Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 1.10.0 #1026

Merged
merged 38 commits into from
Mar 20, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
d7d5b82
CSM 1.10 driver version changes (#949)
shanmydell Jan 9, 2024
6c98fcd
Remove k3s debian to community supported (#951)
coulof Jan 16, 2024
b52ffa8
Update PowerFlex version to 4.5.x (#953)
gallacher Jan 16, 2024
4d42799
Release notes for CSM 1.9 (#954)
csmbot Jan 18, 2024
dda0671
Updated the troubleshooting for Powerstore (#956)
tssushma Jan 24, 2024
8a4d37c
Architecture change of CSM deployment pages (#957)
shanmydell Jan 25, 2024
ce39918
Merge branch 'main' into release-1.10.0
shanmydell Jan 25, 2024
df890cc
[feature-1091]: Update Authorization Redis storage class and proxy se…
atye Feb 2, 2024
4800d32
MKE version update (#969)
tssushma Feb 5, 2024
2c84dd7
Adding medusa plus support for PowerStore (#970)
boyamurthy Feb 6, 2024
130d2ae
Secret update for Powerflex driver (#971)
adarsh-dell Feb 6, 2024
75628be
Updating Authorization documentation (#972) (#973)
PeresKereotubo Feb 7, 2024
49d2ea2
update index (#974)
shanmydell Feb 8, 2024
6dc4f19
Update support for all PowerScale 9.5.0.x minor versions (#980)
gallacher Feb 9, 2024
1571da5
Updating Release notes (#982)
csmbot Feb 12, 2024
515763b
added sample link for sc in csm-operator (#988)
shefali-malhotra Feb 13, 2024
904736d
Updating prerequisite for Powerflex driver (#989)
adarsh-dell Feb 14, 2024
7442026
Updating doc for csi-powerflex (#993)
adarsh-dell Feb 16, 2024
9e9a861
Updating latest sidecar versions (#996)
boyamurthy Feb 19, 2024
9d3fcf8
Responsive interactive tutorial (#998)
cbartoszDell Feb 19, 2024
30c09ff
Update app mobility version (#1001)
boyamurthy Feb 23, 2024
8742e78
Document automatic certificate creation during observability install …
jooseppi-luna Feb 23, 2024
4f28683
Add known issue (#1003)
jooseppi-luna Feb 23, 2024
504bf15
CSM Operator documentation missing steps to enable Authorization side…
shaynafinocchiaro Feb 27, 2024
7fcbca2
Update resiliency uninstallation instructions (#1009)
KerryKovacevic Feb 27, 2024
313c5ca
Add resiliency uninstallation steps (#1011)
KerryKovacevic Feb 28, 2024
5f012ef
CSM Operator docs update (#1012)
panigs7 Mar 1, 2024
5e2b7a0
Fixing broken links (#1014)
boyamurthy Mar 1, 2024
a2a1233
Fixing broken links (#1016)
boyamurthy Mar 5, 2024
daaca0f
Merge branch 'main' into release-1.10.0
shanmydell Mar 7, 2024
639d207
versioning the docs
shanmydell Mar 7, 2024
b9bc08e
Update powerflex.md (#1027)
jooseppi-luna Mar 12, 2024
8eeb655
Update support for Amazon EKS (#1025)
shanmydell Mar 15, 2024
13ff7cd
Removed driver installation section from operator doc (#1030)
gallacher Mar 15, 2024
4cd8aba
add known issue about unity registration (#1034)
cbartoszDell Mar 19, 2024
3499bff
update app mobility version (#1036)
boyamurthy Mar 20, 2024
fec7e09
Update/Simplify CSM Support Matrix (#1029)
gallacher Mar 20, 2024
aeffcc0
Updating Release notes (#1035)
csmbot Mar 20, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
8 changes: 4 additions & 4 deletions config.toml
Original file line number Diff line number Diff line change
Expand Up @@ -172,19 +172,19 @@ enable = false
# icon = "fa fa-envelope"
# desc = "Discuss development issues around the project"
[[params.versions]]
version = "Current(v1.9.3)"
version = "Current(v1.10.0)"
url = "https://dell.github.io/csm-docs/docs/"

[[params.versions]]
version = "v1.8.0"
version = "v1.9.3"
url = "https://dell.github.io/csm-docs/v1"

[[params.versions]]
version = "v1.7.1"
version = "v1.8.0"
url = "https://dell.github.io/csm-docs/v2"

[[params.versions]]
version = "v1.6.1"
version = "v1.7.1"
url = "https://dell.github.io/csm-docs/v3"

[[menu.main]]
Expand Down
10 changes: 1 addition & 9 deletions content/docs/applicationmobility/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Description: >

>> NOTE: This tech-preview release is not intended for use in production environment.

