0 3m6s
CSM for Resiliency may also generate events if it is unable to clean up a pod for some reason. For example, it may not clean up a pod because the pod is still doing I/O to the array.
- Similarly, the label selector for csi-powerscale and csi-unity would be as shown respectively.
+Similarly, the label selector for csi-powerscale, csi-unity, csi-powerstore and csi-powermax would be as shown respectively.
```yaml
labelSelector: {map[podmon.dellemc.com/driver:csi-isilon]
labelSelector: {map[podmon.dellemc.com/driver:csi-unity]
+ labelSelector: {map[podmon.dellemc.com/driver:csi-powerstore]
+ labelSelector: {map[podmon.dellemc.com/driver:csi-powermax]
```
#### Important
diff --git a/content/docs/resiliency/release/_index.md b/content/docs/resiliency/release/_index.md
index bf3b626812..a2e6ca1d44 100644
--- a/content/docs/resiliency/release/_index.md
+++ b/content/docs/resiliency/release/_index.md
@@ -6,7 +6,7 @@ Description: >
Dell Container Storage Modules (CSM) release notes for resiliency
---
-## Release Notes - CSM Resiliency 1.9.1
+## Release Notes - CSM Resiliency 1.10.0
diff --git a/content/docs/snapshots/_index.md b/content/docs/snapshots/_index.md
index 746b845382..bfc84c121a 100644
--- a/content/docs/snapshots/_index.md
+++ b/content/docs/snapshots/_index.md
@@ -44,7 +44,7 @@ snapshot:
```
#### Volume Snapshot CRD's
-The Kubernetes Volume Snapshot CRDs can be obtained and installed from the external-snapshotter project on Github. For installation, use [v7.0.x](https://github.com/kubernetes-csi/external-snapshotter/tree/v7.0.1/client/config/crd)
+The Kubernetes Volume Snapshot CRDs can be obtained and installed from the external-snapshotter project on Github. For installation, use [v8.0.x](https://github.com/kubernetes-csi/external-snapshotter/tree/v8.0.1/client/config/crd)
#### Volume Snapshot Controller
The CSI external-snapshotter sidecar is split into two controllers to support Volume snapshots.
@@ -52,7 +52,7 @@ The CSI external-snapshotter sidecar is split into two controllers to support Vo
- A common snapshot controller
- A CSI external-snapshotter sidecar
-The common snapshot controller must be installed only once in the cluster, irrespective of the number of CSI drivers installed in the cluster. On OpenShift clusters 4.4 and later, the common snapshot-controller is pre-installed. In the clusters where it is not present, it can be installed using `kubectl` and the manifests are available here: [v7.0.x](https://github.com/kubernetes-csi/external-snapshotter/tree/v7.0.1/deploy/kubernetes/snapshot-controller)
+The common snapshot controller must be installed only once in the cluster, irrespective of the number of CSI drivers installed in the cluster. On OpenShift clusters 4.4 and later, the common snapshot-controller is pre-installed. In the clusters where it is not present, it can be installed using `kubectl` and the manifests are available here: [v8.0.x](https://github.com/kubernetes-csi/external-snapshotter/tree/v8.0.1/deploy/kubernetes/snapshot-controller)
*NOTE:*
- The manifests available on GitHub install the snapshotter image:
@@ -65,12 +65,12 @@ You can install CRDs and the default snapshot controller by running the followin
```bash
git clone https://github.com/kubernetes-csi/external-snapshotter/
cd ./external-snapshotter
-git checkout release-6.2
+git checkout v8.0.1
kubectl kustomize client/config/crd | kubectl create -f -
kubectl -n kube-system kustomize deploy/kubernetes/snapshot-controller | kubectl create -f -
```
*NOTE:*
-- It is recommended to use the 6.2.x version of snapshotter/snapshot-controller.
+- It is recommended to use the 8.0.x version of snapshotter/snapshot-controller.
- The CSI external-snapshotter sidecar is still installed along with the driver and does not involve any extra configuration.
diff --git a/content/docs/support/cert-csi/_index.md b/content/docs/support/cert-csi/_index.md
index 73940c8791..b396055512 100644
--- a/content/docs/support/cert-csi/_index.md
+++ b/content/docs/support/cert-csi/_index.md
@@ -30,28 +30,28 @@ There are three methods of installing `cert-csi`.
1. Download the latest release of the cert-csi zip file.
```bash
-curl -LO https://github.com/dell/cert-csi/releases/download/v1.4.1/cert-csi-v1.4.1.zip
+curl -LO https://github.com/dell/cert-csi/releases/download/v1.5.0/cert-csi-v1.5.0.zip
```
2. Unzip the file.
``` bash
-unzip cert-csi-v1.4.1.zip
-chmod +x ./cert-csi-v1.4.1
+unzip cert-csi-v1.5.0.zip
+chmod +x ./cert-csi-v1.5.0
```
-3. Install cert-csi-v1.4.1 as cert-csi.
+3. Install cert-csi-v1.5.0 as cert-csi.
