Skip to content

Releases: dell/csm-operator

Release v1.7.0

31 Oct 14:45
f88f6b6
Compare
Choose a tag to compare

What's Changed

New Contributors

Read more

Release v1.6.1

02 Oct 18:03
v1.6.1
45f495f
Compare
Choose a tag to compare

What's Changed

Fixed Issues

Known Issues

Issue Workaround
When CSM Operator creates a deployment that includes secrets (e.g., application-mobility, observability, cert-manager, velero), these secrets are not deleted on uninstall and will be left behind. For example, the karavi-topology-tls, otel-collector-tls, and cert-manager-webhook-ca secrets will not be deleted. This should not cause any issues on the system, but all secrets present on the cluster can be found with kubectl get secrets -A, and any unwanted secrets can be deleted with kubectl delete secret -n
In certain environments, users have encountered difficulties in installing drivers using the CSM Operator due to the 'OOM Killed' issue. This issue is attributed to the default resource requests and limits configured in the CSM Operator, which fail to meet the resource requirements of the user environments. OOM error occurs when a process in the container tries to consume more memory than the limit specified in resource configuration. Before deploying the CSM Operator, it is crucial to adjust the memory and CPU requests and limits in the files config/manager.yaml, deploy/operator.yaml to align with the user's environment requirements. If the containers running on the pod exceed the specified CPU and memory limits, the pod may get evicted. Currently CSM Operator do not support updating this configuration dynamically. CSM Operator needs to be redeployed for these updates to take effect in case it is already installed. Steps to manually update the resource configuration and then redeploy CSM Operator are available here

v1.6.0

29 Jul 19:58
v1.6.0
af95978
Compare
Choose a tag to compare

What's Changed

Fixed Issues

Known Issues

Issue Workaround
When CSM Operator creates a deployment that includes secrets (e.g., application-mobility, observability, cert-manager, velero), these secrets are not deleted on uninstall and will be left behind. For example, the karavi-topology-tls, otel-collector-tls, and cert-manager-webhook-ca secrets will not be deleted. This should not cause any issues on the system, but all secrets present on the cluster can be found with kubectl get secrets -A, and any unwanted secrets can be deleted with kubectl delete secret -n
In certain environments, users have encountered difficulties in installing drivers using the CSM Operator due to the 'OOM Killed' issue. This issue is attributed to the default resource requests and limits configured in the CSM Operator, which fail to meet the resource requirements of the user environments. OOM error occurs when a process in the container tries to consume more memory than the limit specified in resource configuration. Before deploying the CSM Operator, it is crucial to adjust the memory and CPU requests and limits in the files config/manager.yaml, deploy/operator.yaml to align with the user's environment requirements. If the containers running on the pod exceed the specified CPU and memory limits, the pod may get evicted. Currently CSM Operator do not support updating this configuration dynamically. CSM Operator needs to be redeployed for these updates to take effect in case it is already installed. Steps to manually update the resource configuration and then redeploy CSM Operator are available here

v1.5.1

28 May 13:52
f39ce62
Compare
Choose a tag to compare

What's Changed

Full Changelog: v1.5.0...v1.5.1

v1.5.0

20 Mar 15:15
v1.5.0
5a711be
Compare
Choose a tag to compare

Release Notes - Container Storage Modules Operator v1.5.0

New Features/Changes

Fixed Issues

Known Issues

  • When CSM Operator creates a deployment that includes secrets (e.g., application-mobility, observability, cert-manager, velero), these secrets are not deleted on uninstall and will be left behind. For example, the karavi-topology-tls, otel-collector-tls, and cert-manager-webhook-ca secrets will not be deleted. This should not cause any issues on the system, but all secrets present on the cluster can be found with kubectl get secrets -A, and any unwanted secrets can be deleted with kubectl delete secret -n <secret-namespace> <secret-name>

v1.4.4

19 Mar 21:20
8ce8e00
Compare
Choose a tag to compare

Release Notes - Dell Container Storage Modules Operator 1.4.4

Fixed Issues

  • Change the Apex Connectivity Client access to the kube-proxy port to only connections within the client pod. (#1189)
  • Change Apex Connectivity Client access to secrets to only the secrets it needs to manage. (#1190)

Known Issues

  • The status field of a csm object as deployed by CSM Operator may, in limited cases, display an incorrect status for a deployment. As a workaround, the health of the deployment can be determined by checking the health of the pods.
  • When CSM Operator creates a deployment that includes secrets (e.g., application-mobility, observability, cert-manager, velero), these secrets are not deleted on uninstall and will be left behind. For example, the karavi-topology-tls, otel-collector-tls, and cert-manager-webhook-ca secrets will not be deleted. This should not cause any issues on the system, but all secrets present on the cluster can be found with kubectl get secrets -A, and any unwanted secrets can be deleted with kubectl delete secret -n <secret-namespace> <secret-name>

Documentation

Change Log

See the CHANGELOG for more details.

v1.4.3

01 Mar 19:05
v1.4.3
9d6895b
Compare
Choose a tag to compare

Release Notes - Dell Container Storage Modules Operator 1.4.3

Features

Fixed Issues

Known Issues

  • The status field of a csm object as deployed by CSM Operator may, in limited cases, display an incorrect status for a deployment. As a workaround, the health of the deployment can be determined by checking the health of the pods.
  • When CSM Operator creates a deployment that includes secrets (e.g., application-mobility, observability, cert-manager, velero), these secrets are not deleted on uninstall and will be left behind. For example, the karavi-topology-tls, otel-collector-tls, and cert-manager-webhook-ca secrets will not be deleted. This should not cause any issues on the system, but all secrets present on the cluster can be found with kubectl get secrets -A, and any unwanted secrets can be deleted with kubectl delete secret -n <secret-namespace> <secret-name>

Documentation

Change Log

See the CHANGELOG for more details.

Release v1.4.2

16 Feb 10:09
v1.4.2
1a46e8a
Compare
Choose a tag to compare

Release Notes - Dell Container Storage Modules Operator 1.4.2

Fixed Issues

Known Issues

  • The status field of a csm object as deployed by CSM Operator may, in limited cases, display a "Failed" status for a successful deployment. As a workaround, the deployment is still usable as long as all pods are running/healthy.
  • The status calculation done for the csm object associated with the Authorization Proxy Server when deployed with CSM Operator assumes that the proxy server will be deployed in the "authorization" namespace. If a different namespace is used, the status will stay in the failed state, even though the deployment is healthy. As a workaround, we recommend using the "authorization" namespace for the proxy server. If this is not possible, the health of the deployment can be verified by checking the status of all the pods rather than by checking the status field.

Documentation

Change Log

See the CHANGELOG for more details.

Release v1.4.1

02 Feb 19:32
9b18cff
Compare
Choose a tag to compare

Release Notes - Dell Container Storage Modules Operator 1.4.1

New Features/Changes

Fixed Issues

Known Issues

The images of sidecars are currently missing in the sample YAMLs in the offline bundle. As a consequence, the csm-operator is pulling them from registry.k8s.io.

Documentation

Change Log

See the CHANGELOG for more details.

Release v1.4.0

13 Dec 09:26
v1.4.0
1bcf9eb
Compare
Choose a tag to compare