Configure
Your non-admin Portworx Backup users need certain Kubernetes permissions to perform backup and restore operations on your cluster and through Portworx Central. Ensure your users have the following minimum cluster roles:
📄️ Configure Stork for Proxy Server
Learn how to configure Stork to work with network proxies, including both authenticated proxies with custom CA certificates and unauthenticated proxies. This guide covers creating Kubernetes secrets, updating storage cluster configurations, and setting environment variables to enable proxy support in Stork.
📄️ Configure Admin Namespace
Configure admin namespace in Portworx Backup to store Kubernetes resources
📄️ Grant access to a namespace
Providing namespace access to users without the Kubernetes administrator privileges
🗃️ Access PXB Web Console
2 items
🗃️ User Management
10 items
📄️ Configure Email alerts through SMTP Server
Configure an SMTP server in Portworx Backup to send email alerts for critical system events and notify designated recipients automatically.
🗃️ Configure for S3 object store with TLS
2 items
📄️ Configure Certificates in Keycloak
Configure self-signed certificates for Keycloak
📄️ Monitor PXB Clusters
Monitoring Portworx Backup cluster with Prometheus and Grafana
📄️ kdmp-config ConfigMap
Configure the kdmp-config ConfigMap to fine-tune KDMP job behavior for large-volume backups, control resource allocation, exclude files or directories, and apply node affinity or anyuid settings.
🗃️ Configure REST API
2 items
📄️ Add Service Accounts
Add service accounts to generate a kubeconfig
📄️ Configure Kubelogin
This topic explains how to configure kubelogin for use with Portworx Backup (PXB) and Azure Kubernetes Service (AKS). By integrating Azure AD with kubelogin, PXB supports secure, token-based authentication for AKS clusters.