Skip to main content
Version: 3.4

Installation on an Amazon Elastic Kubernetes Service (EKS) Cluster using Portworx Operator

This topic provides instructions for installing Portworx on an Amazon Elastic Kubernetes Service (EKS) cluster using the Portworx Operator. You can use the installation instructions below to deploy Portworx on AWS Outposts, a kOps-based EKS cluster, Amazon EKS with AWS Auto Scaling groups (ASGs), and EKS-D.

The following collection of tasks describes how to install Portworx on an Amazon EKS cluster using the Portworx Operator:

Complete all the tasks to install Portworx.

Create an IAM policy

Provide permissions for all instances in the Auto Scaling group by creating an IAM role.

Perform the following steps in the AWS Management Console:

  1. Navigate to the IAM page in the AWS Management Console. Select Policies under the Identity and Access Management (IAM) sidebar section, and then select Create policy in the upper-right corner.

    AWS create policy page

  2. Choose the JSON tab, and then paste the following permissions into the editor, providing your own value for Sid if applicable. You can either use the minimum permissions required or the permissions required for disk encryption.

    note

    These are the minimum permissions required for storage operations for a Portworx cluster. For the complete set of permissions for all Portworx storage operations, see the credentials reference.

    {
    "Version": "2012-10-17",
    "Statement": [
    {
    "Sid": "ec2",
    "Effect": "Allow",
    "Action": [
    "ec2:AttachVolume",
    "ec2:ModifyVolume",
    "ec2:DetachVolume",
    "ec2:CreateTags",
    "ec2:CreateVolume",
    "ec2:DeleteTags",
    "ec2:DeleteVolume",
    "ec2:DescribeTags",
    "ec2:DescribeVolumeAttribute",
    "ec2:DescribeVolumesModifications",
    "ec2:DescribeVolumeStatus",
    "ec2:DescribeVolumes",
    "ec2:DescribeInstances",
    "autoscaling:DescribeAutoScalingGroups"
    ],
    "Resource": [
    "*"
    ]
    },
    {
    "Sid": "VisualEditor0",
    "Effect": "Allow",
    "Action": "ec2:DeleteInternetGateway",
    "Resource": [
    "arn:aws:iam::*:role/eksctl-*",
    "arn:aws:ec2:*:*:internet-gateway/*"
    ]
    },
    {
    "Sid": "VisualEditor1",
    "Effect": "Allow",
    "Action": "ec2:DeleteInternetGateway",
    "Resource": "arn:aws:iam::*:instance-profile/eksctl-*"
    },
    {
    "Sid": "VisualEditor2",
    "Effect": "Allow",
    "Action": [
    "iam:CreateInstanceProfile",
    "iam:DeleteInstanceProfile",
    "iam:GetRole",
    "iam:GetInstanceProfile",
    "iam:RemoveRoleFromInstanceProfile",
    "iam:CreateRole",
    "iam:DeleteRole",
    "iam:AttachRolePolicy",
    "iam:PutRolePolicy",
    "iam:AddRoleToInstanceProfile",
    "iam:ListInstanceProfilesForRole",
    "iam:PassRole",
    "iam:CreateServiceLinkedRole",
    "iam:DetachRolePolicy",
    "iam:DeleteRolePolicy",
    "iam:DeleteServiceLinkedRole",
    "iam:GetRolePolicy"
    ],
    "Resource": [
    "arn:aws:iam::*:instance-profile/eksctl-*",
    "arn:aws:iam::*:role/eksctl-*"
    ]
    },
    {
    "Sid": "VisualEditor3",
    "Effect": "Allow",
    "Action": [
    "ec2:AuthorizeSecurityGroupIngress",
    "ec2:DeleteSubnet",
    "ec2:AttachInternetGateway",
    "ec2:DescribeSnapshots",
    "ec2:DeleteSnapshot",
    "ec2:DeleteRouteTable",
    "ec2:AssociateRouteTable",
    "ec2:DescribeInternetGateways",
    "ec2:CreateRoute",
    "ec2:CreateInternetGateway",
    "ec2:RevokeSecurityGroupEgress",
