NetApp Astra Control Center overview

Contributors Download PDF of this page

NetApp Astra Control Center offers a rich set of storage and application-aware data management services for stateful Kubernetes workloads deployed in an on-premises environment and powered by NetApp data protection technology.

Error: Missing Graphic Image

NetApp Astra Control Center can be installed on a Red Hat OpenShift cluster that has the Astra Trident storage orchestrator deployed and configured with storage classes and storage backends to NetApp ONTAP storage systems.

For the installation and configuration of Astra Trident to support Astra Control Center, see this document here.

In a cloud-connected environment, Astra Control Center uses Cloud Insights to provide advanced monitoring and telemetry. In the absence of a Cloud Insights connection, limited monitoring and telemetry (7-days worth of metrics) is available and exported to Kubernetes native monitoring tools (Prometheus and Grafana) through open metrics endpoints.

Astra Control Center is fully integrated into the NetApp AutoSupport and Active IQ ecosystem to provide support for users, provide assistance with troubleshooting, and display usage statistics.

In addition to the paid version of Astra Control Center, a 90-day evaluation license is available. The evaluation version is supported through the email and community (Slack channel). Customers have access to these and other knowledge-base articles and the documentation available from the in-product support dashboard.

To get started with NetApp Astra Control Center, visit the Astra website.

Astra Control Center installation prerequisites

  1. One or more Red Hat OpenShift clusters. Versions 4.6 EUS and 4.7 are currently supported.

  2. Astra Trident must already be installed and configured on each Red Hat OpenShift cluster.

  3. One or more NetApp ONTAP storage systems running ONTAP 9.5 or greater.

    Note It’s best practice for each OpenShift install at a site to have a dedicated SVM for persistent storage. Multi-site deployments require additional storage systems.
  4. A Trident storage backend must be configured on each OpenShift cluster with an SVM backed by an ONTAP cluster.

  5. A default StorageClass configured on each OpenShift cluster with Astra Trident as the storage provisioner.

  6. A load balancer must be installed and configured on each OpenShift cluster for load balancing and exposing OpenShift Services.

    Note See the link here for information about load balancers that have been validated for this purpose.
  7. A private image registry must be configured to host the NetApp Astra Control Center images.

    Note See the link here to install and configure an OpenShift private registry for this purpose.
  8. You must have Cluster-Admin access to the Red Hat OpenShift cluster.

  9. You must have Admin access to NetApp ONTAP clusters.

  10. An admin workstation with docker or podman, tridentctl, and oc or kubectl tools installed and added to your $PATH.

Note Docker or Podman installations must be at least version 20.10.

Install Astra Control Center

  1. Log into the NetApp Support Site and download the latest version of NetApp Astra Control Center. TO do so requires a license attached to your NetApp account. After you download the tarball, transfer it to the admin workstation.

    Note To get started with a trial license for Astra Control, visit the Astra registration site.
  2. Unpack the tar ball and change the working directory to the resulting folder.

    [netapp-user@rhel7 ~]$ tar -vxzf astra-control-center-21.08.65.tar.gz
    [netapp-user@rhel7 ~]$ cd astra-control-center-21.08.65
  3. Before starting the installation, push the Astra Control Center images to an image registry.

    Note You can choose to do this with either Docker or Podman; instructions for both are provided in this step.
  1. Export the registry FQDN with the organization/namespace/project name as a environment variable ‘registry’.

    [netapp-user@rhel7 ~]$ export
  2. Log into the registry.

    [netapp-user@rhel7 ~]$ podman login -u ocp-user -p password --tls-verify=false
  3. Create a shell script file and paste the following content in it.

    [netapp-user@rhel7 ~]$ vi
    for astraImageFile in $(ls images/*.tar); do
       astraImage=$(podman load --input ${astraImageFile} | sed 's/Loaded image(s): //')
       podman tag $astraImage $registry/$(echo $astraImage | sed 's/^[^\/]\+\///')
       podman push $registry/$(echo $astraImage | sed 's/^[^\/]\+\///')
    Note If you are using untrusted certificates for your registry, edit the shell script and use --tls-verify=false for the podman push command podman push $registry/$(echo $astraImage | sed 's/[\/]\+\///') --tls-verify=false.
  4. Make the file executable.

