The Red Hat Ecosystem Catalog is the official source for discovering and learning more about the Red Hat Ecosystem of both Red Hat and certified third-party products and services.
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Dell Container Storage Modules
Dell Container Storage Modules (CSM) Operator is a Kubernetes tool for installing and managing Dell’s storage drivers and modules for PowerFlex, PowerScale, PowerStore, PowerMax, Unity and COSI. By using Dell CSM Operator, you can simplify the deployment of CSM Modules like Authorization and Replication, aiding your DevOps teams in optimizing Kubernetes workloads with enterprise-grade storage. Available as a community operator for Kubernetes and OpenShift, it can be deployed via OperatorHub.io using Operator Lifecycle Manager (OLM).
The following modules are available for deployment:
Authorization: Apply quota and RBAC rules that instantly and automatically restrict cluster tenants' usage of storage resources, built on a stateless architecture.
Replication: Easily extend data protection and DR planning to Kubernetes workloads with consistent policy enforcement and user experience.
Resiliency: Improve application up-time with automatic detection and recovery of node failures.
Observability: Create a single pane management experience for your developers and Kubernetes admins by integrating tools such as Prometheus and Grafana.
Snapshots: Build on CSI’s point-in-time recovery with additional capabilities for volume snapshots with referential integrity.
For additional information and help, please refer to the Container Storage Modules Documentation.
The following information was extracted from the dockerfile and other sources.
| Canonical image ID | dell-csm-operator-bundle |
| Provider | DELL |
| Architecture | amd64 |
The following evidence verifies the image's security and build process compliance with mandated internal standards.
| Security audit date | 2/24/2026, 12:21:13 PM |
| Container certification |
Use a registry service account token to authenticate your container client. This allows you to pull images without using your personal Red Hat credentials, which is recommended for CI/CD pipelines and automated deployments.
Run the following command, then enter your registry token credentials when prompted by the terminal.
Pull the image
Use the following instructions to get images from a Red Hat container registry using your Red Hat login.
Run the following command, then enter your login credentials when prompted by the terminal.
Pull the image