Creating an AWS-backed backingstore
Create an AWS-backed backing store using the MCG command-line interface or a YAML file to add storage resources.
Before you begin, ensure the following:
- Fusion Data Foundation Platform is running.
- Download the MCG command-line interface for easier
management.
subscription-manager repos --enable=rh-odf-4-for-rhel-8-x86_64-rpms
yum install mcg
Note: Specify the appropriate architecture for enabling the repositories using the subscription manager. In case of IBM Z infrastructure, use the following command:subscription-manager repos --enable=rh-odf-4-for-rhel-8-s390x-rpms
-
Alternatively, you can install the MCG package from the RPMs found at Download Red Hat OpenShift Data Foundation page.
Note: Choose the correct Product Variant according to your architecture.
Create an AWS-backed backingstore using MCG command-line interface
From the MCG command-line interface, run the following command:
noobaa backingstore create aws-s3 <backingstore_name> --access-key=<AWS ACCESS KEY> --secret-key=<AWS SECRET ACCESS KEY> --target-bucket <bucket-name> -n openshift-storage
- backingstore_name
- The name of the backingstore.
- AWS ACCESS KEY and AWS SECRET ACCESS KEY
- The AWS access key ID and secret access key you created for this purpose.
- bucket-name
- The existing AWS bucket name. This argument indicates to the MCG which bucket to use as a target bucket for its backing store, and subsequently, data storage and administration.
Example output:
INFO[0001] ✅ Exists: NooBaa "noobaa"
INFO[0002] ✅ Created: BackingStore "aws-resource"
INFO[0002] ✅ Created: Secret "backing-store-secret-aws-resource"
Create an AWS-backed backingstore using a YAML file
- Create a secret with the credentials:
apiVersion: v1 kind: Secret metadata: name: <backingstore-secret-name> namespace: openshift-storage type: Opaque data: AWS_ACCESS_KEY_ID: <AWS ACCESS KEY ID ENCODED IN BASE64> AWS_SECRET_ACCESS_KEY: <AWS SECRET ACCESS KEY ENCODED IN BASE64>
- AWS ACCESS KEY and AWS SECRET ACCESS KEY
- Supply and encode your own AWS access key ID and secret access key using Base64, and use the
results for
AWS ACCESS KEY ID ENCODED IN BASE64
andAWS SECRET ACCESS KEY ENCODED IN BASE64
. - backingstore-secret-name
- The name of the backingstore secret created in Creating a new backing store.
- Apply the following YAML for a specific backing store:
apiVersion: noobaa.io/v1alpha1 kind: BackingStore metadata: finalizers: - noobaa.io/finalizer labels: app: noobaa name: bs namespace: openshift-storage spec: awsS3: secret: name: <backingstore-secret-name> namespace: openshift-storage targetBucket: <bucket-name> type: aws-s3
- bucket-name
-
The existing AWS bucket name.
- backingstore-secret-name
-
The name of the backingstore secret created in the previous step.