```bash
-sudo install -o root -g root -m 0755 cert-csi-v1.4.1 /usr/local/bin/cert-csi
+sudo install -o root -g root -m 0755 cert-csi-v1.5.0 /usr/local/bin/cert-csi
```
If you do not have root access on the target system, you can still install cert-csi to the ~/.local/bin directory:
```bash
-chmod +x cert-csi-v1.4.1
+chmod +x cert-csi-v1.5.0
mkdir -p ~/.local/bin
-mv ./cert-csi-v1.4.1 ~/.local/bin/cert-csi
+mv ./cert-csi-v1.5.0 ~/.local/bin/cert-csi
# and then append (or prepend) ~/.local/bin to $PATH
```
@@ -61,14 +61,14 @@ mv ./cert-csi-v1.4.1 ~/.local/bin/cert-csi
{{% tab name="Docker" %}}
```bash
- docker pull dellemc/cert-csi:v1.4.1
+ docker pull dellemc/cert-csi:v1.5.0
```
{{% /tab %}}
{{% tab name="Podman" %}}
```bash
- podman pull dellemc/cert-csi:v1.4.1
+ podman pull dellemc/cert-csi:v1.5.0
```
{{% /tab %}}
@@ -83,7 +83,7 @@ mv ./cert-csi-v1.4.1 ~/.local/bin/cert-csi
1. Clone the repository
```bash
-git clone -b "v1.4.1" https://github.com/dell/cert-csi.git && cd cert-csi
+git clone -b "v1.5.0" https://github.com/dell/cert-csi.git && cd cert-csi
```
2. Build cert-csi
@@ -125,12 +125,12 @@ make install-ms
{{% /tab %}}
{{% tab name="Docker" %}}
```bash
- docker run --rm -it -v ~/.kube/config:/root/.kube/config dellemc/cert-csi:v1.4.1 --help
+ docker run --rm -it -v ~/.kube/config:/root/.kube/config dellemc/cert-csi:v1.5.0 --help
```
{{% /tab %}}
{{% tab name="Podman" %}}
```bash
- podman run --rm -it -v ~/.kube/config:/root/.kube/config dellemc/cert-csi:v1.4.1 --help
+ podman run --rm -it -v ~/.kube/config:/root/.kube/config dellemc/cert-csi:v1.5.0 --help
```
{{% /tab %}}
@@ -397,12 +397,12 @@ If you are using the container image, the `cert-config` file must be mounted int
{{< tabs name="running-container-certify" >}}
{{% tab name="Docker" %}}
```bash
- docker run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/example-certify-config.yaml:/example-certify-config.yaml dellemc/cert-csi:v1.4.1 certify --cert-config /example-certify-config.yaml --vsc
+ docker run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/example-certify-config.yaml:/example-certify-config.yaml dellemc/cert-csi:v1.5.0 certify --cert-config /example-certify-config.yaml --vsc
```
{{% /tab %}}
{{% tab name="Podman" %}}
```bash
- podman run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/example-certify-config.yaml:/example-certify-config.yaml dellemc/cert-csi:v1.4.1 certify --cert-config /example-certify-config.yaml --vsc
+ podman run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/example-certify-config.yaml:/example-certify-config.yaml dellemc/cert-csi:v1.5.0 certify --cert-config /example-certify-config.yaml --vsc
```
{{% /tab %}}
@@ -595,12 +595,12 @@ If you are using the container image, the `attr` file must be mounted into the c
{{< tabs name="running-container-ephemeral-volume" >}}
{{% tab name="Docker" %}}
```bash
- docker run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/ephemeral-config.properties:/ephemeral-config.properties dellemc/cert-csi:v1.4.1 test ephemeral-volume --driver --attr /ephemeral-config.properties
+ docker run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/ephemeral-config.properties:/ephemeral-config.properties dellemc/cert-csi:v1.5.0 test ephemeral-volume --driver --attr /ephemeral-config.properties
```
{{% /tab %}}
{{% tab name="Podman" %}}
```bash
- podman run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/ephemeral-config.properties:/ephemeral-config.properties dellemc/cert-csi:v1.4.1 test ephemeral-volume --driver --attr /ephemeral-config.properties
+ podman run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/ephemeral-config.properties:/ephemeral-config.properties dellemc/cert-csi:v1.5.0 test ephemeral-volume --driver --attr /ephemeral-config.properties
```
{{% /tab %}}
@@ -611,46 +611,46 @@ Sample ephemeral-config.properties (key/value pair)
{{% tab name="CSI PowerFlex" %}}
```yaml
- volumeName: "my-ephemeral-vol"
- size: "10Gi"
- storagepool: "sample"
- systemID: "sample"
+ volumeName=my-ephemeral-vol
+ size=10Gi
+ storagepool=sample
+ systemID=sample
```
{{% /tab %}}
{{% tab name="CSI PowerScale" %}}
```yaml
- size: "10Gi"
- ClusterName: "sample"
- AccessZone: "sample"
- IsiPath: "/ifs/data/sample"
- IsiVolumePathPermissions: "0777"
- AzServiceIP: "192.168.2.1"
+ size=10Gi
+ ClusterName=sample
+ AccessZone=sample
+ IsiPath=/ifs/data/sample
+ IsiVolumePathPermissions=0777
+ AzServiceIP=192.168.2.1
```
{{% /tab %}}
{{% tab name="CSI PowerStore" %}}
```yaml
- size: "10Gi"
- arrayID: "sample"
- nasName: "sample"
- nfsAcls: "0777"
+ size=10Gi
+ arrayID=sample
+ nasName=sample
+ nfsAcls=0777
```
{{% /tab %}}
{{% tab name="CSI Unity" %}}
```yaml
- size: "10Gi"
- arrayID: "sample"
- protocol: iSCSI
- thinProvisioned: "true"
- isDataReductionEnabled: "false"
- tieringPolicy: "1"
- storagePool: pool_2
- nasName: "sample"
+ size=10Gi
+ arrayId=sample
+ protocol=iSCSI
+ thinProvisioned=true
+ isDataReductionEnabled=false
+ tieringPolicy=1
+ storagePool=pool_2
+ nasName=sample
```
{{% /tab %}}
diff --git a/content/docs/support/cli/_index.md b/content/docs/support/cli/_index.md
index d2dc3763e0..e384ff1d62 100644
--- a/content/docs/support/cli/_index.md
+++ b/content/docs/support/cli/_index.md
@@ -32,10 +32,12 @@ This document outlines all dellctl commands, their intended use, options that ca
| [dellctl encryption rekey-status](#dellctl-encryption-rekey-status) | Get status of an encryption rekey operation |
| [dellctl images](#dellctl-images) | List the container images needed by csi driver |
| [dellctl volume get](#dellctl-volume-get) | Gets PowerFlex volume infomation for a given tenant on a local cluster |
+| [dellctl admin token](#dellctl-admin-token) | Generate an administrator token for administrating CSM Authorization v2 |
+| [dellctl generate token](#dellctl-generate-token) | Generate a tenant token for configuring a Dell CSI Driver with CSM Authorization v2 |
## Installation instructions
-1. Download `dellctl` from [here](https://github.com/dell/csm/releases/tag/v1.6.0).
+1. Download `dellctl` from [here](https://github.com/dell/csm/releases/latest/download/dellctl).
2. chmod +x dellctl
3. Move `dellctl` to `/usr/local/bin` or add `dellctl`'s containing directory path to PATH environment variable.
4. Run `dellctl --help` to know available commands or run `dellctl command --help` to know more about a specific command.
