InfoScale™ 9.0 Support for Containers - Linux

Last Published:
Product(s): InfoScale & Storage Foundation (9.0)
Platform: Linux
  1. Overview
    1.  
      Introduction
    2.  
      Features of InfoScale in Containerized environment
    3.  
      CSI Introduction
    4.  
      I/O fencing
    5.  
      Disaster Recovery
  2. System requirements
    1.  
      Introduction
    2.  
      Supported platforms
    3.  
      Disk space requirements
    4.  
      Hardware requirements
    5.  
      Number of nodes supported
    6.  
      DR support
  3. Preparing to install InfoScale on Containers
    1. Setting up the private network
      1.  
        Guidelines for setting the media speed for LLT interconnects
      2.  
        Guidelines for setting the maximum transmission unit (MTU) for LLT
    2.  
      Synchronizing time settings on cluster nodes
    3.  
      Securing your InfoScale deployment
    4.  
      Configuring kdump
  4. Installing Arctera InfoScale™ on OpenShift
    1.  
      Introduction
    2.  
      Prerequisites
    3. Installing InfoScale on a system with Internet connectivity
      1. Using web console of OperatorHub
        1.  
          Adding Nodes to an InfoScale cluster by using OLM
        2.  
          Undeploying and uninstalling InfoScale
      2. Installing from OperatorHub by using Command Line Interface (CLI)
        1.  
          Configuring cluster
        2.  
          Adding nodes to an existing cluster
        3.  
          Undeploying and uninstalling InfoScale by using CLI
      3. Installing by using YAML.tar
        1.  
          Configuring cluster
        2.  
          Adding nodes to an existing cluster
        3.  
          Undeploying and uninstalling InfoScale
    4. Installing InfoScale in an air gapped system
      1.  
        Configuring cluster
      2.  
        Adding nodes to an existing cluster
      3.  
        Undeploying and uninstalling InfoScale
  5. Installing Arctera InfoScale™ on Kubernetes
    1.  
      Introduction
    2. Prerequisites
      1.  
        Installing Node Feature Discovery (NFD) Operator and Cert-Manager on Kubernetes
    3.  
      Installing the Special Resource Operator
    4. Tagging the InfoScale images on Kubernetes
      1.  
        Downloading side car images
    5. Installing InfoScale on Kubernetes
      1.  
        Configuring cluster
      2.  
        Adding nodes to an existing cluster
    6.  
      Undeploying and uninstalling InfoScale
  6. InfoScale CSI deployment in Container environment
    1.  
      CSI plugin deployment
    2.  
      Static provisioning
    3. Dynamic provisioning
      1.  
        Reclaiming provisioned storage
    4.  
      Resizing Persistent Volumes (CSI volume expansion)
    5. Snapshot provisioning (Creating volume snapshots)
      1.  
        Dynamic provisioning of a snapshot
      2.  
        Static provisioning of an existing snapshot
      3.  
        Using a snapshot
      4.  
        Restoring a snapshot to new PVC
      5.  
        Deleting a volume snapshot
    6. Managing InfoScale volume snapshots with Velero
      1.  
        Setting up Velero with InfoScale CSI
      2.  
        Taking the Velero backup
      3.  
        Creating a schedule for a backup
      4.  
        Restoring from the Velero backup
    7. Volume cloning
      1.  
        Creating volume clones
      2.  
        Deleting a volume clone
    8.  
      Using InfoScale with non-root containers
    9.  
      Using InfoScale in SELinux environments
    10.  
      CSI Drivers
    11.  
      Creating CSI Objects for OpenShift
  7. Installing InfoScale DR on OpenShift
    1.  
      Introduction
    2.  
      Prerequisites
    3.  
      External dependencies
    4. Installing InfoScale DR
      1.  
        Configuring DR Operator
      2.  
        Configuring Global Cluster Membership (GCM)
      3.  
        Configuring Data Replication
      4.  
        Configuring DNS
      5.  
        Configuring Disaster Recovery Plan
  8. Installing InfoScale DR on Kubernetes
    1.  
      Introduction
    2.  
      Prerequisites
    3.  
      External dependencies
    4. Installing InfoScale DR
      1.  
        Configuring DR Operator
      2.  
        Configuring Global Cluster Membership (GCM)
      3.  
        Configuring Data Replication
      4.  
        Configuring DNS
      5.  
        Configuring Disaster Recovery Plan
  9. TECHNOLOGY PREVIEW: Disaster Recovery scenarios
    1.  
      Migration
  10. Configuring InfoScale
    1.  
      Logging mechanism
    2.  
      Configuring Arctera Oracle Data Manager (VRTSodm)
  11. Troubleshooting
    1.  
      Known Issues
    2.  
      Limitations

Installing from OperatorHub by using Command Line Interface (CLI)

Complete the following steps.

Downloading YAML.tar

  1. Download YAML.tar from the Arctera Download Center.
  2. Untar YAML.tar.

    After you untar YAML.tar, a folder /YAML/OpenShift/OLM/ is created and all files required for installation are available in the folder.