    "autoscaling:DescribeAutoScalingGroups",
    "autoscaling:UpdateAutoScalingGroup",
    "ec2:DeleteInternetGateway",
    "ec2:DescribeKeyPairs",
    "ec2:DescribeRouteTables",
    "ecr:BatchCheckLayerAvailability",
    "ecr:GetLifecyclePolicy",
    "ecr:DescribeImageScanFindings",
    "ec2:ImportKeyPair",
    "ec2:DescribeLaunchTemplates",
    "ec2:CreateTags",
    "ecr:GetDownloadUrlForLayer",
    "ec2:CreateRouteTable",
    "cloudformation:*",
    "ec2:RunInstances",
    "ecr:GetAuthorizationToken",
    "ec2:DetachInternetGateway",
    "ec2:DisassociateRouteTable",
    "ec2:RevokeSecurityGroupIngress",
    "ec2:DescribeImageAttribute",
    "ecr:BatchGetImage",
    "ecr:DescribeImages",
    "ec2:DeleteNatGateway",
    "ec2:DeleteVpc",
    "autoscaling:DeleteAutoScalingGroup",
    "eks:*",
    "ec2:CreateSubnet",
    "ec2:DescribeSubnets",
    "autoscaling:CreateAutoScalingGroup",
    "ec2:DescribeAddresses",
    "ec2:DeleteTags",
    "elasticfilesystem:*",
    "ec2:CreateNatGateway",
    "autoscaling:DescribeLaunchConfigurations",
    "ec2:CreateVpc",
    "ecr:ListTagsForResource",
    "ecr:ListImages",
    "ec2:DescribeVpcAttribute",
    "ec2:DescribeAvailabilityZones",
    "autoscaling:DescribeScalingActivities",
    "ec2:CreateSecurityGroup",
    "sts:DecodeAuthorizationMessage",
    "ec2:CreateSnapshot",
    "ec2:ModifyVpcAttribute",
    "ecr:DescribeRepositories",
    "ec2:ReleaseAddress",
    "ec2:AuthorizeSecurityGroupEgress",
    "ec2:DeleteLaunchTemplate",
    "ec2:DescribeTags",
    "ecr:GetLifecyclePolicyPreview",
    "ec2:DeleteRoute",
    "ec2:DescribeLaunchTemplateVersions",
    "ec2:DescribeNatGateways",
    "ec2:AllocateAddress",
    "ec2:DescribeSecurityGroups",
    "ec2:DescribeImages",
    "autoscaling:CreateLaunchConfiguration",
    "ec2:CreateLaunchTemplate",
    "autoscaling:DeleteLaunchConfiguration",
    "sts:Get*",
    "ec2:DescribeVpcs",
    "ec2:DeleteSecurityGroup",
    "ecr:GetRepositoryPolicy"
    ],
    "Resource": "*"
    },
    {
    "Sid": "VisualEditor4",
    "Effect": "Allow",
    "Action": "iam:ListInstanceProfiles",
    "Resource": [
    "arn:aws:iam::*:instance-profile/eksctl-*",
    "arn:aws:iam::*:role/eksctl-*"
    ]
    }
    ]
    }
  3. Name the policy and create it.

    Create policy

Attach the IAM policy

Attach the previously created policy to your node instance role or user account.

Follow the instructions below to attach the policy to your NodeInstanceRole:

  1. From the IAM page, select Roles in the left pane.

  2. On the Roles page, search for and select your node group NodeInstanceRole using your cluster name. The following example shows eksctl-victorpeksdemo2-nodegroup-NodeInstanceRole-M9QTT58HQ9ZX as the node group instance role.

    Search for your policy

    note

    If there is more than one node group NodeInstanceRole for your cluster, attach the policy to those NodeInstanceRoles as well.

  3. Attach the previously created policy by selecting Attach policies from the Add permissions dropdown on the right side of the screen.

    Attach your policy

  4. Under Other permissions policies, search for your policy name. Select your policy, and then select Attach policies to attach it.

    The policy you attached appears under Permissions policies if successful.

    Confirm your policy is added

Generate the Portworx specification

To install Portworx, you must first generate Kubernetes manifests that you will deploy in your Amazon EKS cluster by following these steps.