@@ -970,3 +972,68 @@ k8s-b1abb817d3 a69bf19000000001 8.000000 mypool 636468e3638c840f k8s-b
k8s-28e4184f41 c6b2280d0000009a 8.000000 mypool 636468e3638c840f k8s-28e4184f41 Available local-storage
k8s-7296621062 a69b554f00000004 8.000000 mypool 636468e3638c840f
```
+
+### dellctl admin token
+
+Generate an administrator token for administrating CSM Authorization v2
+
+##### Flags
+
+```
+ --access-token-expiration duration Expiration time of the access token, e.g. 1m30s (default 1m0s)
+ -h, --help help for token
+ -s, --jwt-signing-secret string Specify JWT signing secret, or omit to use stdin
+ -n, --name string Admin name
+ --refresh-token-expiration duration Expiration time of the refresh token, e.g. 48h (default 720h0m0s)
+```
+
+##### Output
+
+```bash
+dellctl admin token -n --jwt-signing-secret
+```
+
+```
+# dellctl admin token -n admin --jwt-signing-secret secret
+{
+ "Access": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJjc20iLCJleHAiOjE3MjA3MDk1MTcsImdyb3VwIjoiYWRtaW4iLCJpc3MiOiJjb20uZGVsbC5jc20iLCJyb2xlcyI6IiIsInN1YiI6ImNzbS1hZG1pbiJ9.WS5NSxrCoMn90ohOZZyyGoBias583xYumeKvmIrCqSs",
+ "Refresh": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJjc20iLCJleHAiOjE3MjMzMDE0NTcsImdyb3VwIjoiYWRtaW4iLCJpc3MiOiJjb20uZGVsbC5jc20iLCJyb2xlcyI6IiIsInN1YiI6ImNzbS1hZG1pbiJ9.MJ9ajrB-nLEQKdAA-H8n78kS9QiX1yW_-m7K4Tmu7Mg"
+}
+```
+
+### dellctl generate token
+
+Generate a tenant token for configuring a Dell CSI Driver with CSM Authorization v2
+
+##### Flags
+
+```
+ --access-token-expiration duration Expiration time of the access token, e.g. 1m30s (default 1m0s)
+ -h, --help help for token
+ --refresh-token-expiration duration Expiration time of the refresh token, e.g. 48h (default 720h0m0s)
+ -t, --tenant string Tenant name
+
+Global Flags:
+ --addr string Address of the CSM Authorization Proxy Server; required
+ -f, --admin-token string Path to admin token file; required
+ --insecure Skip certificate validation of the CSM Authorization Proxy Server
+```
+
+##### Output
+
+```bash
+dellctl generate token --admin-token --addr --tenant
+```
+
+```
+# dellctl admin token -n admin --jwt-signing-secret secret
+apiVersion: v1
+data:
+ access: ZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SmhkV1FpT2lKamMyMGlMQ0psZUhBaU9qRTJPREl3TVRBeU5UTXNJbWR5YjNWd0lqb2labTl2SWl3aWFYTnpJam9pWTI5dExtUmxiR3d1WTNOdElpd2ljbTlzWlhNaU9pSmlZWElpTENKemRXSWlPaUpqYzIwdGRHVnVZVzUwSW4wLjlSYkJISzJUS2dZbVdDX0paazBoSXV0N0daSDV4NGVjQVk2ekdaUDNvUWs=
+ refresh: ZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SmhkV1FpT2lKamMyMGlMQ0psZUhBaU9qRTJPRFEyTURJeE9UTXNJbWR5YjNWd0lqb2labTl2SWl3aWFYTnpJam9pWTI5dExtUmxiR3d1WTNOdElpd2ljbTlzWlhNaU9pSmlZWElpTENKemRXSWlPaUpqYzIwdGRHVnVZVzUwSW4wLkxQcDQzbXktSVJudTFjdmZRcko4M0pMdTR2NXlWQlRDV2NjWFpfWjROQkU=
+kind: Secret
+metadata:
+ creationTimestamp: null
+ name: proxy-authz-tokens
+type: Opaque
+```
diff --git a/content/docs/support/release/_index.md b/content/docs/support/release/_index.md
index e17a6c86f0..22ee98c129 100644
--- a/content/docs/support/release/_index.md
+++ b/content/docs/support/release/_index.md
@@ -10,7 +10,7 @@ Release notes for Container Storage Modules:
[CSI Drivers](../../csidriver/release)
-[CSM for Authorization](../../authorization/release)
+[CSM for Authorization](../../authorization/v1.x-ga/release)
[CSM for Observability](../../observability/release)
diff --git a/content/docs/support/troubleshooting/_index.md b/content/docs/support/troubleshooting/_index.md
index c987433b32..ae40e2cfdf 100644
--- a/content/docs/support/troubleshooting/_index.md
+++ b/content/docs/support/troubleshooting/_index.md
@@ -10,7 +10,7 @@ Troubleshooting links for Container Storage Modules:
[CSI Drivers](../../csidriver/troubleshooting)
-[CSM for Authorization](../../authorization/troubleshooting)
+[CSM for Authorization](../../authorization/v1.x-ga/troubleshooting)
[CSM for Observability](../../observability/troubleshooting)
diff --git a/content/v1/csidriver/features/powerscale.md b/content/v1/csidriver/features/powerscale.md
index 3d3de9cbed..0b21d03420 100644
--- a/content/v1/csidriver/features/powerscale.md
+++ b/content/v1/csidriver/features/powerscale.md
@@ -21,7 +21,7 @@ You can use existing volumes from the PowerScale array as Persistent Volumes in
1. Open your volume in One FS, and take a note of volume-id.
2. Create PersistentVolume and use this volume-id as a volumeHandle in the manifest. Modify other parameters according to your needs.
-3. In the following example, the PowerScale cluster accessZone is assumed as 'System', storage class as 'isilon', cluster name as 'pscale-cluster' and volume's internal name as 'isilonvol'. The volume-handle should be in the format of `=_=_==_=_==_=_=`
+3. In the following example, the PowerScale cluster accessZone is assumed as 'System', storage class as 'isilon', cluster name as 'pscale-cluster' and volume's internal name as 'isilonvol'. The volume-handle should be in the format of `=_=_==_=_==_=_=`
4. If Quotas are enabled in the driver, it is required to add the Quota ID to the description of the NFS export in this format:
`CSI_QUOTA_ID:sC-kAAEAAAAAAAAAAAAAQEpVAAAAAAAA`
5. Quota ID can be identified by querying the PowerScale system.
diff --git a/content/v1/csidriver/installation/helm/isilon.md b/content/v1/csidriver/installation/helm/isilon.md
index 31f3a4c38b..cd95c645c5 100644
--- a/content/v1/csidriver/installation/helm/isilon.md
+++ b/content/v1/csidriver/installation/helm/isilon.md
@@ -97,6 +97,9 @@ CRDs should be configured during replication prepare stage with repctl as descri
1. Run `git clone -b v2.9.1 https://github.com/dell/csi-powerscale.git` to clone the git repository.
2. Ensure that you have created the namespace where you want to install the driver. You can run `kubectl create namespace isilon` to create a new one. The use of "isilon" as the namespace is just an example. You can choose any name for the namespace.
3. Collect information from the PowerScale Systems like IP address, IsiPath, username, and password. Make a note of the value for these parameters as they must be entered in the *secret.yaml*.