    Note:

    An OpenShift cluster already has a namespace openshift-operators. You can choose to install InfoScale in openshift-operators.

Optionally, you can configure a new user - infoscale-admin, associated with a Role-based Access Control ( RBAC) clusterrole defined in infoscale-admin-role.yaml, to deploy InfoScale and its dependent components. infoscale-admin as a user when configured has clusterwide access to only those resources needed to deploy InfoScale and its dependent components such as SRO/NFD/Cert Manager in the desired namespaces.

To provide a secure and isolated environment for InfoScale deployment and associated resources, the namespace associated with these resources must be protected from access of all other users (except super user of the cluster), with appropriate RBAC implemented.

Run the following commands on the bastion node to create a new user - infoscale-admin and a new project and assign role or clusterrole to infoscale-admin. You must be logged in as a super user.

Configuring a new user

  1. oc new-project <New Project name>

    A new project is created for InfoScale deployment.

  2. oc adm policy add-role-to-user admin infoscale-admin

    Following output indicates that administrator privileges are assigned to the new user - infoscale-admin within the new project.

    clusterrole.rbac.authorization.k8s.io/admin added: "infoscale-admin"
  3. oc apply -f /YAML/OpenShift/OLM/infoscale-admin-role.yaml

    Following output indicates that a clusterrole is created.

    clusterrole.rbac.authorization.k8s.io/infoscale-admin-role created
  4. oc adm policy add-cluster-role-to-user infoscale-admin-role infoscale-admin

    Following output indicates that a clusterrole created is associated with infoscale-admin.

    clusterrole.rbac.authorization.k8s.io/infoscale-admin-role added:
              "infoscale-admin"
    

After creating this user, you can login as infoscale-admin to perform all operations involved in installing InfoScale, configuring cluster, and adding nodes.

Installing Operators

  1. Run the following command on the bastion node.

    Note:

    Ignore this step if you want to install in openshift-operators.

    oc create namespace infoscale-vtas

    Review output similar to the following to verify whether the namespace is created successfully.

    namespace/infoscale-vtas created
  2. Run the following command on the bastion node to create subscription.

    Note:

    If you want to install InfoScale in openshift-operators, edit /YAML/OpenShift/OLM/infoscale-sub.yaml. Change namespace from infoscale-vtas to openshift-operators

    oc create -f /YAML/OpenShift/OLM/infoscale-sub.yaml

    Following output indicates a successful command run.

    subscription.operators.coreos.com/infoscale-sds-operator created
  3. Run the following command on the bastion node to create an operator group.

    Note:

    Ignore this step if you want to install in openshift-operators.

    oc create -f /YAML/OpenShift/OLM/infoscale-og.yaml

    Following output indicates a successful command run.

    operatorgroup.operators.coreos.com/infoscale-opgroup created
  4. Run the following command on the bastion node.

    oc get sub,og -n infoscale-vtas

    Following output indicates a successful command run.

    NAME                                PACKAGE              
    subscription.operators.coreos.com   infoscale-sds-operator   
    /infoscale-sds-operator
    
    SOURCE                CHANNEL
    certified-operators   stable
    
    NAME                                                   AGE
    operatorgroup.operators.coreos.com/infoscale-opgroup   24s
  5. Run the following command on the bastion node.

    oc get ip -A

    Use installation-name from the output similar to the following output.

    NAMESPACE        NAME            
    infoscale-vtas   <installation-name> 
    CSV                                        APPROVAL   APPROVED
    openshift-special-resource-operator.4.9.0  Manual     false
    -202111041612 
  6. Run the following command on the bastion node.

    Note:

    Do not include the angle brackets (< >) in the command.

    oc patch installplan <installation-name> --namespace infoscale-vtas --type merge --patch '{"spec":{"approved":true}}'

    Following output indicates a successful command run.

    installplan.operators.coreos.com/<installation-name> patched
  7. Run the following command on the bastion node.

    oc get ip -A

    Review output similar to the following . Check if APPROVED is true.

    NAMESPACE        NAME            
    infoscale-vtas   <installation-name> 
    CSV                                         APPROVAL   APPROVED
    openshift-special-resource-operator.4.9.0   Manual     true
    -202111041612
  8. Run the following command on the bastion node to check the status of csv.

    oc get csv

    Components which are getting installed or are pending are listed, as under.

