13. Backup and Restore Applications and Volumes¶
Robin CNS can:
Backup applications and volume data to an external storage repository such as S3 Object Store, Google Cloud Storage, etc.
Make applications and volume data portable across Kubernetes clusters spanning on-prem, public and hybrid cloud environments.
Backups containing encrypted volumes
By default, Robin CNS volumes are configured with data-at-rest encryption disabled. No special handling is required when reading or writing data from an unencrypted volume.
A volume key is required when writing data to, and reading data from an encrypted volume. To protect access to encrypted volume data, volume keys are encrypted (using the cluster master key) and persisted as part of the volume record in the cluster’s database. A backup’s metadata contains volume keys for all encrypted volumes in the backup.
The backup metadata also contains a special backup key that is used when encrypting and decrypting volume keys during backup export and import operations. Before storing the volume keys in the backup metadata, they are first decrypted (using the local cluster’s master key) and then re-encrypted using the backup key. The backup key itself is also encrypted (using the local cluster’s master key) before it’s added to the metadata.
Importing an encrypted volume from a backup
The first step when importing an encrypted volume from a backup, is to decrypt the backup key (using the cluster master key) and load it into memory. The volume key is then decrypted (using the backup key), re-encrypted (using the cluster master key), and then stored in the imported volume’s record in the cluster database. This only works on a cluster where the backup originated from. That’s because the backup key stored in the backup’s metadata can only be decrypted using the local cluster’s master key.
Importing an backup with encrypted volumes to a different cluster
Before you can import a volume from a backup on a different cluster, you must first import the backup to the cluster. If the backup contains encrypted volumes, then you also need to provide an unencrypted copy of the backup key during the import operation. When importing the backup, the backup key contained in the backup’s metadata (encrypted using the originating cluster’s master key) is replaced with a copy that was encrypted using the target cluster’s master key.
There are a number of ways you can provide an unencrypted copy of the backup key when importing a volume:
By default, the unencrypted backup key is included in the backup token generated when exporting a backup. When you import the backup on a different cluster, the backup key is read in from the token.
You can export the backup key on the source cluster and then import it on the target cluster. This adds the backup key on the target cluster as a secret. When importing the backup, the backup key is read in from the secret store. Note that if you import the backup key as a separate operation, it should not be included in the backup token (add the –exclude-backup-key command line option to exclude the backup key).
Provide an unencrypted copy of the backup key on the command line when importing the backup key.
Provide an unencrypted backup key on the command line when importing the backup.
Note
Only backups that contain encrypted volumes will be assigned a backup key.
An unencrypted copy of the backup key is only required when importing a backup containing encrypted volumes. Once the import operation has finished, the unencrypted backup key (or the token containing the key) can be discarded.
Great care needs to be taken with unencrypted backup keys, as they can be used to decrypt volume keys contained in the backup metadata.
Topics covered in this chapter:
|
Backup an application snapshot to a repository |
|
Delete an application or volume backup |
|
List all backups |
|
Show information about a specific backup |
|
Show transfer status of backup to repository |
|
Share a backup with one or more tenants |
|
Stop sharing a backup with one or more tenants |
|
Share a backup with one or more users |
|
Stop sharing a backup with one or more users |
|
List information about users a backup has been shared with |
|
Generate a token for use when importing a backup into another cluster |
|
Import a backup from another cluster |
|
List the backup_key from a backup with encrypted volumes |
|
Generate an export token containing the backup key from a backup with encrypted volumes |
|
Import the backup key for a backup from another cluster |
13.1. Create an application backup¶
In order to create a backup of an application, issue the following command:
# robin backup create <app_name> <reponame>
--snapshotid <snapshotid>
--backupname <backupname>
--purge-snapshot
|
Name of the application being backed up |
|
Name of the repo where the backup will be pushed |
|
Unique ID of snapshot to be backed up. If not provided a snapshot will be created implicitly |
|
Name to assign to backup |
|
Delete the snapshot pushed to the repo after successfully creating the backup. This option is only valid when a snapshot ID is not provided |
Example:
# robin backup create mysql1 app-repofpom --wait
Creating app backup 'mysql1_backup-1581809777'
Job: 213 Name: K8SApplicationBackup State: PROCESSED Error: 0
Job: 213 Name: K8SApplicationBackup State: WAITING Error: 0
Job: 213 Name: K8SApplicationBackup State: AGENT_WAIT Error: 0
Job: 213 Name: K8SApplicationBackup State: COMPLETED Error: 0
# robin backup list
+----------------------------------+--------------------------+----------+----------------------------+--------+
| Backup ID | Backup Name | Repo | Snapshot Name | State |
+----------------------------------+--------------------------+----------+----------------------------+--------+
| fcc2d538504b11ea821e5d26d9bcf8ac | mysql1_backup-1581809777 | testrepo | mysql1_snapshot-1581809777 | Pushed |
+----------------------------------+--------------------------+----------+----------------------------+--------+
Note
The ability to create a backup is subject to Robin Role Based Access Control (RBAC). By default, all Cluster Users (users having the user role) have permission to create backups, provided they can access the underlying App snapshot. Cluster Administrators (users having the superadmin role) have permission to create backups from all App snapshots. See the section on User Management for details on how Robin RBAC works.
Before creating a backup, the underlying app must be attached to the target repo.