+
+ **Note**: The 'clusterName' serves as a logical, unique identifier for the array that should remain unchanged once it is included in the volume handle. Altering this identifier is not advisable, as it would result in the failure of all operations associated with the volume that was created earlier.
+
4. Download `wget -O my-isilon-settings.yaml https://raw.githubusercontent.com/dell/helm-charts/csi-isilon-2.9.1/charts/csi-isilon/values.yaml` into `cd ../dell-csi-helm-installer` to customize settings for installation.
5. Edit *my-isilon-settings.yaml* to set the following parameters for your installation:
The following table lists the primary configurable parameters of the PowerScale driver Helm chart and their default values. More detailed information can be
@@ -211,9 +214,12 @@ Create isilon-creds secret using the following command:
8. Install the driver using `csi-install.sh` bash script and default yaml by running
```bash
cd dell-csi-helm-installer && wget -O my-isilon-settings.yaml https://raw.githubusercontent.com/dell/helm-charts/csi-isilon-2.9.1/charts/csi-isilon/values.yaml &&
- ./csi-install.sh --namespace isilon --values my-isilon-settings.yaml
+ ./csi-install.sh --namespace isilon --values my-isilon-settings.yaml --helm-charts-version
```
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerscale/blob/main/dell-csi-helm-installer/csi-install.sh#L16) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerscale` directory if it was cloned before.
+
## Certificate validation for OneFS REST API calls
The CSI driver exposes an install parameter 'skipCertificateValidation' which determines if the driver
diff --git a/content/v1/csidriver/installation/helm/powerflex.md b/content/v1/csidriver/installation/helm/powerflex.md
index 8a87470549..9c1b6a1152 100644
--- a/content/v1/csidriver/installation/helm/powerflex.md
+++ b/content/v1/csidriver/installation/helm/powerflex.md
@@ -211,10 +211,11 @@ Use the below command to replace or update the secret:
| skipCertificateValidation | A boolean that enables/disables certificate validation of the csm-authorization proxy server. | No | true |
-10. Install the driver using `csi-install.sh` bash script by running `cd dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values myvalues.yaml`. You may modify the release name with the `--release` arg. If arg is not provided, release will be named `vxflexos` by default.
+10. Install the driver using `csi-install.sh` bash script by running `cd dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values myvalues.yaml --helm-charts-version `. You may modify the release name with the `--release` arg. If arg is not provided, release will be named `vxflexos` by default.
Alternatively, to do a helm install solely with Helm charts (without shell scripts), refer to `helm/README.md`.
*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerflex/blob/main/dell-csi-helm-installer/csi-install.sh#L24) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerflex` directory if it was cloned before.
- For detailed instructions on how to run the install scripts, refer to the README.md in the dell-csi-helm-installer folder.
- Install script will validate MDM IP(s) in `vxflexos-config` secret and creates a new field consumed by the init container and sdc-monitor container
- This install script also runs the `verify.sh` script. You will be prompted to enter the credentials for each of the Kubernetes nodes.
diff --git a/content/v1/csidriver/installation/helm/powermax.md b/content/v1/csidriver/installation/helm/powermax.md
index 3a20bdf840..238222780c 100644
--- a/content/v1/csidriver/installation/helm/powermax.md
+++ b/content/v1/csidriver/installation/helm/powermax.md
@@ -346,7 +346,7 @@ CRDs should be configured during replication prepare stage with repctl as descri
8. Install the driver using `csi-install.sh` bash script by running
```bash
- cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml
+ cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml --helm-charts-version
```
9. Or you can also install the driver using standalone helm chart using the command
```bash
@@ -354,6 +354,7 @@ CRDs should be configured during replication prepare stage with repctl as descri
```
*Note:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powermax/blob/main/dell-csi-helm-installer/csi-install.sh#L52) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powermax` directory if it was cloned before.
- For detailed instructions on how to run the install scripts, see the readme document in the dell-csi-helm-installer folder.
- There are a set of samples provided [here](#sample-values-file) to help you configure the driver with reverse proxy
- This script also runs the verify.sh script in the same directory. You will be prompted to enter the credentials for each of the Kubernetes nodes. The `verify.sh` script needs the credentials to check if the iSCSI initiators have been configured on all nodes. You can also skip the verification step by specifying the `--skip-verify-node` option
diff --git a/content/v1/csidriver/installation/helm/powerstore.md b/content/v1/csidriver/installation/helm/powerstore.md
index 8d6b272e53..7a2ebba1db 100644
--- a/content/v1/csidriver/installation/helm/powerstore.md
+++ b/content/v1/csidriver/installation/helm/powerstore.md
@@ -249,11 +249,12 @@ CRDs should be configured during replication prepare stage with repctl as descri
8. Install the driver using `csi-install.sh` bash script by running
```bash
- ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml
+ ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml --helm-charts-version
```
- After that the driver should be installed, you can check the condition of driver pods by running `kubectl get all -n csi-powerstore`
*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerstore/blob/main/dell-csi-helm-installer/csi-install.sh#L13) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerstore` directory if it was cloned before.
- For detailed instructions on how to run the install scripts, refer to the readme document in the dell-csi-helm-installer folder.
- By default, the driver scans available SCSI adapters and tries to register them with the storage array under the SCSI hostname using `node.nodeNamePrefix` and the ID read from the file pointed to by `node.nodeIDPath`. If an adapter is already registered with the storage under a different hostname, the adapter is not used by the driver.
- A hostname the driver uses for registration of adapters is in the form `--`. By default, these are csi-node and the machine ID read from the file `/etc/machine-id`.
diff --git a/content/v1/csidriver/installation/helm/unity.md b/content/v1/csidriver/installation/helm/unity.md
index 6b9cefabdf..a13e38c3d8 100644
--- a/content/v1/csidriver/installation/helm/unity.md
+++ b/content/v1/csidriver/installation/helm/unity.md
@@ -245,8 +245,11 @@ cd dell-csi-helm-installer && wget -O my-unity-settings.yaml https://github.com/
7. Run the command to proceed with the installation using bash script.
```bash
- ./csi-install.sh --namespace unity --values ./myvalues.yaml
+ ./csi-install.sh --namespace unity --values ./myvalues.yaml --helm-charts-version
```
+ *NOTE:*
+ - The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-unity/blob/main/dell-csi-helm-installer/csi-install.sh#L22) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-unity` directory if it was cloned before.
