Client Area
  • Home
  • Sectors
    • IT for Business
    • IT for Education
    • IT for Charities
  • Our Services
    • IT Support Services
    • IT Security Services
    • IT Cloud Services
    • Microsoft Teams
    • Microsoft 365 Business Voice
    • Managed Connectivity
    • Managed IT Infrastructure
  • IT Masterclass Training
  • The ITSB Byte
  • Contact
IT Support Business IT Support Business
  • Solutions
    • COVID-19 Solutions
      • iDisplay Digital Thermometer
      • Protection – LCD Hand Sanitisers
  • Sectors
    • IT for Business
    • IT for Education
    • IT for Charities
  • IT Services
    • IT Support Services
    • IT Security Services
      • Managed Detection & Response (MDR)
      • Microsoft 365 Security Monitoring
      • Office 365 Advanced Threat Protection
      • Penetration Testing
      • Dark Web Monitoring
      • Cyber Essentials
        • Cyber Essentials
        • Cyber Essentials Plus
      • SSL Certificates
    • IT Cloud Services
      • Microsoft Teams
      • Cloud Protection For Microsoft Office 365
      • Power BI – Data Reporting and Visualisation
      • Email Signatures For Microsoft 365
    • IT Automation Services
      • Intelligent Automation
      • Microsoft Power Automate
    • Modern Workplace
      • Power BI – Data Reporting and Visualisation
    • Microsoft 365 Business Voice
    • Managed Connectivity
    • Managed IT Infrastructure
    • IT Masterclass Training
  • Company
    • About Us
    • Join The Team
    • The ITSB Byte (Blog)
  • Contact
  • Client Area
silvermslogo
Client Area
IT Support Business
Call our experts
Back to The ITSB Byte

[mc4wp_form id=”19228″]

With the recent release of Red Hat OpenShift Container Platform 3.9, you will now have the convenience of deploying Container-Native Storage (CNS) 3.9 built on Red Hat Gluster Storage as part of the normal OpenShift deployment process in a single step. At the same time, major improvements in ease of operation have been introduced to give you the ability to monitor provisioned storage consumption, expand persistent volume (PV) capacity without downtime, and use a more intuitive naming convention for persistent volume names.

For easy evaluation of these features, an OpenShift Container Platform (OCP) evaluation subscription now includes access to CNS evaluation binaries and subscriptions.

New features in Container-Native Storage 3.9

Addition of volume metrics—Volume consumption metrics data (e.g., volume capacity, available space, number of inodes in use, number of inodes free) for CNS is now available. These volume metrics can be viewed using Prometheus. This enables you to monitor storage capacity and consumption trends and take timely actions to ensure applications do not get impacted.

Online expansion of provisioned storage—You can now expand the CNS-backed persistent volumes (PVs) within OpenShift by editing the corresponding claim (oc edit pvc <claim_name>) with new desired capacity (‘spec→ requests → storage: new value’).  This opt-in feature is enabled by configuring the StorageClass for CNS with the parameter allowVolumeExpansion set to “true,” enabling the feature gate `ExpandPersistentVolumes` and including a new admission controller called `PersistentVolumeClaimResize.` You can now dynamically resize storage volumes attached to containerized applications without needing to first detach and then attach a storage volume with increased capacity, which enhances application availability and uptime.

Custom volume naming—Before this release, the names of the dynamically provisioned GlusterFS volumes were auto-generated with unique id number (vol_<UUID>). This release allows you to add a custom volume name prefix, again by parameterizing the StorageClass (`volumenameprefix: myPrefix`), for easier identification of volumes in the GlusterFS backend. The new GlusterFS volumes backing the CNS PVs will be created with the volume name prefix, project name/namespace, claim name and UUID (<myPrefix>_<namespace>_<claimname>_UUID), making it easier for you to automate day-2 admin tasks like backup and recovery, policy application based on pre-ordained volume nomenclature, and other day-2 housekeeping tasks.

You can read more about the new features at the Red Hat Blog.

By  Annette Clewett, Humble Chirammal, Daniel Messer, and Sudhir Prasad, originally published by Red Hat

 

2
Like this post
  • In the world of mobile devices how do you ensure your data is safe?
    Previous PostIn the world of mobile devices how do you ensure your data is safe?
  • Next PostEnsuring Customer Data is Used Correctly
    In the world of mobile devices how do you ensure your data is safe?

Related Posts

Visions of a post-pandemic hybrid workforce
IT Support

Visions of a post-pandemic hybrid workforce

Announcement: Our Strategic Merger with AV Specialist Quad Vision
IT Support ITSB in the Community

Announcement: Our Strategic Merger with AV Specialist Quad Vision

Welcome to the age of remote working productivity
IT Support

Welcome to the age of remote working productivity

How to regain control of your inbox
IT Support

How to regain control of your inbox

Simplify the transition to secure remote working
Cloud IT Support

Simplify the transition to secure remote working

Why you need a disaster recovery plan and what could happen if you don’t
Cyber Security IT Support

Why you need a disaster recovery plan and what could happen if you don’t

How Microsoft 365 can help you simplify GDPR
Cloud IT Support

How Microsoft 365 can help you simplify GDPR

Cloud computing: Frequently asked questions
Cloud IT Support

Cloud computing: Frequently asked questions

Welcome to the team: 10 Questions with Ashley
IT Support Soul

Welcome to the team: 10 Questions with Ashley

Which organisations are most vulnerable to cyber attacks right now?
Cyber Security IT Support

Which organisations are most vulnerable to cyber attacks right now?

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Main-Logo-2.0

Our Services

Our support services are only the start of a larger story. From Security, to voice, infrastructure and cloud our services are in place to cover a wide amount of needs for your organisation.
Lets Talk
Managed IT Support
Learn More
Microsoft Business Voice
Learn More
Managed IT Security
Learn More
Managed Connectivity
Learn More
Managed Cloud
Learn More
Managed IT Infrastructure
Learn More
Sector
  • IT for Business
  • IT for Charities
  • IT for Education
Services
  • IT Support Services
  • IT Security Services
  • IT Cloud Services
  • Managed Connectivity
  • Microsoft 365 Business Voice
  • Managed IT Infrastructure
Our Company
  • About Us
  • The ITSB Byte
  • Contact
Information
  • Privacy Policy
  • Terms & Conditions
DorsetChamberWhite-2-e1576766199759
Microsoft Silver Partners Bournemouth
Cyber Essentials internet Safety Certificate Bournemouth
Quad Vision Logo Dark
Visit our Audio Visual Arm
Main-Logo-2.0
  • IT Support Services
  • IT Security Services
  • IT Cloud Services
  • Managed Connectivity
  • Microsoft 365 Business Voice
  • Managed IT Infrastructure
© 2020 IT Support Business Limited | All Rights Reserved
Company Number: 07184583
Copy
We use cookies to ensure we're able to give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.I AgreePrivacy policy