Portworx is a software-defined persistent storage solution designed and purpose-built for applications deployed as containers, via container orchestrators such as Kubernetes.
For deploying Portworx storage on vSphere environments, make sure to configure the following properties in the pack
The default installation of Portworx will deploy the following components in the Kubernetes cluster
Starting Portworx v2.6.1, you can make use of presets feature to toggle between the available ETCD options.
By default, Portworx is set to use internal KVDB. You can integrate Portworx to an external etcd server by following the steps below.
useExternalKvdbflag by setting it to true
- Configure the external etcd endpoints in
If the external etcd server is configured to authenticate via certificates, additionally you may want to setup the following
externalKvdb.useCertsForSSLflag by setting it to true
- Setup certificate related configuration in
Portworx pack values allows you to configure vSphere user credentials in two ways
- Username & password (
- Secret (
portworx.vsphereConfig.userCredsSecretis available with v2.6.1 and above)
If you chose the latter, make sure to create the secret in the target cluster manually or by making use of BYO manifest addon pack.
Secret can be created using the spec below
apiVersion: v1kind: Secretmetadata:name: px-vsphere-secretnamespace: kube-systemtype: Opaquedata:VSPHERE_USER: "b64 encoded admin username"VSPHERE_PASSWORD: "b64 encoded admin password"
and this secret can be referenced in the Portworx pack values as
Make sure to follow the correct indentation style, otherwise certificates will not be imported correctly and will result in a Portworx deployment failure.