- ```
- Replace the values for the username and password parameters. These values can be obtained using base64 encoding as described in the following example:
+1. Create a namespace in which the driver will be installed.
```bash
- echo -n "myusername" | base64
- echo -n "mypassword" | base64
- # If mychapsecret is the iSCSI CHAP secret
- echo -n "mychapsecret" | base64
+ kubectl create namespace powermax
```
- Run the `kubectl create -f powermax-creds.yaml` command to create the secret.
-3. Create a configmap using sample [here](https://github.com/dell/csm-operator/tree/master/samples/csireverseproxy). Fill in the appropriate values for driver configuration.
- Example: config.yaml
- ```yaml
- port: 2222 # Port on which reverseproxy will listen
- logLevel: debug
- logFormat: text
- config:
- storageArrays:
- - storageArrayId: "000000000001" # arrayID
- primaryURL: https://primary-1.unisphe.re:8443 # primary unisphere for arrayID
- backupURL: https://backup-1.unisphe.re:8443 # backup unisphere for arrayID
- proxyCredentialSecrets:
- - primary-unisphere-secret-1 # credential secret for primary unisphere, e.g., powermax-creds
- - backup-unisphere-secret-1 # credential secret for backup unisphere, e.g., powermax-creds
- - storageArrayId: "000000000002"
- primaryURL: https://primary-2.unisphe.re:8443
- backupURL: https://backup-2.unisphe.re:8443
- proxyCredentialSecrets:
- - primary-unisphere-secret-2
- - backup-unisphere-secret-2
- managementServers:
- - url: https://primary-1.unisphe.re:8443 # primary unisphere endpoint
- arrayCredentialSecret: primary-unisphere-secret-1 # primary credential secret e.g., powermax-creds
- skipCertificateValidation: true
- - url: https://backup-1.unisphe.re:8443 # backup unisphere endpoint
- arrayCredentialSecret: backup-unisphere-secret-1 # backup credential secret e.g., powermax-creds
- skipCertificateValidation: false # value false, to verify unisphere certificate and provide certSecret
- certSecret: primary-certs # unisphere verification certificate
- - url: https://primary-2.unisphe.re:8443
- arrayCredentialSecret: primary-unisphere-secret-2
- skipCertificateValidation: true
- - url: https://backup-2.unisphe.re:8443
- arrayCredentialSecret: backup-unisphere-secret-2
- skipCertificateValidation: false
- certSecret: primary-certs
- ```
- After editing the file, run this command to create a secret called `powermax-reverseproxy-config`. If you are using a different namespace/secret name, just substitute those into the command.
+2. Create the `powermax-creds` secret.
+
+ - *storageArrays*: A list of storage arrays and their associated details.
+ - *storageArrayId*: A unique PowerMax Symmetrix ID.
+ - *primaryEndpoint*: The URL of the Unisphere server managing this storage array.
+ - *backupEndpoint*: The URL of the backup Unisphere server managing this storage array; utilized if the primary server is unreachable.
+ - *managementServers*: A list of Unisphere management server endpoints and resources used to make connections with those servers.
+ - *endpoint*: The URL of the Unisphere server (primary or backup). This should match one of the URLs listed under `storageArrays`.
+ - *username*: The username to be used when connecting to the `endpoint`.
+ - *password*: The password to be used when connecting to the `endpoint`.
+ - *skipCertificateValidation*: Set to `false` to perform client-side TLS certificate verification for the Unisphere instance, `true` to skip verification.
+
+ ```yaml
+ storageArrays:
+ - storageArrayId: "000000000001"
+ primaryEndpoint: https://primary-1.unisphe.re:8443
+ backupEndpoint: https://backup-1.unisphe.re:8443
+ managementServers:
+ - endpoint: https://primary-1.unisphe.re:8443
+ username: admin
+ password: password
+ skipCertificateValidation: true
+ - endpoint: https://backup-1.unisphe.re:8443
+ username: admin2
+ password: password2
+ skipCertificateValidation: false
+ certSecret: primary-cert
+ ```
+ After editing the file, run this command to create a secret called `powermax-creds`. If you are using a different namespace/secret name, just substitute those into the command.
```bash
- kubectl create configmap powermax-reverseproxy-config --from-file config.yaml -n powermax
+ kubectl create secret generic powermax-creds --namespace powermax --from-file=config=samples/secret/secret.yaml
```
4. Create a configmap using the sample file [here](https://github.com/dell/csi-powermax/blob/main/samples/configmap/powermax-array-config.yaml). Fill in the appropriate values for driver configuration.
```yaml
@@ -510,6 +480,7 @@ Example:
| X_CSI_VSPHERE_PORTGROUP | Existing portGroup that driver will use for vSphere | Yes | "" |
| X_CSI_VSPHERE_HOSTNAME | Existing host(initiator group)/host group(cascaded initiator group) that driver will use for vSphere | Yes | "" |
| X_CSI_VCenter_HOST | URL/endpoint of the vCenter where all the ESX are present | Yes | "" |
+ | X_CSI_REVPROXY_USE_SECRET | Define whether or not to use the new secret format for the PowerMax and the Reverse Proxy. The secret format will be determined by the contents of the secret specified in the `authSecret`. **Note:** If this paramter remains `false`, PowerMax and the reverse proxy will use the configMap approach. | Yes | "false" |
| ***Node parameters*** | | | |
| X_CSI_POWERMAX_ISCSI_ENABLE_CHAP | Enable ISCSI CHAP authentication. For more details on this feature see the related [documentation](../../../../csidriver/features/powermax/#iscsi-chap) | No | false |
| X_CSI_TOPOLOGY_CONTROL_ENABLED | Enable/Disabe topology control. It filters out arrays, associated transport protocol available to each node and creates topology keys based on any such user input. | No | false |
diff --git a/content/docs/deployment/helm/drivers/installation/powermax.md b/content/docs/deployment/helm/drivers/installation/powermax.md
index 3d8d5be578..5c2a6f26f6 100644
--- a/content/docs/deployment/helm/drivers/installation/powermax.md
+++ b/content/docs/deployment/helm/drivers/installation/powermax.md
@@ -5,7 +5,9 @@ description: >
Installing the CSI Driver for Dell PowerMax via Helm
---
{{% pageinfo color="primary" %}}
-{{< message text="1" >}}
+1. {{< message text="11" >}}
+
+2. {{< message text="1" >}}
{{% /pageinfo %}}
The CSI Driver for Dell PowerMax can be deployed by using the provided Helm v3 charts and installation scripts on both Kubernetes and OpenShift platforms. For more detailed information on the installation scripts, see the script [documentation](https://github.com/dell/csi-powermax/tree/master/dell-csi-helm-installer).
diff --git a/layouts/shortcodes/message.html b/layouts/shortcodes/message.html
index 7f91233736..c1dd96d0f4 100644
--- a/layouts/shortcodes/message.html
+++ b/layouts/shortcodes/message.html
@@ -18,6 +18,8 @@
We are thrilled to announce the launch of our brand-new Documentation Portal!
{{ else if eq (.Get "text") "10" }}
Application Mobility will be part of the Container Storage Modules open-source suite in an upcoming release.
+{{ else if eq (.Get "text") "11" }}
+The CSI PowerMax Reverse Proxy Config Map will no longer be supported as of May 30, 2025 and completely deprecated by January 31, 2026. Please switch to using the CSI PowerMax Mount Credentials before these dates to prevent any potential disruptions. Migration steps are available for both Helm and Operator.
{{else}}
Default text if no valid parameter is passed.
{{ end }}