{{< /blocks/cover >}}
diff --git a/content/docs/_index.md b/content/docs/_index.md
index 0c0880b012..ba7c8d5f07 100644
--- a/content/docs/_index.md
+++ b/content/docs/_index.md
@@ -20,7 +20,7 @@ The Dell Technologies (Dell) Container Storage Modules (CSM) enables simple and
CSM is made up of multiple components including modules (enterprise capabilities), CSI drivers (storage enablement), and other related applications (deployment, feature controllers, etc).
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[**Authorization**](authorization/)"
footer="Supports [PowerFlex](csidriver/features/powerflex/) [PowerScale](csidriver/features/powerscale/) [PowerMax](csidriver/features/powermax/)">}}
CSM for Authorization provides storage and Kubernetes administrators the ability to apply RBAC for Dell CSI Drivers. It does this by deploying a proxy between the CSI driver and the storage system to enforce role-based access and usage rules.
@@ -32,8 +32,8 @@ CSM is made up of multiple components including modules (enterprise capabilities
CSM for Replication project aims to bring Replication & Disaster Recovery capabilities of Dell Storage Arrays to Kubernetes clusters. It helps you replicate groups of volumes and can provide you a way to restart applications in case of both planned and unplanned migration.
[...Learn more](replication/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[**Resiliency**](resiliency/)"
footer="Supports [PowerFlex](csidriver/features/powerflex/) [PowerScale](csidriver/features/powerscale/) [Unity](csidriver/features/unity/) [PowerStore](csidriver/features/powerstore/)">}}
CSM for Resiliency is designed to make Kubernetes Applications, including those that utilize persistent storage, more resilient to various failures.
@@ -44,8 +44,8 @@ CSM is made up of multiple components including modules (enterprise capabilities
CSM for Observability provides visibility on the capacity of the volumes/file shares that is being managed with Dell CSM CSI (Container Storage Interface) drivers along with their performance in terms of bandwidth, IOPS, and response time.
[...Learn more](observability/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[**Application Mobility**](applicationmobility/)"
footer="Supports all platforms">}}
Container Storage Modules for Application Mobility provide Kubernetes administrators the ability to clone their stateful application workloads and application data to other clusters in the cloud.
@@ -56,12 +56,12 @@ CSM is made up of multiple components including modules (enterprise capabilities
Encryption provides the capability to encrypt user data residing on volumes created by Dell CSI Drivers.
[...Learn more](secure/encryption/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[License](support/license/)"
footer="Required for [Encryption](secure/encryption/)">}}
The tech-preview releases of Encryption require a license.
Request a license using the [Container Storage Modules License Request](https://app.smartsheet.com/b/form/5e46fad643874d56b1f9cf4c9f3071fb) by providing the requested details.
[...Learn more](support/license/)
{{< /card >}}
-{{< /cardpane >}}
\ No newline at end of file
+{{% /cardpane %}}
\ No newline at end of file
diff --git a/content/docs/deployment/_index.md b/content/docs/deployment/_index.md
index e7958805e2..ff85a9e527 100644
--- a/content/docs/deployment/_index.md
+++ b/content/docs/deployment/_index.md
@@ -8,17 +8,17 @@ weight: 2
The Container Storage Modules along with the required CSI Drivers can each be deployed using CSM operator.
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[**CSM Operator**](csmoperator/)"
footer="Supported drivers: [PowerScale](csmoperator/drivers/powerscale/), [PowerStore](csmoperator/drivers/powerstore/), [PowerFlex](csmoperator/drivers/powerflex/), [PowerMax](csmoperator/drivers/powermax/), [Unity XT](csmoperator/drivers/unity/) Supported modules: [Authorization](csmoperator/modules/authorization/), [Replication](csmoperator/modules/replication/), [Observability](csmoperator/modules/observability/)">}}
Dell CSM Operator is a Kubernetes Operator, which can be used to install and manage the CSI Drivers and CSM Modules provided by Dell for various storage platforms. This operator is available as a community operator for upstream Kubernetes and can be deployed using OperatorHub.io. The operator can be installed using OLM (Operator Lifecycle Manager) or manually.
[...More on installation instructions](csmoperator/)
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
The Container Storage Modules and the required CSI Drivers can each be deployed following the links below:
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[Dell CSI Drivers Installation via Helm](helm/drivers)"
footer="Installs [PowerStore](helm/drivers/installation/powerstore/) [PowerMax](helm/drivers/installation/powermax/) [PowerScale](helm/drivers/installation/isilon/) [PowerFlex](helm/drivers/installation/powerflex/) [Unity XT](helm/drivers/installation/unity/)">}}
Dell CSI Helm installer installs the CSI Driver components using the provided Helm charts.
@@ -34,8 +34,8 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Both Helm and Dell CSM operator supports offline installation of the Dell CSI Storage Providers via `csi-offline-bundle.sh` or `csm-offline-bundle.sh` script, respectively, by creating a usable package.
[...More on installation instructions](offline/drivers)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Observability](helm/modules/installation/observability/)"
footer="Installs Observability Module">}}
CSM for Observability can be deployed either via Helm/CSM operator/CSM for Observability Installer/CSM for Observability Offline Installer
@@ -46,8 +46,8 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
CSM Authorization can be installed by using the provided Helm v3 charts on Kubernetes platforms or CSM operator.
[...More on installation instructions](helm/modules/installation/authorization/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Resiliency](helm/modules/installation/resiliency)"
footer="Installs Resiliency Module">}}
CSI drivers that support Helm chart installation allow CSM for Resiliency to be _optionally_ installed by variables in the chart. It can be updated via _podmon_ block specified in the _values.yaml_. It can be installed via CSM operator as well.
@@ -58,11 +58,11 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Replication module can be installed by installing repctl,Container Storage Modules (CSM) for Replication Controller,CSI driver after enabling replication. It can be installed via CSM operator as well.
[...More on installation instructions](helm/modules/installation/replication)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Encryption](helm/modules/installation/encryption)"
footer="Installs Encryption Module">}}
Encryption can be optionally installed via the PowerScale CSI driver Helm chart.
[...More on installation instructions](helm/modules/installation/encryption)
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
diff --git a/content/docs/interactive-tutorials/_index.md b/content/docs/interactive-tutorials/_index.md
index 51eca852bf..2ca7bf8d48 100644
--- a/content/docs/interactive-tutorials/_index.md
+++ b/content/docs/interactive-tutorials/_index.md
@@ -9,15 +9,15 @@ Welcome to Dell CSM's interactive tutorials section! Try the different modules w
Our interactive tutorials provide step-by-step guidance on how to use our CSM products in the context of PowerFlex Software-Defined-Storage.
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[**CSM Quickstart**](csm-quickstart/)">}}
If you are new to Dell CSM, start here and use the different modules interactively.
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[**CSM Operator**](csm-operator/)">}}
In this tutorial, you will learn how to install and use the CSM Operator.
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
diff --git a/content/docs/support/cert-csi/_index.md b/content/docs/support/cert-csi/_index.md
index 997e1fb0d9..ed856c5815 100644
--- a/content/docs/support/cert-csi/_index.md
+++ b/content/docs/support/cert-csi/_index.md
@@ -57,22 +57,17 @@ mv ./cert-csi-linux-amd64 ~/.local/bin/cert-csi
### Pull The Container Image
- {{< tabs name="pulling-cert-csi-image" >}}
- {{% tab name="Docker" %}}
-
- ```bash
+ {{< tabpane name="pulling-cert-csi-image" lang="bash">}}
+ {{}}
docker pull dellemc/cert-csi:v1.5.0
- ```
- {{% /tab %}}
- {{% tab name="Podman" %}}
+ {{}}
+ {{}}
- ```bash
podman pull dellemc/cert-csi:v1.5.0
- ```
- {{% /tab %}}
- {{< /tabs >}}
+ {{}}
+ {{< /tabpane >}}
### Building Locally
#### Prerequisites
@@ -88,24 +83,20 @@ git clone -b "v1.5.0" https://github.com/dell/cert-csi.git && cd cert-csi
2. Build cert-csi
-{{< tabs name="build-cert-csi" >}}
-{{% tab name="Executable" %}}
+{{< tabpane name="build-cert-csi" lang="bash">}}
+{{}}
-```bash
make build # the cert-csi executable will be in the working directory
chmod +x ./cert-csi # if building on *nix machine
-```
-{{% /tab %}}
-{{% tab name="Container Image" %}}
+{{}}
+{{}}
-```bash
# uses podman if available, otherwise uses docker. The resulting image is tagged cert-csi:latest
make docker
-```
-{{% /tab %}}
-{{< /tabs >}}
+{{}}
+{{< /tabpane >}}
### Optional
@@ -117,24 +108,18 @@ make install-ms
## Running Cert-CSI
-{{< tabs name="running-cert-csi" >}}
-{{% tab name="Executable" %}}
-```bash
+{{< tabpane name="running-cert-csi" lang="bash">}}
+{{}}
cert-csi --help
-```
-{{% /tab %}}
-{{% tab name="Docker" %}}
-```bash
+{{}}
+{{}}
docker run --rm -it -v ~/.kube/config:/root/.kube/config dellemc/cert-csi:v1.5.0 --help
-```
-{{% /tab %}}
-{{% tab name="Podman" %}}
-```bash
+{{}}
+{{}}
podman run --rm -it -v ~/.kube/config:/root/.kube/config dellemc/cert-csi:v1.5.0 --help
-```
-{{% /tab %}}
-{{< /tabs >}}
+{{}}
+{{< /tabpane >}}
> The following sections showing how to execute the various test suites use the executable for brevity. For executions requiring special behavior, such as mounting file arguments into the container image, it will be noted for the relevant command.
