Fill in the below parameters and once finished, download the generated spec at the bottom of the page.

Required parameters:


Specifies the unique name for the Portworx cluster. (example:test_cluster)

Points to your key value database, such as an etcd cluster or a consul cluster. (example: etcd:http://etcd-1.com.net:2379,etcd:http://etcd-2.com.net:2379,etcd:http://etcd-3.com.net:2379)

Specify Kubernetes version (default is 1.7). Use output of kubectl version --short | awk -Fv '/Server Version: /{print $3}' (example: 1.8.4-gke.0)




Optional parameters:

Specify comma-separated list of drives. (example:/dev/sdb,/dev/sdc)

Specify data network interface. This is useful if your instances have non-standard network interfaces. (example: eth1)

Specify management network interface. This is useful if your instances have non-standard network interfaces. (example: eth1)



Select if installing on Openshift. (example: true)



Select if you want to install STORK (https://github.com/libopenstorage/stork) (example: true)



Instructs PX to use any available, unused and unmounted drives or partitions. PX will never use a drive or partition that is mounted. (example: true)

Select the secrets type for encrypting volumes. (example: vault)

Comma-separated list of environment variables that will be exported to portworx. (example: MYENV1=myvalue1,MYENV2=myvalue2)




Secure KVDB configuration:

This section is required if you are using a secured key-value store

Username and password for ETCD authentication in the form user:password. (example: username:password)

Location of CA file for ETCD authentication. (example: /path/to/server.ca)

Location of certificate certificate for ETCD authentication. (example: /path/to/server.crt)

Location of certificate key for ETCD authentication. (example: /path/to/server.key)

ACL token value used for Consul authentication. (example: 398073a8-5091-4d9c-871a-bbbeb030d1f6)