Dell PowerStore Discovery
The Infracast Dell PowerStore plugin uses the PowerStore REST API to enumerate storage appliances, volumes, host objects, and replication sessions. Authentication is via PowerStore local admin credentials.
How It Works
- Infracast connects to the PowerStore management IP over HTTPS
- Appliance identity and hardware information is collected
- Volumes are enumerated with their capacity and configuration
- Host and host group objects (with their FC/iSCSI/NVMe initiators) are discovered
- Active replication sessions are collected to map data protection relationships
Prerequisites
- HTTPS access (TCP/443) from the Infracast collector to the PowerStore management IP
- PowerStoreOS 2.0 or later
- A local account with the
Viewerrole (read-only)
Creating a Read-Only Account
Via the PowerStore Manager UI:
- Log into PowerStore Manager
- Navigate to Settings → Security → Users → Add
- Username:
infracast - Role: Viewer (read-only)
- Set a strong password
- Click Save
Via PowerStore CLI:
# SSH to the PowerStore management IP
ssh admin@powerstore.example.com
# Create the user (requires System Administrator access to run)
user create --name infracast --role Viewer --password "YourSecurePassword!"
The Viewer role provides full read access to all PowerStore objects including appliances, volumes, hosts, and replication. It cannot modify any configuration.
Registering the Credential in Infracast
infracast creds add \
--plugin dell-powerstore \
--name "powerstore-prod" \
--type basic-auth \
--host "powerstore.example.com" \
--username "infracast" \
--password-file /run/secrets/powerstore-password
Configuring the Discovery Job
discovery:
jobs:
- name: dell-powerstore
plugin: dell-powerstore
credential: powerstore-prod
schedule: "0 */6 * * *" # every 6 hours
config:
host: "powerstore.example.com"
username: "infracast"
# verify_tls: set to "true" with a valid management cert
verify_tls: "false"
What Gets Discovered
| Resource Type | Description |
|---|---|
dell.powerstore.appliance | PowerStore appliance node (name, model, service tag, PowerStoreOS version, health state) |
dell.powerstore.volume | Volume (name, size, used capacity, appliance assignment, protection policy, state) |
dell.powerstore.host | Host object (name, OS type, initiators: IQN/WWN/NQN, host group membership) |
dell.powerstore.replication_session | Replication session (name, state, role, remote system, last sync time, RPO) |
Edges link volumes to their parent appliance, hosts to their connected volumes, and replication sessions to source/target volumes.
Troubleshooting
401 Unauthorized
Symptom: Error: PowerStore API error: 401 Unauthorized
Checks:
- Verify the username and password are correct
- Confirm the user account is active in PowerStore Manager (Settings → Security → Users)
- Test manually:
curl -sk -u "infracast:password" \
"https://powerstore.example.com/api/rest/appliance" | jq '.[].name'
TLS certificate error
Symptom: Error: x509: certificate signed by unknown authority
Fix: PowerStore appliances use self-signed certificates by default. Set verify_tls: "false" for internal networks, or install a CA-signed certificate via Settings → Security → Certificates.
Replication sessions missing
Symptom: Volumes are discovered but dell.powerstore.replication_session resources are empty
Checks:
- Verify replication is licensed and configured on the cluster
- Check that active replication sessions exist: log into PowerStore Manager → Protection → Replication
- The
Viewerrole must have access to replication data — this is included by default
Missing volumes
Symptom: Some volumes do not appear in Infracast
Cause: Volumes on remote systems (metro volumes) may be listed differently.
Check: Look for volumes with a type field of clone or snapshot which are enumerated separately from primary volumes.