Comprehensive and Detailed Explanation From Exact Extract:
Portworx provides a declarative method to schedule automatic backups by configuring schedule policies within its Backup and DR framework. These policies specify when and how frequently backups should occur, retention rules, and target storage locations. By applying schedule policies, administrators enable Portworx to perform backups automatically without manual intervention or external scripting. Using cron jobs to run pxctl snapshot create is possible but less integrated, error-prone, and not recommended for scalable environments. The command px backup volume is not a valid Portworx CLI command. The Portworx backup documentation encourages using native schedule policies for reliable, maintainable, and policy-driven backup automation, supporting compliance and disaster recovery strategiesã€Pure Storage Portworx Backup Guide†source】.
Question # 5
Which platform is supported by Portworx for deployment?
Comprehensive and Detailed Explanation From Exact Extract:
Portworx primarily supports deployment on Kubernetes and is well-integrated with major cloud platforms including Amazon Web Services (AWS). AWS offers native infrastructure and storage services that complement Portworx’s capabilities for cloud-native storage, including integration with Elastic Block Store (EBS) and S3 Object Storage. While Portworx historically supported container orchestrators like Docker Swarm and Mesosphere DC/OS (DCOS), the primary and recommended platform for production deployments today is Kubernetes on cloud providers such as AWS, Azure, and Google Cloud. AWS’s ecosystem allows Portworx to leverage scalable compute and storage infrastructure, advanced networking, and cloud security features, making it a preferred platform. Portworx official platform support documentation lists AWS as a key supported environment for its container storage solutionsã€Pure Storage Portworx Platform Support Guide†source】.
Comprehensive and Detailed Explanation From Exact Extract:
Portworx requires a minimum Linux kernel version of 3.10 or greater to operate properly. This requirement stems from Portworx’s dependencies on certain kernel features and modules that became standard from kernel version 3.10 onwards. The kernel version affects support for device-mapper, overlay filesystems, network stack enhancements, and other low-level capabilities essential for Portworx’s block storage functionality and performance. Although newer kernels (like 4.15+) offer additional features and improvements, Portworx maintains compatibility back to 3.10 to support a wide range of enterprise Linux distributions such as RHEL, CentOS, and Ubuntu LTS releases. The official Portworx system requirements document explicitly states kernel 3.10 as the minimum supported version to ensure stability and compatibility in production environmentsã€Pure Storage Portworx System Requirements†source】.
Question # 7
What are the three severity levels for Portworx alerts?
Comprehensive and Detailed Explanation From Exact Extract:
Portworx classifies alerts into three main severity levels to help administrators prioritize response actions. These levels are INFO, WARNING, and CRITICAL. INFO alerts provide informational messages about non-critical events, such as configuration changes or normal operational milestones. WARNING alerts indicate potential issues that could impact performance or availability if left unaddressed, such as increased latency or approaching capacity limits. CRITICAL alerts signal severe problems requiring immediate attention, such as node failures or data corruption risks. This severity categorization supports effective alert management and escalation policies, allowing operational teams to focus on high-impact issues first. The Portworx observability and alerting guide explains these levels in detail and recommends integrating alerts with external monitoring systems for centralized managementã€Pure Storage Portworx Alerting Guide†source】.
Question # 8
When updating the Portworx StorageCluster object to mount the SSL certificate secret, which path should be specified for the AWS_CA_BUNDLE environment variable?
Comprehensive and Detailed Explanation From Exact Extract:
When configuring Portworx to communicate securely with an AWS S3-compatible Object Store using custom SSL certificates, the AWS_CA_BUNDLE environment variable must point to the mounted certificate file location. The correct path for this in the StorageCluster spec is /opt/certs/objectstore.pem. This file contains the Certificate Authority (CA) bundle trusted by Portworx to validate TLS connections to the object store. Ensuring this path is correctly specified and the certificate secret properly mounted is critical to prevent TLS handshake failures and enable secure communication. Portworx documentation and configuration samples specify /opt/certs/objectstore.pem as the standard path for the CA bundle within Portworx containers when integrating with custom or private certificate authoritiesã€Pure Storage Portworx Security Guide†source】.