You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-backup-troubleshoot.md
+24-9Lines changed: 24 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,9 +25,9 @@ This article provides troubleshooting steps that help you resolve Azure Kubernet
25
25
```
26
26
27
27
28
-
**Cause**: The extension has been installed successfully, but the pods aren't spawning. This happens because the required compute and memory aren't available for the pods.
28
+
**Cause**: The extension is installed successfully, but the pods aren't spawning because the required compute and memory aren't available for the pods.
29
29
30
-
**Resolution**: To resolve the issue, increase the number of nodes in the cluster. This allows sufficient compute and memory to be available for the pods to spawn.
30
+
**Resolution**: To resolve the issue, increase the number of nodes in the cluster, allowing sufficient compute and memory to be available for the pods to spawn.
31
31
To scale node pool on Azure portal, follow these steps:
32
32
33
33
1. On the Azure portal, open the *AKS cluster*.
@@ -45,7 +45,7 @@ To scale node pool on Azure portal, follow these steps:
**Cause**: When you enable pod-managed identity on your AKS cluster, an *AzurePodIdentityException* named *aks-addon-exception* is added to the *kube-system* namespace. An *AzurePodIdentityException* allows pods with certain labels to access the Azure Instance Metadata Service (IMDS) endpoint without being intercepted by the NMI server.
48
+
**Cause**: When you enable pod-managed identity on your AKS cluster, an *AzurePodIdentityException* named *aks-addon-exception* is added to the *kube-system* namespace. An *AzurePodIdentityException* allows pods with certain labels to access the Azure Instance Metadata Service (IMDS) endpoint are not intercepted by the NMI server.
49
49
50
50
The extension pods aren't exempt, and require the Microsoft Entra pod identity to be enabled manually.
51
51
@@ -82,13 +82,28 @@ This error appears due to absence of these FQDN rules because of which configura
82
82
83
83
**Resolution**: To resolve the issue, you need to create a *CoreDNS-custom override* for the *DP* endpoint to pass through the public network.
84
84
85
-
1.To fetch *Existing CoreDNS-custom* YAML in your cluster (save it on your local for reference later), run the following command:
85
+
1.Get Existing CoreDNS-custom YAML in your cluster (save it on your local for reference later)::
86
86
87
87
```azurecli-interactive
88
88
kubectl get configmap coredns-custom -n kube-system -o yaml
89
89
```
90
90
91
-
2. To override mapping for *Central US DP* endpoint to public IP (download the YAML file attached), run the following command:
91
+
2. Override mapping for centralus DP endpoint to Public IP (use the below YAML):
Now run the below command to apply the update yaml file:
92
107
93
108
```azurecli-interactive
94
109
kubectl apply -f corednsms.yaml
@@ -200,7 +215,7 @@ These error codes appear due to issues based on the Backup extension installed i
200
215
201
216
**Cause**: During extension installation, a Backup Storage Location is to be provided as input that includes a storage account and blob container. The Backup extension should have *Storage Blob Data Contributor* role on the Backup Storage Location (storage account). The Extension Identity gets this role assigned.
202
217
203
-
**Recommended action**: The error appears if the Extension Identity doesn't have right permissions to access the storage account. This error appears if AKS backup extension is installed the first time when configuring protection operation. This happens for the time taken for the granted permissions to propagate to the AKS backup extension. As a workaround, wait an hour and retry the protection configuration. Otherwise, use Azure portal or CLI to reassign this missing permission on the storage account.
218
+
**Recommended action**: The error appears if the Extension Identity doesn't have right permissions to access the storage account. This error appears if AKS backup extension is installed the first time when configuring protection operation. This happens for the time taken for the granted permissions to propagate to the AKS backup extension. As a workaround, wait an hour and retry the protection configuration. Otherwise, use Azure portal or CLI to reassign this missing permission on the storage account.
204
219
205
220
## Vaulted backup based errors
206
221
@@ -238,7 +253,7 @@ This error code can appear while you enable AKS backup to store backups in a vau
238
253
239
254
**Cause**: There is a limited number of snapshots for a Persistent Volume that can exist at a point-in-time. For Azure Disk-based Persistent Volumes, the limit is *500 snapshots*. This error appears when snapshots for specific Persistent Volumes aren't taken due to existence of snapshots higher than the supported limits.
240
255
241
-
**Recommended action**: Update the Backup Policy to reduce the retention duration and wait for older recovery points to be deleted by the Backup vault.
256
+
**Recommended action**: Update the Backup Policy to reduce the retention duration and wait for Backup Vault to delete the older recovery points.
242
257
243
258
### CSISnapshottingTimedOut
244
259
@@ -268,15 +283,15 @@ This error code can appear while you enable AKS backup to store backups in a vau
268
283
269
284
**Error code**: UserErrorPVCHasNoVolume
270
285
271
-
**Cause**: The Persistent Volume Claim (PVC) in context does not have a Persistent Volume attached to it. So, the PVC will not be backed up.
286
+
**Cause**: The Persistent Volume Claim (PVC) in context doesn't have a Persistent Volume attached to it. So, the PVC won't be backed up.
272
287
273
288
**Recommended action**: Attach a volume to the PVC, if it needs to be backed up.
274
289
275
290
### UserErrorPVCNotBoundToVolume
276
291
277
292
**Error code**: UserErrorPVCNotBoundToVolume
278
293
279
-
**Cause**: The PVC in context is in *Pending* state and doesn't have a Persistent Volume attached to it. So, the PVC will not be backed up.
