Skip to content

Commit c487e2e

Browse files
authored
add support for ocp 4.16 and k8s 1.30 (#119)
1 parent e2f077a commit c487e2e

File tree

2 files changed

+26
-6
lines changed

2 files changed

+26
-6
lines changed

installer/README.md

Lines changed: 24 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,8 @@ A Linux based system, with internet access, will be used to execute the script t
3030
| `jq` | `jq` will be used to parse the Karavi Authorization configuration file during installation|
3131

3232
## Installation script
33-
The installation script is located at https://github.com/dell/karavi-observability/blob/main/installer/karavi-observability-install.sh. The script performs the current steps during installation of Karavi Observability:
33+
34+
The installation script is located at <https://github.com/dell/karavi-observability/blob/main/installer/karavi-observability-install.sh>. The script performs the current steps during installation of Karavi Observability:
3435

3536
- Verify that Karavi Observability is not yet installed
3637
- Verify the Kubernetes/Openshift versions are supported
@@ -47,12 +48,14 @@ The installation script is located at https://github.com/dell/karavi-observabili
4748
- Wait for the Karavi Observability pods to become ready
4849

4950
If Karavi Authorization is enabled for the CSI drivers installed in the same Kubernetes cluster, the installation script will perform the current steps to enable Karavi Observability to use the same Karavi Authorization instance:
51+
5052
- Verify the `karavictl` binary is available.
5153
- Verify the appropriate Secret exists in the CSI driver namespace.
5254
- Query the CSI driver environment to get references to the Karavi Authorization sidecar-proxy Docker image and URL of the proxy server.
5355
- Updates the Karavi Observability deployment to use the existing Karavi Authorization instance.
5456

55-
### Usage of the script is as follows:
57+
### Usage of the script is as follows
58+
5659
```
5760
[user@system /home/user/karavi-observability/installer]# ./karavi-observability-install.sh --help
5861
@@ -89,13 +92,15 @@ To perform an online installation of Karavi Observability, the following steps s
8992
### Clone the GitHub repository
9093

9194
1. Clone the GitHub repository:
95+
9296
```
9397
[user@system /home/user]# git clone https://github.com/dell/karavi-observability.git
9498
```
9599

96100
### Execute the installation script
97101

98102
1. Change to the installer directory:
103+
99104
```
100105
[user@system /home/user]# cd karavi-observability/installer
101106
```
@@ -104,6 +109,7 @@ To perform an online installation of Karavi Observability, the following steps s
104109
The following example will install Karavi Observability into the `karavi` namespace.
105110

106111
**Note**: A sample values.yaml file is located [here](https://github.com/dell/helm-charts/blob/main/charts/karavi-observability/values.yaml).
112+
107113
```
108114
[user@system /home/user/karavi-observability/installer]# ./karavi-observability-install.sh install --namespace karavi --values myvalues.yaml
109115
---------------------------------------------------------------------------------
@@ -153,8 +159,8 @@ The following instructions can be followed when a Helm chart will be installed i
153159

154160
Multiple Linux based systems may be required to create and process an offline bundle for use.
155161

156-
* One Linux based system, with internet access, will be used to create the bundle. This involves the user invoking a script that utilizes `docker` to pull and save container images to file.
157-
* One Linux based system, with access to an image registry, to invoke a script that uses `docker` to restore container images from file and push them to a registry
162+
- One Linux based system, with internet access, will be used to create the bundle. This involves the user invoking a script that utilizes `docker` to pull and save container images to file.
163+
- One Linux based system, with access to an image registry, to invoke a script that uses `docker` to restore container images from file and push them to a registry
158164

159165
If one Linux system has both internet access and access to an internal registry, that system can be used for both steps.
160166

@@ -254,37 +260,43 @@ or
254260
### Perform Helm installation
255261

256262
1. Change directory to `helm` which contains the updated Helm chart directory:
263+
257264
```
258265
[user@anothersystem /home/user/offline-karavi-observability-bundle]# cd helm
259266
```
260267

261268
2. Install necessary cert-manager CustomResourceDefinitions provided:
269+
262270
```
263271
[user@anothersystem /home/user/offline-karavi-observability-bundle/helm]# kubectl apply --validate=false -f cert-manager.crds.yaml
264272
```
265273

266274
3. The vxflexos-config Secret from the namespace where CSI Driver for Dell PowerFlex is installed must be copied to the namespace where Karavi Observability is to be installed.
267275

268276
Example command to copy the Secret from the vxflexos namespace to the karavi namespace.
277+
269278
```
270279
[user@anothersystem /home/user/offline-karavi-observability-bundle/helm]# kubectl get secret vxflexos-config -n vxflexos -o yaml | sed 's/namespace: vxflexos/namespace: karavi/' | kubectl create -f -
271280
```
272281

273282
4. The powerstore-config Secret from the namespace where CSI Driver for Dell PowerStore is installed must be copied to the namespace where Karavi Observability is to be installed.
274283

275284
Example command to copy the Secret from the csi-powerstore namespace to the karavi namespace.
285+
276286
```
277287
[user@anothersystem /home/user/offline-karavi-observability-bundle/helm]# kubectl get secret powerstore-config -n csi-powerstore -o yaml | sed 's/namespace: csi-powerstore/namespace: karavi/' | kubectl create -f -
278288
```
279289