Creates an application backup.
End Point: /api/v3/robin_server/apps
Method: PUT
URL Parameters: None
Data Parameters:
action: backup
- This mandatory field within the payload specifies the backup operation is to be performed.app_name: <app_name>
- This mandatory field within the payload specifies the name of the application to be backed up.repo: <repo_name>
- This mandatory field within the payload specifies the name of the repo in which the backup should be stored.backupname: <backup_name>
- This mandatory field within the payload specifies the name of the backup to be created.snapshotid: <snapshot_id>
- Utilizing this parameter, by specifying a snapshot ID, results in the associated snapshot being backed up.purge_snapshot: true
- Utilizing this parameter results in the snapshot being deleted once it has successfully been pushed to the repo. This option is only valid when a snapshot ID is not provided.
Port: RCM Port (default value is 29442)
Headers:
Authorization: <auth_token>
: Authorization token to identify which user is sending the request. The token can be acquired from the login API.
Success Response Code: 202
Error Response Code: 500 (Internal Server Error), 404 (Not Found Error), 401 (Unauthorized Error), 400 (Invalid Api Usage Error)
Example Response:
Output
{
"jobid":663,
"plan":{
"kind":"k8s",
"action":"backup",
"namespace":"t001-u000003",
"current_user":{
"user_contexts":[
"robin",
"robin-k8s-cluster"
],
"user_capabilities":[
"AllSuperAdminCapabilities"
],
"tenant":"Administrators",
"username":"robin",
"user_permissions":{
},
"user_id":3,
"tenant_id":1,
"ip_addr":"172.17.0.1",
"tenants":[
"Administrators"
],
"session_expires":"2020-09-10T21:28:38",
"tenant_role":"superadmin",
"namespace":"t001-u000003",
"user_context":"robin"
},
"backup_name":"demo",
"opcode":null,
"repo":"app-repoihos",
"app_name":"ma-appbd",
"name":"ma-appbd"
}
}
13.2. Delete a backup¶
Run this command to delete a backup:
# robin backup delete <backupid>
--repo-purge
|
Unique ID of the backup |
|
In addition to removing the backup from the cluster’s repo catalog, purge the backup from the external storage repo. Note that once the backup is purged from the repo, it cannot be recovered. In addition this option is only valid for backups that are owned/managed by the local cluster. |
Example 1: Delete a backup, but leave it on the external repo
Delete the local copy of a backup, but leave it in the external storage repo:
# robin backup delete fcc2d538504b11ea821e5d26d9bcf8ac --wait
Job: 218 Name: StorageRepoPurge State: VALIDATED Error: 0
Job: 218 Name: StorageRepoPurge State: COMPLETED Error: 0
# robin backup list
+-----------+-------------+------+---------------+-------+
| Backup ID | Backup Name | Repo | Snapshot Name | State |
+-----------+-------------+------+---------------+-------+
+-----------+-------------+------+---------------+-------+
Example 2: Delete a backup and purge it from the external storage repo
# robin backup delete ebc453b45a6611e99876835407ddf3c4 --repo-purge --wait
Job: 218 Name: StorageRepoPurge State: VALIDATED Error: 0
Job: 218 Name: StorageRepoPurge State: COMPLETED Error: 0
Note
The ability to delete a backup is subject to Robin Role Based Access Control (RBAC). By default, all Cluster Users (users having the user role) have permission to delete from local storage any backups they have created. They do not have permission, however, to purge backups from the repo. Cluster Administrators (users having the superadmin role), on the other hand, have permission to delete all backups as well as purge backups from a repo catalog and the external repo.
All backups that have been pushed to a repo (which is to say, all
backups), can be viewed using the robin backup list
command.
The robin repo contents
command also provides information about
backups that have been pushed to a specific repo. But this command
can only be invoked by Cluster Administrators (users
having the superadmin role).
Deletes a backup.
End Point: /api/v3/robin_server/backups
Method: DELETE
URL Parameters: None
Data Parameters:
action: purge
- This mandatory field within the payload specifies the purge operation is to be performed.backupid: <backupid>
- This mandatory field within the payload specifies the ID of the backup to be deleted.repo_purge: true
- Utilizing this parameter in the payload results in the backup specified being removed from the external storage repo as well as the local catalog. This option is only valid for backups that are owned/managed by the local cluster.
Port: RCM Port (default value is 29442)
Headers:
Authorization: <auth_token>
: Authorization token to identify which user is sending the request. The token can be acquired from the login API.