@@ -181,10 +166,9 @@ storageClasses:
Driver specific examples:
- {{< tabs name="cerity-config-examples" >}}
- {{% tab name="CSI PowerFlex" %}}
+ {{< tabpane name="cerity-config-examples" lang="yaml">}}
+ {{}}
-```yaml
storageClasses:
- name: vxflexos
minSize: 8Gi
@@ -220,12 +204,11 @@ storageClasses:
capacityTracking:
driverNamespace: powerstore
pollInterval: 2m
-```
- {{% /tab %}}
- {{% tab name="CSI PowerScale" %}}
-```yaml
+ {{}}
+ {{}}
+
storageClasses:
- name: isilon
minSize: 8Gi
@@ -244,12 +227,10 @@ storageClasses:
IsiPath: "/ifs/data/sample"
IsiVolumePathPermissions: "0777"
AzServiceIP: "192.168.2.1"
-```
- {{% /tab %}}
- {{% tab name="CSI PowerMax" %}}
+ {{}}
+ {{}}
-```yaml
storageClasses:
- name: powermax-iscsi
minSize: 5Gi
@@ -271,12 +252,10 @@ storageClasses:
capacityTracking:
driverNamespace: powerstore
pollInterval: 2m
-```
- {{% /tab %}}
- {{% tab name="CSI PowerStore" %}}
+ {{}}
+ {{}}
-```yaml
storageClasses:
- name: powerstore
minSize: 5Gi
@@ -311,12 +290,10 @@ storageClasses:
capacityTracking:
driverNamespace: powerstore
pollInterval: 2m
-```
- {{% /tab %}}
- {{% tab name="CSI Unity" %}}
+ {{}}
+ {{}}
-```yaml
storageClasses:
- name: unity-iscsi
minSize: 3Gi
@@ -354,10 +331,9 @@ storageClasses:
capacityTracking:
driverNamespace: unity
pollInterval: 2m
-```
- {{% /tab %}}
- {{< /tabs >}}
+ {{}}
+ {{< /tabpane >}}
#### Launching Test Run
1. Executes the [VolumeIO](#volume-io) suite.
@@ -394,19 +370,14 @@ Run `cert-csi certify -h` for more options.
If you are using the container image, the `cert-config` file must be mounted into the container. Assuming your `cert-config` file is `/home/user/example-certify-config.yaml`, here are examples of how to exeucte this suite with the container image.
-{{< tabs name="running-container-certify" >}}
-{{% tab name="Docker" %}}
-```bash
+{{< tabpane name="running-container-certify" lang="bash">}}
+{{}}
docker run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/example-certify-config.yaml:/example-certify-config.yaml dellemc/cert-csi:v1.5.0 certify --cert-config /example-certify-config.yaml --vsc
-```
-{{% /tab %}}
-{{% tab name="Podman" %}}
-```bash
+{{}}
+{{}}
podman run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/example-certify-config.yaml:/example-certify-config.yaml dellemc/cert-csi:v1.5.0 certify --cert-config /example-certify-config.yaml --vsc
-```
-
-{{% /tab %}}
-{{< /tabs >}}
+{{}}
+{{< /tabpane >}}
## Running Individual Test Suites
@@ -592,57 +563,46 @@ Run `cert-csi test ephemeral-volume -h` for more options.
If you are using the container image, the `attr` file must be mounted into the container. Assuming your `attr` file is `/home/user/ephemeral-config.properties`, here are examples of how to exeucte this suite with the container image.
-{{< tabs name="running-container-ephemeral-volume" >}}
-{{% tab name="Docker" %}}
-```bash
+{{< tabpane name="running-container-ephemeral-volume" lang="bash">}}
+{{}}
docker run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/ephemeral-config.properties:/ephemeral-config.properties dellemc/cert-csi:v1.5.0 test ephemeral-volume --driver --attr /ephemeral-config.properties
-```
-{{% /tab %}}
-{{% tab name="Podman" %}}
-```bash
+{{}}
+{{}}
podman run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/ephemeral-config.properties:/ephemeral-config.properties dellemc/cert-csi:v1.5.0 test ephemeral-volume --driver --attr /ephemeral-config.properties
-```
-{{% /tab %}}
-{{< /tabs >}}
+{{}}
+{{< /tabpane >}}
Sample ephemeral-config.properties (key/value pair)
- {{< tabs name="volume-attributes-examples" >}}
- {{% tab name="CSI PowerFlex" %}}
+ {{< tabpane name="volume-attributes-examples" lang="yaml">}}
+ {{}}
- ```yaml
volumeName=my-ephemeral-vol
size=10Gi
storagepool=sample
systemID=sample
- ```
- {{% /tab %}}
- {{% tab name="CSI PowerScale" %}}
+ {{}}
+ {{}}
- ```yaml
size=10Gi
ClusterName=sample
AccessZone=sample
IsiPath=/ifs/data/sample
IsiVolumePathPermissions=0777
AzServiceIP=192.168.2.1
- ```
- {{% /tab %}}
- {{% tab name="CSI PowerStore" %}}
+ {{}}
+ {{}}
- ```yaml
size=10Gi
arrayID=sample
nasName=sample
nfsAcls=0777
- ```
- {{% /tab %}}
- {{% tab name="CSI Unity" %}}
+ {{}}
+ {{}}
- ```yaml
size=10Gi
arrayId=sample
protocol=iSCSI
@@ -651,10 +611,9 @@ Sample ephemeral-config.properties (key/value pair)
tieringPolicy=1
storagePool=pool_2
nasName=sample
- ```
- {{% /tab %}}
- {{< /tabs >}}
+ {{}}
+ {{< /tabpane >}}
#### Storage Capacity Tracking
1. Creates namespace `functional-test` where resources will be created.
diff --git a/content/v1/_index.md b/content/v1/_index.md
index c59fb24d3f..7fadd25cda 100644
--- a/content/v1/_index.md
+++ b/content/v1/_index.md
@@ -15,7 +15,7 @@ The Dell Technologies (Dell) Container Storage Modules (CSM) enables simple and
CSM is made up of multiple components including modules (enterprise capabilities), CSI drivers (storage enablement), and other related applications (deployment, feature controllers, etc).
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[**Authorization**](authorization/)"
footer="Supports [PowerFlex](csidriver/features/powerflex/) [PowerScale](csidriver/features/powerscale/) [PowerMax](csidriver/features/powermax/)">}}
CSM for Authorization provides storage and Kubernetes administrators the ability to apply RBAC for Dell CSI Drivers. It does this by deploying a proxy between the CSI driver and the storage system to enforce role-based access and usage rules.
@@ -27,8 +27,8 @@ CSM is made up of multiple components including modules (enterprise capabilities
CSM for Replication project aims to bring Replication & Disaster Recovery capabilities of Dell Storage Arrays to Kubernetes clusters. It helps you replicate groups of volumes and can provide you a way to restart applications in case of both planned and unplanned migration.
[...Learn more](replication/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[**Resiliency**](resiliency/)"
footer="Supports [PowerFlex](csidriver/features/powerflex/) [PowerScale](csidriver/features/powerscale/) [Unity](csidriver/features/unity/) [PowerStore](csidriver/features/powerstore/)">}}
CSM for Resiliency is designed to make Kubernetes Applications, including those that utilize persistent storage, more resilient to various failures.
@@ -39,8 +39,8 @@ CSM is made up of multiple components including modules (enterprise capabilities
CSM for Observability provides visibility on the capacity of the volumes/file shares that is being managed with Dell CSM CSI (Container Storage Interface) drivers along with their performance in terms of bandwidth, IOPS, and response time.
