Skip to content

Commit b38d734

Browse files
Merge pull request #110155 from danielclowers/DOCPLAN-164
DOCPLAN-164: CQA ocp virt storage docs
2 parents edcd85a + 745a417 commit b38d734

6 files changed

Lines changed: 66 additions & 65 deletions

modules/virt-managing-auto-update-all-system-boot-sources.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
[role="_abstract"]
1111
Disabling automatic boot source imports and updates can lower resource usage. In disconnected environments, disabling automatic boot source updates prevents `CDIDataImportCronOutdated` alerts from filling up logs.
1212

13-
To disable automatic updates for all system-defined boot sources, set the `enableCommonBootImageImport` field value to `false`. Setting this value to `true` turns automatic updates back on.
13+
To disable automatic updates for all system-defined boot sources, set the `enableCommonBootImageImport` field value to `false`. Disabling automatic updates deletes the associated `DataImportCron` objects but does not remove previously imported boot source images. Setting this value to `true` turns automatic updates back on.
1414

1515
[NOTE]
1616
====

virt/creating_vms_advanced/creating_vms_advanced_web/virt-creating-vms-from-rh-images-overview.adoc

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,6 @@ Red Hat images are xref:../../../virt/creating_vms_advanced/creating_vms_advance
1212
1313
* xref:../../../virt/creating_vms_advanced/creating_vms_advanced_web/virt-creating-vms-from-rh-images-overview.adoc#virt-golden-images-namespace-cli_virt-creating-vms-from-rh-images-overview[Configuring a custom namespace for golden images by using the CLI]
1414
15-
Red Hat images are automatically updated. You can disable and re-enable automatic updates for these images. See xref:../../../virt/storage/virt-automatic-bootsource-updates.adoc#managing-rh-boot-source-updates_virt-automatic-bootsource-updates[Managing Red Hat boot source updates].
16-
1715
Cluster administrators can enable automatic subscription for {op-system-base-full} virtual machines in the {VirtProductName} xref:../../../virt/about_virt/about-virt.adoc#about-virt[web console].
1816

1917
You can create virtual machines (VMs) from operating system images provided by Red Hat by using one of the following methods:
@@ -35,4 +33,10 @@ include::modules/virt-about-vms-and-boot-sources.adoc[leveloffset=+1]
3533

3634
include::modules/virt-golden-images-namespace-web.adoc[leveloffset=+1]
3735

38-
include::modules/virt-golden-images-namespace-cli.adoc[leveloffset=+1]
36+
include::modules/virt-golden-images-namespace-cli.adoc[leveloffset=+1]
37+
38+
[role="_additional-resources"]
39+
[id="additional-resources_{context}"]
40+
== Additional resources
41+
42+
* xref:../../../virt/storage/virt-automatic-bootsource-updates.adoc#virt-managing-auto-update-all-system-boot-sources_virt-automatic-bootsource-updates[Managing automatic updates for all system-defined boot sources]

virt/storage/install-configure-fusion-access-san.adoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,9 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9+
[role="_abstract"]
10+
You configure SAN-based storage for virtual machines by using {IBMFusionFirst} with {VirtProductName}. You must install the {FusionSAN} Operator (Fusion Access for SAN) and set up the storage cluster and file systems.
11+
912
include::modules/virt-about-fusion-access-san.adoc[leveloffset=+1]
1013

1114
include::modules/virt-fusion-access-san-prereqs.adoc[leveloffset=+1]
@@ -22,15 +25,12 @@ include::modules/virt-creating-filesystem-fusion-access-san.adoc[leveloffset=+1]
2225

2326
include::modules/virt-troubleshoot-fusion-access-san.adoc[leveloffset=+1]
2427

25-
[id="fusion-san-next-steps_{context}"]
26-
== Next steps
27-
28-
Once you create a storage cluster with file systems, you can create a virtual machine (VM) on the storage cluster.
29-
30-
Create a VM from an instance type or template and select a storage class that corresponds to one of the file systems you created as the storage type.
28+
include::modules/virt-fusion-access-san-release-updates.adoc[leveloffset=+1]
3129