>> NOTE: Application Mobility requires a time-based license. See [Deployment](./deployment) for instructions.
>> NOTE: Application Mobility requires a time-based license. See [Deployment](../deployment/helm/modules/installation/applicationmobility/) for instructions.

Container Storage Modules for Application Mobility provide Kubernetes administrators the ability to clone their stateful application workloads and application data to other clusters, either on-premise or in the cloud.

Expand All @@ -28,11 +28,3 @@ After a backup has been created, it can be restored on the same Kubernetes clust
|-|-|
| Restic | Persistent Volume data will be stored in the provided object store bucket |
{{</table>}}

## Supported Container Orchestrator Platforms
{{<table "table table-striped table-bordered table-sm">}}
| COP/OS | Supported Versions |
|-|-|
| Kubernetes | 1.26, 1.27. 1.28 |
| Red Hat OpenShift | 4.13, 4.14 |
{{</table>}}
10 changes: 6 additions & 4 deletions content/docs/applicationmobility/release/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,16 +6,18 @@ Description: >
Release Notes
---

## Release Notes - CSM Application Mobility 0.3.0
## Release Notes - CSM Application Mobility v1.0.2

### New Features/Changes

There are no new features in this release
Adds support for object stores using https

### Fixed Issues

- [CSM app-mobility can delete restores but they pop back up after 10 seconds.](https://github.com/dell/csm/issues/690)
- [dellctl crashes on a "backup get" when a trailing "/" is added to the namespace](https://github.com/dell/csm/issues/691)
- Fixed backup sync issue where it was deleting all the backups, when it sees more than one BSLs
- Fixed the issue in the backup path where podvolumebackup objects were not created for volumes belonging to pods with the same name across namespace.
- Fixed the issue in the restore plugin.


### Known Issues

Expand Down
2 changes: 1 addition & 1 deletion content/docs/applicationmobility/troubleshooting.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ kubectl logs -n $namespace $pod $container > $logFileName

### Why are there error logs about a license?

Application Mobility requires a license in order to function. See the [Deployment](../deployment) instructions for steps to request a license.
Application Mobility requires a license in order to function. See the [Deployment](../../deployment/helm/modules/installation/applicationmobility/) instructions for steps to request a license.

There will be errors in the logs about the license for these cases:
- License does not exist
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -75,9 +75,9 @@ deployment.apps/proxy-server restarted

## Tenants, Quota, and Volume ownership

Redis is used to store application data regarding [tenants, quota, and volume ownership](../../design#quota--volume-ownership) with the Storage Class specified in the `redis.storageClass` parameter in the values file, or with the default Storage Class if that parameter was not specified.
Redis is used to store application data regarding [tenants, quota, and volume ownership](../../design#quota--volume-ownership) with the Storage Class `csm-authorization-local-storage` or the one specified in the `redis.storageClass` parameter in the values file.