Success Response Code: 202
Error Response Code: 500 (Internal Server Error), 404 (Not Found Error), 401 (Unauthorized Error), 400 (Invalid Api Usage Error)
Example Response:
Output
{
"jobid":711
}
13.3. List backups¶
Run this command to list backups:
# robin backup list --app <appname>
--app-namespace <app_ns>
--wide
|
Only show backups for the specified application |
|
If there are multiple applications of the same name but in different namespaces this option can be used to distinguish them. Note this option is only valid when |
|
Provide additional information about each backup |
Example 1: List backups of a specific app
# robin backup list --app mysql1
+----------------------------------+--------------------------+-------+----------------------------+--------+
| Backup ID | Backup Name | Repo | Snapshot Name | State |
+----------------------------------+--------------------------+-------+----------------------------+--------+
| 804232a4124f11eca28da5c0831d395f | mysql1_backup-1631289319 | repo1 | mysql1_snapshot-1631288383 | Pushed |
+----------------------------------+--------------------------+-------+----------------------------+--------+
Example 2: List all backups with extra details
# robin backup list --wide
+----------------------------------+----------------------------+-------+----------------------------+--------+---------+-------------+----------+----------------------+-------------+-----------+
| Backup ID | Backup Name | Repo | Snapshot Name | State | Managed | App Name | App Type | Owner/Tenant | Description | Level |
+----------------------------------+----------------------------+-------+----------------------------+--------+---------+-------------+----------+----------------------+-------------+-----------+
| a3b979f0108a11ec931c0d8a6d76a1ea | u1ns1_nsbackup-1631094817 | repo1 | u1ns1iquap_ss1u1ns1 | Pushed | True | u1ns1iquap | flexapp | u1/t1 | | namespace |
| 33be96e4108d11ec816715edd7902163 | u11ns1_nsbackup-1631095917 | repo1 | u11ns1plscf_ss1u11ns1 | Pushed | True | u11ns1plscf | flexapp | u11/t1 | | namespace |
| 804232a4124f11eca28da5c0831d395f | mysql1_backup-1631289319 | repo1 | mysql1_snapshot-1631288383 | Pushed | True | mysql1 | helm | admin/Administrators | | app |
+----------------------------------+----------------------------+-------+----------------------------+--------+---------+-------------+----------+----------------------+-------------+-----------+
Note
The ability to view backups is subject to Robin Role Based Access Control (RBAC). By default, Cluster Users (users having the user role) are able to view all backups they have created, plus any that have been shared with them (see Share a backup with tenants for details). See the section on User Management for details on how Robin RBAC works.
Lists all backups.
End Point: /api/v3/robin_server/backups
Method: GET
URL Parameters:
appname=<app_name>
: Utilizing this parameter filters the results such that only backups of the specified application are returned.namespace=<app_ns>
: Utilizing this parameter filters the results such that only backups of the specified application in the given namespace are returned. Note this option is only valid with theappname
parameter is utilized.
Data Parameters: None
Port: RCM Port (default value is 29442)
Headers:
Authorization: <auth_token>
: Authorization token to identify which user is sending the request. The token can be acquired from the login API.
Success Response Code: 200
Error Response Code: 500 (Internal Server Error), 401 (Unauthorized Error), 400 (Invalid API Usage Error)
Example Response:
Output
{
"items":[
{
"name":"u1ns1_nsbackup-1631094817",
"id":"a3b979f0108a11ec931c0d8a6d76a1ea",
"tenant":"t1",
"username":"u1",
"snapshot":"u1ns1iquap_ss1u1ns1",
"app":"u1ns1iquap",
"appid":24,
"description":"",
"kind":"flexapp",
"repo":"repo1",
"state":"Pushed",
"managed":true,
"share_with_all_tenants":false,
"tenant_shares":{
},
"user_shares":{
},
"app_uuid":"a3acf7f6108511ec8bfde90ebdde4d85",
"namespace_snapshot":true,
"level":"namespace"
},
{
"name":"u11ns1_nsbackup-1631095917",
"id":"33be96e4108d11ec816715edd7902163",
"tenant":"t1",
"username":"u11",
"snapshot":"u11ns1plscf_ss1u11ns1",
"app":"u11ns1plscf",
"appid":28,
"description":"",
"kind":"flexapp",
"repo":"repo1",
"state":"Pushed",
"managed":true,
"share_with_all_tenants":false,
"tenant_shares":{
},
"user_shares":{
},
"app_uuid":"f3417c36108b11ecb02da75c11159457",
"namespace_snapshot":true,
"level":"namespace"
},
{
"name":"mysql1_backup-1631289319",
"id":"804232a4124f11eca28da5c0831d395f",
"tenant":"Administrators",
"username":"admin",
"snapshot":"mysql1_snapshot-1631288383",
"app":"mysql1",
"appid":14,
"description":"",
"kind":"helm",
"repo":"repo1",
"state":"Pushed",
"managed":true,
"share_with_all_tenants":false,
"tenant_shares":{
},
"user_shares":{
},
"app_uuid":"7269d19a0fc511ec932ba5cfd586197c",
"namespace_snapshot":false,
"level":"app"
}
]
}
13.4. Get information about a specific backup¶
Details of a specific backup can be obtained using the following command:
# robin backup info <backupid>
--specs
|
Unique ID of the backup (obtained from the output of |
|
Output the spec file associated with the backup |
Example:
# robin backup info 33be96e4108d11ec816715edd7902163
Name : u11ns1_nsbackup-1631095917
Id : 33be96e4108d11ec816715edd7902163
Snapshot Name : u11ns1plscf_ss1u11ns1
Application Name : u11ns1plscf
Application Kind : flexapp
Snapshot level : Namespace
State : Pushed
Repo : repo1
Description : -
Total Transferred : 352.0 MB
Trigger Details
-------
Operation : MANUAL
User : u11
Tenant : t1
Data Details
-------
Transferred : 352.0 MB
Skipped : 0.0 MB
Total : 352.0 MB
Start Time : 08 Sep 2021 10:11:58
End Time : 08 Sep 2021 10:12:07
Time Taken : 9s
Note
The ability to view information about a backup is subject to Robin Role Based Access Control (RBAC). By default, Cluster Users (users having the user role) are able to view info for all backups they have created, plus any that have been shared with them (see Share a backup with tenants for details). See the section on User Management for details on how Robin RBAC works.
