What is the name of the Kubernetes secret containing external KVDB certificates?
Correct : C
Comprehensive and Detailed Explanation From Exact Extract:
The Kubernetes secret named px-kvdb-auth is used to store external KVDB certificates in a Portworx deployment. These certificates enable mutual TLS authentication for the KVDB pods, ensuring secure and authenticated communication between the distributed KVDB instances running on different nodes. The px-kvdb-auth secret includes private keys and certificate chains that are essential for encrypting KVDB traffic and verifying peer identities within the cluster. This security feature prevents unauthorized access and protects sensitive KVDB data in transit. Portworx's official security and KVDB documentation detail the use of this secret, highlighting its role in certificate management and enabling encryption for high-availability clusters running on Kubernetes environmentsPure Storage Portworx Security Guidesource.
Start a Discussions
An administrator deploys Portworx in the "portworx" namespace.
What command should the administrator use to check status of only the Portworx pods?
Correct : B
Comprehensive and Detailed Explanation From Exact Extract:
To view the status of only Portworx pods within the ''portworx'' namespace, administrators should use label selectors with kubectl. The command kubectl -n portworx get pods -l name=portworx filters pods by the label name=portworx, showing only pods related to the Portworx deployment. This is more precise than simply listing all pods with -o wide, which includes unrelated pods. Checking Portworx pods' status is crucial for monitoring cluster health, identifying pod restarts, or troubleshooting failures. The Portworx installation manifests and documentation specify labels applied to Portworx pods, enabling operators to filter efficiently. Using this command supports focused operational monitoring and streamlined debugging within Kubernetes environments running PortworxPure Storage Portworx Kubernetes Guidesource.
Start a Discussions
What are the two components of Stork?
Correct : A
Comprehensive and Detailed Explanation From Exact Extract:
Stork (Storage Orchestrator for Kubernetes) is a Portworx utility designed to improve Kubernetes storage orchestration. Its two main components are the Stork scheduler and the Stork extender. The scheduler works by placing pods in Kubernetes clusters based on storage constraints, such as volume affinity and anti-affinity, improving application resiliency and data locality. The extender integrates with Kubernetes' default scheduler, influencing pod scheduling decisions to respect storage policies and optimize workload placement. Together, these components enable advanced features such as application-aware migration, snapshot management, and backup coordination. Portworx documentation explains that Stork's design helps maintain stateful application availability during scaling, upgrades, or disaster recovery scenarios by making Kubernetes scheduling storage-awarePure Storage Portworx Stork Guidesource.
Start a Discussions
What is the correct procedure to collect a support bundle for Autopilot in a Portworx cluster?
Correct : C
Comprehensive and Detailed Explanation From Exact Extract:
To collect a comprehensive support bundle for Portworx Autopilot, the proper procedure is to create a dedicated directory, send a support signal to the running Autopilot process to trigger diagnostics collection, and then the generated support bundle files from that directory. This approach ensures all relevant Autopilot logs, configuration files, and runtime metrics are gathered in a structured way, enabling effective troubleshooting and root cause analysis. Simply restarting or deleting pods is insufficient, as it does not guarantee a full diagnostics capture. The Portworx troubleshooting and support documentation outlines this method as the standard for collecting detailed Autopilot support information, facilitating accelerated support response and issue resolution in production clustersPure Storage Portworx Support Guidesource.
Start a Discussions
What is the correct procedure to upgrade a Portworx cluster from version 3.0 to 3.1 using the Portworx Operator?
Correct : B
Comprehensive and Detailed Explanation From Exact Extract:
Upgrading Portworx clusters managed by the Kubernetes Operator requires a declarative update to the StorageCluster Custom Resource Definition (CRD). Specifically, the administrator must edit the StorageCluster resource and update the .spec.image field to point to the new version image, such as changing portworx/oci-monitor:3.0 to portworx/oci-monitor:3.1. This change instructs the Operator to roll out the new image across the cluster nodes, performing a seamless upgrade with minimal downtime. The pxctl CLI does not perform upgrades in Operator-managed environments; it is primarily for direct cluster management. The Operator ensures orderly upgrade sequencing, node by node, handling pod restarts and health checks. Automatic upgrades without manual intervention are not currently supported to prevent unintentional disruptions. Official Portworx upgrade documentation details this procedure, emphasizing the importance of version pinning and controlled rollout for production stability and rollback capabilities during upgradesPure Storage Portworx Upgrade Guidesource.
Start a Discussions