Objs Install Redhat
Objs Install Redhat
x Installation
Guide for Red Hat OpenShift
October 2023
Rev. 1.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2023 Dell Inc. or its subsidiaries. All rights reserved. Dell Technologies, Dell, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Contents
About using this guide..............................................................................................................................................................5
Chapter 1: Introduction................................................................................................................. 6
Revision history.................................................................................................................................................................... 6
Document feedback...................................................................................................................................................... 6
About Dell ObjectScale ..................................................................................................................................................... 6
Product Description............................................................................................................................................................ 7
About installation and user access.................................................................................................................................. 7
Contents 3
Create an IAM user within an account................................................................................................................... 42
Create a new customer-managed policy............................................................................................................... 43
Attach a policy to an account entity.......................................................................................................................44
Create your first object store and bucket(s)............................................................................................................. 45
Create an object store............................................................................................................................................... 45
Associate an account with an object store........................................................................................................... 47
Create a bucket........................................................................................................................................................... 48
Run S3 workloads using the ObjectScale resources................................................................................................ 50
View the certificates for an object store............................................................................................................... 51
Record S3 endpoint values........................................................................................................................................ 51
Perform an S3 workload using the S3 Browser................................................................................................... 52
View ObjectScale Health................................................................................................................................................. 52
ObjectScale Performance Dashboard ......................................................................................................................... 52
Delete the object store and bucket(s).........................................................................................................................53
Delete a bucket............................................................................................................................................................ 54
Delete an object store................................................................................................................................................ 54
View the Metrics dashboards for an object store.....................................................................................................54
Grafana Dashboards................................................................................................................................................... 55
Chapter 6: Upgrades................................................................................................................... 56
About ObjectScale upgrades..........................................................................................................................................56
4 Contents
About using this guide
CAUTION: Many PDF viewers add a line break to the end of each line of text in a PDF. Adobe Acrobat (Reader,
Standard, and Pro) and other common PDF viewers, including Google Chrome and Microsoft Edge, insert these
line breaks. As a result, when you copy commands that wrap across multiple lines in a PDF, the copied command
is in the wrong format. (It contains erroneous line breaks.) If you copy and paste commands, the line breaks
cause issues during the installation and administration of ObjectScale.
To address this known limitation and ensure that copied commands do not contain unintentional line breaks, do
one of the following:
● Paste the copied commands into a text editor and remove the line breaks.
● Use the HTML version of this document when you are copying commands.
Revision history
Table 1. Revision history
Revision Date Revision Number Description of change
May 16, 2023 1.0 Initial release for ObjectScale 1.2.0
October 11, 2023 2.0 Updated release for ObjectScale 1.3.0
Document feedback
Submit feedback or suggestions about this document to [email protected].
6 Introduction
Product Description
ObjectScale is an enterprise-grade object storage system from Dell that runs efficiently on shared infrastructure and in multi-
tenant environments.
ObjectScale gives organizations the power to put data closer to the applications they support, reducing latency and improving
the user experience. In addition, object storage from disparate platforms can cross-replicate for greater access, reliability, and
redundancy.
ObjectScale offers the following major functionality:
● Simple, S3-compatible enterprise-grade object storage
● Kubernetes-based, customer-deployable
● Scaled-out, software-defined architecture
Other important features of ObjectScale include:
● Improved data protection with new erasure coding schemes
● New replication model with eventual consistency for greater availability during hardware failure
● Integrated management of bucket or object events, enabling bucket notifications, ObjectScale replication, and metering
● A complete multi-tenant IAM service with IAM accounts, with each account supporting IAM entities such as users, groups,
roles, policies, and service providers
ObjectScale runs in Kubernetes. Building ObjectScale for Kubernetes allowed Dell to deliver a simplified product where
Kubernetes handles the OS- and hardware-level layers. ObjectScale handles the storage and storage management.
With this underlying Kubernetes architecture, ObjectScale gives you segmented control of the storage, compute, and network
services. The architecture allows for dynamic provisioning of resources. You can control when new services are started on an as
needed basis. These new resources are tied to the underlying resources upon creation.
Here are some of the benefits Kubernetes provides for ObjectScale:
● Predictable application deployment using a declarative method
● Dynamic scaling of application resources
● Deployment using only required resources
● Highly portable across deployment models
● Self-healing: Autoplacement, auto restart, and autoreplication
In Kubernetes, each resource can be affinitized to run on one host. Affinization of resources to hosts allows ObjectScale to
behave as its own fault domain.
Flexible deployment environments support customer-built and maintained object storage systems. ObjectScale deployment
platforms are:
● ObjectScale Appliance
● ObjectScale Software Bundle
● ObjectScale for Red Hat OpenShift
ObjectScale performance and maintenance tasks benefit from the collocation of the compute and storage infrastructure.
Introduction 7
Access roles control the views and actions available to each user. User accounts must be set up in the cluster for users to
access the ObjectScale Portal user interface.
8 Introduction
2
Prerequisites
Topics:
• Deployment prerequisites for ObjectScale on Red Hat OpenShift
• Preparing OpenShift namespaces and users for ObjectScale
• About setting up end-users on OpenShift
NOTE: Dell recommends installing the OpenShift control plane nodes on separate physical servers to ensure HA operation.
Prerequisites 9
For offline deployments, additional requirements for are documented at: Prerequisites to install ObjectScale on an offline
OpenShift cluster.
NOTE: If you are deploying ObjectScale on to a VxRail HCI configuration, the HCI configuration must meet the ObjectScale
hardware requirements that are listed above. Also, VxRail Manager 7.0.320 or higher is required.
$ sudo su -
# echo /crash-dump/core-%e > /proc/sys/kernel/core_pattern
● OpenShift nodes must be synchronized with an NTP server. ObjectScale requires all the clocks on the nodes to be within 30
s of each other to avoid time synchronization problems.
● The cluster should not have a non- Dell Bare-Metal CSI Driver scheduler policy that is configured in Kubernetes.
● Internet access to the Kubernetes cluster (or to a Linux workstation for an offline cluster) required for pulling the
ObjectScale software container images.
● It is recommended to install the OpenShift control plane nodes on separate physical servers to ensure HA operation.
Dell recommends using the open-source Kubernetes load balancer MetalLB with ObjectScale. See https://metallb.org/ for more
details on MetalLB.