Information about the local application or volume will only be included in the output if they still exists. This information will never be displayed for backups which are imported from another Robin cluster.
Returns details about a specific backup such as its kind, the objects which are associated with it and its creation time,
End Point: /api/v3/robin_server/k8s_app/<backupid>?action=info&otype=backup
Method: GET
URL Parameters: None
Data Parameters: None
Port: RCM Port (default value is 29442)
Headers:
Authorization: <auth_token>
: Authorization token to identify which user is sending the request. The token can be acquired from the login API.
Success Response Code: 200
Error Response Code: 500 (Internal Server Error), 404 (Not Found Error), 401 (Unauthorized Error)
Example Response:
Output
{
"name":"u11ns1_nsbackup-1631095917",
"id":"33be96e4108d11ec816715edd7902163",
"tenant":"t1",
"username":"u11",
"snapshot":"u11ns1plscf_ss1u11ns1",
"app":"u11ns1plscf",
"appid":28,
"description":"",
"kind":"flexapp",
"repo":"repo1",
"state":"Pushed",
"managed":true,
"app_exists":true,
"snap_exists":true,
"bytes_count":369098752,
"share_with_all_tenants":false,
"tenant_shares":{
},
"user_shares":{
},
"app_uuid":"f3417c36108b11ecb02da75c11159457",
"namespace_snapshot":true,
"level":"namespace",
"backup_entry":true,
"spec":"apiVersion: v1\ndata: {run.sh: ''}\nkind: ConfigMap\nmetadata:\n annotations: {meta.helm.sh\/release-name: mysql1t1u11ns1, meta.helm.sh\/release-namespace: u11ns1}\n labels: {app: mysql1t1u11ns1, app.kubernetes.io\/managed-by: Helm, chart: mysql-1.6.7,\n heritage: Helm, release: mysql1t1u11ns1}\n name: mysql1t1u11ns1-test\n namespace: u11ns1\n---\napiVersion: v1\ndata: {mysql-password: WVdvNFhrd1ZCOQ==, mysql-root-password: QVNRRVZhd3VQNQ==}\nkind: Secret\nmetadata:\n annotations: {meta.helm.sh\/release-name: mysql1t1u11ns1, meta.helm.sh\/release-namespace: u11ns1}\n labels: {app: mysql1t1u11ns1, app.kubernetes.io\/managed-by: Helm, chart: mysql-1.6.7,\n heritage: Helm, release: mysql1t1u11ns1}\n name: mysql1t1u11ns1\n namespace: u11ns1\ntype: Opaque\n---\napiVersion: v1\nkind: PersistentVolumeClaim\nmetadata:\n annotations: {meta.helm.sh\/release-name: mysql1t1u11ns1, meta.helm.sh\/release-namespace: u11ns1,\n robin.io\/appid: '1', robin.io\/blocksize: '4096', robin.io\/encryption: none, robin.io\/fstype: ext4,\n robin.io\/snapname: u11ns1plscf_ss1u11ns1, robin.io\/snapshotid: '1', robin.io\/vol_snapname: ss1u11ns1,\n robin.io\/volumeid: '19', robin.io\/volumename: pvc-f90e8ae4-56a4-4a7b-aaed-8c7ef337e4e8,\n robin.io\/zoneid: '1630920119', volume.beta.kubernetes.io\/storage-provisioner: robin}\n labels: {app: mysql1t1u11ns1, app.kubernetes.io\/managed-by: Helm, chart: mysql-1.6.7,\n heritage: Helm, release: mysql1t1u11ns1}\n name: mysql1t1u11ns1\n namespace: u11ns1\nspec:\n accessModes: [ReadWriteOnce]\n resources:\n requests: {storage: 1Gi}\n storageClassName: robin\n volumeMode: Filesystem\n---\napiVersion: v1\nkind: Service\nmetadata:\n annotations: {meta.helm.sh\/release-name: mysql1t1u11ns1, meta.helm.sh\/release-namespace: u11ns1}\n labels: {app: mysql1t1u11ns1, app.kubernetes.io\/managed-by: Helm, chart: mysql-1.6.7,\n heritage: Helm, release: mysql1t1u11ns1}\n name: mysql1t1u11ns1\n namespace: u11ns1\nspec:\n ipFamilies: [IPv4]\n ipFamilyPolicy: SingleStack\n ports:\n - {name: mysql, port: 3306, protocol: TCP, targetPort: mysql}\n selector: {app: mysql1t1u11ns1}\n sessionAffinity: None\n type: ClusterIP\n---\napiVersion: apps\/v1\nkind: Deployment\nmetadata:\n annotations: {deployment.kubernetes.io\/revision: '1', meta.helm.sh\/release-name: mysql1t1u11ns1,\n meta.helm.sh\/release-namespace: u11ns1}\n labels: {app: mysql1t1u11ns1, app.kubernetes.io\/managed-by: Helm, chart: mysql-1.6.7,\n heritage: Helm, release: mysql1t1u11ns1}\n name: mysql1t1u11ns1\n namespace: u11ns1\nspec:\n progressDeadlineSeconds: 600\n replicas: 1\n revisionHistoryLimit: 10\n selector:\n matchLabels: {app: mysql1t1u11ns1, release: mysql1t1u11ns1}\n strategy: {type: Recreate}\n template:\n metadata:\n creationTimestamp: null\n labels: {app: mysql1t1u11ns1, release: mysql1t1u11ns1}\n spec:\n containers:\n - env:\n - name: MYSQL_ROOT_PASSWORD\n valueFrom:\n secretKeyRef: {key: mysql-root-password, name: mysql1t1u11ns1}\n - name: MYSQL_PASSWORD\n valueFrom:\n secretKeyRef: {key: mysql-password, name: mysql1t1u11ns1, optional: true}\n - {name: MYSQL_USER}\n - {name: MYSQL_DATABASE}\n image: mysql:5.7.30\n imagePullPolicy: IfNotPresent\n livenessProbe:\n exec:\n command: [sh, -c, 'mysqladmin ping -u root -p${MYSQL_ROOT_PASSWORD}']\n failureThreshold: 3\n initialDelaySeconds: 30\n periodSeconds: 10\n successThreshold: 1\n timeoutSeconds: 5\n name: mysql1t1u11ns1\n ports:\n - {containerPort: 3306, name: mysql, protocol: TCP}\n readinessProbe:\n exec:\n command: [sh, -c, 'mysqladmin ping -u root -p${MYSQL_ROOT_PASSWORD}']\n failureThreshold: 3\n initialDelaySeconds: 5\n periodSeconds: 10\n successThreshold: 1\n timeoutSeconds: 1\n resources:\n requests: {cpu: 100m, memory: 256Mi}\n securityContext: {privileged: true, runAsUser: 0}\n terminationMessagePath: \/dev\/termination-log\n terminationMessagePolicy: File\n volumeMounts:\n - {mountPath: \/var\/lib\/mysql, name: data}\n dnsPolicy: ClusterFirst\n initContainers:\n - command: [rm, -fr, \/var\/lib\/mysql\/lost+found]\n image: busybox:1.32\n imagePullPolicy: IfNotPresent\n name: remove-lost-found\n resources:\n requests: {cpu: 10m, memory: 10Mi}\n terminationMessagePath: \/dev\/termination-log\n terminationMessagePolicy: File\n volumeMounts:\n - {mountPath: \/var\/lib\/mysql, name: data}\n restartPolicy: Always\n schedulerName: default-scheduler\n securityContext: {}\n serviceAccount: default\n serviceAccountName: default\n terminationGracePeriodSeconds: 30\n volumes:\n - name: data\n persistentVolumeClaim: {claimName: mysql1t1u11ns1}\n---\napiVersion: rbac.authorization.k8s.io\/v1\nkind: RoleBinding\nmetadata:\n labels: {app.kubernetes.io\/instance: robin, app.kubernetes.io\/managed-by: robin.io,\n app.kubernetes.io\/name: robin, robin.io\/domain: ROBIN, robin.io\/role: tenantadmin,\n robin.io\/tenant: t1, robin.io\/tenant_id: '2', robin.io\/user_id: '4', robin.io\/username: u1}\n name: rolebinding-u1-edit\n namespace: u11ns1\nroleRef: {apiGroup: rbac.authorization.k8s.io, kind: ClusterRole, name: edit}\nsubjects:\n- {apiGroup: rbac.authorization.k8s.io, kind: User, name: u1, namespace: u11ns1}\n---\napiVersion: rbac.authorization.k8s.io\/v1\nkind: RoleBinding\nmetadata:\n labels: {app.kubernetes.io\/instance: robin, app.kubernetes.io\/managed-by: robin.io,\n app.kubernetes.io\/name: robin, robin.io\/domain: ROBIN, robin.io\/role: user, robin.io\/tenant: t1,\n robin.io\/tenant_id: '2', robin.io\/user_id: '7', robin.io\/username: u11}\n name: rolebinding-u11-edit\n namespace: u11ns1\nroleRef: {apiGroup: rbac.authorization.k8s.io, kind: ClusterRole, name: edit}\nsubjects:\n- {apiGroup: rbac.authorization.k8s.io, kind: User, name: u11, namespace: u11ns1}\n",
"bytes_skipped":0,
"bytes_transferred":369098752,
"op_trigger":"MANUAL",
"vol_data":true,
"creation_time":1631095918,
"creation_end_time":1631095927
}
13.5. Configuring backup schedules and retention policies¶
This is covered under the Manage Application Backup Schedules section of
Applications chapter. See details of the command robin app backup-schedule
.
13.6. Monitor status of a backup¶
The status of transfers of in progress backups to their respective repositories can be viewed using the following command:
# robin backup status --appname <appname>
--backupid <backupid>
--all
|
Filter by app name |
|
Filter by backup id |
|
Include all backups in result |
Example:
# robin backup status --backupid fe7d6f7a504f11ea92f977d7085a249d
+----------------------------------+-------------------------------------+-----------------+
| Name | TransferStatus | Schedule/Manual |
+----------------------------------+-------------------------------------+-----------------+
| fe7d6f7a504f11ea92f977d7085a249d | 100% [####################] 736.0MB | MANUAL |
+----------------------------------+-------------------------------------+-----------------+
Returns the transfer status of backups to a particular repo.
