The Velero add-on is a tool for cluster operators to backup Kubernetes namespaces and data.
The Kurl add-on installs:
The following host packages are required for Red Hat Enterprise Linux 9 and Rocky Linux 9:
The limitations of Velero apply to this add-on. For more information, see Limitations in the Velero GitHub repository.
spec:
velero:
version: "latest"
namespace: "velero"
disableRestic: true
disableCLI: true
localBucket: "local"
resticRequiresPrivileged: true
resticTimeout: "12h0m0s"
serverFlags:
- --log-level
- debug
- --default-repo-maintain-frequency=12h
Flag | Usage |
---|---|
version | The version of velero to be installed. |
namespace | Install the Velero server into an alternative namesapce. Default is 'velero' |
disableCLI | Do not install the velero CLI. |
disableRestic | Do not install the Restic integration. Volume data will not be included in backups if Restic is disabled |
localBucket | Create an alternative bucket in the local ceph RGW store for the initial backend. Default is 'velero' |
resticRequiresPrivileged | Runs Restic container in privileged mode |
resticTimeout | The time interval that backups/restores of pod volumes are allowed to run before timing out. Default is '4h0m0s' |
serverFlags | Additional flags to pass to the Velero server. This is a comma-separated list of arguments. |
This section describes tasks for cluster operators using Velero to backup resources and data in their cluster. Refer to the Velero documentation for more advanced topics, including help on scheduling recurring backups and troubleshooting.
Velero requires a backend object store where it will save your backups. It can alternatively be set up to use a persistent volume for storage.
For the initial install, a storage location inside the cluster will be used as the default. The storage location will be determined in this order of precedence:
kotsadm.disableS3
flag is set to true
in the installer spec, a persistent volume (PV) will be used as the storage backend.You can also decide to move between these Internal Storage locations. See Removing Object Storage for more information on this migration.
None of these Internal Storage locations are suitable for disaster recovery, because the loss of the cluster will mean the loss of backups. Therefore, it is recommended you use an external storage location.
The add-on includes plugins for using AWS, Azure, or GCP object stores as backends, as well as the local-volume-provider plugin for direct-to-disk backups.
Create a BackupStorageLocation in the velero
namespace with your S3 configuration:
velero backup-location create my-aws-backend --bucket my-s3-bucket --provider aws --config region=us-east-2
You must create a secret named aws-credentials
in the velero namespace unless using instance profiles. You may need to delete the secret of the same name created by the initial install for the local ceph object store.
[default]
aws_access_key_id=AKIAIOSFODNN7EXAMPLE
aws_secret_access_key=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
aws-credentials
in the velero
namespace from this file:kubectl -n velero create secret generic aws-credentials --from-file=cloud=<path-to-file>
The minimum policy permissions required for this IAM user are:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:AbortMultipartUpload",
"s3:DeleteObject",
"s3:ListMultipartUploadParts"
],
"Resource": "arn:aws:s3:::my-s3-bucket/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::my-s3-bucket"
}
]
}
S3-Compatible object stores can be used with the AWS provider.
Follow the steps above to create a secret named aws-credentials
in the velero
namespace with the store's credentials.
Then use the velero CLI to create a backup-location with the s3Url
config option to specify the endpoint.
velero backup-location create local-ceph-rgw --bucket snapshots --provider aws --config s3Url=http://$CLUSTER_IP,region=us-east-1
Refer to Velero's Azure plugin documentation for help with creating a storage account and blob container. Then you can configure a backup-location with credentials using the following commands:
velero backup-location create my-azure-backend --provider azure --config resourceGroup=$AZURE_BACKUP_RESOURCE_GROUP,storageAccount=$AZURE_STORAGE_ACCOUNT_ID,subscriptionId=$AZURE_BACKUP_SUBSCRIPTION_ID --bucket $BLOB_CONTAINER
You must create a secret named 'azure-credentials' in the velero namespace.
cat << EOF > ./credentials-velero
AZURE_SUBSCRIPTION_ID=${AZURE_SUBSCRIPTION_ID}
AZURE_TENANT_ID=${AZURE_TENANT_ID}
AZURE_CLIENT_ID=${AZURE_CLIENT_ID}
AZURE_CLIENT_SECRET=${AZURE_CLIENT_SECRET}
AZURE_RESOURCE_GROUP=${AZURE_RESOURCE_GROUP}
AZURE_CLOUD_NAME=AzurePublicCloud
EOF
kubectl -n velero create secret generic azure-credentials --from-file=cloud=credentials-velero
velero backup-location create my-google-backend --provider gcp --bucket my-gcs-bucket
You must create a secret named google-credentials
in the velero namespace.
credentials-velero
holding the contents of an authorized service account.kubectl -n velero create secret generic google-credentials --from-file=cloud=./credentials-velero
The local-volume-provider plugin can be used to store snapshots directly on the host machine (hostpath) or to a Network File Share (NFS) location.
Hostpath backups are only recommended for SINGLE NODE clusters that will never be extended with more nodes. To create a hostpath backup location:
velero backup-location create my-hostpath-backend --provider replicated.com/hostpath --bucket <friendly volume name> --config path=</path/to/hostpath>,resticRepoPrefix=/var/local-volume-provider/<bucket>/restic
To create an NFS backup location:
velero backup-location create my-nfs-backend --provider replicated.com/nfs --bucket <friendly volume name> --config path=</path/on/share>,server=<server host or ip>,resticRepoPrefix=/var/local-volume-provider/<bucket>/restic
velero backup create my-backup-1 --storage-location my-aws-backend --include-namespaces my-app-namespace
velero create restore restore-1 --from-backup my-backup-1
This section describes how authors of Kubernetes yaml must annotate their Pods in order for data to be included in backups. If you are a cluster operator using Velero to backup a KOTS app then the application vendor will already have applied the required annotations to their Pods.
Include a Pod volume in backups by adding the backup.velero.io/backup-volumes
annotation to the Pod spec:
apiVersion: apps/v1
kind: Deployment
metadata:
name: sample
labels:
app: foo
spec:
replicas: 1
selector:
matchLabels:
app: foo
template:
metadata:
labels:
app: foo
annotations:
backup.velero.io/backup-volumes: pvc-volume,scratch
spec:
containers:
- image: k8s.gcr.io/test-webserver
name: test-webserver
volumeMounts:
- name: data
mountPath: /volume-1
- name: scratch
mountPath: /volume-2
volumes:
- name: data
persistentVolumeClaim:
claimName: test-volume-claim
- name: scratch
emptyDir: {}