Skip to content

Commit c975ca9

Browse files
shanmydellcoulofgallachercsmbottssushma
authored
Release 1.10.0 (#1026)
* CSM 1.10 driver version changes (#949) * Remove k3s debian to community supported (#951) * Update PowerFlex version to 4.5.x (#953) * Release notes for CSM 1.9 (#954) * Updated the troubleshooting for Powerstore (#956) * Architecture change of CSM deployment pages (#957) * [feature-1091]: Update Authorization Redis storage class and proxy server address information (#964) * MKE version update (#969) * Update _MKE version Update _MKE version * Update _index.md --------- Co-authored-by: Yamunadevi N Shanmugam <82038610+shanmydell@users.noreply.github.com> * Adding medusa plus support for PowerStore (#970) * Secret update for Powerflex driver (#971) * Updating Authorization documentation (#972) (#973) * updating generating token * updating generating token * updating generating token doc * updating troubleshooting page * update index (#974) * Update support for all PowerScale 9.5.0.x minor versions (#980) * Update support for PowerScale 9.5.0.x minor versions * Update support for PowerScale 9.5.0.x minor versions * Update support for PowerScale 9.5.0.x minor versions * Update support for PowerScale 9.5.0.x minor versions * Update support for PowerScale 9.5.0.x minor versions * Updating Release notes (#982) * added sample link for sc in csm-operator (#988) * Updating prerequisite for Powerflex driver (#989) * Updating doc for csi-powerflex (#993) * Updating latest sidecar versions (#996) * Responsive interactive tutorial (#998) * Update app mobility version (#1001) * Document automatic certificate creation during observability install via csm-operator (#1002) * Update observability.md * Update observability.md * Update observability.md * Update observability.md * Update observability.md * Update observability.md * Update observability.md * Add known issue (#1003) * add known issue * remove dash * update known issues * use table format * ` * update release notes * CSM Operator documentation missing steps to enable Authorization sidecar for Observability (#1008) * Update resiliency uninstallation instructions (#1009) * Add resiliency uninstallation steps (#1011) * CSM Operator docs update (#1012) * csm-operators docs update * Update _index.md * Fixing broken links (#1014) * Fixing broken links (#1016) Co-authored-by: Yamunadevi N Shanmugam <Yamunadevi.Shanmugam@dell.com> * versioning the docs * Update powerflex.md (#1027) * Update support for Amazon EKS (#1025) * Removed driver installation section from operator doc (#1030) * add known issue about unity registration (#1034) * update app mobility version (#1036) * Update/Simplify CSM Support Matrix (#1029) * Create _index.html * Added CSM prerequisites * Update _index.html * Added notes * Added cert-csi doc link * Removed support matrix from csi drivers section * Removed support matrix * Removed orchestrator and platform support matrix * Added ObjectScale and note about Auth support * Removed support matrix * Added Observability note * Removed support matrix * Added replication note * Create cert-csi page * Delete content/docs/csidriver/test/certcsi.md * Created community qualified page * Removed community qualified table * Update qualified.md * Create _index.md * Delete content/docs/prerequisites/_index.html * Update _index.md * Create _index.md * Delete content/docs/cert-csi/_index.html * Removed Tanzu from Support Matrix * Update qualified.md * changed weight * changed weight * Update _index.md * Update _index.md * updated links * Update _index.md * moved images * Update _index.md * Update _index.md * Added EKS qual * Removed Elastic Kubernetes Anywhere * Added VMware Tanzu * updated cert-csi note * Removed storage platforms for page * Removed support matrix * Update _index.md (#1031) * Update _index.md Added few lines to demonstrate the need for cert-csi, re-iterate support for self-certified customers, and enable customers to submit test results. * Update _index.md Removed line - 'As we begin to see more flavors of operating systems and orchestrator platforms, qualifying Dell CSI drivers against different storage arrays is a challenging task. Validating five different storage arrays with different permutations of orchestrators, operating systems, and their versions is not feasible.' * Added module support matrix * Added links to table * updated link * Added tested host operating systems * Removed host operating system note * Updated cert-csi note * Update _index.md * Update qualified.md --------- Co-authored-by: vyshakav-dell <136616665+vyshakav-dell@users.noreply.github.com> * Updating Release notes (#1035) Co-authored-by: csmbot <karavi@dell.com> --------- Co-authored-by: coulof <49235405+coulof@users.noreply.github.com> Co-authored-by: gallacher <35462391+gallacher@users.noreply.github.com> Co-authored-by: CSM Bot <105446864+csmbot@users.noreply.github.com> Co-authored-by: tssushma <98810659+tssushma@users.noreply.github.com> Co-authored-by: Aaron Tye <tyeaaron@gmail.com> Co-authored-by: boyamurthy <92081029+boyamurthy@users.noreply.github.com> Co-authored-by: Adarsh Kumar Yadav <109620911+adarsh-dell@users.noreply.github.com> Co-authored-by: Peres Kereotubo <118770866+PeresKereotubo@users.noreply.github.com> Co-authored-by: shefali-malhotra <91597668+shefali-malhotra@users.noreply.github.com> Co-authored-by: Bartosz Ciesielczyk <120648697+cbartoszDell@users.noreply.github.com> Co-authored-by: Jooseppi Luna <jooseppi_luna@dell.com> Co-authored-by: shaynafinocchiaro <shayna_finocchiaro@dell.com> Co-authored-by: KerryKovacevic <140824885+KerryKovacevic@users.noreply.github.com> Co-authored-by: panigs7 <92028646+panigs7@users.noreply.github.com> Co-authored-by: vyshakav-dell <136616665+vyshakav-dell@users.noreply.github.com> Co-authored-by: csmbot <karavi@dell.com>
1 parent b4299b6 commit c975ca9