End Point: /api/v3/robin_server/k8s_app/
Method: GET
URL Parameters: None
Data Parameters:
action: get_k8s_backup_ops
- This mandatory field within the payload specifies that the status of backups should be returned.all: [true|false]
- This mandatory field within the payload specifies whether or not the status of all backups (both in progress and completed) should be returned.backupid: <backupid>
- Utilizing this parameter within the payload, by specifying a backup ID, results in only the transfer status of the aformentioned backup being returned.appname: <appname>
- Utilizing this parameter within the payload, by specifying an application name, results in only the transfer status of the backups associated with the aforementioned application being returned.
Port: RCM Port (default value is 29442)
Headers:
Authorization: <auth_token>
: Authorization token to identify which user is sending the request. The token can be acquired from the login API.
Success Response Code: 200
Error Response Code: 500 (Internal Server Error), 401 (Unauthorized Error), 400 (Invalid API Usage Error)
Example Response:
Output
{
"items":{
"bc8e3a58f3b611eaa93d0b3c9c4e5962":{
"bytes_skipped":0,
"snap_name":"mysql-hplt_snapmysql-hplt",
"bytes_transferred":134217728,
"state":"Push in progress",
"op_trigger":"MANUAL",
"bytes_count":973078528
},
"4ba16f22f30911eab74d45afeffd38d2":{
"bytes_skipped":0,
"snap_name":"my-apptn_my-s1tc",
"bytes_transferred":369098752,
"state":"Pushed",
"op_trigger":"MANUAL",
"bytes_count":369098752
},
"387a9d46f30911eaae760514a59458bd":{
"bytes_skipped":0,
"snap_name":"mysql2_snapmysql2",
"bytes_transferred":369098752,
"state":"Pushed",
"op_trigger":"MANUAL",
"bytes_count":369098752
},
"1c344900f30911eaa97a51af70aa8d37":{
"bytes_skipped":0,
"snap_name":"mysql1_snapmysql1",
"bytes_transferred":369098752,
"state":"Pushed",
"op_trigger":"MANUAL",
"bytes_count":369098752
},
"d079f9d0f30a11ea85298d04093a1b78":{
"bytes_skipped":0,
"snap_name":"ma-appbd_ma-s1dk",
"bytes_transferred":100663296,
"state":"Pushed",
"op_trigger":"MANUAL",
"bytes_count":100663296
},
"b419d8a2f30611eab3c98b46a91f9934":{
"bytes_skipped":0,
"snap_name":"my-appcw_my-s1po",
"bytes_transferred":369098752,
"state":"Pushed",
"op_trigger":"MANUAL",
"bytes_count":369098752
}
}
}
13.8. Stop sharing a backup with tenants¶
Stop sharing a backup with one or more tenants:
# robin repo unshare <reponame> [tenant_list]
--operations <operations>
--all-tenants
|
ID of the backup to stop sharing |
|
List of tenants to stop sharing the backup with |
|
Comma separated list of operations to stop allowing on a backup shared with specified tenants. If no operations are specified, then stop sharing the backup with all specified tenants. |
|
Stop sharing the backup with all tenants |
Example 1: Stop sharing a backup with a tenant
# robin backup tenant-unshare fe7d6f7a504f11ea92f977d7085a249d t1 --wait
Job: 229 Name: K8sBackupUnshare State: PROCESSED Error: 0
Job: 229 Name: K8sBackupUnshare State: COMPLETED Error: 0
Example 2: Stop sharing a backup with all tenants
# robin backup tenant-unshare fe7d6f7a504f11ea92f977d7085a249d --all-tenants --wait
Job: 229 Name: K8sBackupUnshare State: PROCESSED Error: 0
Job: 229 Name: K8sBackupUnshare State: COMPLETED Error: 0
Note
The ability stop sharing a backup with tenants is subject to Robin Role Based Access Control (RBAC). Only Cluster Administrators (users having the superadmin role) have permission to do so. See the section on User Management for details on how Robin RBAC works.
13.10. Stop sharing a backup with users¶
Stop sharing a backup with one or more users:
# robin backup user-unshare <backupid> <tenant> [<user_list>]
--operations <operations>
--all-tenant-users
|
ID of the backup to stop sharing |
|
Tenant user share should be removed from |
|
List of users to stop sharing the backup with |
|
List of operations to stop allowing users to invoke on the shared backup. To block all valid operations to be performed, specify ‘ALL_OPERATIONS’ on the command line (default value is ‘view’) |
|
Stop sharing a backup with all users (overrides user_list) |
Example:
# robin backup user-unshare fe7d6f7a504f11ea92f977d7085a249d t1 user1 --wait
Job: 237 Name: K8sBackupUnshare State: PROCESSED Error: 0
Job: 237 Name: K8sBackupUnshare State: COMPLETED Error: 0
Note
The ability to stop sharing a backup is subject to Robin Role Based Access Control (RBAC). By default, only Cluster Administrators (users having the superadmin role) and Tenant Administrators (users having the tenantadmin role) have permission to do so. Tenant Administrators are only allowed to stop sharing a backup with users from their tenant. See the section on User Management for details on how Robin RBAC works.