  1. Sign in to the Portworx Central console.
    The system displays the Welcome to Portworx Central! page.

  2. In the Portworx Enterprise section, select Generate Cluster Spec.
    The system displays the Generate Spec page.

  3. From the Portworx Version dropdown menu, select the Portworx version to install.

  4. From the Platform dropdown menu, select AWS.

  5. From the Distribution Name dropdown menu, select Elastic Kubernetes Service (EKS).

  6. (Optional) To customize the configuration options and generate a custom specification, select Customize and perform the following steps:

    note

    To continue without customizing the default configuration or generating a custom specification, proceed to Step 7.

    • Basic tab:

      1. To use an existing etcd cluster:
        1. Select Your etcd details.
        2. In the field provided, enter the host name or IP and port number.
          For example, http://test.com.net:1234.
        3. Select one of the following authentication methods:
          • Disable HTTPS – Use HTTP for etcd communication.
          • Certificate Auth – Use HTTPS with an SSL certificate.
            For more information, see Secure your etcd communication.
          • Password Auth – Use HTTPS with username and password authentication.
      2. To use an internal Portworx-managed key-value store (kvdb):
        1. Select Built-in.
          note

          To restrict Portworx to run internal KVDB only on specific nodes, label those nodes:

          kubectl label nodes node1 node2 node3 px/metadata-node=true
        2. To enable TLS-encrypted communication among KVDB nodes and between Portworx nodes and the KVDB cluster, select Enable TLS for internal kvdb.
        3. If your cluster does not already have a cert-manager, select Deploy Cert-Manager for TLS certificates.
      3. Select Next.
    • Storage tab:
      Note: Do not add volumes of different types when configuring storage devices. For example, do not add both GP2 and GP3 or IO1. This can cause performance issues and errors.

      1. To enable Portworx to provision and manage drives automatically:
        1. Select Create Using a Spec.

        2. The selection between PX-StoreV2 and PX-StoreV1 is automatic. The default datastore is determined by a preflight check that runs across the cluster to assess whether it can deploy Portworx with the PX-StoreV2 datastore. If the preflight check passes for all nodes, PX-StoreV2 is selected by default.

        3. From the Add Drive Type dropdown menu, select the EBS volume type to be used by Portworx for data storage.
          For PX-StoreV2, four drives are recommended for optimal performance. When specifying EBS volume types, provide the following:

          • Size (GB)
          • If applicable, specify the IOPS required from EBS volume.
          • If applicable, specify the Throughput for EBS volume.
          • From the Encryption dropdown menu, select one of the following:
            • None – Create an unencrypted EBS volume.
            • BYOB – Provide an Encryption Key. For more information, see AWS KMS.
          • Drive Tags – Enter multiple tags as key-value pairs to be applied to the disks created by Portworx. For more information, see How to assign custom labels to device pools.

          You can add multiple drive types by selecting Add Drive Type, or remove a drive type by selecting Remove. You can also add the same drive type with different configurations using + Add Drive.

        4. [Optional] Enter the Max storage nodes per availability zone.

        5. From the Default IO Profile dropdown menu, select Auto.
          This enables Portworx to automatically choose the optimal I/O profile based on detected workload patterns.

        6. From the Journal Device dropdown menu, select one of the following:

          • None – Use the default journaling setting.
          • Auto – Automatically allocate journal devices.
          • Custom – Manually define a journal device.
            • Select the EBS Volume Type from the dropdown menu.
            • Specify the IOPS required from EBS volume and Throughput for EBS volume.
            • From the Encryption dropdown menu, select one of the following:
              • None – Create an unencrypted EBS volume.
              • BYOB – Provide an Encryption Key. For more information, see AWS KMS.
            • Drive Tags – Enter multiple tags as key-value pairs to be applied to the disks created by Portworx. For more information, see How to assign custom labels to device pools.
        7. Select Enable Workload Identity to deploy Portworx on an EKS-D cluster.
          Enter the AWS Workload Identity IAM Role ARN to allow Portworx to access AWS resources. Ensure you created the IAM role with the correct AWS Workload Identity Key.