10 Prerequisites
● When Dell issues new license entitlements to a customer based on a purchase, evaluation, or other event, the entitlements
are associated to a unique LAC.
● A LAC can have one or more entitlements that are associated to it. A LAC is the primary identifier of one or more
entitlements, used by the customer or partner to locate and activate licenses.
● At the time an LAC is generated, it is emailed to the customer, but this is not always the case for evaluation licenses or for
purchases of certain products.
When your software order is fulfilled, you receive an email or letter that includes the LAC for your order and instructions for
activating entitlements online.
If you have any questions about your Dell order, contact your Dell Sales Account Representative or your Authorized Reseller.
If you have any questions about Dell software licensing, contact our Licensing Support team.
After activating the license, Dell Licensing sends the software license activation notification email to notify you that software
licenses associated with your Dell account have been activated.
Review the details within the email and contact Dell if you think this license activation is erroneous or unintended.
The activated ObjectScale license .xml file is attached to this email notification. Use this license .xml file within the
ObjectScale UI to activate the product. For more information, see Apply an ObjectScale license.
Steps
1. Log in to the service node in a cluster.
apiVersion: machineconfiguration.openshift.io/v1
kind: KubeletConfig
metadata:
name: set-max-pod-pids
spec:
machineConfigPoolSelector:
matchLabels:
custom-kubelet: larger-pid-limit
kubeletConfig:
podPidsLimit: 16384
4. Validate podPidsLimit.
Prerequisites 11
5. Reboot all nodes after the changes are completed.
a. Communicate to all nodes from the service node through SSH.
b. Run sudo reboot.
12 Prerequisites
● Then, assign the cluster-admin role to one of the users so that it can manage the cluster as admin while logged in as a user.
● As the Admin user, create the necessary projects (namespaces) in the Kubernetes cluster to manage the ObjectScale
deployment. You have the option of deploying the ObjectScale instance and the object stores within the same or different
namespaces.
● As the Admin user, assign RBAC roles to ObjectScale and object store users in OpenShift so that they can manage the
specified namespace and object stores.
NOTE: When creating end users, only assign these users namespace-level role bindings. ObjectScale on OpenShift only
supports Kubernetes-level namespace bindings and does not support cluster-level role bindings.
Prerequisites 13
3
Install ObjectScale on an online, externally-
connected cluster
Follow these tasks to install ObjectScale on an online, externally-connected cluster.
Topics:
• Prepare the OpenShift cluster
• Download the charts .tgz and signature verification files from Dell Support
• (Optional) Verify downloaded files and the online image signatures pulled from DockerHub
• Create and prepare the necessary namespaces in Red Hat OpenShift
• Deploy the Bare-Metal CSI Driver for ObjectScale
• Install ObjectScale onto the OpenShift cluster
• Complete the initial setup of ObjectScale
• Next steps with ObjectScale
Steps
1. On your Linux workstation, create the kube directory.
mkdir -p ~/.kube
2. Using SCP copy the kubeconfig file from the service node to the Linux workstation. Command syntax is:
You will need to provide the password for the service node to complete this step.
3. Edit the /etc/hosts to add the service node name to local hosts file.
a. Locate the service node name in the config file
server: https://api.ocp4.myhost.com:6443
b. Add the service node entry obtained above to the /etc/hosts file:
For example:
4. Verify accessibility to the service node by running this command on the Linux workstation:
a. Get a list of all of the nodes in your cluster:
Steps
1. On a local Linux workstation create, and then open, a directory to place the downloaded files needed for the version of
ObjectScale.
a. Create a directory for the files for this version of ObjectScale:
mkdir <DIR>
b. Go to the directory:
cd <DIR>
Steps
1. On a local Linux workstation, verify the signatures file.
mkdir signatures
./objectscale-images-1.3.0.tgz.02.signed.bin
./OBJECTSCALE_CE_30TB.xml.signed.bin
./objectscale-images-mgt-1.3.0.sh.signed.bin
./objectscale-images-1.3.0.tgz.05.signed.bin
./obs-public-1.3.0.pem.signed.bin
./objectscale-images-1.3.0.tgz.06.signed.bin
./objectscale-online-image-digests-1.3.0.txt.signed.bin
./dellemc-csi-helm-charts-1.3.0-121.2e006fb.tgz.signed.bin
./objectscale-verify-online-digests-1.3.0.sh.signed.bin
./objectscale-images-1.3.0.tgz.03.signed.bin
./objectscale-images-1.3.0.tgz.04.signed.bin
./objectscale-helm-charts-1.3.0.tgz.signed.bin
./objectscale-manifest-1.3.0.json.signed.bin
./objectscale-images-1.3.0.tgz.00.signed.bin
./objectscale-images-1.3.0.tgz.01.signed.bin
For example, to verify the OBJECTSCALE_CE_30TB.xml file, you would use the following command:
machine auth.docker.io
login <DOCKERHUB-USERNAME>
password <PASSWORD>
chmod +x objectscale-verify-online-digests-1.3.0.sh
./objectscale-verify-online-digests-1.3.0.sh <netrc-file>
As an example, the command and output for the ObjectScale 1.3.0 release is shown:
./objectscale-verify-online-digests-1.3.0.sh netrc
objectscale/atlas:2.0.1-24.gdc2ce0c - MATCHED
objectscale/atlas-operator:1.1.0-215.196feb4 - MATCHED
objectscale/csi-baremetal-node:1.3.0-648.59a295a - MATCHED
objectscale/csi-baremetal-node-kernel-5.4:1.3.0-648.59a295a - MATCHED