13.12. Export a backup¶
Generate a token for use when importing a backup backup into another cluster:
# robin backup export <backupid>
--exclude-backup-key
--force
|
Application backup ID |
|
Do not include the backup_key in the backup token. Note that an unencrypted backup_key only gets added when the backup contains encrypted volumes. |
|
Force backup import operation. Use this as part of encrypted volumes backup |
Example:
# robin backup list
+----------------------------------+-------------+----------+--------------------+--------+
| Backup ID | Backup Name | Repo | Snapshot Name | State |
+----------------------------------+-------------+----------+--------------------+--------+
| 644770427d8911e9b908cbe6a78db423 | mysql1 | testrepo | mysql1_mysql1-snap | Pushed |
+----------------------------------+-------------+----------+--------------------+--------+
# robin backup export 644770427d8911e9b908cbe6a78db423
eyJyZXBvX3R5cGUiOiAiR0NTIiwgImJhY2t1cF9pZCI6ICI2NDQ3NzA0MjdkODkxMWU5YjkwOGNiZTZhNzhkYjQyMyIsICJiYWNrdXBfcGF0aCI6ICJkZXYvdGVzdGluZy9hcHBjb25maWcvMTU1ODU5NDE0Ny9teXNxbDFfMS9teXNxbDFfbXlzcWwxLXNuYXAuanNvbiIsICJyZXBvX3BhcmFtcyI6IHsiYnVja2V0IjogInRlc3RidWNrZXQtMTAyOTM4NDc1NiIsICJyZXBvX3R5cGUiOiAiR0NTIiwgInBhdGgiOiAiZGV2L3Rlc3RpbmcvIiwgImNyZWRlbnRpYWxzIjogeyJwcm9qZWN0X2lkIjogInJvY2stcmFuZ2UtMjA3NjIyIn19fQ==
Note
The ability to export a backup is subject to Robin Role Based Access Control (RBAC). By default, only Cluster Administrators (users having the superadmin role) have permission to do so. See the section on User Management for details on how Robin RBAC works.
Generates a token for use when importing a backup into another cluster:
End Point: /api/v3/robin_server/k8s_app
Method: PUT
URL Parameters: None
Data Parameters:
action: export
- This mandatory field within the payload specifies that the export operation should be performedbkpid: <backupid>
- This mandatory field within the payload specifies the ID of the backup to be exported.
Port: RCM Port (default value is 29442)
Headers:
Authorization: <auth_token>
: Authorization token to identify which user is sending the request. The token can be acquired from the login API.
Success Response Code: 200
Error Response Code: 500 (Internal Server Error), 401 (Unauthorized Error), 400 (Invalid API Usage Error), 404 (Not Found Error)
Example Response:
Output
{
"backup_token":"eyJyZXBvX3BhcmFtcyI6IHsiYnVja2V0IjogInJhbWVuZHJhIiwgImNyZWRlbnRpYWxzIjogeyJwcm9qZWN0X2lkIjogInJvY2stcmFuZ2UtMjA3NjIyIn0sICJwYXRoIjogIm15LWFwcGN3LWJ1Y2tldC8iLCAicmVwb190eXBlIjogIkdDUyJ9LCAicmVwb190eXBlIjogIkdDUyIsICJiYWNrdXBfaWQiOiAiMzg3YTlkNDZmMzA5MTFlYWFlNzYwNTE0YTU5NDU4YmQiLCAiYmFja3VwX3BhdGgiOiAibXktYXBwY3ctYnVja2V0LzE1OTUzMzE4NjYvbXlzcWwyXzkvMzg3YTlkNDZmMzA5MTFlYWFlNzYwNTE0YTU5NDU4YmQvYXBwY29uZmlnL2JhY2t1cF9tZXRhZGF0YS5qc29uIn0="
}
13.13. Import a backup¶
Run this command to import a backup from another cluster:
Note
Importing a backup of a bundle application requires that the same bundle used when creating the original application be present in the destination cluster.
# robin backup import <backup_token>
--backup-key <BACKUP_KEY>
|
Token containing details of the backup to import |
|
Backup key for the backup. Note that this is is not a secure option, as the backup key is not encrypted. |
Example:
# robin backup import eyJyZXBvX3R5cGUiOiAiR0NTIiwgImJhY2t1cF9pZCI6ICI2NDQ3NzA0MjdkODkxMWU5YjkwOGNiZTZhNzhkYjQyMyIsICJiYWNrdXBfcGF0aCI6ICJkZXYvdGVzdGluZy9hcHBjb25maWcvMTU1ODU5NDE0Ny9teXNxbDFfMS9teXNxbDFfbXlzcWwxLXNuYXAuanNvbiIsICJyZXBvX3BhcmFtcyI6IHsiYnVja2V0IjogInRlc3RidWNrZXQtMTAyOTM4NDc1NiIsICJyZXBvX3R5cGUiOiAiR0NTIiwgInBhdGgiOiAiZGV2L3Rlc3RpbmcvIiwgImNyZWRlbnRpYWxzIjogeyJwcm9qZWN0X2lkIjogInJvY2stcmFuZ2UtMjA3NjIyIn19fQ==
Note
The ability to import a backup is subject to Robin Role Based Access Control (RBAC). By default, only Cluster Administrators (users having the superadmin role) have permission to do so. See the section on User Management for details on how Robin RBAC works.
