Skip to content

Commit

Permalink
Merge branch 'main' into go-1.23
Browse files Browse the repository at this point in the history
  • Loading branch information
shaynafinocchiaro authored Oct 25, 2024
2 parents 5f0bddd + 160c368 commit 2dc2f34
Show file tree
Hide file tree
Showing 30 changed files with 105 additions and 132 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -119,8 +119,8 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
enabled: true

# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v1.12.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.12.0
# Default value: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v1.12.0
sidecarProxyImage: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v1.12.0

# proxyHost: hostname of the csm-authorization server
# Default value: None
Expand Down Expand Up @@ -159,7 +159,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
configVersion: v1.12.0
components:
- name: karavi-authorization-proxy
image: dellemc/csm-authorization-sidecar:v1.12.0
image: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v1.12.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -103,8 +103,8 @@ Create the karavi-authorization-config secret using this command:
enabled: true

# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v1.12.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.12.0
# Default value: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v1.12.0
sidecarProxyImage: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v1.12.0

# proxyHost: hostname of the csm-authorization server
# Default value: None
Expand Down Expand Up @@ -142,7 +142,7 @@ Create the karavi-authorization-config secret using this command:
# enabled: Always set to true
enabled: true
forceRemoveModule: true
configVersion: v2.10.0
configVersion: v2.12.0
components:
- name: csipowermax-reverseproxy
envs:
Expand All @@ -155,7 +155,7 @@ Create the karavi-authorization-config secret using this command:
configVersion: v1.12.0
components:
- name: karavi-authorization-proxy
image: dellemc/csm-authorization-sidecar:v1.12.0
image: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v1.12.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -127,8 +127,8 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=
enabled: true
# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v1.12.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.12.0
# Default value: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v1.12.0
sidecarProxyImage: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v1.12.0
# proxyHost: hostname of the csm-authorization server
# Default value: None
Expand Down Expand Up @@ -165,7 +165,7 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=
configVersion: v1.12.0
components:
- name: karavi-authorization-proxy
image: dellemc/csm-authorization-sidecar:v1.12.0
image: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v1.12.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
Expand Down
2 changes: 1 addition & 1 deletion content/docs/authorization/v1.x/release/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ Description: >
Dell Container Storage Modules (CSM) release notes for authorization
---

## Release Notes - CSM Authorization 1.11.0
## Release Notes - CSM Authorization 1.12.0



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
configVersion: v1.12.0
components:
- name: karavi-authorization-proxy
image: dellemc/csm-authorization-sidecar:v2.0.0
image: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v2.0.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
Expand Down Expand Up @@ -158,8 +158,8 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
enabled: true
# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v2.0.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v2.0.0
# Default value: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v2.0.0
sidecarProxyImage: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v2.0.0
# proxyHost: hostname of the csm-authorization server
# Default value: None
Expand Down
10 changes: 5 additions & 5 deletions content/docs/authorization/v2.x/configuration/powermax/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -114,12 +114,12 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
# enabled: Always set to true
enabled: true
forceRemoveModule: true
configVersion: v2.11.0
configVersion: v2.12.0
components:
- name: csipowermax-reverseproxy
# image: Define the container images used for the reverse proxy
# Default value: None
image: dellemc/csipowermax-reverseproxy:v2.11.0
image: quay.io/dell/container-storage-modules/csipowermax-reverseproxy:v2.12.0
envs:
# "tlsSecret" defines the TLS secret that is created with certificate
# and its associated key
Expand All @@ -144,7 +144,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
configVersion: v1.12.0
components:
- name: karavi-authorization-proxy
image: dellemc/csm-authorization-sidecar:v2.0.0
image: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v2.0.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
Expand Down Expand Up @@ -192,8 +192,8 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
authorization:
enabled: true
# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
# Default value: dellemc/csm-authorization-sidecar:v2.0.0
sidecarProxyImage: dellemc/csm-authorization-sidecar:v2.0.0
# Default value: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v2.0.0
sidecarProxyImage: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v2.0.0
# proxyHost: hostname of the csm-authorization server
# Default value: None
proxyHost: csm-authorization.com
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -132,7 +132,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
configVersion: v1.12.0
components:
- name: karavi-authorization-proxy
image: dellemc/csm-authorization-sidecar:v2.0.0
image: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v2.0.0
envs:
# proxyHost: hostname of the csm-authorization server
- name: "PROXY_HOST"
Expand Down Expand Up @@ -162,7 +162,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
enabled: true

# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
sidecarProxyImage: dellemc/csm-authorization-sidecar:v2.0.0
sidecarProxyImage: quay.io/dell/container-storage-modules/csm-authorization-sidecar:v2.0.0

# proxyHost: hostname of the csm-authorization server
# Default value: None
Expand Down
2 changes: 1 addition & 1 deletion content/docs/csidriver/release/powermax.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: PowerMax
description: Release notes for PowerMax CSI driver
---

## Release Notes - CSI PowerMax v2.11.0
## Release Notes - CSI PowerMax v2.12.0

>Note: Auto SRDF group creation is currently not supported in PowerMaxOS 10.1 (6079) Arrays.
Expand Down
2 changes: 1 addition & 1 deletion content/docs/csidriver/release/powerstore.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: PowerStore
description: Release notes for PowerStore CSI driver
---

## Release Notes - CSI PowerStore v2.11.0
## Release Notes - CSI PowerStore v2.12.0



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ csi-powerstore:
podmon:
image: dellemc/podmon:v1.11.0
metadataretriever:
image: dellemc/csi-metadata-retriever:v1.8.0
image: dellemc/csi-metadata-retriever:v1.9.0
## Controller ATTRIBUTES
controller:
controllerCount: $CONTROLLER_COUNT
Expand Down Expand Up @@ -382,7 +382,7 @@ csi-isilon:
authorization:
image: dellemc/csm-authorization-sidecar:v1.12.0
metadataretriever:
image: dellemc/csi-metadata-retriever:v1.8.0
image: dellemc/csi-metadata-retriever:v1.9.0