objectscale/csi-baremetal-controller:1.3.0-648.59a295a - MATCHED
objectscale/csi-baremetal-halmgr:1.3.0-648.59a295a - MATCHED
objectscale/csi-baremetal-basemgr:1.3.0-648.59a295a - MATCHED
objectscale/csi-baremetal-loopbackmgr:1.3.0-648.59a295a - MATCHED
objectscale/csi-baremetal-scheduler-extender:1.3.0-648.59a295a - MATCHED
objectscale/csi-baremetal-scheduler-patcher:1.3.0-648.59a295a - MATCHED
objectscale/csi-baremetal-node-controller:1.3.0-648.59a295a - MATCHED
objectscale/csi-provisioner:v3.1.0 - MATCHED
objectscale/csi-node-driver-registrar:v2.5.0 - MATCHED
objectscale/livenessprobe:v2.6.0 - MATCHED
objectscale/csi-resizer:v1.4.0 - MATCHED
objectscale/kube-scheduler:v0.23.10 - MATCHED
objectscale/csi-baremetal-operator:1.3.0-121.2e006fb - MATCHED
objectscale/csi-baremetal-pre-upgrade-crds:1.3.0-121.2e006fb - MATCHED
objectscale/secondary-scheduler-operator:1.3.0-121.2e006fb - MATCHED
objectscale/dcm:3.8.5.0-p3.139575.5eee936b537 - MATCHED
objectscale/decks:3.0.2-406.31bbcb7 - MATCHED
objectscale/supportassist-ese-notifier:3.0.2-406.31bbcb7 - MATCHED
objectscale/ese-callback:3.0.2-406.31bbcb7 - MATCHED
objectscale/decks-support-store:3.0.2-406.31bbcb7 - MATCHED
objectscale/telemetry-upload:3.0.2-406.31bbcb7 - MATCHED
objectscale/dell-supportassist-ese:3.0.2-406.31bbcb7 - MATCHED
objectscale/base-service-tools:3.0.2-406.31bbcb7 - MATCHED
objectscale/ecs-flex-graphql:1.3.0-1174.2e6d1085 - MATCHED
objectscale/objectscale-portal:1.3.0-310.74d790a2 - MATCHED
objectscale/fabric-proxy:1.3.1-53.0a30b8c - MATCHED
objectscale/iamsvc:3.8.5.0-p3.139574.ac3145de1f6 - MATCHED
objectscale/kahm:2.113.2-265.4a07fa1 - MATCHED
objectscale/kahm-testapp:2.113.2-265.4a07fa1 - MATCHED
objectscale/mock-notifier:2.113.2-265.4a07fa1 - MATCHED
objectscale/snmp-notifier:2.113.2-265.4a07fa1 - MATCHED
objectscale/management-gateway:1.3.0-388.a27f3b4 - MATCHED
objectscale/influxdb:3.8.5.0-1633.83a83598 - MATCHED
objectscale/telegraf:3.8.5.0-1633.83a83598 - MATCHED
objectscale/fluxd:3.8.5.0-1633.83a83598 - MATCHED
objectscale/grafana:3.8.5.0-1633.83a83598 - MATCHED
objectscale/throttler:3.8.5.0-1633.83a83598 - MATCHED
objectscale/rsyslog:3.8.5.0-1633.83a83598 - MATCHED
objectscale/nginx:3.8.5.0-1633.83a83598 - MATCHED
objectscale/prometheus:3.8.5.0-1633.83a83598 - MATCHED
objectscale/statefuldaemonset-operator:3.8.5.0-1633.83a83598 - MATCHED
objectscale/logging-injector:3.8.5.0-1633.83a83598 - MATCHED
objectscale/influxdb-operator:3.8.5.0-1633.83a83598 - MATCHED
Results
Image signature validation is completed.
Prerequisites
● If the ObjectScale Qualification Tool precheck report showed another scheduler extender on the cluster, follow the
OpenShift steps of Manual Kubernetes Scheduler Configuration from https://github.com/dell/csi-baremetal-
operator/blob/master/docs/MANUAL_SCHEDULER_CONFIGURATION.md. These steps ensure that the current
scheduler extender is NOT overwritten. Do these steps before you deploy the Bare-Metal CSI Driver.
Steps
1. Set these environment variables:
export CSI_NS=<CSI_NAMESPACE>
export SSO_NS=openshift-secondary-scheduler-operator
export OBJECTSCALE_NS=<OBJECTSCALE_PROJECT_NAMESPACE>
2. Create a namespace where you can install the secondary scheduler operator.
Red Hat provides this secondary scheduler operator, which is Kubernetes-level software like the default scheduler. You must
install the secondary scheduler on its own namespace.
3. Create a namespace where you can install the CSI Bare-Metal components.
OpenShift 4.12:
# kubectl label --overwrite ns
$OBJECTSCALE_NS pod-security.kubernetes.io/enforce=privileged pod-
security.kubernetes.io/audit=privileged pod-security.kubernetes.io/warn=privileged
security.openshift.io/scc.podSecurityLabelSync="false"
OpenShift 4.13:
# kubectl label --overwrite ns $OBJECTSCALE_NS pod-security.kubernetes.io/
audit=privileged pod-security.kubernetes.io/warn=privileged security.openshift.io/
scc.podSecurityLabelSync="false"
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: pod-csi
namespace: <CSI_NAMESPACE>
rules:
- apiGroups:
- security.openshift.io
resourceNames:
- privileged
resources:
- securitycontextconstraints
verbs:
- use
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: role-binding
namespace: <CSI_NAMESPACE>
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: pod-csi
subjects:
- kind: ServiceAccount
name: csi-baremetal-extender-sa
namespace: <CSI_NAMESPACE>
- kind: ServiceAccount
name: csi-node-sa
namespace: <CSI_NAMESPACE>
9. You should ensure that the OCP cluster global registry pull secret includes the registry pull secret for the docker.io registry
server. If the registry pull secret for docker.io is already in the global cluster pull secret, you may skip the steps below. If the
registry pull secret must be added or updated, follow the steps below.
a. Download the current OCP global pull secrets to a temporary file.
b. Enter the following command to add or update the registry secret for the registry server which hosts the ObjectScale
images to the temporary file.
c. Enter the following command to update the global registry pull secret.
rm -f ocp_cluster_pull_secret
The update to registry pull secret is rolled out to all nodes in the cluster. This update can take some time, depending on the
size of the cluster.
Steps
1. Set these additional environment variables:
export REGISTRY=docker.io/objectscale
export CSI_VERSION=1.3.0-648.59a295a
export CSI_OPERATOR_VERSION=1.3.0-121.2e006fb
export CHARTS_DIR=<CHARTS_DIRECTORY>
NOTE: <CHARTS_DIRECTORY> is the directory that you created and where you downloaded the ObjectScale
charts .tgz files.