[...Learn more](observability/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[**Application Mobility**](applicationmobility/)"
footer="Supports all platforms">}}
Container Storage Modules for Application Mobility provide Kubernetes administrators the ability to clone their stateful application workloads and application data to other clusters, either on-premise or in the cloud.
@@ -51,12 +51,12 @@ CSM is made up of multiple components including modules (enterprise capabilities
Encryption provides the capability to encrypt user data residing on volumes created by Dell CSI Drivers.
[...Learn more](secure/encryption/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[License](support/license/)"
footer="Required for [Application Mobility](applicationmobility/) & [Encryption](secure/encryption/)">}}
The tech-preview releases of Application Mobility and Encryption require a license.
Request a license using the [Container Storage Modules License Request](https://app.smartsheet.com/b/form/5e46fad643874d56b1f9cf4c9f3071fb) by providing the requested details.
[...Learn more](support/license/)
{{< /card >}}
-{{< /cardpane >}}
\ No newline at end of file
+{{% /cardpane %}}
\ No newline at end of file
diff --git a/content/v1/deployment/_index.md b/content/v1/deployment/_index.md
index 2cbef062d9..f041f5d58d 100644
--- a/content/v1/deployment/_index.md
+++ b/content/v1/deployment/_index.md
@@ -8,18 +8,18 @@ weight: 2
The Container Storage Modules along with the required CSI Drivers can each be deployed using CSM operator.
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[**CSM Operator**](csmoperator/)"
footer="Supported drivers: [PowerScale](csmoperator/drivers/powerscale/), [PowerStore](csmoperator/drivers/powerstore/), [PowerFlex](csmoperator/drivers/powerflex/), [PowerMax](csmoperator/drivers/powermax/), [Unity XT](csmoperator/drivers/unity/) Supported modules: [Authorization](csmoperator/modules/authorization/), [Replication](csmoperator/modules/replication/), [Observability](csmoperator/modules/observability/)">}}
Dell CSM Operator is a Kubernetes Operator, which can be used to install and manage the CSI Drivers and CSM Modules provided by Dell for various storage platforms. This operator is available as a community operator for upstream Kubernetes and can be deployed using OperatorHub.io. The operator can be installed using OLM (Operator Lifecycle Manager) or manually.
[...More on installation instructions](csmoperator/)
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
The Container Storage Modules and the required CSI Drivers can each be deployed following the links below:
-{{< cardpane >}}
- {{< card header="[Dell CSI Drivers Installation via Helm](helm/drivers)"
+{{% cardpane %}}
+ {{< card header="[Dell CSI Drivers Installation via Helm](../csidriver/installation/helm)"
footer="Installs [PowerStore](helm/drivers/installation/powerstore/) [PowerMax](helm/drivers/installation/powermax/) [PowerScale](helm/drivers/installation/isilon/) [PowerFlex](helm/drivers/installation/powerflex/) [Unity XT](helm/drivers/installation/unity/)">}}
Dell CSI Helm installer installs the CSI Driver components using the provided Helm charts.
[...More on installation instructions](helm/drivers/installation/)
@@ -34,8 +34,8 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Both Helm and Dell CSM operator supports offline installation of the Dell CSI Storage Providers via `csi-offline-bundle.sh` or `csm-offline-bundle.sh` script, respectively, by creating a usable package.
[...More on installation instructions](offline/drivers)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Observability](helm/modules/installation/observability/)"
footer="Installs Observability Module">}}
CSM for Observability can be deployed either via Helm/CSM operator/CSM for Observability Installer/CSM for Observability Offline Installer
@@ -46,8 +46,8 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
CSM Authorization can be installed by using the provided Helm v3 charts on Kubernetes platforms or CSM operator.
[...More on installation instructions](helm/modules/installation/authorization/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Resiliency](helm/modules/installation/resiliency)"
footer="Installs Resiliency Module">}}
CSI drivers that support Helm chart installation allow CSM for Resiliency to be _optionally_ installed by variables in the chart. It can be updated via _podmon_ block specified in the _values.yaml_. It can be installed via CSM operator as well.
@@ -58,8 +58,8 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Replication module can be installed by installing repctl,Container Storage Modules (CSM) for Replication Controller,CSI driver after enabling replication. It can be installed via CSM operator as well.
[...More on installation instructions](helm/modules/installation/replication)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Application Mobility](helm/modules/installation/applicationmobility)"
footer="Installs Application Mobility Module">}}
Application mobility module can be installed via helm charts. This is a tech preview release and it requires a license for installation.
@@ -70,4 +70,4 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Encryption can be optionally installed via the PowerScale CSI driver Helm chart.
[...More on installation instructions](helm/modules/installation/encryption)
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
diff --git a/content/v1/support/cert-csi/_index.md b/content/v1/support/cert-csi/_index.md
index ed88b711d4..6479d95a06 100644
--- a/content/v1/support/cert-csi/_index.md
+++ b/content/v1/support/cert-csi/_index.md
@@ -57,22 +57,18 @@ mv ./cert-csi-linux-amd64 ~/.local/bin/cert-csi
### Pull The Container Image
- {{< tabs name="pulling-cert-csi-image" >}}
- {{% tab name="Docker" %}}
+ {{< tabpane name="pulling-cert-csi-image" lang="bash">}}
+ {{}}
- ```bash
docker pull dellemc/cert-csi:v1.4.1
- ```
- {{% /tab %}}
- {{% tab name="Podman" %}}
+ {{}}
+ {{}}
- ```bash
podman pull dellemc/cert-csi:v1.4.1
- ```
-
- {{% /tab %}}
- {{< /tabs >}}
+
+ {{}}
+ {{< /tabpane>}}
### Building Locally
#### Prerequisites
@@ -88,24 +84,20 @@ git clone -b "v1.4.1" https://github.com/dell/cert-csi.git && cd cert-csi
2. Build cert-csi
-{{< tabs name="build-cert-csi" >}}
-{{% tab name="Executable" %}}
+{{< tabpane name="build-cert-csi" lang="bash">}}
+{{}}
-```bash
make build # the cert-csi executable will be in the working directory
chmod +x ./cert-csi # if building on *nix machine
-```
-{{% /tab %}}
-{{% tab name="Container Image" %}}
+{{}}
+{{}}
-```bash
# uses podman if available, otherwise uses docker. The resulting image is tagged cert-csi:latest
make docker
-```
-{{% /tab %}}
-{{< /tabs >}}
+{{}}
+{{< /tabpane >}}
### Optional
@@ -117,24 +109,24 @@ make install-ms
## Running Cert-CSI
-{{< tabs name="running-cert-csi" >}}
-{{% tab name="Executable" %}}
-```bash
+{{< tabpane name="running-cert-csi" lang="bash">}}
+{{}}
+
cert-csi --help
-```
-{{% /tab %}}
-{{% tab name="Docker" %}}
-```bash
+
+{{}}
+{{}}
+
docker run --rm -it -v ~/.kube/config:/root/.kube/config dellemc/cert-csi:v1.4.1 --help
-```
-{{% /tab %}}
-{{% tab name="Podman" %}}
-```bash
+
+{{}}
+{{}}
+
podman run --rm -it -v ~/.kube/config:/root/.kube/config dellemc/cert-csi:v1.4.1 --help
-```
-{{% /tab %}}
-{{< /tabs >}}
+
+{{}}
+{{< /tabpane >}}
> The following sections showing how to execute the various test suites use the executable for brevity. For executions requiring special behavior, such as mounting file arguments into the container image, it will be noted for the relevant command.
@@ -181,10 +173,9 @@ storageClasses:
Driver specific examples:
- {{< tabs name="cerity-config-examples" >}}
- {{% tab name="CSI PowerFlex" %}}
+ {{< tabpane name="cerity-config-examples" lang="yaml">}}
+ {{}}
-```yaml
storageClasses:
- name: vxflexos
minSize: 8Gi
@@ -220,12 +211,11 @@ storageClasses:
capacityTracking:
driverNamespace: powerstore
pollInterval: 2m
-```
- {{% /tab %}}
- {{% tab name="CSI PowerScale" %}}
+ {{}}
+ {{}}
+
-```yaml
storageClasses:
- name: isilon
minSize: 8Gi
@@ -244,12 +234,11 @@ storageClasses:
IsiPath: "/ifs/data/sample"
IsiVolumePathPermissions: "0777"
AzServiceIP: "192.168.2.1"
-```
- {{% /tab %}}
- {{% tab name="CSI PowerMax" %}}
-```yaml
+ {{}}
+ {{}}
+
storageClasses:
- name: powermax-iscsi
minSize: 5Gi
@@ -271,12 +260,12 @@ storageClasses:
capacityTracking:
driverNamespace: powerstore
pollInterval: 2m
-```
- {{% /tab %}}
- {{% tab name="CSI PowerStore" %}}
-```yaml
+ {{}}
+
+ {{}}
+
storageClasses:
- name: powerstore
minSize: 5Gi
@@ -311,12 +300,11 @@ storageClasses:
capacityTracking:
driverNamespace: powerstore
pollInterval: 2m
-```
- {{% /tab %}}
- {{% tab name="CSI Unity" %}}
-```yaml
+ {{}}
+ {{}}
+
storageClasses:
- name: unity-iscsi
minSize: 3Gi
@@ -354,10 +342,9 @@ storageClasses:
capacityTracking:
driverNamespace: unity
pollInterval: 2m
-```
- {{% /tab %}}
- {{< /tabs >}}
+ {{}}
+ {{< /tabpane >}}
#### Launching Test Run
1. Executes the [VolumeIO](#volume-io) suite.
@@ -394,19 +381,18 @@ Run `cert-csi certify -h` for more options.