      2. To enable Portworx to use all available, unused, and unmounted drives on the node:
        1. Select Consume Unused.
        2. Select the PX-StoreV2 checkbox to enable the PX-StoreV2 datastore.
        3. If you select PX-StoreV2, in Metadata Path, enter a pre-provisioned path for storing the Portworx metadata.
          The path must be at least 64 GB.
        4. In Drive/Device, specify the block drive(s) that Portworx uses for data storage.
        5. From the Journal Device dropdown menu, select one of the following:
          • None – Use the default journaling setting.
          • Auto – Automatically allocate journal devices.
          • Custom – Manually enter a journal device path.
            Enter the path of the journal device in Journal Device Path.
        6. Select the Use unmounted disks even if they have a partition or filesystem on it. Portworx will never use a drive or partition that is mounted checkbox to use unmounted disks, even if they contain a partition or filesystem.
          Portworx will not use any mounted drive or partition.
      3. To manually specify the drives on the node for Portworx to use, do the following:
        1. Select the Use Existing Drives option.
        2. Select the PX-StoreV2 checkbox to enable the PX-StoreV2 datastore.
        3. If you select the PX-StoreV2 checkbox, in the Metadata Path field, enter a pre-provisioned path for storing the Portworx metadata.
          The path must be at least 64 GB in size.
        4. In Drive/Device, specify the block drive(s) that Portworx uses for data storage.
        5. In Pool Label, assign a custom label in key:value format to identify and categorize storage pools.
        6. From the Journal Device dropdown menu, select one of the following:
          • None – Use the default journaling setting.
          • Auto – Automatically allocate journal devices.
          • Custom – Manually enter a journal device path.
            Enter the path of the journal device in Journal Device Path.
      4. Select Next.
    • Network tab:

      1. In Interface(s):
        1. Enter the Data Network Interface to be used for data traffic.
        2. Enter the Management Network Interface to be used for management traffic.
      2. In Advanced Settings:
        1. Enter the Starting port for Portworx services.
      3. Select Next.
    • Customize tab:

      1. Choose the Kubernetes platform in the Customize section.
      2. In the Environment Variables section, enter name-value pairs in the respective fields.
      • For Disaggregated installation you need to set node labels and ENABLE_ASG_STORAGE_PARTITIONING environment variable to true. For more information, see Deployment planning.
      1. In the Registry and Image Settings section:
        1. Enter the Custom Container Registry Location to download the Docker images.
        2. Enter the Kubernetes Docker Registry Secret used to authenticate to the custom container registry.
        3. From Image Pull Policy, select Default, Always, IfNotPresent, or Never.
          This policy influences how images are managed on the node and when updates are applied.
      2. In Security Settings, select Enable Authorization to enable Role-Based Access Control (RBAC) and secure access to storage resources in your cluster.
      3. In the Advanced Settings section:
        1. Select the Enable Stork checkbox to enable Stork.
        2. Select the Enable CSI checkbox to enable CSI.
        3. Select the Enable Monitoring checkbox to enable monitoring for user-defined projects before installing Portworx Operator.
        4. Select the Enable Telemetry checkbox to enable telemetry in the StorageCluster spec.
          For more information, see Enable Pure1 integration for upgrades on Amazon EKS.
        5. Enter the prefix for the Portworx cluster name in the Cluster Name Prefix field.
        6. Select the Secrets Store Type from the dropdown menu to store and manage secure information for features such as CloudSnaps and Encryption.
      4. Select Finish.
      5. On the summary page, enter a name for the specification in Spec Name, and tags in Spec Tags.
      6. Select Download .yaml to download the YAML file with the customized specification or Save Spec to save the specification.
  7. Select Save & Download to generate the specification.

Deploy the Portworx Operator

Use the operator specification you generated in the Generate the Portworx specification section, and deploy the Portworx Operator by running the following command.

kubectl apply -f 'https://install.portworx.com/<version-number>?comp=pxoperator'
serviceaccount/portworx-operator created
podsecuritypolicy.policy/px-operator created
clusterrole.rbac.authorization.k8s.io/portworx-operator created
clusterrolebinding.rbac.authorization.k8s.io/portworx-operator created
deployment.apps/portworx-operator created

Deploy the StorageCluster

Use the StorageCluster specification you generated in the Generate the Portworx specification section, and deploy the StorageCluster by running the following command.