+
A successful installation must display messages that look similar to the following samples:
```
------------------------------------------------------
diff --git a/content/v1/csidriver/installation/test/certcsi.md b/content/v1/csidriver/installation/test/certcsi.md
index 49f72232af..c608b0de23 100644
--- a/content/v1/csidriver/installation/test/certcsi.md
+++ b/content/v1/csidriver/installation/test/certcsi.md
@@ -603,51 +603,52 @@ Sample ephemeral-config.properties (key/value pair)
{{% tab name="CSI PowerFlex" %}}
```yaml
- volumeName: "my-ephemeral-vol"
- size: "10Gi"
- storagepool: "sample"
- systemID: "sample"
+ volumeName=my-ephemeral-vol
+ size=10Gi
+ storagepool=sample
+ systemID=sample
```
{{% /tab %}}
{{% tab name="CSI PowerScale" %}}
```yaml
- size: "10Gi"
- ClusterName: "sample"
- AccessZone: "sample"
- IsiPath: "/ifs/data/sample"
- IsiVolumePathPermissions: "0777"
- AzServiceIP: "192.168.2.1"
+ size=10Gi
+ ClusterName=sample
+ AccessZone=sample
+ IsiPath=/ifs/data/sample
+ IsiVolumePathPermissions=0777
+ AzServiceIP=192.168.2.1
```
{{% /tab %}}
{{% tab name="CSI PowerStore" %}}
```yaml
- size: "10Gi"
- arrayID: "sample"
- nasName: "sample"
- nfsAcls: "0777"
+ size=10Gi
+ arrayID=sample
+ nasName=sample
+ nfsAcls=0777
```
{{% /tab %}}
{{% tab name="CSI Unity" %}}
```yaml
- size: "10Gi"
- arrayID: "sample"
- protocol: iSCSI
- thinProvisioned: "true"
- isDataReductionEnabled: "false"
- tieringPolicy: "1"
- storagePool: pool_2
- nasName: "sample"
+ size=10Gi
+ arrayId=sample
+ protocol=iSCSI
+ thinProvisioned=true
+ isDataReductionEnabled=false
+ tieringPolicy=1
+ storagePool=pool_2
+ nasName=sample
```
{{% /tab %}}
{{< /tabs >}}
+
#### Storage Capacity Tracking
1. Creates namespace `functional-test` where resources will be created.
2. Creates a duplicate of the provided storge class using prefix `capacity-tracking`.
diff --git a/content/v1/csidriver/upgradation/drivers/isilon.md b/content/v1/csidriver/upgradation/drivers/isilon.md
index b278408360..c57bfa7427 100644
--- a/content/v1/csidriver/upgradation/drivers/isilon.md
+++ b/content/v1/csidriver/upgradation/drivers/isilon.md
@@ -27,9 +27,12 @@ You can upgrade the CSI Driver for Dell PowerScale using Helm or Dell CSM Operat
4. Upgrade the CSI Driver for Dell PowerScale using following command:
```bash
- ./csi-install.sh --namespace isilon --values ./my-isilon-settings.yaml --upgrade
+ ./csi-install.sh --namespace isilon --values ./my-isilon-settings.yaml --helm-charts-version --upgrade
```
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerscale/blob/main/dell-csi-helm-installer/csi-install.sh#L16) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerscale` directory if it was cloned before.
+
## Upgrade using Dell CSM Operator
**Note:** Upgrading the Operator does not upgrade the CSI Driver.
diff --git a/content/v1/csidriver/upgradation/drivers/powerflex.md b/content/v1/csidriver/upgradation/drivers/powerflex.md
index 4e51d479ba..7708c6582e 100644
--- a/content/v1/csidriver/upgradation/drivers/powerflex.md
+++ b/content/v1/csidriver/upgradation/drivers/powerflex.md
@@ -19,15 +19,16 @@ You can upgrade the CSI Driver for Dell PowerFlex using Helm or Dell CSM Operato
4. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
- cd ../dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --upgrade
+ cd ../dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --helm-charts-version --upgrade
```
*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerflex/blob/main/dell-csi-helm-installer/csi-install.sh#L24) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerflex` directory if it was cloned before.
- If you are upgrading from a driver version that was installed using Helm v2, ensure that you install Helm3 before installing the driver.
- To update any installation parameter after the driver has been installed, change the `myvalues.yaml` file and run the install script with the option _\-\-upgrade_, for example:
```bash
- ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --upgrade
+ ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --helm-charts-version --upgrade
```
- The logging configuration from v1.5 will not work in v2.1, since the log configuration parameters are now set in the myvalues.yaml file located at dell-csi-helm-installer/myvalues.yaml. Please set the logging configuration parameters in the myvalues.yaml file.
diff --git a/content/v1/csidriver/upgradation/drivers/powermax.md b/content/v1/csidriver/upgradation/drivers/powermax.md
index e76bb61eb2..d38f7b6f73 100644
--- a/content/v1/csidriver/upgradation/drivers/powermax.md
+++ b/content/v1/csidriver/upgradation/drivers/powermax.md
@@ -24,10 +24,11 @@ You can upgrade CSI Driver for Dell PowerMax using Helm or Dell CSM Operator.
3. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
- cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml --upgrade
+ cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml --upgrade --helm-charts-version
```
*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powermax/blob/main/dell-csi-helm-installer/csi-install.sh#L52) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powermax` directory if it was cloned before.
- If you are upgrading from a driver version that was installed using Helm v2, ensure that you install Helm3 before installing the driver.
- To update any installation parameter after the driver has been installed, change the `my-powermax-settings.yaml` file and run the install script with the option _\-\-upgrade_, for example:
```bash
diff --git a/content/v1/csidriver/upgradation/drivers/powerstore.md b/content/v1/csidriver/upgradation/drivers/powerstore.md
index 28204eaa21..40021a0296 100644
--- a/content/v1/csidriver/upgradation/drivers/powerstore.md
+++ b/content/v1/csidriver/upgradation/drivers/powerstore.md
@@ -42,8 +42,10 @@ Note: While upgrading the driver via helm, controllerCount variable in myvalues.
6. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
- ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml --upgrade
+ ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml --upgrade --helm-charts-version
```
+ *NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerstore/blob/main/dell-csi-helm-installer/csi-install.sh#L13) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerstore` directory if it was cloned before.
## Upgrade using Dell CSM Operator:
diff --git a/content/v1/csidriver/upgradation/drivers/unity.md b/content/v1/csidriver/upgradation/drivers/unity.md
index 3b8c0108d9..57c742b6a2 100644
--- a/content/v1/csidriver/upgradation/drivers/unity.md
+++ b/content/v1/csidriver/upgradation/drivers/unity.md
@@ -27,9 +27,12 @@ To upgrade the driver from csi-unity v2.8.0 to csi-unity v2.9.1
3. Navigate to csi-unity/dell-csi-hem-installer folder and execute this command:
```bash
- ./csi-install.sh --namespace unity --values ./myvalues.yaml --upgrade
+ ./csi-install.sh --namespace unity --values ./myvalues.yaml --helm-charts-version --upgrade
```
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-unity/blob/main/dell-csi-helm-installer/csi-install.sh#L22) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-unity` directory if it was cloned before.