4. Verify that the Secondary Scheduler Operator pods are in Running status.
Wait for approximately five minutes for CSI Bare-Metal Deployment to start.
b. Wait for the new CSI Pods to be Running status and the count of pods in the Ready column is matched (for example,
3/3), before continuing:
Steps
1. Ensure that the Bare-Metal CSI storage classes are available on the OpenShift cluster for the installation:
kubectl get sc
4. Set an environment variable for the EULA Revision Date value shown in the last line of the readme file.
You must use this value in the helm install command to deploy ObjectScale. The date is in the format: ddMMMYYYY.
export EULA_DATE=<ddMMMYYYY>
5. Install Postgres.
Installation of ObjectScale begins. Wait at least 10 minutes for all the services to completely start before completing the next
steps.
8. After a few minutes, verify that the ObjectScale components are in Deployed status.
9. Now that the KAHM app has been deployed, install the csi-baremetal-alerts chart into the default namespace:
Prerequisites
If you have not already done so, obtain the network address (EXTERNAL-IP) of the ObjectScale Portal user interface:
Steps
1. Open a supported web browser and enter the External IP address and port for the objectscale-portal service:
https://<EXTERNAL_IP_ADDRESS>:4443
Prerequisites
To obtain the XML license file from the Dell license management website, you must have the License Authorization Code (LAC),
which is emailed from Dell. If you have not received the LAC, contact your Customer Support representative.
Steps
1. From the ObjectScale Portal user interface, click Administration.
The Administration sections that the user is authorized to view are displayed.
2. Click Licensing.
Prerequisites
1. For SupportAssist connectivity you can connect directly with access to the Dell-maintained FQDN: esrs3-
core.emc.com:443.
2. You have applied a valid license to the ObjectScale instance.
3. You are an active Dell customer with login access to https://www.dell.com/support/home/.
4. You must obtain an access key and pin from Dell in order to configure SupportAssist for the first time. This access key and
pin ensure the accuracy of contact and other customer values and access to Dell Support. To obtain an access key and
pin, go to https://www.dell.com/support/home/en-us/product-support/product/objectscale/overview and click Generate
Access key. After completing the required form, Dell sends an email to the email address they have set up for the Dell portal
login. The email is from the "Dell | ServicesConnectivity Team" and contains the site ID, access key, and pin for the selected
customer.
NOTE: The generated access key is valid for seven days.
5. See "SupportAssist port requirements" listed in the ObjectScale Administration Guide and validate that the required ports
are configured properly before configuring SupportAssist.
6. If you are planning on connecting using a Gateway server, ensure that a Dell Secure Connect Gateway (SCG 5.1x) server is
configured on site.
Steps
1. From the ObjectScale Portal user interface, click Administration.
The Administration sections that the user is authorized to view are displayed.
2. Click the SupportAssist tab.
3. Accept the Connect to SupportAssist End User License Agreement.
4. On the Connect to SupportAssist page, select the Select Connection Type to determine which SupportAssist connectivity
type to deploy:
● Select Connect Directly to Dell Support services to connect ObjectScale directly to Dell.
NOTE: Dell highly recommends deploying ObjectScale SupportAssist using a Secure Connect Gateway.
● Select Connect via Gateway Server to connect ObjectScale to Dell through a Secure Connect Gateway (SCG) server.
You must add the Priority, Gateway IP/Host, and Gateway Port values for the gateway server in the Connect via
Gateway Server option.
5. On the Access Key Portal page, select the Model and Software Instance.
6. Configure the Access Key value for Site ID in the Party Number field, and then click Submit. The Access Key is generated,
and the details of the Access Key is emailed to the registered email address.
7. On the Access Key & PIN SupportAssist page, enter the Access Key and PIN SupportAssist values for SiteID, Access Key,
and PIN, and then click Next.
8. Select the Support Contacts tab to add existing Primary or Secondary contacts.
a. Provide the listed values for the Primary contact.
● First Name
● Last Name
● Email address
● Phone number
● Preferred Language
b. Click Add Secondary Contact and provide the required values to configure the contact.
If a Failed Status is shown, view the Status Message to determine the failure details.
11. Click Test Connectivity to validate the SupportAssist connection. When successful, the value that is shown in the Last
Connected column is updated with a newer date and time.
As required, use the panel refresh icon to update the screen before automatic updates.
12. Remote support allows authorized Remote Support engineers to troubleshoot your ObjectScale instance. Enable Remote
Support on the SupportAssist page, Connection tab. You can also click the EDIT button and enable Remote Support on the
Connect to SupportAssist page.
Steps
1. On your Linux workstation, create the kube directory.
mkdir -p ~/.kube
You will need to provide the password for the service node to complete this step.
3. Edit the /etc/hosts to add the service node name to local hosts file.
a. Locate the service node name in the config file
server: https://api.ocp4.myhost.com:6443
b. Add the service node entry obtained above to the /etc/hosts file:
For example:
4. Verify accessibility to the service node by running this command on the Linux workstation:
a. Get a list of all of the nodes in your cluster:
Steps
1. On a local Linux workstation create, and then open, a directory with at least 150 GB of free space for downloading and
extracting the files needed for the version of ObjectScale.
a. Create a directory for the files for this version of ObjectScale:
mkdir <DIR>
b. Go to the directory:
cd <DIR>
mkdir signatures
./objectscale-images-1.3.0.tgz.02.signed.bin
./OBJECTSCALE_CE_30TB.xml.signed.bin
./objectscale-images-mgt-1.3.0.sh.signed.bin
./objectscale-images-1.3.0.tgz.05.signed.bin
./obs-public-1.3.0.pem.signed.bin
./objectscale-images-1.3.0.tgz.06.signed.bin
./objectscale-online-image-digests-1.3.0.txt.signed.bin
./dellemc-csi-helm-charts-1.3.0-121.2e006fb.tgz.signed.bin
./objectscale-verify-online-digests-1.3.0.sh.signed.bin
./objectscale-images-1.3.0.tgz.03.signed.bin
For example, to verify the OBJECTSCALE_CE_30TB.xml file, you would use the following command:
5. After validating the downloaded files, move the objectscale-signatures-1.3.0.tgz.signed.bin into the
signatures directory.
mv objectscale-signatures-1.3.0.tgz.signed.bin ./signatures
chmod +x ./objectscale-images-mgt-1.3.0.sh
3. Then, run the unpacker script to push the files to the registry:
./objectscale-images-mgt-1.3.0.sh <REPOSITORY>
Pushing the images to the repository may take as long as twenty minutes.