kubectl apply -f 'https://install.portworx.com/<version-number>?operator=true&mc=false&kbver=&b=true&kd=type%3Dgp2%2Csize%3D150&s=%22type%3Dgp2%2Csize%3D150%22&c=px-cluster-XXXX-XXXX&eks=true&stork=true&csi=true&mon=true&tel=false&st=k8s&e==AWS_ACCESS_KEY_ID%3XXXX%2CAWS_SECRET_ACCESS_KEY%3XXXX&promop=true'
storagecluster.core.libopenstorage.org/px-cluster-xxxxxxxx-xxxx-xxxx-xxxx-8dfd338e915b created

Monitor Portworx nodes

  1. Enter the following kubectl get command and wait until all Portworx nodes show as Ready or Online in the output:

    kubectl -n <px-namespace> get storagenodes -l name=portworx
    NAME                  ID                                     STATUS   VERSION          AGE
    username-k8s1-node0 xxxxxxxx-xxxx-xxxx-xxxx-43cf085e764e Online 2.11.1-3a5f406 4m52s
    username-k8s1-node1 xxxxxxxx-xxxx-xxxx-xxxx-4597de6fdd32 Online 2.11.1-3a5f406 4m52s
    username-k8s1-node2 xxxxxxxx-xxxx-xxxx-xxxx-e2169ffa111c Online 2.11.1-3a5f406 4m52s
  2. Enter the following kubectl describe command with the NAME of one of the Portworx nodes you retrieved above to show the current installation status for individual nodes:

    kubectl -n <px-namespace> describe storagenode <portworx-node-name>
    ...
    Events:
    Type Reason Age From Message
    ---- ------ ---- ---- -------
    Normal PortworxMonitorImagePullInPrgress 7m48s portworx, k8s-node-2 Portworx image portworx/px-enterprise:2.10.1.1 pull and extraction in progress
    Warning NodeStateChange 5m26s portworx, k8s-node-2 Node is not in quorum. Waiting to connect to peer nodes on port 9002.
    Normal NodeStartSuccess 5m7s portworx, k8s-node-2 PX is ready on this node

Verify Portworx pod status

Enter the following command to list and filter the results for Portworx pods and specify the namespace where you deployed Portworx:

kubectl get pods -n <px-namespace> -o wide | grep -e portworx -e px
NAME                                                    READY   STATUS    RESTARTS         AGE     IP              NODE                         NOMINATED NODE   READINESS GATES
portworx-api-8scq2 1/1 Running 1 (90m ago) 5h1m xx.xx.xxx.xxx username-vms-silver-sight-0 <none> <none>
portworx-api-f24b9 1/1 Running 1 (108m ago) 5h1m xx.xx.xxx.xxx username-vms-silver-sight-3 <none> <none>
portworx-api-f95z5 1/1 Running 1 (90m ago) 5h1m xx.xx.xxx.xxx username-vms-silver-sight-2 <none> <none>
portworx-kvdb-558g5 1/1 Running 0 3m46s xx.xx.xxx.xxx username-vms-silver-sight-2 <none> <none>
portworx-kvdb-9tfjd 1/1 Running 0 2m57s xx.xx.xxx.xxx username-vms-silver-sight-0 <none> <none>
portworx-kvdb-cjcxg 1/1 Running 0 3m7s xx.xx.xxx.xxx username-vms-silver-sight-3 <none> <none>
portworx-operator-548b8d4ccc-qgnkc 1/1 Running 13 (4m26s ago) 5h2m xx.xx.xxx.xxx username-vms-silver-sight-0 <none> <none>
portworx-pvc-controller-ff669698-62ngd 1/1 Running 1 (108m ago) 5h1m xx.xx.xxx.xxx username-vms-silver-sight-3 <none> <none>
portworx-pvc-controller-ff669698-6b4zj 1/1 Running 1 (90m ago) 5h1m xx.xx.xxx.xxx username-vms-silver-sight-2 <none> <none>
portworx-pvc-controller-ff669698-pffvl 1/1 Running 1 (90m ago) 5h1m xx.xx.xxx.xxx username-vms-silver-sight-0 <none> <none>
prometheus-px-prometheus-0 2/2 Running 2 (90m ago) 5h xx.xx.xxx.xxx username-vms-silver-sight-0 <none> <none>
px-cluster-xxxxxxxx-xxxx-xxxx-xxxx-fab038f0bbe6-2qsp4 2/2 Running 13 (108m ago) 3h20m xx.xx.xxx.xxx username-vms-silver-sight-3 <none> <none>
px-cluster-xxxxxxxx-xxxx-xxxx-xxxx-fab038f0bbe6-5vnzv 2/2 Running 16 (90m ago) 3h20m xx.xx.xxx.xxx username-vms-silver-sight-0 <none> <none>
px-cluster-xxxxxxxx-xxxx-xxxx-xxxx-fab038f0bbe6-lxzd5 2/2 Running 16 (90m ago) 3h20m xx.xx.xxx.xxx username-vms-silver-sight-2 <none> <none>
px-csi-ext-77fbdcdcc9-7hkpm 4/4 Running 4 (108m ago) 3h19m xx.xx.xxx.xxx username-vms-silver-sight-3 <none> <none>
px-csi-ext-77fbdcdcc9-9ck26 4/4 Running 4 (90m ago) 3h18m xx.xx.xxx.xxx username-vms-silver-sight-0 <none> <none>
px-csi-ext-77fbdcdcc9-ddmjr 4/4 Running 14 (90m ago) 3h20m xx.xx.xxx.xxx username-vms-silver-sight-2 <none> <none>
px-prometheus-operator-7d884bc8bc-5sv9r 1/1 Running 1 (90m ago) 5h1m xx.xx.xxx.xxx username-vms-silver-sight-0 <none> <none>