+
### Upgrade using Dell CSM Operator:
**Note:**
Upgrading the Operator does not upgrade the CSI Driver.
diff --git a/content/v1/deployment/csmoperator/drivers/powerflex.md b/content/v1/deployment/csmoperator/drivers/powerflex.md
index a033610060..4166851386 100644
--- a/content/v1/deployment/csmoperator/drivers/powerflex.md
+++ b/content/v1/deployment/csmoperator/drivers/powerflex.md
@@ -111,7 +111,7 @@ For detailed PowerFlex installation procedure, see the _Dell PowerFlex Deploymen
If replication feature is enabled, ensure the secret includes all the PowerFlex arrays involved in replication.
- After editing the file, run this command to create a secret called `vxflexos-config`. If you are using a different namespace/secret name, just substitute those into the command.
+ After editing the file, run this command to create a secret called `vxflexos-config`.
```bash
kubectl create secret generic vxflexos-config -n vxflexos --from-file=config=secret.yaml
diff --git a/content/v2/csidriver/features/powerscale.md b/content/v2/csidriver/features/powerscale.md
index b8d27ac722..3a36f4a307 100644
--- a/content/v2/csidriver/features/powerscale.md
+++ b/content/v2/csidriver/features/powerscale.md
@@ -21,7 +21,7 @@ You can use existing volumes from the PowerScale array as Persistent Volumes in
1. Open your volume in One FS, and take a note of volume-id.
2. Create PersistentVolume and use this volume-id as a volumeHandle in the manifest. Modify other parameters according to your needs.
-3. In the following example, the PowerScale cluster accessZone is assumed as 'System', storage class as 'isilon', cluster name as 'pscale-cluster' and volume's internal name as 'isilonvol'. The volume-handle should be in the format of `=_=_==_=_==_=_=`
+3. In the following example, the PowerScale cluster accessZone is assumed as 'System', storage class as 'isilon', cluster name as 'pscale-cluster' and volume's internal name as 'isilonvol'. The volume-handle should be in the format of `=_=_==_=_==_=_=`
4. If Quotas are enabled in the driver, it is required to add the Quota ID to the description of the NFS export in this format:
`CSI_QUOTA_ID:sC-kAAEAAAAAAAAAAAAAQEpVAAAAAAAA`
5. Quota ID can be identified by querying the PowerScale system.
diff --git a/content/v2/csidriver/installation/helm/isilon.md b/content/v2/csidriver/installation/helm/isilon.md
index db951501f2..216b21a91b 100644
--- a/content/v2/csidriver/installation/helm/isilon.md
+++ b/content/v2/csidriver/installation/helm/isilon.md
@@ -110,6 +110,9 @@ CRDs should be configured during replication prepare stage with repctl as descri
1. Run `git clone -b v2.8.0 https://github.com/dell/csi-powerscale.git` to clone the git repository.
2. Ensure that you have created the namespace where you want to install the driver. You can run `kubectl create namespace isilon` to create a new one. The use of "isilon" as the namespace is just an example. You can choose any name for the namespace.
3. Collect information from the PowerScale Systems like IP address, IsiPath, username, and password. Make a note of the value for these parameters as they must be entered in the *secret.yaml*.
+
+ **Note**: The 'clusterName' serves as a logical, unique identifier for the array that should remain unchanged once it is included in the volume handle. Altering this identifier is not advisable, as it would result in the failure of all operations associated with the volume that was created earlier.
+
4. Download `wget -O my-isilon-settings.yaml https://raw.githubusercontent.com/dell/helm-charts/csi-isilon-2.8.0/charts/csi-isilon/values.yaml` into `cd ../dell-csi-helm-installer` to customize settings for installation.
5. Edit *my-isilon-settings.yaml* to set the following parameters for your installation:
The following table lists the primary configurable parameters of the PowerScale driver Helm chart and their default values. More detailed information can be
@@ -227,9 +230,12 @@ Create isilon-creds secret using the following command:
8. Install the driver using `csi-install.sh` bash script and default yaml by running
```bash
cd dell-csi-helm-installer && wget -O my-isilon-settings.yaml https://raw.githubusercontent.com/dell/helm-charts/csi-isilon-2.8.0/charts/csi-isilon/values.yaml &&
- ./csi-install.sh --namespace isilon --values my-isilon-settings.yaml
+ ./csi-install.sh --namespace isilon --values my-isilon-settings.yaml --helm-charts-version
```
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerscale/blob/main/dell-csi-helm-installer/csi-install.sh#L16) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerscale` directory if it was cloned before.
+
## Certificate validation for OneFS REST API calls
The CSI driver exposes an install parameter 'skipCertificateValidation' which determines if the driver
diff --git a/content/v2/csidriver/installation/helm/powerflex.md b/content/v2/csidriver/installation/helm/powerflex.md
index cd57eb886a..50343275c4 100644
--- a/content/v2/csidriver/installation/helm/powerflex.md
+++ b/content/v2/csidriver/installation/helm/powerflex.md
@@ -223,10 +223,11 @@ Use the below command to replace or update the secret:
| skipCertificateValidation | A boolean that enables/disables certificate validation of the csm-authorization proxy server. | No | true |
-10. Install the driver using `csi-install.sh` bash script by running `cd dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values myvalues.yaml`. You may modify the release name with the `--release` arg. If arg is not provided, release will be named `vxflexos` by default.
+10. Install the driver using `csi-install.sh` bash script by running `cd dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values myvalues.yaml --helm-charts-version `. You may modify the release name with the `--release` arg. If arg is not provided, release will be named `vxflexos` by default.
Alternatively, to do a helm install solely with Helm charts (without shell scripts), refer to `helm/README.md`.
*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerflex/blob/main/dell-csi-helm-installer/csi-install.sh#L24) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerflex` directory if it was cloned before.
- For detailed instructions on how to run the install scripts, refer to the README.md in the dell-csi-helm-installer folder.