294
+
**Cause**: The PVC in context is in *Pending* state and doesn't have a Persistent Volume attached to it. So, the PVC won't be backed up.
280
295
281
296
**Recommended action**: Attach a volume to the PVC, if it needs to be backed up.
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-backup-support-matrix.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ You can use [Azure Backup](./backup-overview.md) to help protect Azure Kubernete
35
35
36
36
- AKS backups don't support in-tree volumes. You can back up only CSI driver-based volumes. You can [migrate from tree volumes to CSI driver-based persistent volumes](../aks/csi-migrate-in-tree-volumes.md).
37
37
38
-
- Currently, an AKS backup supports only the backup of Azure disk-based persistent volumes (enabled by the CSI driver). Both static and dynamically provisioned volumes are supported. For backup of static disks, the persistent volumes specification should have the *storage class* defined in the **YAML** file, otherwise such persistent volumes will be skipped from the backup operation.
38
+
- Currently, an AKS backup supports only the backup of Azure disk-based persistent volumes (enabled by the CSI driver). The supported Azure Disk SKUs are Standard HDD, Standard SSD, and Premium SSD. The disks belonging to Premium SSD v2 and Ultra Disk SKU are not supported. Both static and dynamically provisioned volumes are supported. For backup of static disks, the persistent volumes specification should have the *storage class* defined in the **YAML** file, otherwise such persistent volumes will be skipped from the backup operation.
39
39
40
40
- Azure Files shares and Azure Blob Storage persistent volumes are currently not supported by AKS backup due to lack of CSI Driver-based snapshotting capability. If you're using said persistent volumes in your AKS clusters, you can configure backups for them via the Azure Backup solutions. For more information, see [Azure file share backup](azure-file-share-backup-overview.md) and [Azure Blob Storage backup](blob-backup-overview.md).
41
41
@@ -47,7 +47,7 @@ You can use [Azure Backup](./backup-overview.md) to help protect Azure Kubernete
47
47
48
48
- You must install the backup extension in the AKS cluster. If you're using Azure CLI to install the backup extension, ensure that the version is 2.41 or later. Use `az upgrade` command to upgrade the Azure CLI.
49
49
50
-
- The blob container provided as input during installation of the backup extension should be in the same region and subscription as that of the AKS cluster.
50
+
- The blob container provided as input during installation of the backup extension should be in the same region and subscription as that of the AKS cluster. Only blob containers in a General-purpose V2 Storage Account are supported and Premium Storage Account are not supported.
51
51
52
52
- The Backup vault and the AKS cluster should be in the same region and subscription.
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-restore-using-powershell.md
+45-20Lines changed: 45 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,15 +22,39 @@ You can perform both *Original-Location Recovery (OLR)* (restoring in the AKS cl
22
22
>[!Note]
23
23
>Before you initiate a restore operation, the target cluster should have Backup Extension installed and Trusted Access enabled for the Backup vault. [Learn more](azure-kubernetes-service-cluster-backup-using-powershell.md#prepare-aks-cluster-for-backup).
24
24
25
-
Here, we've used an existing Backup vault *TestBkpVault*, under the resource group *testBkpVaultRG*, in the examples.
25
+
Initialize the variables with required details related to each resource to be used in commands:
- AKS backup allows you to restore to original AKS cluster (that was backed up) and to an alternate AKS cluster. AKS backup allows you to perform a full restore and item-level restore. You can utilize [restore configurations](#restore-to-an-aks-cluster) to define parameters based on the cluster resources that will be picked up during the restore.
57
+
- AKS backup allows you to restore to original AKS cluster (that was backed up) and to an alternate AKS cluster. AKS backup allows you to perform a full restore and item-level restore. You can utilize [restore configurations](#restore-to-an-aks-cluster) to define parameters based on the cluster resources that will be restored.
34
58
35
59
- You must [install the Backup Extension](azure-kubernetes-service-cluster-manage-backups.md#install-backup-extension) in the target AKS cluster. Also, you must [enable Trusted Access](azure-kubernetes-service-cluster-manage-backups.md#register-the-trusted-access) between the Backup vault and the AKS cluster.
36
60
@@ -43,29 +67,23 @@ For more information on the limitations and supported scenarios, see the [suppor
43
67
Fetch all instances using the `Get-AzDataProtectionBackupInstance` cmdlet and identify the relevant instance.
You can also use `Az.Resourcegraph` and `Search-AzDataProtectionBackupInstanceInAzGraph` cmdlets to search across instances in multiple vaults and subscriptions.
Once the instance is identified, fetch the relevant recovery point.
79
+
Once the instance is identified, fetch the relevant recovery point. Supposedly, from the output array of the above command, third backup instance is to be restored.
Use the `New-AzDataProtectionRestoreConfigurationClientObject` cmdlet to prepare the restore configuration and defining the items to be restored to the target AKS cluster.
2. The *User Identity* attached with the Backup Extension should have *Storage Account Contributor* roles on the *storage account* where backups are stored.
94
119
3. The *Backup vault* should have a *Reader* role on the *Target AKS cluster* and *Snapshot Resource Group*.
95
120
96
-
Now, use the `Start-AzDataProtectionBackupInstanceRestore` cmdlet to trigger the restore operation with the request prepared above.
121
+
Now, use the `Start-AzDataProtectionBackupInstanceRestore` cmdlet to trigger the restore operation with the request prepared earlier.
0 commit comments