If you are using the container image, the `cert-config` file must be mounted into the container. Assuming your `cert-config` file is `/home/user/example-certify-config.yaml`, here are examples of how to exeucte this suite with the container image.
-{{< tabs name="running-container-certify" >}}
-{{% tab name="Docker" %}}
-```bash
+{{< tabpane name="running-container-certify" lang="bash">}}
+{{}}
+
docker run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/example-certify-config.yaml:/example-certify-config.yaml dellemc/cert-csi:v1.4.1 certify --cert-config /example-certify-config.yaml --vsc
-```
-{{% /tab %}}
-{{% tab name="Podman" %}}
-```bash
+{{}}
+{{}}
+
podman run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/example-certify-config.yaml:/example-certify-config.yaml dellemc/cert-csi:v1.4.1 certify --cert-config /example-certify-config.yaml --vsc
-```
-{{% /tab %}}
-{{< /tabs >}}
+
+{{}}
+{{< /tabpane >}}
## Running Individual Test Suites
@@ -592,57 +578,46 @@ Run `cert-csi test ephemeral-volume -h` for more options.
If you are using the container image, the `attr` file must be mounted into the container. Assuming your `attr` file is `/home/user/ephemeral-config.properties`, here are examples of how to exeucte this suite with the container image.
-{{< tabs name="running-container-ephemeral-volume" >}}
-{{% tab name="Docker" %}}
-```bash
+{{< tabpane name="running-container-ephemeral-volume" lang="bash">}}
+{{}}
docker run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/ephemeral-config.properties:/ephemeral-config.properties dellemc/cert-csi:v1.4.1 test ephemeral-volume --driver --attr /ephemeral-config.properties
-```
-{{% /tab %}}
-{{% tab name="Podman" %}}
-```bash
+{{}}
+{{}}
podman run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/ephemeral-config.properties:/ephemeral-config.properties dellemc/cert-csi:v1.4.1 test ephemeral-volume --driver --attr /ephemeral-config.properties
-```
-{{% /tab %}}
-{{< /tabs >}}
+{{}}
+{{< /tabpane >}}
Sample ephemeral-config.properties (key/value pair)
- {{< tabs name="volume-attributes-examples" >}}
- {{% tab name="CSI PowerFlex" %}}
+ {{< tabpane name="volume-attributes-examples" lang="yaml">}}
+ {{}}
- ```yaml
volumeName: "my-ephemeral-vol"
size: "10Gi"
storagepool: "sample"
systemID: "sample"
- ```
- {{% /tab %}}
- {{% tab name="CSI PowerScale" %}}
+ {{}}
+ {{}}
- ```yaml
size: "10Gi"
ClusterName: "sample"
AccessZone: "sample"
IsiPath: "/ifs/data/sample"
IsiVolumePathPermissions: "0777"
AzServiceIP: "192.168.2.1"
- ```
- {{% /tab %}}
- {{% tab name="CSI PowerStore" %}}
+ {{}}
+ {{}}
- ```yaml
size: "10Gi"
arrayID: "sample"
nasName: "sample"
nfsAcls: "0777"
- ```
- {{% /tab %}}
- {{% tab name="CSI Unity" %}}
+ {{}}
+ {{}}
- ```yaml
size: "10Gi"
arrayID: "sample"
protocol: iSCSI
@@ -651,10 +626,9 @@ Sample ephemeral-config.properties (key/value pair)
tieringPolicy: "1"
storagePool: pool_2
nasName: "sample"
- ```
- {{% /tab %}}
- {{< /tabs >}}
+ {{}}
+ {{< /tabpane >}}
#### Storage Capacity Tracking
1. Creates namespace `functional-test` where resources will be created.
diff --git a/content/v2/_index.md b/content/v2/_index.md
index a8c4a5f0cd..c05a886ef5 100644
--- a/content/v2/_index.md
+++ b/content/v2/_index.md
@@ -15,7 +15,7 @@ The Dell Technologies (Dell) Container Storage Modules (CSM) enables simple and
CSM is made up of multiple components including modules (enterprise capabilities), CSI drivers (storage enablement), and other related applications (deployment, feature controllers, etc).
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[**Authorization**](authorization/)"
footer="Supports [PowerFlex](csidriver/features/powerflex/) [PowerScale](csidriver/features/powerscale/) [PowerMax](csidriver/features/powermax/)">}}
CSM for Authorization provides storage and Kubernetes administrators the ability to apply RBAC for Dell CSI Drivers. It does this by deploying a proxy between the CSI driver and the storage system to enforce role-based access and usage rules.
@@ -27,8 +27,8 @@ CSM is made up of multiple components including modules (enterprise capabilities
CSM for Replication project aims to bring Replication & Disaster Recovery capabilities of Dell Storage Arrays to Kubernetes clusters. It helps you replicate groups of volumes and can provide you a way to restart applications in case of both planned and unplanned migration.
[...Learn more](replication/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[**Resiliency**](resiliency/)"
footer="Supports [PowerFlex](csidriver/features/powerflex/) [PowerScale](csidriver/features/powerscale/) [Unity](csidriver/features/unity/) [PowerStore](csidriver/features/powerstore/)">}}
CSM for Resiliency is designed to make Kubernetes Applications, including those that utilize persistent storage, more resilient to various failures.
@@ -39,8 +39,8 @@ CSM is made up of multiple components including modules (enterprise capabilities
CSM for Observability provides visibility on the capacity of the volumes/file shares that is being managed with Dell CSM CSI (Container Storage Interface) drivers along with their performance in terms of bandwidth, IOPS, and response time.
[...Learn more](observability/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[**Application Mobility**](applicationmobility/)"
footer="Supports all platforms">}}
Container Storage Modules for Application Mobility provide Kubernetes administrators the ability to clone their stateful application workloads and application data to other clusters, either on-premise or in the cloud.
@@ -51,12 +51,12 @@ CSM is made up of multiple components including modules (enterprise capabilities
Encryption provides the capability to encrypt user data residing on volumes created by Dell CSI Drivers.
[...Learn more](secure/encryption/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[License](license/)"
footer="Required for [Application Mobility](applicationmobility/) & [Encryption](secure/encryption/)">}}
The tech-preview releases of Application Mobility and Encryption require a license.
Request a license using the [Container Storage Modules License Request](https://app.smartsheet.com/b/form/5e46fad643874d56b1f9cf4c9f3071fb) by providing the requested details.