Import a backup from another cluster.
End Point: /api/v3/robin_server/k8s_app
Method: PUT
URL Parameters: None
Data Parameters:
action: import
- This mandatory field within the payload specifies that the import operation should be performedbackup_token: <backup_token>
- This mandatory field within the payload specifies the token containing the details of the backup to import.
Port: RCM Port (default value is 29442)
Headers:
Authorization: <auth_token>
: Authorization token to identify which user is sending the request. The token can be acquired from the login API.
Success Response Code: 202
Error Response Code: 500 (Internal Server Error), 401 (Unauthorized Error), 400 (Invalid API Usage Error)
Example Response:
Output
{
"jobid":722
}
13.14. View backup key from backup with encrypted volumes¶
Run this command to view the backup key from a backup that contains encrypted volumes.
# robin backup list-key <backupid> --force
|
Backup ID |
|
Because the returned backup key is unencrypted, the force option is required in order for it to be displayed. |
Example:
[root@cscale-82-64 ~]# robin backup list-key 0cae83d46b4411eeb1ecb9f9119206b3 --force 868fcc4a57c1015343d0bcf03ae4b18a259d6cd21d561e33534ce32435abdd79
13.15. Export backup key from backup with encrypted volumes¶
Run this command to export the backup key of a backup that contains encrypted volumes.
# robin backup export-key <backupid>
backupid
Backup ID
Example:
[root@cscale-82-64 ~]# robin backup export-key 0cae83d46b4411eeb1ecb9f9119206b3eyJYWNrdXBfaWQiOiiMGNhZTgzZDQYjQ0MTFlZWIxZWNiOWY5MTE5MjA2YjMiLCAiYmFja3VwX2tleSI6ICI4NjhmY2M0YTU3YzEwMTUzNDNkMGJjZjAzYWU0YjE4YTI1OWQ2Y2QyMWQ1NjFlMzM1MzRjZTMyNDM1YWJkZDc5IiwgInpvbmVpZCI6IDE2OTY5MTc3MTZ9
13.16. Import backup key from backup with encrypted volumes¶
Run this command to import the backup key from a backup that contains encrypted volumes. The backup key will be added to the secret store, for use when the associated backup is imported.
The backup key can be supplied via backup_key_token
(which contains Backup ID
and backup key), or it can be supplied on the command line by including the
--backup-id
and --backup-key
command line options.
# robin backup import-key <backup_key_token>
--backup-id <BACKUP_ID>
--backup-key <BACKUP_KEY>
|
Encoded token containing backup ID and backup key from a backup from another cluster. |
|
The backup ID |
|
The backup key |
Example:
[root@cscale-82-64 ~]# robin backup import-key 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
Backup key for backup with ID '0cae83d46b4411eeb1ecb9f9119206b3' was successfully imported
13.17. Configuring internal repo for Backup¶
This article describes how to configure an internal repo using minio as a backup repository and secure it with TLS.
Ensure that minio is configured to use TLS - https://docs.min.io/docs/how-to-secure-access-to-minio-server-with-tls.html
If using a private certificate, create and sign a certificate for the connection. An example of how to do this using OpenSSL can be found here: https://jamielinux.com/docs/openssl-certificate-authority/introduction.html
Test that minio TLS configuration is works with the created certificate:
cURL the minio server without specifying a certificate - this should fail
curl https://minio-sever
cURL the minio server specifying a certificate - this should succeed
curl --cacert <ca.cert> https://minio-server
A create a minio object store for the Robin backups - https://docs.min.io/docs/minio-client-complete-guide.html
Register the minio backup repository with Robin:
Create the credential json file in the below format:
Update the minio endpoint and certificate file path . Access key and secret key of minio needs to be configured as the value for “aws_access_key” and “aws_secret_key“.
{ "aws_access_key_id" : "minioadmin", "aws_secret_access_key" : "minioadmin", "end_point": "<mnioserverip/serviceip>:9000", "tls": "yes", "ca_file": "/root/ca-chain.cert.pem" }
In case you want configure to skip tls validation , configure “validate_certs” parameter as “no” in the credential json and remove the “ca_file” parameter.
{ "aws_access_key_id" : "minioadmin", "aws_secret_access_key" : "minioadmin", "end_point": "<mnioserverip/serviceip>:9000", "tls": "yes", "validate_certs": "no" }
Register the minio repo to robin. You will have to provide the minio object store path and the path to the credential json while registering the repo.
# robin repo register miniotest-repo s3://miniotest/test /root/minio-credential.json readwrite
Check if the repo has been added to robin
# robin repo list | grep miniotest-repo
Test that a backup can be made to the minio repo:
Attach minio repo to the app:
# robin app attach-repo mongoapp mongodbns-backup --wait
Create a backup from the app
# robin backup create mongoapp miniotest-repo
Alternatively we can also backup an existing snapshot to repo
# robin backup create mongoapp miniotest-repo --snapshotid c9689aca0d0911ebace6af20df9778b7
List backup and validate the snapshot has been backed up to minio repo
# robin backup list | grep mongoapp
Test restore from minio repo,
List the backups and note down the backup id.
# robin backup list | grep mongoapp
Restore the backup using the backup id.
robin app restore mongoapp --backupid 89d6cbde0d1111eba8b7b71d742fe09d --wait