Prerequisites
● If the ObjectScale Qualification Tool precheck report showed another scheduler extender on the cluster, follow the
OpenShift steps of Manual Kubernetes Scheduler Configuration from https://github.com/dell/csi-baremetal-
operator/blob/master/docs/MANUAL_SCHEDULER_CONFIGURATION.md. These steps ensure that the current
scheduler extender is NOT overwritten. Do these steps before you deploy the Bare-Metal CSI Driver.
Steps
1. Set these environment variables:
export CSI_NS=<CSI_NAMESPACE>
export SSO_NS=openshift-secondary-scheduler-operator
export OBJECTSCALE_NS=<OBJECTSCALE_PROJECT_NAMESPACE>
2. Create a namespace where you can install the secondary scheduler operator.
Red Hat provides this secondary scheduler operator, which is Kubernetes-level software like the default scheduler. You must
install the secondary scheduler on its own namespace.
3. Create a namespace where you can install the CSI Bare-Metal components.
OpenShift 4.12:
# kubectl label --overwrite ns
$OBJECTSCALE_NS pod-security.kubernetes.io/enforce=privileged pod-
security.kubernetes.io/audit=privileged pod-security.kubernetes.io/warn=privileged
security.openshift.io/scc.podSecurityLabelSync="false"
OpenShift 4.13:
# kubectl label --overwrite ns $OBJECTSCALE_NS pod-security.kubernetes.io/
audit=privileged pod-security.kubernetes.io/warn=privileged security.openshift.io/
scc.podSecurityLabelSync="false"
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: pod-csi
namespace: <CSI_NAMESPACE>
rules:
- apiGroups:
- security.openshift.io
resourceNames:
- privileged
resources:
- securitycontextconstraints
verbs:
- use
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: role-binding
namespace: <CSI_NAMESPACE>
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: pod-csi
subjects:
- kind: ServiceAccount
name: csi-baremetal-extender-sa
namespace: <CSI_NAMESPACE>
- kind: ServiceAccount
name: csi-node-sa
namespace: <CSI_NAMESPACE>
9. You should ensure that the OCP cluster global registry pull secret includes the registry pull secret for the docker.io registry
server. If the registry pull secret for docker.io is already in the global cluster pull secret, you may skip the steps below. If the
registry pull secret must be added or updated, follow the steps below.
a. Download the current OCP global pull secrets to a temporary file.
b. Enter the following command to add or update the registry secret for the registry server which hosts the ObjectScale
images to the temporary file.
c. Enter the following command to update the global registry pull secret.
rm -f ocp_cluster_pull_secret
The update to registry pull secret is rolled out to all nodes in the cluster. This update can take some time, depending on the
size of the cluster.
export REGISTRY=<PRIVATE-REGISTRY>:<PRIVATE-REGISTRY_PORT>
export CSI_VERSION=1.3.0-648.59a295a
export CSI_OPERATOR_VERSION=1.3.0-121.2e006fb
export CHARTS_DIR=<CHARTS_DIRECTORY>
NOTE: <CHARTS_DIRECTORY> is the directory that you created and where you downloaded the ObjectScale
charts .tgz files.
4. Verify that the Secondary Scheduler Operator pods are in Running status.
Wait for approximately five minutes for CSI Bare-Metal Deployment to start.
b. Wait for the new CSI Pods to be Running status and the count of pods in the Ready column is matched (for example,
3/3), before continuing:
10. Set an environment variable for the EULA Revision Date value shown in the last line of the readme file.
You must use this value in the helm install command to deploy ObjectScale. The date is in the format: ddMMMYYYY.
export EULA_DATE=<ddMMMYYYY>
13. Get a list of all the Kubernetes applications to ensure that all the ObjectScale components are present.
14. After a few minutes, verify that the ObjectScale components are in Deployed status.
15. Now that the KAHM app has been deployed, install the csi-baremetal-alerts chart into the default namespace:
Prerequisites
If you have not already done so, obtain the network address (EXTERNAL-IP) of the ObjectScale Portal user interface:
Steps
1. Open a supported web browser and enter the External IP address and port for the objectscale-portal service:
Prerequisites
To obtain the XML license file from the Dell license management website, you must have the License Authorization Code (LAC),
which is emailed from Dell. If you have not received the LAC, contact your Customer Support representative.
Prerequisites
1. For SupportAssist connectivity you can connect directly with access to the Dell-maintained FQDN: esrs3-
core.emc.com:443.
2. You have applied a valid license to the ObjectScale instance.
3. You are an active Dell customer with login access to https://www.dell.com/support/home/.
4. You must obtain an access key and pin from Dell in order to configure SupportAssist for the first time. This access key and
pin ensure the accuracy of contact and other customer values and access to Dell Support. To obtain an access key and
pin, go to https://www.dell.com/support/home/en-us/product-support/product/objectscale/overview and click Generate
Access key. After completing the required form, Dell sends an email to the email address they have set up for the Dell portal
login. The email is from the "Dell | ServicesConnectivity Team" and contains the site ID, access key, and pin for the selected
customer.
NOTE: The generated access key is valid for seven days.
5. See "SupportAssist port requirements" listed in the ObjectScale Administration Guide and validate that the required ports
are configured properly before configuring SupportAssist.
6. If you are planning on connecting using a Gateway server, ensure that a Dell Secure Connect Gateway (SCG 5.1x) server is
configured on site.
Steps
1. From the ObjectScale Portal user interface, click Administration.
The Administration sections that the user is authorized to view are displayed.
2. Click the SupportAssist tab.
3. Accept the Connect to SupportAssist End User License Agreement.
4. On the Connect to SupportAssist page, select the Select Connection Type to determine which SupportAssist connectivity
type to deploy:
● Select Connect Directly to Dell Support services to connect ObjectScale directly to Dell.
NOTE: Dell highly recommends deploying ObjectScale SupportAssist using a Secure Connect Gateway.
● Select Connect via Gateway Server to connect ObjectScale to Dell through a Secure Connect Gateway (SCG) server.
You must add the Priority, Gateway IP/Host, and Gateway Port values for the gateway server in the Connect via
Gateway Server option.