[...Learn more](license/)
{{< /card >}}
-{{< /cardpane >}}
\ No newline at end of file
+{{% /cardpane %}}
diff --git a/content/v2/csidriver/installation/test/certcsi.md b/content/v2/csidriver/installation/test/certcsi.md
index 0879cd91af..872d4d53d3 100644
--- a/content/v2/csidriver/installation/test/certcsi.md
+++ b/content/v2/csidriver/installation/test/certcsi.md
@@ -48,22 +48,18 @@ mv ./cert-csi-linux-amd64 ~/.local/bin/cert-csi
### Pull The Container Image
- {{< tabs name="pulling-cert-csi-image" >}}
- {{% tab name="Docker" %}}
+ {{< tabpane name="pulling-cert-csi-image" lang="bash">}}
+ {{< tab header="Docker" >}}
- ```bash
docker pull dellemc/cert-csi:v1.3.1
- ```
- {{% /tab %}}
- {{% tab name="Podman" %}}
+ {{< /tab >}}
+ {{< tab header="Podman" >}}
- ```bash
podman pull dellemc/cert-csi:v1.3.1
- ```
- {{% /tab %}}
- {{< /tabs >}}
+ {{< /tab >}}
+ {{< /tabpane >}}
### Building Locally
#### Prerequisites
@@ -79,24 +75,20 @@ git clone -b "v1.3.1" https://github.com/dell/cert-csi.git && cd cert-csi
2. Build cert-csi
-{{< tabs name="build-cert-csi" >}}
-{{% tab name="Executable" %}}
+{{< tabpane name="build-cert-csi" lang="bash">}}
+{{< tab header="Executable" >}}
-```bash
make build # the cert-csi executable will be in the working directory
chmod +x ./cert-csi # if building on *nix machine
-```
-{{% /tab %}}
-{{% tab name="Container Image" %}}
+{{< /tab >}}
+{{< tab header="Container Image" >}}
-```bash
# uses podman if available, otherwise uses docker. The resulting image is tagged cert-csi:latest
make docker
-```
-{{% /tab %}}
-{{< /tabs >}}
+{{< /tab >}}
+{{< /tabpane >}}
### Optional
@@ -108,24 +100,18 @@ make install-ms
## Running Cert-CSI
-{{< tabs name="running-cert-csi" >}}
-{{% tab name="Executable" %}}
-```bash
+{{< tabpane name="running-cert-csi" lang="bash">}}
+{{< tab header="Executable" >}}
cert-csi --help
-```
-{{% /tab %}}
-{{% tab name="Docker" %}}
-```bash
+{{< /tab >}}
+{{< tab header="Docker" >}}
docker run --rm -it -v ~/.kube/config:/root/.kube/config dellemc/cert-csi:v1.3.1 --help
-```
-{{% /tab %}}
-{{% tab name="Podman" %}}
-```bash
+{{< /tab >}}
+{{< tab header="Podman" >}}
podman run --rm -it -v ~/.kube/config:/root/.kube/config dellemc/cert-csi:v1.3.1 --help
-```
-{{% /tab %}}
-{{< /tabs >}}
+{{< /tab >}}
+{{< /tabpane >}}
> The following sections showing how to execute the various test suites use the executable for brevity. For executions requiring special behavior, such as mounting file arguments into the container image, it will be noted for the relevant command.
@@ -172,10 +158,9 @@ storageClasses:
Driver specific examples:
- {{< tabs name="cerity-config-examples" >}}
- {{% tab name="CSI PowerFlex" %}}
+ {{< tabpane name="cerity-config-examples" lang="yaml">}}
+ {{< tab header="CSI PowerFlex" >}}
-```yaml
storageClasses:
- name: vxflexos
minSize: 8Gi
@@ -211,12 +196,10 @@ storageClasses:
capacityTracking:
driverNamespace: powerstore
pollInterval: 2m
-```
- {{% /tab %}}
- {{% tab name="CSI PowerScale" %}}
+ {{< /tab >}}
+ {{< tab header="CSI PowerScale" >}}
-```yaml
storageClasses:
- name: isilon
minSize: 8Gi
@@ -235,11 +218,10 @@ storageClasses:
IsiPath: "/ifs/data/sample"
IsiVolumePathPermissions: "0777"
AzServiceIP: "192.168.2.1"
-```
- {{% tab name="CSI PowerMax" %}}
+ {{< /tab >}}
+ {{< tab header="CSI PowerMax" >}}
-```yaml
storageClasses:
- name: powermax-iscsi
minSize: 5Gi
@@ -261,14 +243,11 @@ storageClasses:
capacityTracking:
driverNamespace: powerstore
pollInterval: 2m
-```
- {{% /tab %}}
+ {{< /tab >}}
- {{% /tab %}}
- {{% tab name="CSI PowerStore" %}}
+ {{< tab header="CSI PowerStore" >}}
-```yaml
storageClasses:
- name: powerstore
minSize: 5Gi
@@ -303,12 +282,10 @@ storageClasses:
capacityTracking:
driverNamespace: powerstore
pollInterval: 2m
-```
- {{% /tab %}}
- {{% tab name="CSI Unity" %}}
+ {{< /tab >}}
+ {{< tab header="CSI Unity" >}}
-```yaml
storageClasses:
- name: unity-iscsi
minSize: 3Gi
@@ -346,10 +323,9 @@ storageClasses:
capacityTracking:
driverNamespace: unity
pollInterval: 2m
-```
- {{% /tab %}}
- {{< /tabs >}}
+ {{< /tab >}}
+ {{< /tabpane >}}
### Launching Test Run
1. Executes the [VolumeIO](#volume-io) suite.
@@ -386,19 +362,15 @@ Run `cert-csi certify -h` for more options.
If you are using the container image, the `cert-config` file must be mounted into the container. Assuming your `cert-config` file is `/home/user/example-certify-config.yaml`, here are examples of how to exeucte this suite with the container image.
-{{< tabs name="running-container-certify" >}}
-{{% tab name="Docker" %}}
-```bash
+{{< tabpane name="running-container-certify" lang="bash">}}
+{{< tab header="Docker" >}}
docker run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/example-certify-config.yaml:/example-certify-config.yaml dellemc/cert-csi:v1.3.1 certify --cert-config /example-certify-config.yaml --vsc
-```
-{{% /tab %}}
-{{% tab name="Podman" %}}
-```bash
+{{< /tab >}}
+{{< tab header="Podman" >}}
podman run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/example-certify-config.yaml:/example-certify-config.yaml dellemc/cert-csi:v1.3.1 certify --cert-config /example-certify-config.yaml --vsc
-```
-{{% /tab %}}
-{{< /tabs >}}
+{{< /tab >}}
+{{< /tabpane >}}
### Running Invidual Test Suites
@@ -584,57 +556,46 @@ Run `cert-csi test ephemeral-volume -h` for more options.
If you are using the container image, the `attr` file must be mounted into the container. Assuming your `attr` file is `/home/user/ephemeral-config.properties`, here are examples of how to exeucte this suite with the container image.
-{{< tabs name="running-container-ephemeral-volume" >}}
-{{% tab name="Docker" %}}
-```bash
+{{< tabpane name="running-container-ephemeral-volume" lang="bash">}}
+{{< tab header="Docker" >}}
docker run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/ephemeral-config.properties:/ephemeral-config.properties dellemc/cert-csi:v1.3.1 test ephemeral-volume --driver --attr /ephemeral-config.properties
-```
-{{% /tab %}}
-{{% tab name="Podman" %}}
-```bash
+{{< /tab >}}
+{{< tab header="Podman" >}}
podman run --rm -it -v ~/.kube/config:/root/.kube/config -v /home/user/ephemeral-config.properties:/ephemeral-config.properties dellemc/cert-csi:v1.3.1 test ephemeral-volume --driver --attr /ephemeral-config.properties
-```
-{{% /tab %}}
-{{< /tabs >}}
+{{< /tab >}}
+{{< /tabpane >}}
Sample ephemeral-config.properties (key/value pair)
- {{< tabs name="volume-attributes-examples" >}}
- {{% tab name="CSI PowerFlex" %}}
+ {{< tabpane name="volume-attributes-examples" lang="yaml">}}
+ {{< tab header="CSI PowerFlex" >}}
- ```yaml
volumeName=my-ephemeral-vol
size=10Gi
storagepool=sample
systemID=sample
- ```
- {{% /tab %}}
- {{% tab name="CSI PowerScale" %}}
+ {{< /tab >}}
+ {{< tab header="CSI PowerScale" >}}
- ```yaml
size=10Gi
ClusterName=sample
AccessZone=sample
IsiPath=/ifs/data/sample
IsiVolumePathPermissions=0777
AzServiceIP=192.168.2.1
- ```
- {{% /tab %}}
- {{% tab name="CSI PowerStore" %}}
+ {{< /tab >}}
+ {{< tab header="CSI PowerStore" >}}
- ```yaml
size=10Gi
arrayID=sample
nasName=sample
nfsAcls=0777
- ```
- {{% /tab %}}
- {{% tab name="CSI Unity" %}}
+ {{< /tab >}}
+ {{< tab header="CSI Unity" >}}
- ```yaml
size=10Gi
arrayId=sample
protocol=iSCSI
@@ -643,10 +604,9 @@ Sample ephemeral-config.properties (key/value pair)
tieringPolicy=1
storagePool=pool_2
nasName=sample
- ```
- {{% /tab %}}
- {{< /tabs >}}
+ {{< /tab >}}
+ {{< /tabpane >}}
#### Storage Capacity Tracking
diff --git a/content/v2/deployment/_index.md b/content/v2/deployment/_index.md
index 69be54cedd..877b6537f9 100644
--- a/content/v2/deployment/_index.md
+++ b/content/v2/deployment/_index.md
@@ -8,17 +8,17 @@ weight: 1
The Container Storage Modules along with the required CSI Drivers can each be deployed using CSM operator.
