1. Portworx Enterprise Documentation - Install Portworx on Kubernetes -> Prerequisites -> Key-value store: "If you are using a secure etcd
you need to create a secret called px-kvdb-auth in the kube-system namespace with the following files: ca.crt
etcd-client.crt
etcd-client.key." This section explicitly names the secret.
2. Portworx Enterprise Documentation - Use an external key-value store -> Secure etcd with TLS: "Create a Kubernetes secret called px-kvdb-auth with the client certificate
key
and CA certificate you generated in the previous section." This guide provides a step-by-step process
reinforcing the required secret name.
3. Portworx Enterprise Documentation - Reference -> StorageCluster -> kvdb: The StorageCluster Custom Resource Definition (CRD) includes the field spec.kvdb.authSecret. The documentation notes: "Name of the secret that has the credentials for the KVDB. If the secret is not provided
Portworx will use the default secret name px-kvdb-auth." This confirms the default and expected name.