File tree

526 files changed

+18934
-9325
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

526 files changed

+18934
-9325
lines changed

config.toml

+4-4
Original file line numberDiff line numberDiff line change
@@ -172,19 +172,19 @@ enable = false
172172
# icon = "fa fa-envelope"
173173
# desc = "Discuss development issues around the project"
174174
[[params.versions]]
175-
version = "Current(v1.9.3)"
175+
version = "Current(v1.10.0)"
176176
url = "https://dell.github.io/csm-docs/docs/"
177177

178178
[[params.versions]]
179-
version = "v1.8.0"
179+
version = "v1.9.3"
180180
url = "https://dell.github.io/csm-docs/v1"
181181

182182
[[params.versions]]
183-
version = "v1.7.1"
183+
version = "v1.8.0"
184184
url = "https://dell.github.io/csm-docs/v2"
185185

186186
[[params.versions]]
187-
version = "v1.6.1"
187+
version = "v1.7.1"
188188
url = "https://dell.github.io/csm-docs/v3"
189189

190190
[[menu.main]]

content/docs/applicationmobility/_index.md

+1-9
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Description: >
88

99
>> NOTE: This tech-preview release is not intended for use in production environment.
1010
11-
>> NOTE: Application Mobility requires a time-based license. See [Deployment](./deployment) for instructions.
11+
>> NOTE: Application Mobility requires a time-based license. See [Deployment](../deployment/helm/modules/installation/applicationmobility/) for instructions.
1212
1313
Container Storage Modules for Application Mobility provide Kubernetes administrators the ability to clone their stateful application workloads and application data to other clusters, either on-premise or in the cloud.
1414

@@ -28,11 +28,3 @@ After a backup has been created, it can be restored on the same Kubernetes clust
2828
|-|-|
2929
| Restic | Persistent Volume data will be stored in the provided object store bucket |
3030
{{</table>}}
31-
32-
## Supported Container Orchestrator Platforms
33-
{{<table "table table-striped table-bordered table-sm">}}
34-
| COP/OS | Supported Versions |
35-
|-|-|
36-
| Kubernetes | 1.26, 1.27. 1.28 |
37-
| Red Hat OpenShift | 4.13, 4.14 |
38-
{{</table>}}

content/docs/applicationmobility/release/_index.md

+6-4
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,18 @@ Description: >
66
Release Notes
77
---
88

