Installing CSI Driver for PowerScale via Dell CSM Operator

The CSI Driver for Dell PowerScale can be installed via the Dell CSM Operator. To deploy the Operator, follow the instructions available here.

Note that the deployment of the driver using the operator does not use any Helm charts and the installation and configuration parameters will be slightly different from the one specified via the Helm installer.

Note: MKE (Mirantis Kubernetes Engine) does not support the installation of CSI-PowerScale via Operator.

Listing installed drivers with the ContainerStorageModule CRD

User can query for all Dell CSI drivers using the following command: kubectl get csm --all-namespaces


  1. Create namespace. Execute kubectl create namespace test-isilon to create the test-isilon namespace (if not already present). Note that the namespace can be any user-defined name, in this example, we assume that the namespace is ‘test-isilon’.

  2. Create isilon-creds secret by creating a yaml file called secret.yaml with the following content:

        # logical name of PowerScale Cluster
      - clusterName: "cluster1"
        # username for connecting to PowerScale OneFS API server
        # Default value: None
        username: "user"
        # password for connecting to PowerScale OneFS API server
        password: "password"
        # HTTPS endpoint of the PowerScale OneFS API server
        # Default value: None
        # Examples: "", "", "https://abc.myonefs.com"
        endpoint: ""
        # Is this a default cluster (would be used by storage classes without ClusterName parameter)
        # Allowed values:
        #   true: mark this cluster config as default
        #   false: mark this cluster config as not default
        # Default value: false
        isDefault: true
        # Specify whether the PowerScale OneFS API server's certificate chain and host name should be verified.
        # Allowed values:
        #   true: skip OneFS API server's certificate verification
        #   false: verify OneFS API server's certificates
        # Default value: default value specified in values.yaml
        # skipCertificateValidation: true
        # The base path for the volumes to be created on PowerScale cluster
        # This will be used if a storage class does not have the IsiPath parameter specified.
        # Ensure that this path exists on PowerScale cluster.
        # Allowed values: unix absolute path
        # Default value: default value specified in values.yaml
        # Examples: "/ifs/data/csi", "/ifs/engineering"
        # isiPath: "/ifs/data/csi"
        # The permissions for isi volume directory path
        # This will be used if a storage class does not have the IsiVolumePathPermissions parameter specified.
        # Allowed values: valid octal mode number
        # Default value: "0777"
        # Examples: "0777", "777", "0755"
        # isiVolumePathPermissions: "0777"
      - clusterName: "cluster2"
        username: "user"
        password: "password"
        endpoint: ""
        endpointPort: "8080"

    Replace the values for the given keys as per your environment. After creating the secret.yaml, the following command can be used to create the secret,
    kubectl create secret generic isilon-creds -n isilon --from-file=config=secret.yaml

    Use the following command to replace or update the secret

    kubectl create secret generic isilon-creds -n isilon --from-file=config=secret.yaml -o yaml --dry-run | kubectl replace -f -

    Note: The user needs to validate the YAML syntax and array related key/values while replacing the isilon-creds secret. The driver will continue to use previous values in case of an error found in the YAML file.

  3. Create isilon-certs-n secret. Please refer this section for creating cert-secrets.

    If certificate validation is skipped, empty secret must be created. To create an empty secret. Ex: empty-secret.yaml

    apiVersion: v1
    kind: Secret
       name: isilon-certs-0
       namespace: isilon
    type: Opaque
       cert-0: ""

    Execute command: kubectl create -f empty-secret.yaml

Install Driver

  1. Follow all the prerequisites above

  2. Create a CR (Custom Resource) for PowerScale using the sample files provided here. This file can be modified to use custom parameters if needed.

  3. Users should configure the parameters in CR. The following table lists the primary configurable parameters of the PowerScale driver and their default values:

    Parameter Description Required Default
    dnsPolicy Determines the DNS Policy of the Node service Yes ClusterFirstWithHostNet
    Common parameters for node and controller
    CSI_ENDPOINT The UNIX socket address for handling gRPC calls No /var/run/csi/csi.sock
    X_CSI_ISI_SKIP_CERTIFICATE_VALIDATION Specifies whether SSL security needs to be enabled for communication between PowerScale and CSI Driver No true
    X_CSI_ISI_PATH Base path for the volumes to be created Yes
    X_CSI_ALLOWED_NETWORKS Custom networks for PowerScale export. List of networks that can be used for NFS I/O traffic, CIDR format should be used No empty
    X_CSI_ISI_AUTOPROBE To enable auto probing for driver No true
    X_CSI_ISI_NO_PROBE_ON_START Indicates whether the controller/node should probe during initialization Yes
    X_CSI_ISI_VOLUME_PATH_PERMISSIONS The permissions for isi volume directory path Yes 0777
    Controller parameters
    X_CSI_MODE Driver starting mode No controller
    X_CSI_ISI_ACCESS_ZONE Name of the access zone a volume can be created in No System
    X_CSI_ISI_QUOTA_ENABLED To enable SmartQuotas Yes
    Node parameters
    X_CSI_MAX_VOLUMES_PER_NODE Specify the default value for the maximum number of volumes that the controller can publish to the node Yes 0
    X_CSI_MODE Driver starting mode No node
  4. Execute the following command to create PowerScale custom resource: kubectl create -f <input_sample_file.yaml> . This command will deploy the CSI-PowerScale driver in the namespace specified in the input YAML file.

  5. Verify the CSI Driver installation

Note :

  1. “Kubelet config dir path” is not yet configurable in case of Operator based driver installation.
  2. Also, snapshotter and resizer sidecars are not optional to choose, it comes default with Driver installation.