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[**CSM Operator**](csmoperator/)"
footer="Supported drivers: [PowerScale](csmoperator/drivers/powerscale/), [PowerStore](csmoperator/drivers/powerstore/), [PowerFlex](csmoperator/drivers/powerflex/), [PowerMax](csmoperator/drivers/powermax/), [Unity XT](csmoperator/drivers/unity/) Supported modules: [Authorization](csmoperator/modules/authorization/), [Replication](csmoperator/modules/replication/), [Observability](csmoperator/modules/observability/)">}}
Dell CSM Operator is a Kubernetes Operator, which can be used to install and manage the CSI Drivers and CSM Modules provided by Dell for various storage platforms. This operator is available as a community operator for upstream Kubernetes and can be deployed using OperatorHub.io. The operator can be installed using OLM (Operator Lifecycle Manager) or manually.
[...More on installation instructions](csmoperator/)
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
The Container Storage Modules and the required CSI Drivers can each be deployed following the links below:
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[Dell CSI Drivers Installation via Helm](../csidriver/installation/helm)"
footer="Installs [PowerStore](../csidriver/installation/helm/powerstore/) [PowerMax](../csidriver/installation/helm/powermax/) [PowerScale](../csidriver/installation/helm/isilon/) [PowerFlex](../csidriver/installation/helm/powerflex/) [Unity XT](../csidriver/installation/helm/unity/)">}}
Dell CSI Helm installer installs the CSI Driver components using the provided Helm charts.
@@ -34,8 +34,8 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Both Helm and Dell CSM operator supports offline installation of the Dell CSI Storage Providers via `csi-offline-bundle.sh` or `csm-offline-bundle.sh` script, respectively, by creating a usable package.
[...More on installation instructions](../csidriver/installation/offline)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Observability](../observability/deployment)"
footer="Installs Observability Module">}}
CSM for Observability can be deployed either via Helm/CSM operator/CSM for Observability Installer/CSM for Observability Offline Installer
@@ -46,8 +46,8 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
CSM Authorization can be installed by using the provided Helm v3 charts on Kubernetes platforms or CSM operator.
[...More on installation instructions](../authorization/deployment)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Resiliency](../resiliency/deployment)"
footer="Installs Resiliency Module">}}
CSI drivers that support Helm chart installation allow CSM for Resiliency to be _optionally_ installed by variables in the chart. It can be updated via _podmon_ block specified in the _values.yaml_. It can be installed via CSM operator as well.
@@ -58,8 +58,8 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Replication module can be installed by installing repctl,Container Storage Modules (CSM) for Replication Controller,CSI driver after enabling replication. It can be installed via CSM operator as well.
[...More on installation instructions](../replication/deployment)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Application Mobility](../applicationmobility/deployment)"
footer="Installs Application Mobility Module">}}
Application mobility module can be installed via helm charts. This is a tech preview release and it requires a license for installation.
@@ -70,4 +70,4 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Encryption can be optionally installed via the PowerScale CSI driver Helm chart.
[...More on installation instructions](../secure/encryption//deployment)
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
diff --git a/content/v3/_index.md b/content/v3/_index.md
index 012ffcef40..ec696a7d8f 100644
--- a/content/v3/_index.md
+++ b/content/v3/_index.md
@@ -16,7 +16,7 @@ The Dell Technologies (Dell) Container Storage Modules (CSM) enables simple and
CSM is made up of multiple components including modules (enterprise capabilities), CSI drivers (storage enablement), and other related applications (deployment, feature controllers, etc).
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[**Authorization**](authorization/)"
footer="Supports [PowerFlex](csidriver/features/powerflex/) [PowerScale](csidriver/features/powerscale/) [PowerMax](csidriver/features/powermax/)">}}
CSM for Authorization provides storage and Kubernetes administrators the ability to apply RBAC for Dell CSI Drivers. It does this by deploying a proxy between the CSI driver and the storage system to enforce role-based access and usage rules.
@@ -28,8 +28,8 @@ CSM is made up of multiple components including modules (enterprise capabilities
CSM for Replication project aims to bring Replication & Disaster Recovery capabilities of Dell Storage Arrays to Kubernetes clusters. It helps you replicate groups of volumes and can provide you a way to restart applications in case of both planned and unplanned migration.
[...Learn more](replication/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[**Resiliency**](resiliency/)"
footer="Supports [PowerFlex](csidriver/features/powerflex/) [PowerScale](csidriver/features/powerscale/) [Unity](csidriver/features/unity/)">}}
CSM for Resiliency is designed to make Kubernetes Applications, including those that utilize persistent storage, more resilient to various failures.
@@ -40,8 +40,8 @@ CSM is made up of multiple components including modules (enterprise capabilities
CSM for Observability provides visibility on the capacity of the volumes/file shares that is being managed with Dell CSM CSI (Container Storage Interface) drivers along with their performance in terms of bandwidth, IOPS, and response time.
[...Learn more](observability/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[**Application Mobility**](applicationmobility/)"
footer="Supports all platforms">}}
Container Storage Modules for Application Mobility provide Kubernetes administrators the ability to clone their stateful application workloads and application data to other clusters, either on-premise or in the cloud.
@@ -52,15 +52,15 @@ CSM is made up of multiple components including modules (enterprise capabilities
Encryption provides the capability to encrypt user data residing on volumes created by Dell CSI Drivers.
[...Learn more](secure/encryption/)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[License](license/)"
footer="Required for [Application Mobility](applicationmobility/) & [Encryption](secure/encryption/)">}}
The tech-preview releases of Application Mobility and Encryption require a license.
Request a license using the [Container Storage Modules License Request](https://app.smartsheet.com/b/form/5e46fad643874d56b1f9cf4c9f3071fb) by providing the requested details.
[...Learn more](license/)
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
## CSM Modules Support Matrix for Dell CSI Drivers
diff --git a/content/v3/deployment/_index.md b/content/v3/deployment/_index.md
index f9ae6b5cb6..d76bc0b10d 100644
--- a/content/v3/deployment/_index.md
+++ b/content/v3/deployment/_index.md
@@ -8,17 +8,17 @@ weight: 1
The Container Storage Modules along with the required CSI Drivers can each be deployed using CSM operator.
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[**CSM Operator**](csmoperator/)"
footer="Supported drivers: [PowerScale](csmoperator/drivers/powerscale/), [PowerStore](csmoperator/drivers/powerstore/), [PowerFlex](csmoperator/drivers/powerflex/), [PowerMax](csmoperator/drivers/powermax/), [Unity XT](csmoperator/drivers/unity/) Supported modules: [Authorization](csmoperator/modules/authorization/), [Replication](csmoperator/modules/replication/), [Observability](csmoperator/modules/observability/)">}}
Dell CSM Operator is a Kubernetes Operator, which can be used to install and manage the CSI Drivers and CSM Modules provided by Dell for various storage platforms. This operator is available as a community operator for upstream Kubernetes and can be deployed using OperatorHub.io. The operator can be installed using OLM (Operator Lifecycle Manager) or manually.
[...More on installation instructions](csmoperator/)
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
The Container Storage Modules and the required CSI Drivers can each be deployed following the links below:
-{{< cardpane >}}
+{{% cardpane %}}
{{< card header="[Dell CSI Drivers Installation via Helm](../csidriver/installation/helm)"
footer="Installs [PowerStore](../csidriver/installation/helm/powerstore/) [PowerMax](../csidriver/installation/helm/powermax/) [PowerScale](../csidriver/installation/helm/isilon/) [PowerFlex](../csidriver/installation/helm/powerflex/) [Unity XT](../csidriver/installation/helm/unity/)">}}
Dell CSI Helm installer installs the CSI Driver components using the provided Helm charts.
@@ -34,15 +34,15 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Both Helm and Dell CSI opetor supports offline installation of the Dell CSI Storage Providers via `csi-offline-bundle.sh` script by creating a usable package.
[...More on installation instructions](../csidriver/installation/offline)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell CSI Drivers Installation via operator](../csidriver/installation/operator)"
footer="Installs [PowerStore](../csidriver/installation/operator/powerstore/) [PowerMax](../csidriver/installation/operator/powermax/) [PowerScale](../csidriver/installation/operator/isilon/) [PowerFlex](../csidriver/installation/operator/powerflex/) [Unity XT](../csidriver/installation/operator/unity/)">}}
Dell CSI Operator is a Kubernetes Operator, which can be used to install and manage the CSI Drivers provided by Dell for various storage platforms. This operator is available as a community operator for upstream Kubernetes and can be deployed using OperatorHub.io. It is also available as a certified operator for OpenShift clusters and can be deployed using the OpenShift Container Platform. Both these methods of installation use OLM (Operator Lifecycle Manager). The operator can also be deployed manually.