The Persistent Volume for Redis is dynamically provisioned by this Storage Class with the `redis-primary-pv-claim` Persistent Volume Claim. See the example.
The Persistent Volume for Redis is provisioned by the above Storage Class with the `redis-primary-pv-claim` Persistent Volume Claim. See the example.

```bash
kubectl get persistentvolume
Expand Down
30 changes: 2 additions & 28 deletions content/docs/authorization/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,38 +29,12 @@ The following diagram shows a high-level overview of CSM for Authorization with

**NOTE:** PowerScale OneFS implements its own form of Role-Based Access Control (RBAC). CSM for Authorization does not enforce any role-based restrictions for PowerScale. To configure RBAC for PowerScale, refer to the PowerScale OneFS [documentation](https://www.dell.com/support/home/en-us/product-support/product/isilon-onefs/docs).

## Supported Operating Systems/Container Orchestrator Platforms
{{<table "table table-striped table-bordered table-sm">}}
| COP/OS | Supported Versions |
|-|-|
| Kubernetes | 1.26, 1.27, 1.28 |
{{</table>}}

## Supported Storage Platforms

{{<table "table table-striped table-bordered table-sm">}}
| | PowerMax | PowerFlex | PowerScale |
|---------------|:----------------:|:-------------------:|:----------------:|
| Storage Array |PowerMax 2500/8500 PowerMaxOS 10 (6079) , PowerMaxOS 10.0.1 (6079) , PowerMaxOS 10.1 (6079)<br> PowerMax 2000/8000 - 5978.711.xxx, 5978.479.xxx,<br> Unisphere 10.0, 10.0.1, 10.1| 3.6.x, 4.0.x, 4.5 | OneFS 9.5.0.x (x >= 5) |
{{</table>}}

## Supported CSI Drivers

CSM for Authorization supports the following CSI drivers and versions.
{{<table "table table-striped table-bordered table-sm">}}
| Storage Array | CSI Driver | Supported Versions |
| ------------- | ---------- | ------------------ |
| CSI Driver for Dell PowerFlex | [csi-powerflex](https://github.com/dell/csi-powerflex) | v2.0 + |
| CSI Driver for Dell PowerMax | [csi-powermax](https://github.com/dell/csi-powermax) | v2.0 + |
| CSI Driver for Dell PowerScale | [csi-powerscale](https://github.com/dell/csi-powerscale) | v2.0 + |
{{</table>}}
## Authorization Components Support Matrix
CSM for Authorization consists of 2 components - The authorization sidecar, bundled with the driver, communicates with the Authorization proxy server to validate access to Storage platforms. The authorization sidecar is backward compatible with older Authorization proxy server versions. However, it is highly recommended to have the Authorization proxy server and sidecar installed from the same release of CSM.

**NOTE:** If the deployed CSI driver has a number of controller pods equal to the number of schedulable nodes in your cluster, CSM for Authorization may not be able to inject properly into the driver's controller pod.
To resolve this, please refer to our [troubleshooting guide](./troubleshooting) on the topic.

## Authorization Components Support Matrix
CSM for Authorization consists of 2 components - The authorization sidecar, bundled with the driver, communicates with the Authorization proxy server to validate access to Storage platforms. The authorization sidecar is backward compatible with older Authorization proxy server versions. However, it is highly recommended to have the Authorization proxy server and sidecar installed from the same release of CSM.

## Roles and Responsibilities

The CSM for Authorization CLI can be executed in the context of the following roles:
Expand Down
18 changes: 9 additions & 9 deletions content/docs/authorization/configuration/powerflex/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization

**Helm**

Refer to the [Install the Driver](../../../csidriver/installation/helm/powerflex/#install-the-driver) section to edit the parameters in `samples/config.yaml` to configure the driver to communicate with the CSM Authorization sidecar.
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/powerflex/#install-the-driver) section to edit the parameters in `samples/config.yaml` to configure the driver to communicate with the CSM Authorization sidecar.

- Update `endpoint` to match the localhost endpoint in `samples/secret/karavi-authorization-config.json`.

Expand All @@ -78,7 +78,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization

**Operator**

Refer to the [Create Secret](../../../deployment/csmoperator/drivers/powerflex/#create-secret) section to prepare `config.yaml` to configure the driver to communicate with the CSM Authorization sidecar.
Refer to the [Create Secret](../../../deployment/csmoperator/drivers/powerflex/#create-secret) section to prepare `secret.yaml` to configure the driver to communicate with the CSM Authorization sidecar.

- Update `endpoint` to match the localhost endpoint in `samples/secret/karavi-authorization-config.json`.

Expand All @@ -102,13 +102,13 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization

**Helm**

Refer to the [Install the Driver](../../../csidriver/installation/helm/powerflex/#install-the-driver) section to edit the parameters in `myvalues.yaml` to enable CSM Authorization.
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/powerflex/#install-the-driver) section to edit the parameters in `myvalues.yaml` to enable CSM Authorization.

- Update `authorization.enabled` to `true`.

- Update `images.authorization` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.

- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server.
- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.

- Update `authorization.skipCertificateValidation` to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.

Expand All @@ -119,8 +119,8 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
enabled: true

# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v1.9.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.9.0
# Default value: dellemc/csm-authorization-sidecar:v1.10.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.10.0

# proxyHost: hostname of the csm-authorization server
# Default value: None
Expand All @@ -144,7 +144,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization

- Update the `image` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.

- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server.
- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.

- Update the `SKIP_CERTIFICATE_VALIDATION` environment value to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.

Expand All @@ -156,10 +156,10 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
- name: authorization
# enable: Enable/Disable csm-authorization
enabled: true
configVersion: v1.9.0
configVersion: v1.10.0
components:
- name: karavi-authorization-proxy
image: dellemc/csm-authorization-sidecar:v1.9.0
image: dellemc/csm-authorization-sidecar:v1.10.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
Expand Down
26 changes: 17 additions & 9 deletions content/docs/authorization/configuration/powermax/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,13 +51,21 @@ Create the karavi-authorization-config secret using this command:
kubectl -n powermax create secret generic proxy-server-root-certificate --from-file=rootCertificate.pem=/path/to/rootCA -o yaml --dry-run=client | kubectl apply -f -
```

4. Enable CSM Authorization in the driver installation applicable to your installation method.
4. Prepare the driver configuration secret, applicable to your driver installation method, to communicate with the CSM Authorization sidecar.

