IBM Fusion Access SAN¶
Official documentation: Deploying IBM Fusion Access for SAN
Tested with:
| Component | Version |
|---|---|
| OpenShift | v4.20.4 |
| OpenShift Virt | v4.20.x |
| IBM Fusion Access for SAN | 2.12.0 |
Prerequisites¶
- IBM account (IBMid). Create an account via https://www.ibm.com/account/reg/us-en/signup?formid=urx-19776
- Access to IBM Storage Fusion, for example via the 60-day trial
- IBM Entitlement key to allow your OpenShift cluster to pull images from IBM Registry: https://myibm.ibm.com/products-services/containerlibrary
- OpenShift cluster with at least three worker nodes, each with ~32 GB memory
- All nodes (at least 3) need a shared disk (via iSCSI, FC, or shared disks in a KVM lab).
- Access to a container registry for the GPFS kernel modules
- Internal registry (requires registry storage)
- External registry, for example quay.io with a private repository
- If Secure Boot is enabled: Create and roll out your signing key. (IBM Fusion Access for SAN builds and loads its own kernel module via KMM)
Let's start the installation¶
If Secure Boot is enabled: Create and roll out your signing key¶
Documentation:
Create an key pair¶
Here are the commands executed on RHEL 10.
-
Create public and private key
-
Export public key to
sb_cert.cer -
Export private key to
sb_cert.p12 -
Export the unencrypted private key:
Roll out the public key¶
This may differ in your environment.
In my virtual lab environment running on KVM/libvirt with hetzner-ocp4:
-
Copy the public key to the VM via SSH
-
Check & import the key via
mokutilon the node: -
Reboot the node, enter the MOK manager, and enroll the key
-
Check the key via
mokutilat the Node:
Install IBM Fusion Access for SAN operator¶
https://www.ibm.com/docs/en/fusion-software/2.12.0?topic=san-installing-fusion-access-operator
Do NOT create the FusionAccess custom resource yet!
At this point there is a YouTube video available that does not cover Secure Boot or an external registry.
Create a pull secret with IBM Entitlement Key¶
You can get/review the entitlement keys at the IBM Container library
If Secure Boot is enabled: provide signing key¶
-
Private key
-
Public key
Optional: Configure external registry for kernel module container image¶
-
Create ConfigMap with external registry information:
-
Provide push secret to quay.io
Note
It's important to be as specific as possible here. If I only specify quay.io, the pull secret will also be used for pulling OpenShift images, which will then cause the build to fail.
Creating the FusionAccess custom resource¶
https://www.ibm.com/docs/en/fusion-software/2.12.0?topic=san-creating-fusionaccess-cr
Wait until the Web Console plugin is available to create the storage cluster.
Creating a storage cluster¶
https://www.ibm.com/docs/en/fusion-software/2.12.0?topic=san-creating-storage-cluster
After creating the storage cluster, it's building the kernel module container image. Check builds in ibm-fusion-access project.
Check the pods in the following projects:
ibm-fusion-accessibm-spectrum-scale
To check which devices are found, you can run:
Or check the pod logs of the following pods:
To check the kernel module build settings, look at:
Here's an example:
To watch the build logs:
After a successful build, the build objects disappear.
Creating a filesystem¶
https://www.ibm.com/docs/en/fusion-software/2.12.0?topic=san-creating-filesystem
Check the details of the FileSystem if it takes too long.
In case you recognize the following message:
Disk has Spectrum Scale filesystem data structures on it. Set the 'existingDataSkipVerify' spec-parameter of the LocalDisk 0x5000c500155a3456 to true if the disk should be formatted and re-used nevertheless.
Check the LocalDisk:
If you are sure the shared disk can be wiped, set existingDataSkipVerify to true:
Don't forget to review the IBM Fusion dashboard¶
Notes for various lab environments¶
Add a shared disk to all worker nodes.
Plain KVM environment¶
I deployed via hetzner-ocp4. Now let's add a shared LVM disk because everything is running on one node.
Info
The following issue is related to Secure Boot:
Two options to solve:
- Disable Secure Boot
- Work with a KMM signing key / Machine Owner Key (MOK), documented above.
iSCSI & RHCOS¶
This is ugly as hell, but works for quick testing.