32-
* xref:../../virt/creating_vm/virt-creating-vms-from-instance-types.adoc#virt-creating-vms-from-instance-types[Creating virtual machines from instance types].
30+
[role="_additional-resources"]
31+
[id="additional-resources_{context}"]
32+
== Additional resources
3333

34-
* xref:../../virt/creating_vm/virt-creating-vms-from-templates.adoc#virt-creating-vms-from-templates[Creating virtual machines from templates].
34+
* xref:../../virt/creating_vm/virt-creating-vms-from-instance-types.adoc#virt-creating-vms-from-instance-types[Creating virtual machines from instance types]
3535

36-
include::modules/virt-fusion-access-san-release-updates.adoc[leveloffset=+1]
36+
* xref:../../virt/creating_vm/virt-creating-vms-from-templates.adoc#virt-creating-vms-from-templates[Creating virtual machines from templates]

virt/storage/virt-automatic-bootsource-updates.adoc

Lines changed: 15 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -6,49 +6,29 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9-
You can manage automatic updates for the following boot sources:
9+
[role="_abstract"]
10+
You can manage automatic updates for boot sources used to create virtual machines. This includes configuring update behavior for Red Hat and custom boot sources.
1011

11-
* xref:../../virt/storage/virt-automatic-bootsource-updates.adoc#managing-rh-boot-source-updates_virt-automatic-bootsource-updates[All Red Hat boot sources]
12-
* xref:../../virt/storage/virt-automatic-bootsource-updates.adoc#managing-custom-boot-source-updates_virt-automatic-bootsource-updates[All custom boot sources]
13-
* xref:../../virt/storage/virt-automatic-bootsource-updates.adoc#virt-disable-auto-updates-single-boot-source_virt-automatic-bootsource-updates[Individual Red Hat or custom boot sources]
14-
15-
Boot sources can make virtual machine (VM) creation more accessible and efficient for users. If automatic boot source updates are enabled, the Containerized Data Importer (CDI) imports, polls, and updates the images so that they are ready to be cloned for new VMs. By default, CDI automatically updates Red Hat boot sources.
16-
17-
[id="managing-rh-boot-source-updates_virt-automatic-bootsource-updates"]
18-
== Managing Red Hat boot source updates
19-
20-
You can opt out of automatic updates for all system-defined boot sources by setting the `enableCommonBootImageImport` field value to `false`. If you set the value to `false`, all `DataImportCron` objects are deleted. This does not, however, remove previously imported boot source objects that store operating system images, though administrators can delete them manually.
21-
22-
When the `enableCommonBootImageImport` field value is set to `false`, `DataSource` objects are reset so that they no longer point to the original boot source. An administrator can manually provide a boot source by creating a new persistent volume claim (PVC) or volume snapshot for the `DataSource` object, and then populating it with an operating system image.
12+
include::modules/virt-managing-auto-update-all-system-boot-sources.adoc[leveloffset=+1]
2313

24-
include::modules/virt-managing-auto-update-all-system-boot-sources.adoc[leveloffset=+2]
14+
include::modules/virt-configuring-default-and-virt-default-storage-class.adoc[leveloffset=+1]
2515

26-
[id="managing-custom-boot-source-updates_virt-automatic-bootsource-updates"]
27-
== Managing custom boot source updates
16+
include::modules/virt-configuring-storage-class-bootsource-update.adoc[leveloffset=+1]
2817

29-
_Custom_ boot sources that are not provided by {VirtProductName} are not controlled by the feature gate. You must manage them individually by editing the `HyperConverged` custom resource (CR).
18+
include::modules/virt-autoupdate-custom-bootsource.adoc[leveloffset=+1]
3019