5. On the Access Key Portal page, select the Model and Software Instance.
6. Configure the Access Key value for Site ID in the Party Number field, and then click Submit. The Access Key is generated,
and the details of the Access Key is emailed to the registered email address.
7. On the Access Key & PIN SupportAssist page, enter the Access Key and PIN SupportAssist values for SiteID, Access Key,
and PIN, and then click Next.
8. Select the Support Contacts tab to add existing Primary or Secondary contacts.
a. Provide the listed values for the Primary contact.
● First Name
● Last Name
If a Failed Status is shown, view the Status Message to determine the failure details.
11. Click Test Connectivity to validate the SupportAssist connection. When successful, the value that is shown in the Last
Connected column is updated with a newer date and time.
As required, use the panel refresh icon to update the screen before automatic updates.
12. Remote support allows authorized Remote Support engineers to troubleshoot your ObjectScale instance. Enable Remote
Support on the SupportAssist page, Connection tab. You can also click the EDIT button and enable Remote Support on the
Connect to SupportAssist page.
New Accounts
This task describes how to create an account with the ObjectScale Portal user interface.
Steps
1. From the ObjectScale Portal user interface, click Accounts.
The list of Accounts that the user is authorized to view is displayed.
2. Select NEW ACCOUNT.
New Account window opens.
3. Fill all the required fields in the New Account page.
Field Description
Alias An informal name for the new account.
Description Enter details about the new account.
Encryption Encryption is disabled by default.
Click to enable or disable encryption.
4. Click SAVE.
Steps
1. From the ObjectScale Portal user interface, click Accounts.
The list of Accounts that the user is authorized to view is displayed.
2. Select an account from the account list and then select the Users tab.
The Users list appears.
3. Click New User.
The New User window opens.
4. Fill all the required fields in the New User window.
Field Descriptions
Name a. Enter name of the user.
b. To go to Permissions tab, click Next.
Permissions a. You can add permissions to the new user in one of the following ways:
● Permission boundary and copy permission from an existing user to the current account.
● Add existing group of current account and permission boundary.
● Add existing policies of current account and permission boundary.
b. To go to Tags tab, click Next.
Tags You can add one or more tags to a User.
(Optional) a. Enter the details for Key and Value for a tag.
b. To go to Review tab, click Next.
Review a. Review details of the user.
b. Click CREATE USER.
Secret Keys The Secret Keys tab consists of:
● A list of users that are created along with permission, Access Key ID, and Access Secret keys.
● To download the user table in CSV format, click DOWNLOAD.CSV button.
NOTE: This is the only time that you will be able to download this CSV for this user.
If this access secret key is lost, delete and create a new secret key.
5. Click Complete.
A new IAM user is added in ObjectScale.
Steps
1. From the ObjectScale Portal user interface, click Accounts.
The list of Accounts that the user is authorized to view is displayed.
2. Select an account from the account list and then select the Policies tab.
The Policies list appears.
3. Click NEW POLICY.
The New Policy window opens.
4. Create the policy using the New Policy wizard.
a. On the General tab, add Name and Description for the new policy.
b. On the Editor tab, click Visual or JSON to fill out the policy editor.
Click ADD POLICY STATEMENT to add additional statements.
c. On the Review tab, verify that the previewed policy statement is accurate and then click SAVE.
New policy is created for the account.
Steps
1. From the ObjectScale Portal user interface, click Accounts.
The list of Accounts that the user is authorized to view is displayed.
2. Select an account from the account list and then select the Policies tab.
The Policies list appears.
3. Select a policy, and click Usage and then select Permissions.
4. Click ATTACH
● The Attach Policy window opens, and consists of:
○ The User tab opens by default and lists all the Users in the Account.
○ The Group tab lists all the Groups in the Account.
○ The Role tab lists all the Roles in the Account.
● Any User, Group, or Role that are attached to policy are pre-selected.
5. Select one or more Users, Groups, or Roles, and click SAVE.
The selected User, Group, and Roles are added to the policy.
Steps
1. From the ObjectScale Portal user interface, click Administration > ObjectScale.
The list of Object Stores in the selected namespace that the user is authorized to view is displayed.
2. Select the appropriate namespace from the namespace drop-down on the upper right the ObjectScale Portal user interface.
3. Click New Object Store.
The New Object Store wizard appears.
4. In the General configuration page complete the required fields.
Option Description
Name Enter the Name for the object store. You must verify the name by clicking the VERIFY button next to
the name.
Namespace Verify that you are creating the object store in the correct namespace.
Version Select the Version. This logically tags the object store to allow filtering via a group.
Group Enter the Group value(s) to apply to the object store. Use the version to logically group the object
stores and to filter the object stores with the group.
The Group field is optional.
My Templates If previously created, select a template to populate the configuration values for the new object store.
The My Templates field is optional.
5. Click Quick or Advanced to continue with the creation of the new object store.
● Click Quick and set the Requested Raw Capacity for the new object store in the Storage And Review section of the
wizard.
8. In the Storage configuration page, set desired Storage values and click Next to continue.
In this step define the following storage values for the new object store:
● Requested Raw Capacity for the object store. In software defined storage, Requested Raw capacity can be greater
than currently licensed capacity but cannot be greater than total cluster capacity.
● Storage Server Replica(s) for the object store. The number of storage server replicas should be less than or equal
to maximum storage server replica count and available storage server replicas count. When capacity is incremented, the
storage server replica count may increase.
● Volumes per Storage Server Replica for the object store.
Based on these values, ObjectScale will configure the remaining fields within the Storage tab.
NOTE: Additionally, if you wish to save a portion of the object store settings as a template for future use, simply add a
name to the Save as template field at the bottom of this page of the wizard.
Finally, use the Review page to review the values to be used for configuring the new object store and click Save.
The object store creation process begins and will take approximately 15 to 20 minutes to become available.
11. Optional: Refresh the UI to observe the various states of Health for the object store during the creation process such as
Initializing, Starting, and Provisioning. The process is complete when the Health of the object store becomes Avaliable.
During object store creation, new pods for the object store become visible in the selected namespace.
Results
The new object store has been created. Before you can create buckets or use this object store, you must associate this object
store with an IAM account. See Associate an account with an object store for more information.