    [netapp-user@rhel7 ~]$ chmod +x
  5. Execute the shell script.

    [netapp-user@rhel7 ~]$ ./
  1. Export the registry FQDN with the organization/namespace/project name as a environment variable ‘registry’.

    [netapp-user@rhel7 ~]$ export
  2. Log into the registry.

    [netapp-user@rhel7 ~]$ docker login -u ocp-user -p password --tls-verify=false
  3. Create a shell script file and paste the following content in it.

    [netapp-user@rhel7 ~]$ vi
    for astraImageFile in $(ls images/*.tar); do
       astraImage=$(docker load --input ${astraImageFile} | sed 's/Loaded image: //')
       docker tag $astraImage $registry/$(echo $astraImage | sed 's/^[^\/]\+\///')
       docker push $registry/$(echo $astraImage | sed 's/^[^\/]\+\///')
    Note If you are using untrusted certificates for your registry, edit the shell script and use --tls-verify=false for the docker push command docker push $registry/$(echo $astraImage | sed 's/[\/]\+\///') --tls-verify=false.
  4. Make the file executable.

    [netapp-user@rhel7 ~]$ chmod +x
  5. Execute the shell script.

    [netapp-user@rhel7 ~]$ ./
  1. Next, upload the image registry TLS certificates to the OpenShift nodes. To do so, create a configmap in the openshift-config namespace using the TLS certificates and patch it to the cluster image config to make the certificate trusted.

    [netapp-user@rhel7 ~]$ oc create configmap default-ingress-ca -n openshift-config
    [netapp-user@rhel7 ~]$ oc patch --patch '{"spec":{"additionalTrustedCA":{"name":"default-ingress-ca"}}}' --type=merge
    Note If you are using an OpenShift internal registry with default TLS certificates from the ingress operator with a route, you still need to follow the previous step to patch the certificates to the route hostname. To extract the certificates from ingress operator, you can use the command oc extract secret/router-ca --keys=tls.crt -n openshift-ingress-operator.
  2. Create a namespace netapp-acc-operator for installing the Astra Control Center Operator.

    [netapp-user@rhel7 ~]$ oc create ns netapp-acc-operator
  3. Create a secret with credentials to log into the image registry in netapp-acc-operator namespace.

    [netapp-user@rhel7 ~]$ oc create secret docker-registry astra-registry-cred --docker-username=ocp-user --docker-password=password -n netapp-acc-operator
    secret/astra-registry-cred created
  4. Edit the Astra Control Center Operator CR astra_control_center_operator_deploy.yaml, which is a set of all resources Astra Control Center deploys. In the operator CR, find the deployment definition for acc-operator-controller-manager and enter the FQDN for your registry along with the organization name as it was given while pushing the images to registry (in this example, by replacing the text [] and provide the name of the secret we just created. Verify other details of the operator, save, and close.

    [netapp-user@rhel7 ~]$ vim astra_control_center_operator_deploy.yaml
    apiVersion: apps/v1
    kind: Deployment
        control-plane: controller-manager
      name: acc-operator-controller-manager
      namespace: netapp-acc-operator
      replicas: 1
          control-plane: controller-manager
            control-plane: controller-manager
          - args:
            - --secure-listen-address=
            - --upstream=
            - --logtostderr=true
            - --v=10
            name: kube-rbac-proxy
            - containerPort: 8443
              name: https
          - args:
            - --health-probe-bind-address=:8081
            - --metrics-bind-address=
            - --leader-elect
            - /manager
            - name: ACCOP_LOG_LEVEL
              value: "2"
            imagePullPolicy: IfNotPresent
                path: /healthz
                port: 8081
              initialDelaySeconds: 15
              periodSeconds: 20
            name: manager
                path: /readyz
                port: 8081
              initialDelaySeconds: 5
              periodSeconds: 10
                cpu: 100m
                memory: 150Mi
                cpu: 100m
                memory: 50Mi
              allowPrivilegeEscalation: false
          imagePullSecrets: [name: astra-registry-cred]
            runAsUser: 65532
          terminationGracePeriodSeconds: 10
  5. Create the operator by running the following command.