31-
ifndef::openshift-rosa,openshift-dedicated,openshift-rosa-hcp[]
32-
[IMPORTANT]
33-
====
34-
You must configure a storage class. Otherwise, the cluster cannot receive automated updates for custom boot sources. See xref:../../storage/dynamic-provisioning.adoc#defining-storage-classes_dynamic-provisioning[Defining a storage class] for details.
35-
====
36-
endif::openshift-rosa,openshift-dedicated,openshift-rosa-hcp[]
37-
ifdef::openshift-rosa,openshift-dedicated,openshift-rosa-hcp[]
38-
[IMPORTANT]
39-
====
40-
You must configure a storage profile. Otherwise, the cluster cannot receive automated updates for custom boot sources. See xref:../../virt/storage/virt-configuring-storage-profile.adoc#virt-configuring-storage-profile[Configure storage profiles] for details.
41-
====
42-
endif::openshift-rosa,openshift-dedicated,openshift-rosa-hcp[]
20+
include::modules/virt-enabling-volume-snapshot-boot-source.adoc[leveloffset=+1]
4321

44-
include::modules/virt-configuring-default-and-virt-default-storage-class.adoc[leveloffset=+2]
22+
include::modules/virt-disable-auto-updates-single-boot-source.adoc[leveloffset=+1]
4523

46-
include::modules/virt-configuring-storage-class-bootsource-update.adoc[leveloffset=+2]
24+
include::modules/virt-verify-status-bootsource-update.adoc[leveloffset=+1]
4725

48-
include::modules/virt-autoupdate-custom-bootsource.adoc[leveloffset=+2]
26+
[role="_additional-resources"]
27+
[id="additional-resources_{context}"]
28+
== Additional resources
4929

50-
include::modules/virt-enabling-volume-snapshot-boot-source.adoc[leveloffset=+2]
30+
* xref:../../virt/storage/virt-automatic-bootsource-updates.adoc#virt-managing-auto-update-all-system-boot-sources_virt-automatic-bootsource-updates[All Red Hat boot sources]
5131

52-
include::modules/virt-disable-auto-updates-single-boot-source.adoc[leveloffset=+1]
32+
* xref:../../virt/storage/virt-automatic-bootsource-updates.adoc#virt-autoupdate-custom-bootsource_virt-automatic-bootsource-updates[All custom boot sources]
5333

54-
include::modules/virt-verify-status-bootsource-update.adoc[leveloffset=+1]
34+
* xref:../../virt/storage/virt-automatic-bootsource-updates.adoc#virt-disable-auto-updates-single-boot-source_virt-automatic-bootsource-updates[Individual Red Hat or custom boot sources]

virt/storage/virt-storage-config-overview.adoc

Lines changed: 33 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,9 @@ toc::[]
88

99
[role="_abstract"]
1010
You can configure a default storage class, storage profiles, Containerized Data Importer (CDI), data volumes (DVs), and automatic boot source updates.
11+
1112
ifdef::openshift-dedicated[]
12-
On {product-title}, specific configurations for Hyperdisk and {gcp-short} NetApp Volumes (GCNV) are required to ensure performance and support features like live migration. For more information, see "Storage configuration for OpenShift Virtualization 4.21.x on Google Cloud" and "{GCP} with {GCP} NetApp Volumes - Configuration" in the _Additional resources_ section.
13+
On {product-title}, specific configurations for Hyperdisk are required to ensure performance and support features like live migration. For more information, see "Storage configuration for {VirtProductName} 4.21.x on Google Cloud" in the "Additional resources" section.
1314
endif::openshift-dedicated[]
1415

1516
[id="storage-configuration-tasks"]
@@ -18,26 +19,28 @@ endif::openshift-dedicated[]
1819
The following storage configuration tasks are mandatory:
1920

2021
ifndef::openshift-rosa,openshift-dedicated,openshift-rosa-hcp[]
21-
xref:../../storage/dynamic-provisioning.adoc#defining-storage-classes_dynamic-provisioning[Configure a default storage class]::
22+
23+
Configure a default storage class::
2224