Steps
1. From the ObjectScale Portal user interface, click Administration > ObjectScale.
The list of Object Stores in the selected namespace that the user is authorized to view is displayed.
2. Select the appropriate namespace from the namespace drop-down on the upper right the ObjectScale Portal user interface.
3. Click the name of the object store that you want to review.
The Object Store Summary page is displayed. Here you can review the high-level details about the select object store:
● General details
● Storage Classes
● Storage details
● S3 Service details
● Management Service details
● Replication Service details
Steps
1. From the ObjectScale Portal user interface, click Administration > ObjectScale.
The list of Object Stores in the selected namespace that the user is authorized to view is displayed.
2. Select the appropriate namespace from the namespace drop-down on the upper right the ObjectScale Portal user interface.
3. Select the object store to add the tenant account to by clicking the object store name.
4. Select the Accounts tab.
The Accounts list appears displaying the accounts currently associated with the object store.
5. Click Add.
The Add Account to Object Store: <OBJECT_STORE_NAME> wizard is displayed.
Create a bucket
This section describes how to set up a new bucket using the ObjectScale Portal user interface.
Steps
1. From the ObjectScale Portal user interface, click Buckets.
The list of Buckets that the user is authorized to view is displayed.
2. Use the Namespace and Object store fields at the top of the Buckets page to locate the object store in which you want
to create the bucket.
a. Select the namespace from the namespace drop-down on the top of the Buckets page.
b. Select the name of the object store that contains the bucket.
3. Click New Bucket.
Option Description
Name Type a name for the new bucket. Bucket names can consist only of lowercase letters, numbers, dots
(.), and hyphens (-).
Namespace Select the namespace. Only the namespaces for which the user has edit permissions are listed in the
dropdown.
Object Store Select the object store from the ObjectStore dropdown menu within which to create the bucket.
Name
Bucket Owner Select the bucket owner account from the Bucket Owner Account dropdown menu.
Account
To select any account, first remove the selected account to see all accounts, and click the dropdown
to list all accounts. Select an account from the data list, or you can begin typing the account id to the
Bucket Owner Account data list.
5. In the Policy page, describe the policy to apply to the bucket and then click Next.
For more detailed information about creating a bucket policy statement, see the "About bucket policies" section in the
ObjectScale 1.3 Administration Guide.
a. Switch to the Text view of the policy editor by clicking between the View and Text views of the policy editor.
b. In the Policy editor text field, type the JSON-formatted policy or copy and paste a previously created policy. The syntax
for policies is the same as the syntax used for Amazon AWS.
c. Provided your policy is valid, you can switch to the tree view of the Policy. The tree view makes it easier to view your
policy and to expand and contract statements.
6. In the Controls page, complete the required fields and then click Next.
Option Description
Versioning ● To maintain multiple versions of the same object within the bucket, set Versioning to On.
● To maintain a single version of an object, keep Versioning Off.
For more information, see the "Versioning configuration and effects on bucket operations" section in the
ObjectScale 1.3 Administration Guide.
Object Lock Enable Object Lock to protect objects from deletion or overwrite, for a fixed amount of time or indefinitely,
depending on the configuration.
● When Versioning is On, Object Lock protects versions.
● When Versioning is Off (or edited later to Suspended), Object Lock applies to the object. Delete
object and overwrite object operations are blocked for objects in the bucket with a lock that is still in
effect.
Optionally set a default Object Lock retention mode for the objects in this bucket. Objects are automatically
locked when they are added to a bucket that has a configured default retention lock. The default retention
lock is applied to objects even if the user does not have s3:PutObjectLegalHold and s3:PutObjectRetention
permissions. Available lock types are:
● GOVERNANCE
● COMPLIANCE
● NONE (Object Lock is enabled, but the retention mode is not set.)
If GOVERNANACE or COMPLIANCE is selected, you can optionally set a Retention period. Select either
Days or Years and type the number of days or years for the period. This setting is a default retention
period for the bucket. Objects can have explicit retention periods set for them. An explicit retention period
set on an object supersedes this bucket default retention period.
Object Lock is Off by default.
For more information about Object Lock states and how Object Lock works with the different versioning
states, see the "Object Lock configuration and the effects on bucket operations" section in the ObjectScale
1.3 Administration Guide.
Encryption Enable encryption to save the bucket data in an encrypted format. If Encryption was enabled at the
account level when add to object store, you cannot disable encryption in the bucket.
Encryption is disabled by default.
NOTE: Encryption cannot be disabled after you create the bucket with encryption enabled.
Bucket Enable Bucket logging to log requests for a specific source bucket to a designated target bucket in a
Logging consistent format. Enter the name of the target bucket in the Target Bucket field. Enter an optional prefix
to prepend to generated log files in the Prefix for Bucket Logging files field.
NOTE:
● The target bucket must be configured to allow bucket logging before allowing a source bucket to
set it as a target.
● The prefix makes it easier to locate log objects.
● Multiple source buckets can share the same prefix.
7. In the Event Rule page, complete the required fields and then click Next.
For more information about editing bucket event notifications, see .
You must have at least one notification destination for this account to set up a bucket event rule.
Option Description
Event Rule Name Type a name for the new event.
Events Select one or more event types that trigger this event notification.
Prefix/Suffix Type the object prefix or suffix values that trigger this event notification.
Send To Select the notification destination to be used to send the notifications for the configured events.
NOTE: Click Add Event Rule to add multiple event rules. You cannot create configurations on the same bucket that
share a common event type.
8. Finally, use the Review page to review the values for configuring the new bucket and click Save.
If necessary, click Edit to modify any of the values.
Results
The system creates the bucket in the object store, and the bucket name appears on the main Buckets page.
Steps
1. From the ObjectScale Portal user interface, click Administration > ObjectScale.
The list of Object Stores in the selected namespace that the user is authorized to view is displayed.
2. Select the appropriate namespace from the namespace drop-down on the upper right the ObjectScale Portal user interface.
3. Click the name of the object store.
The Summary of the selected object store appears.
Steps
1. From the ObjectScale Portal user interface, click Administration > ObjectScale.
The list of Object Stores in the selected namespace that the user is authorized to view is displayed.
2. Select the appropriate namespace from the namespace drop-down on the upper right the ObjectScale Portal user interface.