9-
## Release Notes - CSM Application Mobility 0.3.0
9+
## Release Notes - CSM Application Mobility v1.0.2
1010

1111
### New Features/Changes
1212

13-
There are no new features in this release
13+
Adds support for object stores using https
1414

1515
### Fixed Issues
1616

17-
- [CSM app-mobility can delete restores but they pop back up after 10 seconds.](https://github.com/dell/csm/issues/690)
18-
- [dellctl crashes on a "backup get" when a trailing "/" is added to the namespace](https://github.com/dell/csm/issues/691)
17+
- Fixed backup sync issue where it was deleting all the backups, when it sees more than one BSLs
18+
- Fixed the issue in the backup path where podvolumebackup objects were not created for volumes belonging to pods with the same name across namespace.
19+
- Fixed the issue in the restore plugin.
20+
1921

2022
### Known Issues
2123

content/docs/applicationmobility/troubleshooting.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ kubectl logs -n $namespace $pod $container > $logFileName
4040

4141
### Why are there error logs about a license?
4242

43-
Application Mobility requires a license in order to function. See the [Deployment](../deployment) instructions for steps to request a license.
43+
Application Mobility requires a license in order to function. See the [Deployment](../../deployment/helm/modules/installation/applicationmobility/) instructions for steps to request a license.
4444

4545
There will be errors in the logs about the license for these cases:
4646
- License does not exist

content/docs/authorization/Backup and Restore/helm/_index.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -75,9 +75,9 @@ deployment.apps/proxy-server restarted
7575

7676
## Tenants, Quota, and Volume ownership
7777

78-
Redis is used to store application data regarding [tenants, quota, and volume ownership](../../design#quota--volume-ownership) with the Storage Class specified in the `redis.storageClass` parameter in the values file, or with the default Storage Class if that parameter was not specified.
78+
Redis is used to store application data regarding [tenants, quota, and volume ownership](../../design#quota--volume-ownership) with the Storage Class `csm-authorization-local-storage` or the one specified in the `redis.storageClass` parameter in the values file.
7979

80-
The Persistent Volume for Redis is dynamically provisioned by this Storage Class with the `redis-primary-pv-claim` Persistent Volume Claim. See the example.
80+
The Persistent Volume for Redis is provisioned by the above Storage Class with the `redis-primary-pv-claim` Persistent Volume Claim. See the example.
8181

