You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -9,127 +9,18 @@ store and has a plugin-based system to enable snapshotting of a cluster's persis
9
9
Backup and restore is only available for production-grade HA installations of clusters.
10
10
<!-- prettier-ignore-end -->
11
11
12
-
The playbooks install Velero on the HA management cluster and the Velero command-line-tool on the seed node. Once configured with the appropriate credentials, the installation process will create a [Schedule](https://velero.io/docs/latest/api-types/schedule/) on the HA cluster, which triggers a daily backup at midnight and cleans up backups older which are more than 1 week old.
13
-
14
-
The
15
-
[AWS Velero plugin](https://github.com/vmware-tanzu/velero-plugin-for-aws) is used for S3 support
16
-
and the
17
-
[CSI plugin](https://github.com/vmware-tanzu/velero-plugin-for-csi) for volume snapshots.
18
-
The CSI plugin uses Kubernetes generic support for
19
-
[Volume Snapshots](https://kubernetes.io/docs/concepts/storage/volume-snapshots/), which is
# Access key ID and secret for accessing the S3 bucket
48
-
velero_aws_access_key_id: <s3-access-key-id>
49
-
velero_aws_secret_access_key: <s3-secret-value>
50
-
```
51
-
52
-
<!-- prettier-ignore-start -->
53
-
!!! tip "Generating credentials for Keystone-integrated Ceph Object Gateway"
54
-
If the S3 target is Ceph Object Gateway integrated with Keystone, a common configuration with OpenStack clouds, S3 credentials can be generated using the following:
55
-
```sh
56
-
openstack ec2 credentials create
57
-
```
58
-
See [Ceph Object Gateway integrated with Keystone](https://docs.ceph.com/en/latest/radosgw/keystone/).
59
-
60
-
!!! danger
61
-
The S3 credentials should be kept secret. If you want to keep them in Git - which is recommended - then they must be encrypted.
62
-
See [secrets](../repository/secrets.md) for instructions on how to do this.
63
-
<!-- prettier-ignore-end -->
64
-
65
-
## Velero CLI
66
-
67
-
The Velero installation process also installs the Velero CLI on the seed node, which can be
68
-
used to inspect the state of the backups:
69
-
70
-
```sh title="On the seed node, with the kubeconfig for the HA cluster exported"
71
-
# List the configured backup locations
72
-
velero backup-location get
73
-
74
-
# List the backups and their statuses
75
-
velero backup get
76
-
```
77
-
78
-
See `velero -h` for other useful commands.
79
-
80
-
## Restoring from a backup
81
-
82
-
To restore from a backup, you must first know the name of the target backup. This can be inferred
83
-
from the object names in S3 if the Velero CLI is no longer available.
84
-
85
-
Once you have the name of the backup to restore, run the following command with your environment
# Schedule to use for backups (defaults to every day at midnight)
124
-
# See https://en.wikipedia.org/wiki/Cron for format options
125
-
velero_backup_schedule: "0 0 * * *"
126
-
# Time-to-live for existing backups (defaults to 1 week)
127
-
# See https://pkg.go.dev/time#ParseDuration for duration format options
128
-
velero_backup_ttl: "168h"
129
-
```
12
+
The playbooks install Velero on the HA management cluster and the Velero command-line-tool on the seed node.
13
+
Once configured with the appropriate credentials, the installation process will create a
14
+
[Schedule](https://velero.io/docs/latest/api-types/schedule/) on the HA cluster, which triggers a daily
15
+
backup at midnight and cleans up backups older which are more than 1 week old.
130
16
131
17
<!-- prettier-ignore-start -->
132
18
!!! note
133
-
Setting `velero_backup_schedule_enabled: false` does not prevent the backup schedule from being installed - instead it sets the schedule state to `paused`.
134
-
This allows for ad-hoc backups to still be run on demand using the configured backup parameters.
19
+
- The [AWS Velero plugin](https://github.com/vmware-tanzu/velero-plugin-for-aws) is used for S3 support.
20
+
- The [CSI plugin](https://github.com/vmware-tanzu/velero-plugin-for-csi) for volume snapshots.
21
+
- The CSI plugin uses Kubernetes generic support for [Volume Snapshots](https://kubernetes.io/docs/concepts/storage/volume-snapshots/).
22
+
- This is implemented for OpenStack by the [Cinder CSI plugin](https://github.com/kubernetes/cloud-provider-openstack).
135
23
<!-- prettier-ignore-end -->
24
+
25
+
Information on how to configure and use disaster recovery can be found
Copy file name to clipboardExpand all lines: docs/CAPI-mgmt/index.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,8 +10,7 @@ standalone CAPI management cluster, using Magnum as the chosen COE.
10
10
11
11
<!-- prettier-ignore-start -->
12
12
!!! note
13
-
Make sure you have some understanding of [stackhpc-kayobe-config](https://github.com/stackhpc/stackhpc-kayobe-config),
14
-
as well as satisfying the [deployment prerequisites](https://stackhpc-kayobe-config.readthedocs.io/en/stackhpc-2025.1/configuration/magnum-capi.html#deployment-prerequisites).
13
+
This deployment of a standalone Cluster API management cluster is, as the name suggests, able to work without the backing of another cloud infrastructure. However, if you're using [stackhpc-kayobe-config](https://github.com/stackhpc/stackhpc-kayobe-config), or some other OpenStack deployment tool, these documents are complimented by the following [documentation](https://stackhpc-kayobe-config.readthedocs.io/en/stackhpc-2025.1/configuration/magnum-capi.html).
15
14
16
15
!!! note
17
16
It is assumed that you have already followed the steps in setting up a configuration repository, and so have an environment for your site that is ready to be configured.
0 commit comments