**Helm**

In [Install the Driver](../../../csidriver/installation/helm/powermax/#install-the-driver) where you edit `samples/secret/secret.yaml` with the credentials of the PowerMax, you can leave these with the default values as they will be ignored.
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/powermax/#install-the-driver) section where you edit `samples/secret/secret.yaml` with the credentials of the PowerMax. Leave `username` and `password` with the default values as they will be ignored.

Refer to the [Install the Driver](../../../csidriver/installation/helm/powermax/#install-the-driver) section to edit the parameters in `my-powermax-settings.yaml` file to configure the driver to communicate with the CSM Authorization sidecar.
**Operator**

Refer to the [Install the Driver](../../../deployment/csmoperator/drivers/powermax/#install-driver) section to prepare `powermax-creds.yaml`. Leave `username` and `password` with the default values as they will be ignored.

5. Enable CSM Authorization in the driver installation applicable to your installation method.

**Helm**

Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/powermax/#install-the-driver) section to edit the parameters in `my-powermax-settings.yaml` file to configure the driver to communicate with the CSM Authorization sidecar.

- Update `global.storageArrays.endpoint` to match the localhost endpoint in `samples/secret/karavi-authorization-config.json`.

Expand All @@ -67,7 +75,7 @@ Create the karavi-authorization-config secret using this command:

- Update `images.authorization` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.

- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server.
- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.

- Update `authorization.skipCertificateValidation` to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.

Expand All @@ -85,8 +93,8 @@ Create the karavi-authorization-config secret using this command:
enabled: true

# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v1.9.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.9.0
# Default value: dellemc/csm-authorization-sidecar:v1.10.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.10.0

# proxyHost: hostname of the csm-authorization server
# Default value: None
Expand All @@ -110,7 +118,7 @@ Create the karavi-authorization-config secret using this command:

- Update the `image` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.

- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server.
- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.

- Update the `SKIP_CERTIFICATE_VALIDATION` environment value to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.

Expand All @@ -122,10 +130,10 @@ Create the karavi-authorization-config secret using this command:
- name: authorization
# enable: Enable/Disable csm-authorization
enabled: true
configVersion: v1.9.0
configVersion: v1.10.0
components:
- name: karavi-authorization-proxy
image: dellemc/csm-authorization-sidecar:v1.9.0
image: dellemc/csm-authorization-sidecar:v1.10.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
Expand Down
16 changes: 8 additions & 8 deletions content/docs/authorization/configuration/powerscale/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=

**Helm**

Refer to the [Install the Driver](../../../csidriver/installation/helm/isilon/#install-the-driver) section to edit the parameters in `samples/secret/secret.yaml` file to configure the driver to communicate with the CSM Authorization sidecar.
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/isilon/#install-the-driver) section to edit the parameters to prepare the `samples/secret/secret.yaml` file to configure the driver to communicate with the CSM Authorization sidecar.

- Update `endpoint` to match the localhost endpoint in `samples/secret/karavi-authorization-config.json`.

Expand Down Expand Up @@ -110,13 +110,13 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=

**Helm**

Refer to the [Install the Driver](../../../csidriver/installation/helm/isilon/#install-the-driver) section to edit the parameters in `my-isilon-settings.yaml` file to enable CSM Authorization.
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/isilon/#install-the-driver) section to edit the parameters in `my-isilon-settings.yaml` file to enable CSM Authorization.

- Update `authorization.enabled` to `true`.

- Update `images.authorization` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.

- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server.
- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.

- Update `authorization.skipCertificateValidation` to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.

Expand All @@ -127,8 +127,8 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=
enabled: true

# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v1.9.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.9.0
# Default value: dellemc/csm-authorization-sidecar:v1.10.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.10.0

# proxyHost: hostname of the csm-authorization server
# Default value: None
Expand All @@ -152,7 +152,7 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=

- Update the `image` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.

- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server.
- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.

- Update the `SKIP_CERTIFICATE_VALIDATION` environment value to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.

Expand All @@ -162,10 +162,10 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=
- name: authorization
# enable: Enable/Disable csm-authorization
enabled: true
configVersion: v1.9.0
configVersion: v1.10.0
components:
- name: karavi-authorization-proxy
image: dellemc/csm-authorization-sidecar:v1.9.0
image: dellemc/csm-authorization-sidecar:v1.10.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
Expand Down
Loading
Loading