- Install script will validate MDM IP(s) in `vxflexos-config` secret and creates a new field consumed by the init container and sdc-monitor container
- This install script also runs the `verify.sh` script. You will be prompted to enter the credentials for each of the Kubernetes nodes.
diff --git a/content/v2/csidriver/installation/helm/powermax.md b/content/v2/csidriver/installation/helm/powermax.md
index 26970fadee..ea9f93b173 100644
--- a/content/v2/csidriver/installation/helm/powermax.md
+++ b/content/v2/csidriver/installation/helm/powermax.md
@@ -321,7 +321,7 @@ CRDs should be configured during replication prepare stage with repctl as descri
8. Install the driver using `csi-install.sh` bash script by running
```bash
- cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml
+ cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml --helm-charts-version
```
9. Or you can also install the driver using standalone helm chart using the command
```bash
@@ -329,6 +329,7 @@ CRDs should be configured during replication prepare stage with repctl as descri
```
*Note:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powermax/blob/main/dell-csi-helm-installer/csi-install.sh#L52) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powermax` directory if it was cloned before.
- For detailed instructions on how to run the install scripts, see the readme document in the dell-csi-helm-installer folder.
- There are a set of samples provided [here](#sample-values-file) to help you configure the driver with reverse proxy
- This script also runs the verify.sh script in the same directory. You will be prompted to enter the credentials for each of the Kubernetes nodes. The `verify.sh` script needs the credentials to check if the iSCSI initiators have been configured on all nodes. You can also skip the verification step by specifying the `--skip-verify-node` option
diff --git a/content/v2/csidriver/installation/helm/powerstore.md b/content/v2/csidriver/installation/helm/powerstore.md
index 4a77564107..f83a8b6cce 100644
--- a/content/v2/csidriver/installation/helm/powerstore.md
+++ b/content/v2/csidriver/installation/helm/powerstore.md
@@ -214,11 +214,12 @@ CRDs should be configured during replication prepare stage with repctl as descri
8. Install the driver using `csi-install.sh` bash script by running
```bash
- ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml
+ ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml --helm-charts-version
```
- After that the driver should be installed, you can check the condition of driver pods by running `kubectl get all -n csi-powerstore`
*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerstore/blob/main/dell-csi-helm-installer/csi-install.sh#L13) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerstore` directory if it was cloned before.
- For detailed instructions on how to run the install scripts, refer to the readme document in the dell-csi-helm-installer folder.
- By default, the driver scans available SCSI adapters and tries to register them with the storage array under the SCSI hostname using `node.nodeNamePrefix` and the ID read from the file pointed to by `node.nodeIDPath`. If an adapter is already registered with the storage under a different hostname, the adapter is not used by the driver.
- A hostname the driver uses for registration of adapters is in the form `--`. By default, these are csi-node and the machine ID read from the file `/etc/machine-id`.
diff --git a/content/v2/csidriver/installation/helm/unity.md b/content/v2/csidriver/installation/helm/unity.md
index e7e0f12538..dabc542cb2 100644
--- a/content/v2/csidriver/installation/helm/unity.md
+++ b/content/v2/csidriver/installation/helm/unity.md
@@ -259,8 +259,11 @@ cd dell-csi-helm-installer && wget -O my-unity-settings.yaml https://github.com/
7. Run the command to proceed with the installation using bash script.
```bash
- ./csi-install.sh --namespace unity --values ./myvalues.yaml
+ ./csi-install.sh --namespace unity --values ./myvalues.yaml --helm-charts-version
```
+ *NOTE:*
+ - The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-unity/blob/main/dell-csi-helm-installer/csi-install.sh#L22) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-unity` directory if it was cloned before.
+
A successful installation must display messages that look similar to the following samples:
```
------------------------------------------------------
diff --git a/content/v2/csidriver/upgradation/drivers/isilon.md b/content/v2/csidriver/upgradation/drivers/isilon.md
index c0b37f9221..805e212950 100644
--- a/content/v2/csidriver/upgradation/drivers/isilon.md
+++ b/content/v2/csidriver/upgradation/drivers/isilon.md
@@ -27,9 +27,12 @@ You can upgrade the CSI Driver for Dell PowerScale using Helm or Dell CSI Operat
4. Upgrade the CSI Driver for Dell PowerScale using following command:
```bash
- ./csi-install.sh --namespace isilon --values ./my-isilon-settings.yaml --upgrade
+ ./csi-install.sh --namespace isilon --values ./my-isilon-settings.yaml --helm-charts-version --upgrade
```
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerscale/blob/main/dell-csi-helm-installer/csi-install.sh#L16) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerscale` directory if it was cloned before.
+
## Upgrade using Dell CSM Operator
**Note:** Upgrading the Operator does not upgrade the CSI Driver.
diff --git a/content/v2/csidriver/upgradation/drivers/powerflex.md b/content/v2/csidriver/upgradation/drivers/powerflex.md
index 4890384a19..b8c62a749c 100644
--- a/content/v2/csidriver/upgradation/drivers/powerflex.md
+++ b/content/v2/csidriver/upgradation/drivers/powerflex.md
@@ -19,15 +19,16 @@ You can upgrade the CSI Driver for Dell PowerFlex using Helm or Dell CSI Operato
4. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
- cd ../dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --upgrade
+ cd ../dell-csi-helm-installer && ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --helm-charts-version --upgrade
```
*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerflex/blob/main/dell-csi-helm-installer/csi-install.sh#L24) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerflex` directory if it was cloned before.
- If you are upgrading from a driver version that was installed using Helm v2, ensure that you install Helm3 before installing the driver.
- To update any installation parameter after the driver has been installed, change the `myvalues.yaml` file and run the install script with the option _\-\-upgrade_, for example:
```bash
- ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --upgrade
+ ./csi-install.sh --namespace vxflexos --values ./myvalues.yaml --helm-charts-version --upgrade
```
- The logging configuration from v1.5 will not work in v2.1, since the log configuration parameters are now set in the myvalues.yaml file located at dell-csi-helm-installer/myvalues.yaml. Please set the logging configuration parameters in the myvalues.yaml file.
diff --git a/content/v2/csidriver/upgradation/drivers/powermax.md b/content/v2/csidriver/upgradation/drivers/powermax.md
index 9672a34819..57e4a88929 100644
--- a/content/v2/csidriver/upgradation/drivers/powermax.md
+++ b/content/v2/csidriver/upgradation/drivers/powermax.md
@@ -24,10 +24,11 @@ You can upgrade CSI Driver for Dell PowerMax using Helm or Dell CSI Operator.
3. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
- cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml --upgrade
+ cd ../dell-csi-helm-installer && ./csi-install.sh --namespace powermax --values ./my-powermax-settings.yaml --upgrade --upgrade --helm-charts-version
```
*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powermax/blob/main/dell-csi-helm-installer/csi-install.sh#L52) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powermax` directory if it was cloned before.
- If you are upgrading from a driver version that was installed using Helm v2, ensure that you install Helm3 before installing the driver.