[...More on installation instructions](../csidriver/installation/operator)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Observability](../observability/deployment)"
footer="Installs Observability Module">}}
CSM for Observability can be deployed either via Helm or CSM for Observability Installer or CSM for Observability Offline Installer
@@ -53,8 +53,8 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
CSM Authorization can be installed by using the provided Helm v3 charts on Kubernetes platforms.
[...More on installation instructions](../authorization/deployment)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Resiliency](../resiliency/deployment)"
footer="Installs Resiliency Module">}}
CSI drivers that support Helm chart installation allow CSM for Resiliency to be _optionally_ installed by variables in the chart. It can be updated via _podmon_ block specified in the _values.yaml_
@@ -65,8 +65,8 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Replication module can be installed by installing repctl,Container Storage Modules (CSM) for Replication Controller,CSI driver after enabling replication.
[...More on installation instructions](../replication/deployment)
{{< /card >}}
-{{< /cardpane >}}
-{{< cardpane >}}
+{{% /cardpane %}}
+{{% cardpane %}}
{{< card header="[Dell Container Storage Module for Application Mobility](../applicationmobility/deployment)"
footer="Installs Application Mobility Module">}}
Application mobility module can be installed via helm charts. This is a tech preview release and it requires a license for installation.
@@ -77,4 +77,4 @@ The Container Storage Modules and the required CSI Drivers can each be deployed
Encryption can be optionally installed via the PowerScale CSI driver Helm chart.
[...More on installation instructions](../secure/encryption//deployment)
{{< /card >}}
-{{< /cardpane >}}
+{{% /cardpane %}}
diff --git a/go.mod b/go.mod
index 177303a13e..40cb2f2a3e 100644
--- a/go.mod
+++ b/go.mod
@@ -3,7 +3,6 @@ module github.com/google/docsy-example
go 1.12
require (
- github.com/FortAwesome/Font-Awesome v0.0.0-20210804190922-7d3d774145ac // indirect
- github.com/google/docsy v0.4.1-0.20220725215923-c09d2feff8b2 // indirect
- github.com/twbs/bootstrap v4.6.1+incompatible // indirect
+ github.com/google/docsy v0.10.1-0.20240529105443-333c2f8d4172 // indirect - v0.10.0-12-g333c2f8
+ github.com/google/docsy/dependencies v0.7.2 // indirect
)
diff --git a/go.sum b/go.sum
index 610ed4772e..11cf3a6e9c 100644
--- a/go.sum
+++ b/go.sum
@@ -1,18 +1,14 @@
-github.com/FortAwesome/Font-Awesome v0.0.0-20210804190922-7d3d774145ac h1:AjwgwoaDsNEA1Wtc8pgw/BqG7SEk9bKxXPjEPQQ42vY=
-github.com/FortAwesome/Font-Awesome v0.0.0-20210804190922-7d3d774145ac/go.mod h1:IUgezN/MFpCDIlFezw3L8j83oeiIuYoj28Miwr/KUYo=
-github.com/google/docsy v0.2.0-pre.0.20220404161753-f7b37a0aca2a h1:bnufXLbTD8QCLbqygy/kmYxUK1JINSlHU5rLQYTcFMQ=
-github.com/google/docsy v0.2.0-pre.0.20220404161753-f7b37a0aca2a/go.mod h1:yuKLZHMX5CKiLUH55+ePFJaYnoSwUVVffNareaOGQYo=
-github.com/google/docsy v0.2.0 h1:DN6wfyyp2rXsjdV1K3wioxOBTRvG6Gg48wLPDso2lc4=
-github.com/google/docsy v0.2.0/go.mod h1:shlabwAQakGX6qpXU6Iv/b/SilpHRd7d+xqtZQd3v+8=
-github.com/google/docsy v0.4.0 h1:Eyt2aiDC1fnw/Qq/9xnIqUU5n5Yyk4c8gX3nBDdTv/4=
-github.com/google/docsy v0.4.0/go.mod h1:vJjGkHNaw9bO42gpFTWwAUzHZWZEVlK46Kx7ikY5c7Y=
-github.com/google/docsy v0.4.1-0.20220720164819-c65715725ee9 h1:XO+X/xxhd66juziB8RvFAkGh36QvC5yX77myqWWe7/M=
-github.com/google/docsy v0.4.1-0.20220720164819-c65715725ee9/go.mod h1:vJjGkHNaw9bO42gpFTWwAUzHZWZEVlK46Kx7ikY5c7Y=
-github.com/google/docsy v0.4.1-0.20220725215923-c09d2feff8b2 h1:s12aPmQtqIVUoRZwVBTuyCp46caANLcXW2ll6DaPkus=
-github.com/google/docsy v0.4.1-0.20220725215923-c09d2feff8b2/go.mod h1:vJjGkHNaw9bO42gpFTWwAUzHZWZEVlK46Kx7ikY5c7Y=
-github.com/google/docsy/dependencies v0.2.0-pre.0.20220404161753-f7b37a0aca2a h1:fy6IqUmWGMdQngRa7+CP1cRkTseQK7OEsqx6r7dNuSA=
-github.com/google/docsy/dependencies v0.2.0-pre.0.20220404161753-f7b37a0aca2a/go.mod h1:oPdn05sNt61uT6K+LqNRhYq1jeqrsbbQMDXkPdPscmA=
-github.com/google/docsy/dependencies v0.2.0/go.mod h1:2zZxHF+2qvkyXhLZtsbnqMotxMukJXLaf8fAZER48oo=
-github.com/google/docsy/dependencies v0.4.0/go.mod h1:2zZxHF+2qvkyXhLZtsbnqMotxMukJXLaf8fAZER48oo=
-github.com/twbs/bootstrap v4.6.1+incompatible h1:75PsBfPU1SS65ag0Z3Cq6JNXVAfUNfB0oCLHh9k9Fu8=
-github.com/twbs/bootstrap v4.6.1+incompatible/go.mod h1:fZTSrkpSf0/HkL0IIJzvVspTt1r9zuf7XlZau8kpcY0=
+github.com/FortAwesome/Font-Awesome v0.0.0-20230327165841-0698449d50f2/go.mod h1:IUgezN/MFpCDIlFezw3L8j83oeiIuYoj28Miwr/KUYo=
+github.com/FortAwesome/Font-Awesome v0.0.0-20240402185447-c0f460dca7f7/go.mod h1:IUgezN/MFpCDIlFezw3L8j83oeiIuYoj28Miwr/KUYo=
+github.com/google/docsy v0.10.0 h1:6tMDacPwAyRWNCfvsn/9qGOZDQ8b0aRzjRZvnZPY5dg=
+github.com/google/docsy v0.10.0/go.mod h1:c0nIAqmRTOuJ01F85U/wJPQtc3Zj9N58Kea9bOT2AJc=
+github.com/google/docsy v0.10.1-0.20240516225026-36746913371a h1:Fmx4SmmyWZf4q3rq9jhVWr6/h2MKEi4+61irjQO2ylI=
+github.com/google/docsy v0.10.1-0.20240516225026-36746913371a/go.mod h1:c0nIAqmRTOuJ01F85U/wJPQtc3Zj9N58Kea9bOT2AJc=
+github.com/google/docsy v0.10.1-0.20240528200232-6549143cf323 h1:T4UiGpcrIgiuyQj0tc7BtJwv6u736J8Jnl4QZno0fk4=
+github.com/google/docsy v0.10.1-0.20240528200232-6549143cf323/go.mod h1:c0nIAqmRTOuJ01F85U/wJPQtc3Zj9N58Kea9bOT2AJc=
+github.com/google/docsy v0.10.1-0.20240529105443-333c2f8d4172 h1:1gAAuOfHRok/hJqfF+wpjOYqlH0d76dwUsskLEnOzxo=
+github.com/google/docsy v0.10.1-0.20240529105443-333c2f8d4172/go.mod h1:c0nIAqmRTOuJ01F85U/wJPQtc3Zj9N58Kea9bOT2AJc=
+github.com/google/docsy/dependencies v0.7.2 h1:+t5ufoADQAj4XneFphz4A+UU0ICAxmNaRHVWtMYXPSI=
+github.com/google/docsy/dependencies v0.7.2/go.mod h1:gihhs5gmgeO+wuoay4FwOzob+jYJVyQbNaQOh788lD4=
+github.com/twbs/bootstrap v5.2.3+incompatible/go.mod h1:fZTSrkpSf0/HkL0IIJzvVspTt1r9zuf7XlZau8kpcY0=
+github.com/twbs/bootstrap v5.3.3+incompatible/go.mod h1:fZTSrkpSf0/HkL0IIJzvVspTt1r9zuf7XlZau8kpcY0=
diff --git a/hugo-disabled.toml b/hugo-disabled.toml
new file mode 100644
index 0000000000..d115b8e3c8
--- /dev/null
+++ b/hugo-disabled.toml
@@ -0,0 +1,172 @@
+baseURL = "https://dell.github.io/csm-docs/docs/"
+title = "Dell Container Storage Modules"
+
+# Language settings
+contentDir = "content/en"
+defaultContentLanguage = "en"
+defaultContentLanguageInSubdir = false
+# Useful when translating.