8282
```bash
8383
kubectl get persistentvolume

content/docs/authorization/_index.md

+2-28
Original file line numberDiff line numberDiff line change
@@ -29,38 +29,12 @@ The following diagram shows a high-level overview of CSM for Authorization with
2929

3030
**NOTE:** PowerScale OneFS implements its own form of Role-Based Access Control (RBAC). CSM for Authorization does not enforce any role-based restrictions for PowerScale. To configure RBAC for PowerScale, refer to the PowerScale OneFS [documentation](https://www.dell.com/support/home/en-us/product-support/product/isilon-onefs/docs).
3131

32-
## Supported Operating Systems/Container Orchestrator Platforms
33-
{{<table "table table-striped table-bordered table-sm">}}
34-
| COP/OS | Supported Versions |
35-
|-|-|
36-
| Kubernetes | 1.26, 1.27, 1.28 |
37-
{{</table>}}
38-
39-
## Supported Storage Platforms
40-
41-
{{<table "table table-striped table-bordered table-sm">}}
42-
| | PowerMax | PowerFlex | PowerScale |
43-
|---------------|:----------------:|:-------------------:|:----------------:|
44-
| Storage Array |PowerMax 2500/8500 PowerMaxOS 10 (6079) , PowerMaxOS 10.0.1 (6079) , PowerMaxOS 10.1 (6079)<br> PowerMax 2000/8000 - 5978.711.xxx, 5978.479.xxx,<br> Unisphere 10.0, 10.0.1, 10.1| 3.6.x, 4.0.x, 4.5 | OneFS 9.5.0.x (x >= 5) |
45-
{{</table>}}
46-
47-
## Supported CSI Drivers
48-
49-
CSM for Authorization supports the following CSI drivers and versions.
50-
{{<table "table table-striped table-bordered table-sm">}}
51-
| Storage Array | CSI Driver | Supported Versions |
52-
| ------------- | ---------- | ------------------ |
53-
| CSI Driver for Dell PowerFlex | [csi-powerflex](https://github.com/dell/csi-powerflex) | v2.0 + |
54-
| CSI Driver for Dell PowerMax | [csi-powermax](https://github.com/dell/csi-powermax) | v2.0 + |
55-
| CSI Driver for Dell PowerScale | [csi-powerscale](https://github.com/dell/csi-powerscale) | v2.0 + |
56-
{{</table>}}
32+
## Authorization Components Support Matrix
33+
CSM for Authorization consists of 2 components - The authorization sidecar, bundled with the driver, communicates with the Authorization proxy server to validate access to Storage platforms. The authorization sidecar is backward compatible with older Authorization proxy server versions. However, it is highly recommended to have the Authorization proxy server and sidecar installed from the same release of CSM.
5734

5835
**NOTE:** If the deployed CSI driver has a number of controller pods equal to the number of schedulable nodes in your cluster, CSM for Authorization may not be able to inject properly into the driver's controller pod.
5936
To resolve this, please refer to our [troubleshooting guide](./troubleshooting) on the topic.
6037

61-
## Authorization Components Support Matrix
62-
CSM for Authorization consists of 2 components - The authorization sidecar, bundled with the driver, communicates with the Authorization proxy server to validate access to Storage platforms. The authorization sidecar is backward compatible with older Authorization proxy server versions. However, it is highly recommended to have the Authorization proxy server and sidecar installed from the same release of CSM.
63-
6438
## Roles and Responsibilities
6539

6640
The CSM for Authorization CLI can be executed in the context of the following roles:

content/docs/authorization/configuration/powerflex/_index.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
5555

5656
**Helm**
5757

58-
Refer to the [Install the Driver](../../../csidriver/installation/helm/powerflex/#install-the-driver) section to edit the parameters in `samples/config.yaml` to configure the driver to communicate with the CSM Authorization sidecar.
58+
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/powerflex/#install-the-driver) section to edit the parameters in `samples/config.yaml` to configure the driver to communicate with the CSM Authorization sidecar.
5959

6060
- Update `endpoint` to match the localhost endpoint in `samples/secret/karavi-authorization-config.json`.
6161

@@ -78,7 +78,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
7878

7979
**Operator**
8080

81-
Refer to the [Create Secret](../../../deployment/csmoperator/drivers/powerflex/#create-secret) section to prepare `config.yaml` to configure the driver to communicate with the CSM Authorization sidecar.
81+
Refer to the [Create Secret](../../../deployment/csmoperator/drivers/powerflex/#create-secret) section to prepare `secret.yaml` to configure the driver to communicate with the CSM Authorization sidecar.
8282

8383
- Update `endpoint` to match the localhost endpoint in `samples/secret/karavi-authorization-config.json`.
8484

@@ -102,13 +102,13 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
102102

103103
**Helm**
104104

105-
Refer to the [Install the Driver](../../../csidriver/installation/helm/powerflex/#install-the-driver) section to edit the parameters in `myvalues.yaml` to enable CSM Authorization.
105+
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/powerflex/#install-the-driver) section to edit the parameters in `myvalues.yaml` to enable CSM Authorization.
106106

107107
- Update `authorization.enabled` to `true`.
108108

109109
- Update `images.authorization` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.
110110

111-
- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server.
111+
- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.
112112

113113
- Update `authorization.skipCertificateValidation` to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.
114114

@@ -119,8 +119,8 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
119119
enabled: true
120120
121121
# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
122-
# Default value: dellemc/csm-authorization-sidecar:v1.9.0
123-
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.9.0
122+
# Default value: dellemc/csm-authorization-sidecar:v1.10.0
123+
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.10.0
124124
125125
# proxyHost: hostname of the csm-authorization server
126126
# Default value: None
@@ -144,7 +144,7 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
144144

145145
- Update the `image` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.
146146

147-
- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server.
147+
- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.
148148

149149
- Update the `SKIP_CERTIFICATE_VALIDATION` environment value to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.
150150

@@ -156,10 +156,10 @@ Given a setup where Kubernetes, a storage system, and the CSM for Authorization
156156
- name: authorization
157157
# enable: Enable/Disable csm-authorization
158158
enabled: true
159-
configVersion: v1.9.0
159+
configVersion: v1.10.0
160160
components:
161161
- name: karavi-authorization-proxy
162-
image: dellemc/csm-authorization-sidecar:v1.9.0
162+
image: dellemc/csm-authorization-sidecar:v1.10.0
163163
envs:
164164
# proxyHost: hostname of the csm-authorization server
165165
- name: "PROXY_HOST"

content/docs/authorization/configuration/powermax/_index.md

+17-9
Original file line numberDiff line numberDiff line change
@@ -51,13 +51,21 @@ Create the karavi-authorization-config secret using this command:
5151
kubectl -n powermax create secret generic proxy-server-root-certificate --from-file=rootCertificate.pem=/path/to/rootCA -o yaml --dry-run=client | kubectl apply -f -
5252
```
5353

