rancher-partner-charts/charts/portworx/portworx
Samuel Attwood 5335667721 Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
..
ci Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
templates Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
Chart.yaml Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
README.md Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
app-readme.md Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
questions.yml Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
values.yaml Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00

README.md

Portworx

Pre-requisites

Use this Helm chart to deploy Portworx and Stork to your Kubernetes cluster.

Prerequisites

Refer to the Install Portworx on Kubernetes via Helm page for the list of prerequisites.

Limitations

  • The portworx helm chart can only be deployed in the kube-system namespace. Hence use "kube-system" in the "Target namespace" during configuration.

Uninstalling the Chart

You can uninstall Portworx using one of the following methods:

1. Delete all the Kubernetes components associated with the chart and the release.

Note > The Portworx configuration files under /etc/pwx/ directory are preserved, and will not be deleted.

To perform this operation simply delete the application from the Apps page

2. Wipe your Portworx installation

Note > The commands in this section are disruptive and will lead to data loss. Please use caution..

See more details here

Documentation

Installing the Chart using the CLI

See the installation details here

Installing Portworx on AWS

See the installation details here

** Giving your etcd certificates to Portworx using Kubernetes Secrets.**

This is the recommended way of providing etcd certificates, as the certificates will be automatically available to the new nodes joining the cluster

  • Create Kubernetes secret
  • Copy all your etcd certificates and key in a directory etcd-secrets/ to create a Kubernetes secret from it. Make sure the file names are the same as you gave above.
# ls -1 etcd-secrets/
etcd-ca.crt
etcd.crt
etcd.key
  • Use kubectl to create the secret named px-etcd-certs from the above files:
# kubectl -n kube-system create secret generic px-etcd-certs --from-file=etcd-secrets/
  • Notice that the secret has 3 keys etcd-ca.crt, etcd.crt and etcd.key, corresponding to file names in the etcd-secrets folder. We will use these keys in the Portworx spec file to reference the certificates.
# kubectl -n kube-system describe secret px-etcd-certs
Name:         px-etcd-certs
Namespace:    kube-system
Labels:       <none>
Annotations:  <none>

Type:  Opaque

Data
====
etcd-ca.crt:      1679 bytes
etcd.crt:  1680 bytes
etcd.key:  414  bytes

Once above secret is created, proceed to the next steps.