    NAME             DISPLAY        VERSION              REPLACES   PHASE
    cert-manager.v1.6.1        cert-manager              1.6.1    Installing
    infoscale-sds-operator.
                    v8.0.100  InfoScale™ SDS Operator   8.0.100  Installing
    nfd.4.9.0-202111020858     Node Feature Discovery 4.9.0-202111020858  
                                                                  Pending
    openshift-special-resource Special Resource Operator 4.9.0-202111041612 
    -operator.4.9.0-202111041612                                  Installing 
    
  9. Run the following command on the bastion node to check the status of operator group and subscription.

    oc get og,sub -n infoscale-vtas

    Review output similar to the following output for the status.

    operatorgroup.operators.coreos.com/infoscale-opgroup   47m
    
    NAME                                                                                                                 
    subscription.operators.coreos.com/cert-manager-stable-community
    -operators-openshift-marketplace                       
    subscription.operators.coreos.com/infoscale-sds-operator                                                                  
    subscription.operators.coreos.com/nfd-stable-redhat-operators
    -openshift-marketplace                                   
    subscription.operators.coreos.com/openshift-special-resource-operator-
    stable-redhat-operators-openshift-marketplace   
    
     PACKAGE                            SOURCE                CHANNEL
    cert-manager                        community-operators   stable
    infoscale-sds-operator                  certified-operators   stable
    nfd                                 redhat-operators      stable
    openshift-special-resource-operator redhat-operators      stable
  10. Run the following command on the bastion node again.

    oc get csv

    Review the output if all components are installed successfully.

    NAME             DISPLAY        VERSION              REPLACES   PHASE
    cert-manager.v1.6.1        cert-manager              1.6.1    Succeeded
    infoscale-sds-operator.
                     v8.0.100  InfoScale™ SDS Operator   8.0.100  Succeeded
    nfd.4.9.0-202111020858     Node Feature Discovery 4.9.0-202111020858 
                                                                  Succeeded
    openshift-special-resource Special Resource Operator 4.9.0-202111041612   
    -operator.4.9.0-202111041612                                  Succeeded           
    
  11. After a successful installation of these components, create a NodeFeatureDiscovery CR. NodeFeatureDiscovery.yaml is a NodeFeatureDiscovery Custom Resource (CR).
  12. Run the following command on the bastion node.

    Note:

    If you want to install InfoScale in openshift-operators, edit /YAML/OpenShift/OLM/NodeFeatureDiscovery.yaml. Change namespace from infoscale-vtas to openshift-operators for the nfd instance.

    oc create -f /YAML/OpenShift/OLM/NodeFeatureDiscovery.yaml

    Following output indicates a successful creation.

    nodefeaturediscovery.nfd.openshift.io/nfd-instance created
  13. Run the following command to check the status of all operator pods in infoscale-vtas.

    Note:

    If you have installed in openshift-operators, run oc get pods -n openshift-operators.

    oc get pods -n infoscale-vtas

    NAME                                   READY STATUS    RESTARTS   AGE
    cert-manager-64c9cb7499-ppgbk          1/1   Running   0          165m
    cert-manager-cainjector-5596f8f575
                                    -2f246 1/1   Running   0          165m
    cert-manager-webhook-7485d9dd59-864l4  1/1   Running   0          165m
    infoscale-sds-operator-6dd8d77bf8-qwg2p 1/1  Running   0          165m
    nfd-controller-manager-5fc85ff79-gx4qb 2/2   Running   0          165m
    nfd-master-6zs5p                       1/1   Running   0          55m
    nfd-master-ktc7s                       1/1   Running   0          55m
    nfd-master-n2dh9                       1/1   Running   0          55m
    nfd-worker-795vs                       1/1   Running   0          55m
    nfd-worker-8n2m9                       1/1   Running   0          55m
    nfd-worker-9j845                       1/1   Running   0          55m
    nfd-worker-vwkwq                       1/1   Running   0          55m
    special-resource-controller-manager-
    dc5d6b768-2sk4k                        2/2   Running   0          165m
    

Applying Licenses

  1. Run oc create -f /YAML/OpenShift/OLM/lico.yaml on the bastion node.
  2. Run oc get pods -n infoscale-vtas|grep -i licensing on the bastion node to verify whether lico.yaml is successfully applied.

    An output similar to the following indicates that lico.yaml is successfully applied.

    NAME                                  READY STATUS  RESTARTS AGE
    licensing-operator-fbd8c7dc4-rcfz5    1/1   Running 0        2m
    
    
  3. After lico.yaml is successfully applied, licensing endpoints must be available.

    Run oc describe service/lico-webhook-service -n infoscale-vtas|grep Endpoints on the master node and review the output.

  4. Run the command again till you get an output in the following format.
    Endpoints: <IP address of the endpoint>:<Port number>
  5. Edit /YAML/OpenShift/OLM/license_cr.yaml for the license edition. The default license edition is Developer. You can change the licenseEdition. If you want to configure Disaster Recovery (DR), you must have Trialware or SubscriptionEnterprise as the license edition.
    apiVersion: vlic.veritas.com/v1
    kind: License
    metadata:
      name: license-dev
    spec:
      # valid licenseEdition values are Developer, Trialware, 
                 SubscriptionStorage or SubscriptionEnterprise
      licenseEdition: "Developer"
    
  6. Run oc create -f /YAML/OpenShift/OLM/license_cr.yaml on the bastion node.
  7. Run oc get licenses on the bastion node to verify whether licenses have been successfully applied.

    An output similar to the following indicates that license_cr.yaml is successfully applied.

    NAME          NAMESPACE   LICENSE-EDITION   AGE
    license                   DEVELOPER         27s