54-
4. Enable CSM Authorization in the driver installation applicable to your installation method.
54+
4. Prepare the driver configuration secret, applicable to your driver installation method, to communicate with the CSM Authorization sidecar.
5555

5656
**Helm**
5757

58-
In [Install the Driver](../../../csidriver/installation/helm/powermax/#install-the-driver) where you edit `samples/secret/secret.yaml` with the credentials of the PowerMax, you can leave these with the default values as they will be ignored.
58+
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/powermax/#install-the-driver) section where you edit `samples/secret/secret.yaml` with the credentials of the PowerMax. Leave `username` and `password` with the default values as they will be ignored.
5959

60-
Refer to the [Install the Driver](../../../csidriver/installation/helm/powermax/#install-the-driver) section to edit the parameters in `my-powermax-settings.yaml` file to configure the driver to communicate with the CSM Authorization sidecar.
60+
**Operator**
61+
62+
Refer to the [Install the Driver](../../../deployment/csmoperator/drivers/powermax/#install-driver) section to prepare `powermax-creds.yaml`. Leave `username` and `password` with the default values as they will be ignored.
63+
64+
5. Enable CSM Authorization in the driver installation applicable to your installation method.
65+
66+
**Helm**
67+
68+
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/powermax/#install-the-driver) section to edit the parameters in `my-powermax-settings.yaml` file to configure the driver to communicate with the CSM Authorization sidecar.
6169

6270
- Update `global.storageArrays.endpoint` to match the localhost endpoint in `samples/secret/karavi-authorization-config.json`.
6371

@@ -67,7 +75,7 @@ Create the karavi-authorization-config secret using this command:
6775

6876
- Update `images.authorization` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.
6977

70-
- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server.
78+
- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.
7179

7280
- Update `authorization.skipCertificateValidation` to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.
7381

@@ -85,8 +93,8 @@ Create the karavi-authorization-config secret using this command:
8593
enabled: true
8694
8795
# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
88-
# Default value: dellemc/csm-authorization-sidecar:v1.9.0
89-
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.9.0
96+
# Default value: dellemc/csm-authorization-sidecar:v1.10.0
97+
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.10.0
9098
9199
# proxyHost: hostname of the csm-authorization server
92100
# Default value: None
@@ -110,7 +118,7 @@ Create the karavi-authorization-config secret using this command:
110118