certSecretCount: $CERT_SECRET_COUNT
allowedNetworks: []
Expand Down
44 changes: 22 additions & 22 deletions content/docs/deployment/csmoperator/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -182,22 +182,22 @@ Here is the output of a request to build an offline bundle for the Dell CSM Oper
* Pulling and saving container images
dellemc/csi-isilon:v2.12.0
dellemc/csi-metadata-retriever:v1.9.0
dellemc/csipowermax-reverseproxy:v2.11.0
dellemc/csi-powermax:v2.12.0
dellemc/csi-powerstore:v2.12.0
dellemc/csi-unity:v2.12.0
dellemc/csi-vxflexos:v2.12.0
dellemc/csm-authorization-sidecar:v1.12.0
dellemc/csm-metrics-powerflex:v1.10.0
dellemc/csm-metrics-powerscale:v1.7.0
dellemc/csm-topology:v1.10.0
dellemc/dell-csi-replicator:v1.10.0
dellemc/dell-replication-controller:v1.10.0
quay.io/dell/container-storage-modules/csi-isilon:v2.12.0
quay.io/dell/container-storage-modules/csi-metadata-retriever:v1.9.0
quay.io/dell/container-storage-modules/csipowermax-reverseproxy:v2.11.0
quay.io/dell/container-storage-modules/csi-powermax:v2.12.0
quay.io/dell/container-storage-modules/csi-powerstore:v2.12.0
quay.io/dell/container-storage-modules/csi-unity:v2.12.0
quay.io/dell/container-storage-modules/csi-vxflexos:v2.12.0
quay.io/dell/container-storage-modules/csm-authorization-sidecar:v1.12.0
quay.io/dell/container-storage-modules/csm-metrics-powerflex:v1.10.0
quay.io/dell/container-storage-modules/csm-metrics-powerscale:v1.7.0
quay.io/dell/container-storage-modules/csm-topology:v1.10.0
quay.io/dell/container-storage-modules/dell-csi-replicator:v1.10.0
quay.io/dell/container-storage-modules/dell-replication-controller:v1.10.0
dellemc/sdc:4.5.2.1
docker.io/dellemc/dell-csm-operator:v1.7.0
gcr.io/kubebuilder/kube-rbac-proxy:v0.8.0
quay.io/dell/container-storage-modules/dell-csm-operator:v1.7.0
registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9:v4.16.0-202409051837.p0.g8ea2c99.assembly.stream.el9
nginxinc/nginx-unprivileged:1.20
otel/opentelemetry-collector:0.42.0
registry.k8s.io/sig-storage/csi-attacher:v4.7.0
Expand Down Expand Up @@ -280,28 +280,28 @@ Here is the output for preparing the bundle for installation (`localregistry:500
```
Preparing a offline bundle for installation
* Loading docker images
* Loading quay.io images
Loaded image: docker.io/dellemc/csi-powerstore:v2.12.0
Loaded image: docker.io/dellemc/csi-isilon:v2.12.0
Loaded image: quay.io/dell/container-storage-modules/csi-powerstore:v2.12.0
Loaded image: quay.io/dell/container-storage-modules/csi-isilon:v2.12.0
...
...
Loaded image: registry.k8s.io/sig-storage/csi-resizer:v1.12.0
Loaded image: registry.k8s.io/sig-storage/csi-snapshotter:v8.1.0
* Tagging and pushing images
dellemc/csi-isilon:v2.12.0 -> localregistry:5000/dell-csm-operator/csi-isilon:v2.12.0
dellemc/csi-metadata-retriever:v1.9.0 -> localregistry:5000/dell-csm-operator/csi-metadata-retriever:v1.9.0
quay.io/dell/container-storage-modules/csi-isilon:v2.12.0 -> localregistry:5000/dell-csm-operator/csi-isilon:v2.12.0
quay.io/dell/container-storage-modules/csi-metadata-retriever:v1.9.0 -> localregistry:5000/dell-csm-operator/csi-metadata-retriever:v1.9.0
...
...
registry.k8s.io/sig-storage/csi-resizer:v1.12.0 -> localregistry:5000/dell-csm-operator/csi-resizer:v1.12.0
registry.k8s.io/sig-storage/csi-snapshotter:v8.1.0 -> localregistry:5000/dell-csm-operator/csi-snapshotter:v8.1.0
* Preparing files within /root/dell-csm-operator-bundle
changing: dellemc/csi-isilon:v2.12.0 -> localregistry:5000/dell-csm-operator/csi-isilon:v2.12.0
changing: dellemc/csi-metadata-retriever:v1.9.0 -> localregistry:5000/dell-csm-operator/csi-metadata-retriever:v1.9.0
changing: quay.io/dell/container-storage-modules/csi-isilon:v2.12.0 -> localregistry:5000/dell-csm-operator/csi-isilon:v2.12.0
changing: quay.io/dell/container-storage-modules/csi-metadata-retriever:v1.9.0 -> localregistry:5000/dell-csm-operator/csi-metadata-retriever:v1.9.0
...
...
changing: registry.k8s.io/sig-storage/csi-resizer:v1.12.0 -> localregistry:5000/dell-csm-operator/csi-resizer:v1.12.0
Expand Down
4 changes: 2 additions & 2 deletions content/docs/deployment/csmoperator/modules/replication.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,14 +31,14 @@ This change will need to be made to the /etc/hosts file on:
The [csm-replication](https://github.com/dell/csm-replication.git) GitHub repository is cloned to your source cluster as part of the installation. On your source cluster run the following to clone and build the repctl tool:

```bash
git clone -b v1.9.0 https://github.com/dell/csm-replication.git
git clone -b v1.10.0 https://github.com/dell/csm-replication.git
cd csm-replication/repctl
make build
```

Alternately, you can download a pre-built repctl binary from our [Releases](https://github.com/dell/csm-replication/releases) page.
```shell
wget https://github.com/dell/csm-replication/releases/download/v1.9.0/repctl-linux-amd64
wget https://github.com/dell/csm-replication/releases/download/v1.10.0/repctl-linux-amd64
mv repctl-linux-amd64 repctl
chmod +x repctl
```
Expand Down
2 changes: 1 addition & 1 deletion content/docs/deployment/csmoperator/modules/resiliency.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ To enable this module, user should choose the sample file for the respective dri
# false: disable Resiliency feature(do not deploy podmon sidecar)
# Default value: false
enabled: true
configVersion: v1.10.0
configVersion: v1.11.0
components:
- name: podmon-controller
args:
Expand Down
4 changes: 2 additions & 2 deletions content/docs/deployment/helm/drivers/installation/powermax.md
Original file line number Diff line number Diff line change
Expand Up @@ -260,7 +260,7 @@ CRDs should be configured during replication prepare stage with repctl as descri

**Steps**

1. Run `git clone -b v2.11.0 https://github.com/dell/csi-powermax.git` to clone the git repository. This will include the Helm charts and dell-csi-helm-installer scripts.
1. Run `git clone -b v2.12.0 https://github.com/dell/csi-powermax.git` to clone the git repository. This will include the Helm charts and dell-csi-helm-installer scripts.
2. Ensure that you have created a namespace where you want to install the driver. You can run `kubectl create namespace powermax` to create a new one
3. Edit the `samples/secret/secret.yaml` file,to point to the correct namespace, and replace the values for the username and password parameters.
These values can be obtained using base64 encoding as described in the following example:
Expand All @@ -275,7 +275,7 @@ CRDs should be configured during replication prepare stage with repctl as descri
```
5. Download the default values.yaml file
```bash
cd dell-csi-helm-installer && wget -O my-powermax-settings.yaml https://github.com/dell/helm-charts/raw/csi-powermax-2.11.0/charts/csi-powermax/values.yaml
cd dell-csi-helm-installer && wget -O my-powermax-settings.yaml https://github.com/dell/helm-charts/raw/csi-powermax-2.12.0/charts/csi-powermax/values.yaml
```
6. Ensure the unisphere have 10.0 REST endpoint support by clicking on Unisphere -> Help (?) -> About in Unisphere for PowerMax GUI.
7. Edit the newly created file and provide values for the following parameters
Expand Down
4 changes: 2 additions & 2 deletions content/docs/deployment/helm/drivers/upgrade/powermax.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,10 +16,10 @@ You can upgrade CSI Driver for Dell PowerMax using Helm or Dell CSM Operator.
1. Upgrade the Unisphere to have 10.0 endpoint support.Please find the instructions [here.](https://dl.dell.com/content/manual34878027-dell-unisphere-for-powermax-10-0-0-installation-guide.pdf?language=en-us&ps=true)
2. Update the `my-powermax-settings.yaml` to have endpoint with 10.0 support.

## Update Driver from v2.10.1 to v2.11.0 using Helm
## Update Driver from v2.11.0 to v2.12.0 using Helm

**Steps**
1. Run `git clone -b v2.11.0 https://github.com/dell/csi-powermax.git` to clone the git repository and get the driver.
1. Run `git clone -b v2.12.0 https://github.com/dell/csi-powermax.git` to clone the git repository and get the driver.
2. Update the values file as needed.
3. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
Expand Down
6 changes: 3 additions & 3 deletions content/docs/deployment/helm/drivers/upgrade/powerstore.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,12 +9,12 @@ Description: Upgrade PowerStore CSI driver

You can upgrade the CSI Driver for Dell PowerStore using Helm.

## Update Driver from v2.10.1 to v2.11.0 using Helm
## Update Driver from v2.11.0 to v2.12.0 using Helm

Note: While upgrading the driver via helm, controllerCount variable in myvalues.yaml can be at most one less than the number of worker nodes.

**Steps**
1. Run `git clone -b v2.11.0 https://github.com/dell/csi-powerstore.git` to clone the git repository and get the driver.
1. Run `git clone -b v2.12.0 https://github.com/dell/csi-powerstore.git` to clone the git repository and get the driver.
2. Edit `samples/secret/secret.yaml` file and configure connection information for your PowerStore arrays changing the following parameters:
- *endpoint*: defines the full URL path to the PowerStore API.
- *globalID*: specifies what storage cluster the driver should use
Expand All @@ -38,7 +38,7 @@ Note: While upgrading the driver via helm, controllerCount variable in myvalues.
kubectl create secret generic powerstore-config -n csi-powerstore --from-file=config=secret.yaml
```
5. Download the default values.yaml file `cd dell-csi-helm-installer && wget -O my-powerstore-settings.yaml https://github.com/dell/helm-charts/raw/csi-powerstore-2.11.0/charts/csi-powerstore/values.yaml` and update parameters as per the requirement.
5. Download the default values.yaml file `cd dell-csi-helm-installer && wget -O my-powerstore-settings.yaml https://github.com/dell/helm-charts/raw/csi-powerstore-2.12.0/charts/csi-powerstore/values.yaml` and update parameters as per the requirement.
6. Run the `csi-install` script with the option _\-\-upgrade_ by running:
```bash
Expand Down
Loading

0 comments on commit 2dc2f34

Please sign in to comment.