3. Collect the S3 endpoint value from the object store Summary tab.
Record this value in the EXTERNAL_ENDPOINT value in the table above.
4. Locate the Secret Key .csv file previously saved locally for the user that owns the bucket in the object store.
This user should be a part of the IAM account that is a tenant within the selected object store.
Record this value as the SECRET_KEY in the table above.
5. Finally, collect the Access Key ID for the user.
a. Go to the object store Accounts tab and click on the name of the IAM account that manages the user account.
b. Select the Users tab and click on the name of the user account that will be used for S3.
c. Click on Secret Key and record the Access Key ID value displayed in the Secret Key table.
NOTE: If you do not have the previously created Secret Key for this user or wish to change it for any reason, you
can DEACTIVATE or REMOVE old Secret Keys/Access Key pairs and click ADD KEY to generate a new key for the
user.
Steps
1. In S3 browser, create an account with the details of the object store bucket.
Use the S3 values you recorded in the last task to complete this step.
a. Type a Name for the account.
b. Select S3 Compatible Storage from the Account Type dropdown.
c. Enter the EXTERNAL_ENDPOINT value into the REST Endpoint field.
For example:
Rest Endpoint: 10.55.66.77:443
d. Enter the ACCESS KEY value into the Access Key ID field.
For example:
Access Key: AKIA5F587FA0E4E4FF81
e. Enter the SECRET_KEY value into the Secret Access Key field.
For example:
Secret Key: KqM5xHvaG7Bv9SH0lGoMrGYDWJrUoZsVvZ71JBeY
2. Connectivity is verified by creating new buckets and uploading objects via S3 Browser or a similar S3 Compatible application.
3. Optional: Create additional buckets using S3 browser or within the object store.
4. Use the S3 Browser to place one or move objects in this new bucket.
You should see the object(s) uploaded in the within the bucket.
Steps
1. From the ObjectScale Portal user interface, click Alerts to display the full list of current alerts.
You can filter the alerts that are listed using the dropdown above the table. You can filter alerts from the last 24 hours, the
last 7 days, last month, or all.
You can filter on some columns in the Alerts tab. To filter, click the filter icon in each column header and then type in what
you are trying to match on. If a filter is defined, then the icon is selected and circled.
a. Select an alert listed in the table.
b. If the alert type is Manual, use ACKNOWLEDGE or UNACKNOWLEDGE to modify an issue once reviewed.
2. To review health events, select Logs to display the full list of current events.
You can filter the events that are listed using the dropdown above the table. You can filter events from the last 24 hours, the
last 7 days, last month, or all.
You can filter on some columns in the Logs tab. To filter, click the filter icon in each column header and then type what you
are trying to match. If a filter is defined, then the icon is highlighted and circled.
Prerequisites
The bucket must be empty. ObjectScale will only allow the deletion of buckets without any data within them.
Steps
1. From the ObjectScale Portal user interface, click Buckets.
The list of Buckets that the user is authorized to view is displayed.
2. Use the Namespace, Object store, Account, and Bucket name fields at the top of the Buckets page to locate the
bucket.
a. Select the appropriate namespace from the Namespace drop-down on the top of the Buckets page.
b. Select the name of the Object Store that contains the bucket.
c. Select the account from the Accounts dropdown.
To select another account, remove the current account to see all the available accounts. Then, select another account,
by either using the dropdown to display all accounts, or by typing the account id into to the Select an account field to
dynamically filter the list of accounts.
d. Optionally, type at least the first three characters of a Bucket name to filter the list of buckets.
3. Select the bucket to be deleted and click Delete.
ObjectScale prompts Are you sure you want to delete following bucket(s)?
4. In the Delete Bucket confirmation window, confirm that the appropriate bucket will be deleted.
Results
The bucket is deleted from the object store.
Steps
1. From the ObjectScale Portal user interface, click Administration > ObjectScale.
The list of Object Stores in the selected namespace that the user is authorized to view is displayed.
2. Select the appropriate namespace from the namespace drop-down on the upper right the ObjectScale Portal user interface.
3. Select the object store to delete by clicking the checkbox to the left of the object store name.
4. Click Delete and confirm in the dialog box that appears.
The object store disappears from the table before all the resources associated with it (pods, PVCs, volumes, so on) have
been deleted. The removal operations continue in the background for a few minutes (depends on the size of the store).
Removal can be monitored with kubectl (for example, using get pods).
Grafana Dashboards
ObjectScale includes the collection, storage, and visualization of detailed metrics in Grafana dashboards. Administrators can use
these dashboards to drill into problems or identify developing problems with ObjectScale or problems with underlying storage
resources.
Similar metrics are also available at the ObjectScale-level, from the Dashboard page (must have admin permissions to see
them).
Grafana is an open-source metrics visualization tool. The ObjectScale installation deploys Grafana.
See Grafana for basic details of navigation in Grafana dashboards.
56 Upgrades
7
Uninstall ObjectScale
Topics:
• Uninstall ObjectScale from the Red Hat OpenShift cluster
Wait until all object store resources are removed before continuing. Deleting an object store can take up to a few minutes,
depending on the size of the object store.
4. Remove all the ObjectScale application.
Wait for all the ObjectScale applications to be removed before proceeding with the next steps.
5. Run helm list --all-namespaces to get the list of installed components for ObjectScale.
6. Uninstall Postgres.
7. Start removing the CSI Bare Metal components by first deleting the PVCs bound for ObjectScale and its components.
a. List all the PVCs used by ObjectScale:
b. Delete each ObjectScale PVC one by one until all have been removed:
d. Delete each ObjectScale volume one by one until all have been removed:
Uninstall ObjectScale 57
e. List all the LVGs used by ObjectScale:
f. Delete each ObjectScale LVGs one by one until all have been removed:
NOTE: Repeat these steps for any other object store namespaces.
58 Uninstall ObjectScale
For each returned ObjectScale secret, use:
17. Check for the following remaining resources in ObjectScale and object store namespaces and carefully delete only the
resources that have "objectscale" or the name of a deleted object store:
NOTE: Repeat these steps for any other object store namespaces. If you are unable to delete any component or
resource, then edit that resource and check for finalizers. Delete that row including finalizers; then the component or
resource is automatically deleted.
Uninstall ObjectScale 59