111119
- Update the `image` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.
112120

113-
- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server.
121+
- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.
114122

115123
- Update the `SKIP_CERTIFICATE_VALIDATION` environment value to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.
116124

@@ -122,10 +130,10 @@ Create the karavi-authorization-config secret using this command:
122130
- name: authorization
123131
# enable: Enable/Disable csm-authorization
124132
enabled: true
125-
configVersion: v1.9.0
133+
configVersion: v1.10.0
126134
components:
127135
- name: karavi-authorization-proxy
128-
image: dellemc/csm-authorization-sidecar:v1.9.0
136+
image: dellemc/csm-authorization-sidecar:v1.10.0
129137
envs:
130138
# proxyHost: hostname of the csm-authorization server
131139
- name: "PROXY_HOST"

content/docs/authorization/configuration/powerscale/_index.md

+8-8
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=
5656

5757
**Helm**
5858

59-
Refer to the [Install the Driver](../../../csidriver/installation/helm/isilon/#install-the-driver) section to edit the parameters in `samples/secret/secret.yaml` file to configure the driver to communicate with the CSM Authorization sidecar.
59+
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/isilon/#install-the-driver) section to edit the parameters to prepare the `samples/secret/secret.yaml` file to configure the driver to communicate with the CSM Authorization sidecar.
6060

6161
- Update `endpoint` to match the localhost endpoint in `samples/secret/karavi-authorization-config.json`.
6262

@@ -110,13 +110,13 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=
110110

111111
**Helm**
112112

113-
Refer to the [Install the Driver](../../../csidriver/installation/helm/isilon/#install-the-driver) section to edit the parameters in `my-isilon-settings.yaml` file to enable CSM Authorization.
113+
Refer to the [Install the Driver](../../../deployment/helm/drivers/installation/isilon/#install-the-driver) section to edit the parameters in `my-isilon-settings.yaml` file to enable CSM Authorization.
114114

115115
- Update `authorization.enabled` to `true`.
116116

117117
- Update `images.authorization` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.
118118

119-
- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server.
119+
- Update `authorization.proxyHost` to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.
120120

121121
- Update `authorization.skipCertificateValidation` to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.
122122

@@ -127,8 +127,8 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=
127127
enabled: true
128128
129129
# sidecarProxyImage: the container image used for the csm-authorization-sidecar.
130-
# Default value: dellemc/csm-authorization-sidecar:v1.9.0
131-
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.9.0
130+
# Default value: dellemc/csm-authorization-sidecar:v1.10.0
131+
sidecarProxyImage: dellemc/csm-authorization-sidecar:v1.10.0
132132
133133
# proxyHost: hostname of the csm-authorization server
134134
# Default value: None
@@ -152,7 +152,7 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=
152152

153153
- Update the `image` to the image of the CSM Authorization sidecar. In most cases, you can leave the default value.
154154

155-
- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server.
155+
- Update the `PROXY_HOST` environment value to the hostname of the CSM Authorization Proxy Server. `csm-authorization.com` is a placeholder for the proxyHost. See the administrator of CSM for Authorization for the correct value.
156156

157157
- Update the `SKIP_CERTIFICATE_VALIDATION` environment value to `true` or `false` depending on if you want to disable or enable certificate validation of the CSM Authorization Proxy Server.
158158

@@ -162,10 +162,10 @@ kubectl -n isilon create secret generic karavi-authorization-config --from-file=
162162
- name: authorization
163163
# enable: Enable/Disable csm-authorization
164164
enabled: true
165-
configVersion: v1.9.0
165+
configVersion: v1.10.0
166166
components:
167167
- name: karavi-authorization-proxy
168-
image: dellemc/csm-authorization-sidecar:v1.9.0
168+
image: dellemc/csm-authorization-sidecar:v1.10.0
169169
envs:
170170
# proxyHost: hostname of the csm-authorization server
171171
- name: "PROXY_HOST"

0 commit comments

Comments
 (0)