+enableMissingTranslationPlaceholders = true
+
+enableRobotsTXT = true
+
+# Will give values to .Lastmod etc.
+enableGitInfo = true
+
+# Comment out to enable taxonomies in Docsy
+# disableKinds = ["taxonomy", "taxonomyTerm"]
+
+# You can add your own taxonomies
+[taxonomies]
+tag = "tags"
+category = "categories"
+
+[params.taxonomy]
+# set taxonomyCloud = [] to hide taxonomy clouds
+taxonomyCloud = ["tags", "categories"]
+
+# If used, must have same length as taxonomyCloud
+taxonomyCloudTitle = ["Tag Cloud", "Categories"]
+
+# set taxonomyPageHeader = [] to hide taxonomies on the page headers
+taxonomyPageHeader = ["tags", "categories"]
+
+# Highlighting config
+pygmentsCodeFences = true
+pygmentsUseClasses = false
+# Use the new Chroma Go highlighter in Hugo.
+pygmentsUseClassic = false
+#pygmentsOptions = "linenos=table"
+# See https://help.farbox.com/pygments.html
+pygmentsStyle = "tango"
+
+# Configure how URLs look like per section.
+[permalinks]
+blog = "/:section/:year/:month/:day/:slug/"
+
+# Image processing configuration.
+[imaging]
+resampleFilter = "CatmullRom"
+quality = 75
+anchor = "smart"
+
+# Language configuration
+
+[languages]
+[languages.en]
+languageName ="English"
+title = "Container Storage Modules"
+[languages.en.params]
+description = "Documentation for Container Storage Modules"
+[markup]
+ [markup.goldmark]
+ [markup.goldmark.parser.attribute]
+ block = true
+ [markup.goldmark.renderer]
+ unsafe = true
+ [markup.highlight]
+ # See a complete list of available styles at https://xyproto.github.io/splash/docs/all.html
+ style = "tango"
+ # Uncomment if you want your chosen highlight style used for code blocks without a specified language
+ # guessSyntax = "true"
+
+# Comment out if you don't want the "print entire section" link enabled.
+[outputs]
+section = ["HTML", "print", "RSS"]
+
+# Everything below this are Site Params
+
+[params]
+privacy_policy = "https://policies.google.com/privacy"
+
+# Menu title if your navbar has a versions selector to access old versions of your site.
+# This menu appears only if you have at least one [params.versions] set.
+version_menu = "Releases"
+
+# Flag used in the "version-banner" partial to decide whether to display a
+# banner on every page indicating that this is an archived version of the docs.
+# Set this flag to "true" if you want to display the banner.
+archived_version = false
+
+# The version number for the version of the docs represented in this doc set.
+# Used in the "version-banner" partial to display a version number for the
+# current doc set.
+version = "0.0"
+
+# A link to latest version of the docs. Used in the "version-banner" partial to
+# point people to the main doc site.
+url_latest_version = "dell.github.io/csm-docs/docs/"
+
+# Repository configuration (URLs for in-page links to opening issues and suggesting changes)
+github_repo = "https://github.com/dell/csm"
+# An optional link to a related project repo. For example, the sibling repository where your product code lives.
+github_project_repo = "https://github.com/dell/csm-docs"
+
+# Specify a value here if your content directory is not in your repo's root directory
+# github_subdir = ""
+
+# Uncomment this if your GitHub repo does not have "main" as the default branch,
+# or specify a new value if you want to reference another branch in your GitHub links
+github_branch= "main"
+
+# Google Custom Search Engine ID. Remove or comment out to disable search.
+gcs_engine_id = "d72aa9b2712488cc3"
+
+# Enable Lunr.js offline search
+offlineSearch = false
+
+# Enable syntax highlighting and copy buttons on code blocks with Prism
+prism_syntax_highlighting = false
+
+[params.copyright]
+ authors = "Dell Technologies"
+ from_year = 2024
+
+# User interface configuration
+[params.ui]
+# Set to true to disable breadcrumb navigation.
+breadcrumb_disable = false
+# Set to false if you don't want to display a logo (/assets/icons/logo.svg) in the top navbar
+navbar_logo = true
+# Set to true if you don't want the top navbar to be translucent when over a `block/cover`, like on the homepage.
+navbar_translucent_over_cover_disable = false
+# Enable to show the side bar menu in its compact state.
+sidebar_menu_compact = false
+# Set to true to hide the sidebar search box (the top nav search box will still be displayed if search is enabled)
+sidebar_search_disable = false
+
+# Adds a H2 section titled "Feedback" to the bottom of each doc. The responses are sent to Google Analytics as events.
+# This feature depends on [services.googleAnalytics] and will be disabled if "services.googleAnalytics.id" is not set.
+# If you want this feature, but occasionally need to remove the "Feedback" section from a single page,
+# add "hide_feedback: true" to the page's front matter.
+[params.ui.feedback]
+enable = true
+# The responses that the user sees after clicking "yes" (the page was helpful) or "no" (the page was not helpful).
+yes = 'Glad to hear it! Please tell us how we can improve.'
+no = 'Sorry to hear that. Please tell us how we can improve.'
+
+# Adds a reading time to the top of each doc.
+# If you want this feature, but occasionally need to remove the Reading time from a single page,
+# add "hide_readingtime: true" to the page's front matter
+[params.ui.readingtime]
+enable = false
+
+[params.links]
+# End user relevant links. These will show up on left side of footer and in the community page if you have one.
+[[params.links.developer]]
+ name = "GitHub"
+ url = "https://github.com/dell/csm"
+ icon = "fab fa-github"
+ desc = "Development takes place here!"
+
+# hugo module configuration
+
+[module]
+ # Uncomment the next line to build and serve using local docsy clone declared in the named Hugo workspace:
+ # workspace = "docsy.work"
+ [module.hugoVersion]
+ extended = true
+ min = "0.110.0"
+ [[module.imports]]
+ path = "github.com/google/docsy"
+ disable = false
diff --git a/config.toml b/hugo.toml
similarity index 97%
rename from config.toml
rename to hugo.toml
index 919f68ed82..b772cb01d8 100644
--- a/config.toml
+++ b/hugo.toml
@@ -1,5 +1,5 @@
baseURL = "https://dell.github.io/csm-docs/"
-title = "Dell Technologies"
+title = ""
canonifyURLs = false
enableRobotsTXT = true
@@ -16,7 +16,7 @@ defaultContentLanguage = "en"
# Useful when translating.
enableMissingTranslationPlaceholders = true
-disableKinds = ["taxonomy", "taxonomyTerm", "term"]
+disableKinds = ["taxonomy", "taxonomy", "term"]
# Highlighting config
pygmentsCodeFences = true
@@ -52,7 +52,7 @@ anchor = "smart"
# Language configuration
[languages]
-[languages.en]
+[languages.en.params]
title = "Dell Technologies"
description = "Dell Technologies (Dell) Container Storage Modules documentation pages"
languageName ="English"
@@ -100,8 +100,6 @@ github_repo = ""
# Google Custom Search Engine ID. Remove or comment out to disable search.
#gcs_engine_id = "011737558837375720776:fsdu1nryfng"
-# Enable Algolia DocSearch
-algolia_docsearch = false
# Enable Lunr.js offline search
offlineSearch = true
@@ -119,8 +117,8 @@ breadcrumb_disable = false
sidebar_search_disable = false
# Set to false if you don't want to display a logo (/assets/icons/logo.svg) in the top nav bar
navbar_logo = true
-# Set to true to disable the About link in the site footer
-footer_about_disable = false
+# Set to false to disable the About link in the site footer
+footer_about_enable = true
# Adds a H2 section titled "Feedback" to the bottom of each doc. The responses are sent to Google Analytics as events.
# This feature depends on [services.googleAnalytics] and will be disabled if "services.googleAnalytics.id" is not set.
@@ -138,6 +136,10 @@ no = 'Sorry to hear that. Please
-