280290
5. The isilon-creds Secret from the namespace where CSI Driver for Dell PowerScale is installed must be copied to the namespace where Karavi Observability is to be installed.
281291

282292
Example command to copy the Secret from the isilon namespace to the karavi namespace.
293+
283294
```
284295
[user@anothersystem /home/user/offline-karavi-observability-bundle/helm]# kubectl get secret isilon-creds -n isilon -o yaml | sed 's/namespace: isilon/namespace: karavi/' | kubectl create -f -
285296
```
286297

287298
6. The powermax-reverseproxy-config Configmap and corresponding Secreta from the namespace where CSI Driver for Dell PowerMax is installed must be copied to the namespace where Karavi Observability is to be installed.
299+
288300
```
289301
[user@anothersystem /home/user/offline-karavi-observability-bundle/helm]# kubectl get configmap powermax-reverseproxy-config -n powermax -o yaml | sed 's/namespace: powermax/namespace: karavi/' | kubectl create -f -
290302
[user@anothersystem /home/user/offline-karavi-observability-bundle/helm]# for secret in\
@@ -294,13 +306,15 @@ Example command to copy the Secret from the isilon namespace to the karavi names
294306
```
295307

296308
# TODO
309+
297310
7. (Optional) The following steps can be performed to enable Karavi Observability for PowerFlex/PowerScale/PowerMax to use an existing instance of Karavi Authorization for accessing the REST API for the given storage systems.
298311
You need to provide your own configurations. A sample values.yaml file is located [here](https://github.com/dell/helm-charts/blob/main/charts/karavi-observability/values.yaml).
299312

300313
In your own configuration values.yaml, you need to enable PowerFlex/PowerScale/PowerMax Authorization, and provide the location of the sidecar-proxy Docker image and URL of the Karavi Authorization proxyHost address.
301314

302315
PowerFlex:
303316
Copy the vxflexos-config-params Configmap, and Copy karavi-authorization-config, proxy-server-root-certificate and proxy-authz-tokens Secrets into the Karavi Observability namespace:
317+
304318
```
305319
[user@anothersystem /home/user/offline-karavi-observability-bundle/helm]# kubectl get configmap vxflexos-config-params -n vxflexos -o yaml | sed 's/namespace: vxflexos/namespace: karavi/' | kubectl create -f -
306320
@@ -309,11 +323,13 @@ Copy the vxflexos-config-params Configmap, and Copy karavi-authorization-config,
309323

310324
PowerScale:
311325
Copy the isilon-config-params Configmap, and Copy karavi-authorization-config, proxy-server-root-certificate and proxy-authz-tokens Secrets into the Karavi Observability namespace:
326+
312327
```
313328
[user@anothersystem /home/user/offline-karavi-observability-bundle/helm]# kubectl get configmap isilon-config-params -n isilon -o yaml | sed 's/namespace: isilon/namespace: karavi/' | kubectl create -f -
314329
315330
[user@anothersystem /home/user/offline-karavi-observability-bundle/helm]# kubectl get secret karavi-authorization-config proxy-server-root-certificate proxy-authz-tokens -n isilon -o yaml | sed 's/namespace: isilon/namespace: karavi/' | sed 's/name: karavi-authorization-config/name: isilon-karavi-authorization-config/' | sed 's/name: proxy-server-root-certificate/name: isilon-proxy-server-root-certificate/' | sed 's/name: proxy-authz-tokens/name: isilon-proxy-authz-tokens/' | kubectl create -f -
316331
```
332+
317333
PowerMax:
318334
Copy the powermax-config-params Configmap, and Copy karavi-authorization-config, proxy-server-root-certificate and proxy-authz-tokens Secrets into the Karavi Observability namespace:
319335

@@ -356,19 +372,23 @@ To perform an offline installation of a helm chart, the following steps should b
356372
3. Perform a Helm upgrade.
357373

358374
### Build the Offline Bundle
375+
359376
Follow [Offline Karavi Observability Helm Chart Installer](#build-the-offline-bundle), Build the latest bundle.
360377

361378
### Unpack the Offline Bundle
379+
362380
Follow [Offline Karavi Observability Helm Chart Installer](#unpack-the-offline-bundle), Copy and Unpack the Offline Bundle to another Linux system, and Push Docker images to the internal Docker registry.
363381

364382
### Perform Helm upgrade
365383

366384
1. Change directory to `helm` which contains the updated Helm chart directory:
385+
367386
```
368387
[user@anothersystem /home/user/offline-karavi-observability-bundle]# cd helm
369388
```
370389

371390
2. Install necessary cert-manager CustomResourceDefinitions provided.
391+
372392
```
373393
[user@anothersystem /home/user/offline-karavi-observability-bundle/helm]# kubectl apply --validate=false -f cert-manager.crds.yaml
374394
```

installer/karavi-observability-install.sh

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -442,8 +442,8 @@ function verify_karavi_observability() {
442442
log info "Skipping verification of the environment"
443443
return
444444
fi
445-
verify_k8s_versions "1.27" "1.29"
446-
verify_openshift_versions "4.11" "4.14"
445+
verify_k8s_versions "1.28" "1.30"
446+
verify_openshift_versions "4.11" "4.15"
447447
verify_helm_3
448448
}
449449

0 commit comments

Comments
 (0)