Skip to main content
Version: 3.2

Prerequisites for Google Cloud Platform

Environment Prerequisites

For a Portworx cluster on OCP GCP, each node must meet the following hardware, software, and network requirements:

Hardware
CPU4 cores minimum, 8 cores recommended
RAM4GB minimum, 8GB recommended
Disk
  • /var
  • /opt
  • 2GB free
  • 3GB free
Backing drive8GB (minimum required)
128 GB (minimum recommended)
Operating system root partition64 GB is the minimum required size for the root filesystem which contains the operating system
128 GB minimum recommended
Storage drivesStorage drives must be unmounted block storage: raw disks, drive partitions, LVM, or cloud block storage.
Network connectivityBandwidth:
  • 10 Gbps recommended
  • 1 Gbps minimum

Latency requirements for synchronous replication: less than 10ms between nodes in the cluster
Node typeBare metal and virtual machine (VM)
Software
Linux kernel and distroKernel version 3.10 or greater.
To check if your Linux distro and kernel are supported, see Supported Kernels.
DockerVersion 1.13.1 or greater.
Key-value storePortworx needs a key-value store to perform its operations. As such, install a clustered key-value database (kvdb) with a three node cluster.

You can also use Internal KVDB during installation. In this mode, Portworx will create and manage an internal key-value store (KVDB) cluster.

If you plan of using your own KVDB, refer to KVDB for Portworx for details on recommendations for installing and configuring a KVDB cluster.
Disable swapDisable swap on all nodes that will run the Portworx software. Ensure that the swap device is not automatically mounted on server reboot.
Network Time Protocol (NTP)All nodes in the cluster should be in sync with NTP time. Any time drift between nodes can cause unexpected behaviour, impacting services.

Portworx network requirements

Portworx runs as a pod in a Kubernetes cluster and uses specific ports for communication, data transfer, and telemetry.

note

Portworx also requires the following ports:

  • An open KVDB port. For example, if you're using etcd externally, open port 2379.
  • An open UDP port at 17002.
OpenShiftDescription
17001Portworx management port [REST]
17002Portworx node-to-node port [gossip]/UDP
17003Portworx storage data port
17004Portworx namespace [RPC]
17009Portworx node-to-node communication port [gRPC]
17010Portworx namespace driver [gRPC]
17011Portworx diags server port [gRPC]
17015Portworx kvdb peer-to-peer port [gRPC]
17016Portworx kvdb client service [gRPC]
17018Portworx gRPC SDK gateway [REST]
17019Portworx health monitor [REST]
17021Telemetry log uploader
20002Telemetry phone home

Supported OpenShift versions

Before you install Portworx on OpenShift, ensure that you're using a supported versions:

Portworx Enterprise supported GCP and OCP versions

TypeSupported Versions
Red Hat OpenShift
  • OpenShift version: 4.13, verified up to 4.13.52, Kubernetes version: 1.26
  • OpenShift version: 4.14, verified up to 4.14.38, Kubernetes version: 1.27
  • OpenShift version: 4.15, verified up to 4.15.36, Kubernetes version: 1.28
  • OpenShift version: 4.16, verified up to 4.16.17, Kubernetes version: 1.29
  • OpenShift version: 4.17, verified up to 4.17.1, Kubernetes version: 1.30
  • Supports both bare metal and VM

Best practices

Prevent Accidental Deletion: If your virtualization software has a feature to prevent accidental deletion, you should enable it for the VMs hosting PX nodes. While PX is designed to handle the loss of some nodes without issue, losing a significant number of storage nodes due to VM deletion can result in a loss of quorum and an outage. For more information on how to prevent accidental deletion of VM, refer to Prevent accidental VM deletion on Google cloud compute engine.

Was this page helpful?