    [netapp-user@rhel7 ~]$ oc create -f astra_control_center_operator_deploy.yaml
  6. Create a dedicated namespace for installing all the Astra Control Center resources.

    [netapp-user@rhel7 ~]$ oc create ns netapp-astra-cc
    namespace/netapp-astra-cc created
  7. Create the secret for accessing the image registry in that namespace.

    [netapp-user@rhel7 ~]$ oc create secret docker-registry astra-registry-cred --docker-server= --docker-username=ocp-user --docker-password=password -n netapp-astra-cc
    secret/astra-registry-cred created
  8. Edit the Astra Control Center CRD file astra_control_center_min.yaml and enter the FQDN, image registry details, administrator email address, and other details.

    [netapp-user@rhel7 ~]$ vim astra_control_center_min.yaml
    kind: AstraControlCenter
      name: astra
      astraVersion: "21.08.65"
      astraAddress: ""
        enrolled: true
      email: ""
        name: ""     # use your registry
        secret: "astra-registry-cred"             # comment out if not needed
  9. Create the Astra Control Center CRD in the namespace created for it.

    [netapp-user@rhel7 ~]$ oc apply -f astra_control_center_min.yaml -n netapp-astra-cc created
Note The previous file astra_control_center_min.yaml is the minimum version of the Astra Control Center CRD. If you want to create the CRD with more control, such as defining a storageclass other than the default for creating PVCs or providing SMTP details for mail notifications, you can edit the file astra_control_center.yaml, enter then needed details, and use it to create the CRD.

Installation verification

  1. It might take several minutes for the installation to complete. Verify that all the pods and services in the netapp-astra-cc namespace are up and running.

    [netapp-user@rhel7 ~]$ oc get all -n netapp-astra-cc
  2. Check the acc-operator-controller-manager logs to ensure that the installation is completed.

    [netapp-user@rhel7 ~]$ oc logs deploy/acc-operator-controller-manager -n netapp-acc-operator -c manager -f
    Note The following message indicates the successful installation of Astra Control Center.
    {"level":"info","ts":1624054318.029971,"logger":"controllers.AstraControlCenter","msg":"Successfully Reconciled AstraControlCenter in [seconds]s","AstraControlCenter":"netapp-astra-cc/astra","ae.Version":"[21.08.65]"}
  3. The username for logging into Astra Control Center is the email address of the administrator provided in the CRD file and the password is a string ACC- appended to the Astra Control Center UUID. Run the following command:

    [netapp-user@rhel7 ~]$ oc get astracontrolcenters -n netapp-astra-cc
    NAME    UUID
    astra   345c55a5-bf2e-21f0-84b8-b6f2bce5e95f
    Note In this example, the password is ACC-345c55a5-bf2e-21f0-84b8-b6f2bce5e95f.
  4. Get the traefik service load balancer IP.

    [netapp-user@rhel7 ~]$ oc get svc -n netapp-astra-cc | egrep 'EXTERNAL|traefik'
    NAME                                       TYPE           CLUSTER-IP       EXTERNAL-IP     PORT(S)                                                                   AGE
    traefik                                    LoadBalancer   80:30343/TCP,443:30060/TCP                                                16m
  5. Add an entry in the DNS server pointing the FQDN provided in the Astra Control Center CRD file to the EXTERNAL-IP of the traefik service.

    Add DNS entry for ACC GUI

  6. Log into the Astra Control Center GUI by browsing to its FQDN.

    Astra Control Center login

  7. When you log into Astra Control Center GUI for the first time using the admin email address provided in CRD, you need to change the password.

    Astra Control Center mandatory password change

  8. If you wish to add a user to Astra Control Center, navigate to Account > Users, click Add, enter the details of the user, and click Add.

    Astra Control Center create user

  9. Astra Control Center requires a license for all of it’s functionalities to work. To add a license, navigate to Account > License, click Add License, and upload the license file.

    Astra Control Center add license

    Note If you encounter issues with the install or configuration of NetApp Astra Control Center, the knowledge base of known issues is available here.