2325
You must configure a default storage class for the cluster. Otherwise, {VirtProductName} cannot automatically import boot source images. `DataVolume` objects (DVs) and `PersistentVolumeClaim` objects (PVCs) that do not explicitly specify a storage class remain in the `Pending` state until you set a default storage class.
26+
2427
endif::openshift-rosa,openshift-dedicated,openshift-rosa-hcp[]
2528

26-
xref:../../virt/storage/virt-configuring-storage-profile.adoc#virt-configuring-storage-profile[Configure storage profiles]::
29+
Configure storage profiles::
2730

2831
You must configure storage profiles if your storage provider is not recognized by CDI. A storage profile provides recommended storage settings based on the associated storage class.
2932

3033
The following storage configuration tasks are optional:
3134

32-
xref:../../virt/storage/virt-reserving-pvc-space-fs-overhead.adoc#virt-reserving-pvc-space-fs-overhead[Reserve additional PVC space for file system overhead]::
35+
Reserve additional PVC space for file system overhead::
3336

3437
By default, 5.5% of a file system PVC is reserved for overhead, reducing the space available for VM disks by that amount. You can configure a different overhead value.
3538

36-
xref:../../virt/storage/virt-configuring-local-storage-with-hpp.adoc#virt-configuring-local-storage-with-hpp[Configure local storage by using the hostpath provisioner]::
39+
Configure local storage by using the hostpath provisioner::
3740

3841
You can configure local storage for virtual machines by using the hostpath provisioner (HPP). When you install the {VirtProductName} Operator, the HPP Operator is automatically installed.
3942

40-
xref:../../virt/storage/virt-enabling-user-permissions-to-clone-datavolumes.adoc#virt-enabling-user-permissions-to-clone-datavolumes[Configure user permissions to clone data volumes between namespaces]::
43+
Configure user permissions to clone data volumes between namespaces::
4144

4245
You can configure RBAC roles to enable users to clone data volumes between namespaces.
4346

@@ -46,22 +49,24 @@ You can configure RBAC roles to enable users to clone data volumes between names
4649

4750
You can perform the following Containerized Data Importer (CDI) configuration tasks:
4851

49-
xref:../../virt/storage/virt-configuring-cdi-for-namespace-resourcequota.adoc#virt-configuring-cdi-for-namespace-resourcequota[Override the resource request limits of a namespace]::
52+
Override the resource request limits of a namespace::
53+
5054
You can configure CDI to import, upload, and clone VM disks into namespaces that are subject to CPU and memory resource restrictions.
5155

52-
xref:../../virt/storage/virt-preparing-cdi-scratch-space.adoc#virt-preparing-cdi-scratch-space[Configure CDI scratch space]::
56+
Configure CDI scratch space::
57+
5358
CDI requires scratch space (temporary storage) to complete some operations, such as importing and uploading VM images. During this process, CDI provisions a scratch space PVC equal to the size of the PVC backing the destination data volume (DV).
5459

5560
[id="dv-configuration-tasks"]
5661
== Data volumes
5762

5863
You can perform the following data volume configuration tasks:
5964

60-
xref:../../virt/storage/virt-using-preallocation-for-datavolumes.adoc#virt-using-preallocation-for-datavolumes[Enable preallocation for data volumes]::
65+
Enable preallocation for data volumes::
6166

6267
CDI can preallocate disk space to improve write performance when creating data volumes. You can enable preallocation for specific data volumes.
6368

64-
xref:../../virt/storage/virt-managing-data-volume-annotations.adoc#virt-managing-data-volume-annotations[Manage data volume annotations]::
69+
Manage data volume annotations::
6570

6671
Data volume annotations allow you to manage pod behavior. You can add one or more annotations to a data volume, which then propagates to the created importer pods.
6772