- To update any installation parameter after the driver has been installed, change the `my-powermax-settings.yaml` file and run the install script with the option _\-\-upgrade_, for example:
```bash
diff --git a/content/v2/csidriver/upgradation/drivers/powerstore.md b/content/v2/csidriver/upgradation/drivers/powerstore.md
index fddeeefe09..19bd54cebe 100644
--- a/content/v2/csidriver/upgradation/drivers/powerstore.md
+++ b/content/v2/csidriver/upgradation/drivers/powerstore.md
@@ -42,9 +42,10 @@ Note: While upgrading the driver via helm, controllerCount variable in myvalues.
6. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
- ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml --upgrade
+ ./csi-install.sh --namespace csi-powerstore --values ./my-powerstore-settings.yaml --upgrade --helm-charts-version
```
-
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-powerstore/blob/main/dell-csi-helm-installer/csi-install.sh#L13) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-powerstore` directory if it was cloned before.
## Upgrade using Dell CSM Operator:
**Note:** Upgrading the Operator does not upgrade the CSI Driver.
diff --git a/content/v2/csidriver/upgradation/drivers/unity.md b/content/v2/csidriver/upgradation/drivers/unity.md
index efab1b693f..25a5fd17e0 100644
--- a/content/v2/csidriver/upgradation/drivers/unity.md
+++ b/content/v2/csidriver/upgradation/drivers/unity.md
@@ -27,9 +27,12 @@ To upgrade the driver from csi-unity v2.7.0 to csi-unity v2.8.0
3. Navigate to csi-unity/dell-csi-hem-installer folder and execute this command:
```bash
- ./csi-install.sh --namespace unity --values ./myvalues.yaml --upgrade
+ ./csi-install.sh --namespace unity --values ./myvalues.yaml --helm-charts-version --upgrade
```
+*NOTE:*
+- The parameter `--helm-charts-version` is optional and if you do not specify the flag, by default the `csi-install.sh` script will clone the version of the helm chart that is specified in the driver's [csi-install.sh](https://github.com/dell/csi-unity/blob/main/dell-csi-helm-installer/csi-install.sh#L22) file. If you wish to install the driver using a different version of the helm chart, you need to include this flag. Also, remember to delete the `helm-charts` repository present in the `csi-unity` directory if it was cloned before.
+
### Upgrade using Dell CSM Operator:
**Note:**
Upgrading the Operator does not upgrade the CSI Driver.
diff --git a/content/v2/deployment/csmoperator/drivers/powerflex.md b/content/v2/deployment/csmoperator/drivers/powerflex.md
index e8edfa26e9..dbaed11d4c 100644
--- a/content/v2/deployment/csmoperator/drivers/powerflex.md
+++ b/content/v2/deployment/csmoperator/drivers/powerflex.md
@@ -112,7 +112,7 @@ For detailed PowerFlex installation procedure, see the _Dell PowerFlex Deploymen
mdm: "10.0.0.3,10.0.0.4"
```
- After editing the file, run this command to create a secret called `vxflexos-config`. If you are using a different namespace/secret name, just substitute those into the command.
+ After editing the file, run this command to create a secret called `vxflexos-config`.
```bash
kubectl create secret generic vxflexos-config -n vxflexos --from-file=config=secret.yaml
diff --git a/content/v3/csidriver/features/powerscale.md b/content/v3/csidriver/features/powerscale.md
index 4479234c2e..f40ff7975c 100644
--- a/content/v3/csidriver/features/powerscale.md
+++ b/content/v3/csidriver/features/powerscale.md
@@ -21,7 +21,7 @@ You can use existing volumes from the PowerScale array as Persistent Volumes in
1. Open your volume in One FS, and take a note of volume-id.
2. Create PersistentVolume and use this volume-id as a volumeHandle in the manifest. Modify other parameters according to your needs.
-3. In the following example, the PowerScale cluster accessZone is assumed as 'System', storage class as 'isilon', cluster name as 'pscale-cluster' and volume's internal name as 'isilonvol'. The volume-handle should be in the format of =_=_==_=_==_=_=
+3. In the following example, the PowerScale cluster accessZone is assumed as 'System', storage class as 'isilon', cluster name as 'pscale-cluster' and volume's internal name as 'isilonvol'. The volume-handle should be in the format of =_=_==_=_==_=_=
4. If Quotas are enabled in the driver, it is required to add the Quota ID to the description of the NFS export in this format:
`CSI_QUOTA_ID:sC-kAAEAAAAAAAAAAAAAQEpVAAAAAAAA`
5. Quota ID can be identified by querying the PowerScale system.
diff --git a/content/v3/csidriver/installation/helm/isilon.md b/content/v3/csidriver/installation/helm/isilon.md
index 24cf090b4a..ce822c4f5f 100644
--- a/content/v3/csidriver/installation/helm/isilon.md
+++ b/content/v3/csidriver/installation/helm/isilon.md
@@ -104,6 +104,9 @@ CRDs should be configured during replication prepare stage with repctl as descri
1. Run `git clone -b v2.7.0 https://github.com/dell/csi-powerscale.git` to clone the git repository.
2. Ensure that you have created the namespace where you want to install the driver. You can run `kubectl create namespace isilon` to create a new one. The use of "isilon" as the namespace is just an example. You can choose any name for the namespace.
3. Collect information from the PowerScale Systems like IP address, IsiPath, username, and password. Make a note of the value for these parameters as they must be entered in the *secret.yaml*.
+
+ **Note**: The 'clusterName' serves as a logical, unique identifier for the array that should remain unchanged once it is included in the volume handle. Altering this identifier is not advisable, as it would result in the failure of all operations associated with the volume that was created earlier.
+
4. Copy *the helm/csi-isilon/values.yaml* into a new location with name say *my-isilon-settings.yaml*, to customize settings for installation.
5. Edit *my-isilon-settings.yaml* to set the following parameters for your installation:
The following table lists the primary configurable parameters of the PowerScale driver Helm chart and their default values. More detailed information can be
diff --git a/content/v3/deployment/csmoperator/drivers/powerflex.md b/content/v3/deployment/csmoperator/drivers/powerflex.md
index a923ba52d9..a5913d4f0f 100644
--- a/content/v3/deployment/csmoperator/drivers/powerflex.md
+++ b/content/v3/deployment/csmoperator/drivers/powerflex.md
@@ -114,7 +114,7 @@ For detailed PowerFlex installation procedure, see the _Dell PowerFlex Deploymen
AllSystemNames: "name1,name2"
```
- After editing the file, run this command to create a secret called `test-vxflexos-config`. If you are using a different namespace/secret name, just substitute those into the command.
+ After editing the file, run this command to create a secret called `test-vxflexos-config`.
```bash
kubectl create secret generic test-vxflexos-config -n test-vxflexos --from-file=config=config.yaml