Note the name of one of your px-cluster pods. You will run pxctl commands from these pods in the following steps.

Verify Portworx cluster status

You can find the status of the Portworx cluster by running pxctl status commands from a pod.
Enter the following kubectl exec command, specifying the pod name you retrieved in Verify Portworx Pod Status:

kubectl exec <px-pod>  -n <px-namespace> -- /opt/pwx/bin/pxctl status
Defaulted container "portworx" out of: portworx, csi-node-driver-registrar
Status: PX is operational
Telemetry: Disabled or Unhealthy
Metering: Disabled or Unhealthy
License: Trial (expires in 31 days)
Node ID: xxxxxxxx-xxxx-xxxx-xxxx-bf578f9addc1
IP: xx.xx.xxx.xxx
Local Storage Pool: 1 pool
POOL IO_PRIORITY RAID_LEVEL USABLE USED STATUS ZONE REGION
0 HIGH raid0 25 GiB 33 MiB Online default default
Local Storage Devices: 1 device
Device Path Media Type Size Last-Scan
0:0 /dev/sda STORAGE_MEDIUM_SSD 32 GiB 10 Oct 22 23:45 UTC
total - 32 GiB
Cache Devices:
* No cache devices
Kvdb Device:
Device Path Size
/dev/sdc 1024 GiB
* Internal kvdb on this node is using this dedicated kvdb device to store its data.
Metadata Device:
1 /dev/sdd STORAGE_MEDIUM_SSD 64 GiB
Cluster Summary
Cluster ID: px-cluster-xxxxxxxx-xxxx-xxxx-xxxx-fab038f0bbe6
Cluster UUID: xxxxxxxx-xxxx-xxxx-xxxx-5d610fa334bd
Scheduler: kubernetes
Nodes: 3 node(s) with storage (3 online)
IP ID SchedulerNodeName Auth StorageNode Used Capacity Status StorageStatus Version Kernel OS
xx.xx.xxx.xxx xxxxxxxx-xxxx-xxxx-xxxx-bf578f9addc1 username-vms-silver-sight-3 Disabled Yes(PX-StoreV2) 33 MiB 25 GiB Online Up (This node) 2.12.0-28944c8 5.4.217-1.el7.elrepo.x86_64 CentOS Linux 7 (Core)
xx.xx.xxx.xxx xxxxxxxx-xxxx-xxxx-xxxx-4a1bafeff5bc username-vms-silver-sight-0 Disabled Yes(PX-StoreV2) 33 MiB 25 GiB Online Up 2.12.0-28944c8 5.4.217-1.el7.elrepo.x86_64 CentOS Linux 7 (Core)
xx.xx.xxx.xxx xxxxxxxx-xxxx-xxxx-xxxx-502e658bc307 username-vms-silver-sight-2 Disabled Yes(PX-StoreV2) 33 MiB 25 GiB Online Up 2.12.0-28944c8 5.4.217-1.el7.elrepo.x86_64 CentOS Linux 7 (Core)
Global Storage Pool
Total Used : 99 MiB
Total Capacity : 74 GiB

The status displays PX is operational when the cluster is running as expected. For each node, the StorageNode column reads Yes(PX-StoreV2).