@@ -70,15 +75,26 @@ Data volume annotations allow you to manage pod behavior. You can add one or mor
7075

7176
You can perform the following boot source update configuration task:
7277

73-
xref:../../virt/storage/virt-automatic-bootsource-updates.adoc#virt-automatic-bootsource-updates[Manage automatic boot source updates]::
78+
Manage automatic boot source updates::
7479

7580
Boot sources can make virtual machine (VM) creation more accessible and efficient for users. If automatic boot source updates are enabled, CDI imports, polls, and updates the images so that they are ready to be cloned for new VMs. By default, CDI automatically updates Red Hat boot sources. You can enable automatic updates for custom boot sources.
7681

77-
ifdef::openshift-dedicated[]
7882
[role="_additional-resources"]
83+
[id="additional-resources_{context}"]
7984
== Additional resources
80-
* link:https://access.redhat.com/articles/7139046[Storage configuration for OpenShift Virtualization 4.21.x on Google Cloud]
81-
* link:https://access.redhat.com/articles/7139682[OpenShift Virtualization on Google Cloud: Known Issues and Limitations]
82-
* link:https://access.redhat.com/articles/7141472[{GCP} with {GCP} NetApp Volumes - Configuration]
83-
* link:https://access.redhat.com/articles/7141471[{GCP} with {GCP} NetApp Volumes - Known errors and limits]
84-
endif::openshift-dedicated[]
85+
86+
ifndef::openshift-rosa,openshift-dedicated,openshift-rosa-hcp[]
87+
* xref:../../storage/dynamic-provisioning.adoc#defining-storage-classes_dynamic-provisioning[Configure a default storage class]
88+
endif::openshift-rosa,openshift-dedicated,openshift-rosa-hcp[]
89+
* xref:../../virt/storage/virt-configuring-storage-profile.adoc#virt-configuring-storage-profile[Configure storage profiles]
90+
* xref:../../virt/storage/virt-reserving-pvc-space-fs-overhead.adoc#virt-reserving-pvc-space-fs-overhead[Reserve additional PVC space for file system overhead]
91+
* xref:../../virt/storage/virt-configuring-local-storage-with-hpp.adoc#virt-configuring-local-storage-with-hpp[Configure local storage by using the hostpath provisioner]
92+
* xref:../../virt/storage/virt-enabling-user-permissions-to-clone-datavolumes.adoc#virt-enabling-user-permissions-to-clone-datavolumes[Configure user permissions to clone data volumes between namespaces]
93+
* xref:../../virt/storage/virt-configuring-cdi-for-namespace-resourcequota.adoc#virt-configuring-cdi-for-namespace-resourcequota[Override the resource request limits of a namespace]
94+
* xref:../../virt/storage/virt-preparing-cdi-scratch-space.adoc#virt-preparing-cdi-scratch-space[Configure CDI scratch space]
95+
* xref:../../virt/storage/virt-using-preallocation-for-datavolumes.adoc#virt-using-preallocation-for-datavolumes[Enable preallocation for data volumes]
96+
* xref:../../virt/storage/virt-managing-data-volume-annotations.adoc#virt-managing-data-volume-annotations[Manage data volume annotations]
97+
* xref:../../virt/storage/virt-automatic-bootsource-updates.adoc#virt-automatic-bootsource-updates[Manage automatic boot source updates]
98+
ifdef::openshift-dedicated[]
99+
* link:https://access.redhat.com/articles/7139046[Storage configuration for {VirtProductName} 4.21.x on Google Cloud]
100+
endif::openshift-dedicated[]

virt/storage/virt-storage-with-csi-paradigm.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9+
[role="_abstract"]
910
Virtual machines (VMs) in {VirtProductName} use PersistentVolume (PV) and PersistentVolumeClaim (PVC) paradigms to manage storage. This ensures seamless integration with the Container Storage Interface (CSI).
1011

1112
include::modules/virt-storage-pv-csi-overview.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)