Verify Portworx pool status

Run the following command to view the Portworx drive configurations for your pod:

kubectl exec <px-pod>  -n <px-namespace> -- /opt/pwx/bin/pxctl service pool show
Defaulted container "portworx" out of: portworx, csi-node-driver-registrar
PX drive configuration:
Pool ID: 0
Type: PX-StoreV2
UUID: xxxxxxxx-xxxx-xxxx-xxxx-db8abe01d4f0
IO Priority: HIGH
Labels: kubernetes.io/arch=amd64,kubernetes.io/hostname=username-vms-silver-sight-3,kubernetes.io/os=linux,medium=STORAGE_MEDIUM_SSD,beta.kubernetes.io/arch=amd64,beta.kubernetes.io/os=linux,iopriority=HIGH
Size: 25 GiB
Status: Online
Has metadata: No
Balanced: Yes
Drives:
0: /dev/sda, Total size 32 GiB, Online
Cache Drives:
No Cache drives found in this pool
Metadata Device:
1: /dev/sdd, STORAGE_MEDIUM_SSD

The output Type: PX-StoreV2 ensures that the pod uses the PX-StoreV2 datastore.

Verify pxctl cluster provision status

  1. Access the Portworx CLI.

  2. Run the following command to find the storage cluster:

    kubectl -n <px-namespace> get storagecluster
    NAME                                              CLUSTER UUID                           STATUS   VERSION          AGE
    px-cluster-xxxxxxxx-xxxx-xxxx-xxxx-fab038f0bbe6 xxxxxxxx-xxxx-xxxx-xxxx-5d610fa334bd Online 2.12.0-dev-rc1 5h6m

    The status must display Online.

  3. Run the following command to find the storage nodes:

    kubectl -n <px-namespace> get storagenodes
    NAME                          ID                                     STATUS   VERSION          AGE
    username-vms-silver-sight-0 xxxxxxxx-xxxx-xxxx-xxxx-4a1bafeff5bc Online 2.12.0-28944c8 3h25m
    username-vms-silver-sight-2 xxxxxxxx-xxxx-xxxx-xxxx-502e658bc307 Online 2.12.0-28944c8 3h25m
    username-vms-silver-sight-3 xxxxxxxx-xxxx-xxxx-xxxx-bf578f9addc1 Online 2.12.0-28944c8 3h25m

    The status must display Online.

  4. Verify the Portworx cluster provision status by running the following command.
    Specify the pod name you retrieved in Verify Portworx Pod Status.

    kubectl exec <px-pod> -n <px-namespace> -- /opt/pwx/bin/pxctl cluster provision-status
    NODE					        NODE STATUS	 POOL					      POOL STATUS  IO_PRIORITY	SIZE	AVAILABLE	USED   PROVISIONED ZONE REGION	RACK
    xxxxxxxx-xxxx-xxxx-xxxx-502e658bc307 Up 0 ( xxxxxxxx-xxxx-xxxx-xxxx-f9131bf7ef9d ) Online HIGH 32 GiB 32 GiB 33 MiB 0 B default default default
    xxxxxxxx-xxxx-xxxx-xxxx-4a1bafeff5bc Up 0 ( xxxxxxxx-xxxx-xxxx-xxxx-434152789beb ) Online HIGH 32 GiB 32 GiB 33 MiB 0 B default default default
    xxxxxxxx-xxxx-xxxx-xxxx-bf578f9addc1 Up 0 ( xxxxxxxx-xxxx-xxxx-xxxx-db8abe01d4f0 ) Online HIGH 32 GiB 32 GiB 33 MiB 0 B default default default

What to do next

Create a PVC. For more information, see Create your first PVC.