You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-backup-troubleshoot.md
+43-2Lines changed: 43 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -165,7 +165,7 @@ These error codes appear due to issues on the Backup Extension installed in the
165
165
166
166
**Recommended action**: The health of the extension is required to be verified via running the command `kubectl get pods -n dataprotection.microsoft`. If the pods aren't in running state, then increase the number of nodes in the cluster by *1* or increase the compute limits. Then wait for a few minutes and run the command again, which should change the state of the pods to *running*. If the issue persists, delete and reinstall the extension.
167
167
168
-
### BackupPluginPodRestartedDuringBackupError
168
+
### UserErrorBackupPluginPodRestartedDuringBackup
169
169
170
170
**Cause**: Azure Backup for AKS relies on pods deployed within the AKS cluster as part of the backup extension under the namespace `dataprotection-microsoft`. To perform backup and restore operations, these pods have specific CPU and memory requirements.
171
171
@@ -174,7 +174,7 @@ These error codes appear due to issues on the Backup Extension installed in the
174
174
2. CPU: requests - 500m, limits - 1000m
175
175
```
176
176
177
-
However, if the number of resources in the cluster exceeds 1000, the pods may require additional CPU and memory beyond the default reservation. If the required resources exceed the allocated limits, you might encounter a BackupPluginPodRestarted error due to OOMKilled (Out of Memory) error during backup jobs.
177
+
However, if the number of resources in the cluster exceeds 1000, the pods may require additional CPU and memory beyond the default reservation. If the required resources exceed the allocated limits, you might encounter a UserErrorBackupPluginPodRestartedDuringBackup error due to OOMKilled (Out of Memory) error during backup operation.
178
178
179
179
**Recommended action**: To ensure successful backup and restore operations, manually update the resource settings for the extension pods by following these steps:
180
180
@@ -198,6 +198,47 @@ However, if the number of resources in the cluster exceeds 1000, the pods may re
198
198
199
199
After applying the changes, either wait for a scheduled backup to run or initiate an on-demand backup. If you still experience an OOMKilled failure, repeat the steps above and gradually increase memory limits and if it still persists increase `resources.limits.cpu` parameter also.
200
200
201
+
> [!NOTE]
202
+
>
203
+
> If the node where the extension pod is provisioned doesn't have the required CPU or memory, and you've only updated the resource limits, the pod may be repeatedly killed. To resolve this, update the configuration settings using `resources.requests.cpu` and `resources.requests.memory`. This ensures the pod is scheduled on a node that meets the requested resource requirements.
**Cause**: Azure Backup for AKS relies on pods deployed within the AKS cluster as part of the backup extension under the namespace `dataprotection-microsoft`. To perform backup and restore operations, these pods have specific CPU and memory requirements.
208
+
209
+
```
210
+
1. Memory: requests - 128Mi, limits - 1280Mi
211
+
2. CPU: requests - 500m, limits - 1000m
212
+
```
213
+
214
+
However, if the number of resources in the cluster exceeds 1000, the pods may require additional CPU and memory beyond the default reservation. If the required resources exceed the allocated limits, you might encounter a UserErrorBackupPluginPodRestartedDuringRestore error due to OOMKilled (Out of Memory) error during restore operation.
215
+
216
+
**Recommended action**: To ensure successful backup and restore operations, manually update the resource settings for the extension pods by following these steps:
217
+
218
+
1. Open the AKS cluster in the Azure portal.
219
+
220
+

221
+
222
+
1. Navigate to Extensions + Applications under Settings in the left-hand pane.
223
+
224
+

225
+
226
+
1. Click on the extension titled "azure-aks-backup".
227
+
228
+

229
+
230
+
1. Scroll down, add new value under configuration settings and then click Save.
231
+
232
+
`resources.limits.memory : 4400Mi`
233
+
234
+

235
+
236
+
After applying the changes, either wait for a scheduled backup to run or initiate an on-demand backup. If you still experience an OOMKilled failure, repeat the steps above and gradually increase memory limits and if it still persists increase `resources.limits.cpu` parameter also.
237
+
238
+
> [!NOTE]
239
+
>
240
+
> If the node where the extension pod is provisioned doesn't have the required CPU or memory, and you've only updated the resource limits, the pod may be repeatedly killed. To resolve this, update the configuration settings using `resources.requests.cpu` and `resources.requests.memory`. This ensures the pod is scheduled on a node that meets the requested resource requirements.
241
+
201
242
### BackupPluginDeleteBackupOperationFailed
202
243
203
244
**Cause**: The Backup extension should be running to delete the backups.
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-backup-concept.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,6 +76,14 @@ To enable backup for an AKS cluster, see the following prerequisites: .
76
76
77
77
- If you have any previous installation of *Velero* in the AKS cluster, you need to delete it before installing Backup Extension.
78
78
79
+
[!NOTE]
80
+
>
81
+
>The Velero CRDs installed in the cluster are shared between AKS Backup and the customer’s own Velero installation. However, the versions used by each installation may differ, potentially leading to failures due to contractmismatches.
82
+
>
83
+
>Additionally, custom Velero configurations created by the customer—such as a VolumeSnapshotClass for Velero CSI-based snapshotting—might interfere with the AKS Backup snapshotting setup.
84
+
>
85
+
>Velero annotations containing `velero.io` applied to various resources in the cluster can also impact the behavior of AKS Backup in unsupported ways.
86
+
79
87
- If you are using [Azure policies in your AKS cluster](/azure/aks/policy-reference), ensure that the extension namespace *dataprotection-microsoft* is excluded from these policies to allow backup and restore operations to run successfully.
80
88
81
89
- If you are using Azure network security group to filter network traffic between Azure resources in an Azure virtual network then set an inbound rule to allow service tags *azurebackup* and *azurecloud*.
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-backup-support-matrix.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ You can use [Azure Backup](./backup-overview.md) to help protect Azure Kubernete
50
50
51
51
- Azure Backup for AKS is currently not supported for Network Isolated AKS clusters.
52
52
53
-
- Don't install AKS Backup Extension along with Velero or other Velero-based backup services. This could lead to disruption of backup service during any future Velero upgrades driven by you or AKS backup
53
+
- Don't install AKS Backup Extension along with Velero or other Velero-based backup services. Addtionally ensure that your Kubernetes resources does not have labels of annotations containing word `velero.io` except in recommended scenarios, otherwise this could lead to unexpected behaviour.
54
54
55
55
- You must install the backup extension in the AKS cluster. If you're using Azure CLI to install the backup extension, ensure that the version is 2.41 or later. Use `az upgrade` command to upgrade the Azure CLI.
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-backup.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,11 +18,16 @@ You can use Azure Backup to back up AKS clusters (cluster resources and persiste
18
18
19
19
Things to ensure before you configure backup for AKS cluster:
20
20
21
-
- Currently, AKS Backup supports only Azure Disk Storage-based persistent volumes enabled by CSI driver. The backups are stored in an operational datastore only (backup data is stored in your tenant and isn't moved to a vault). The Backup vault and AKS cluster must be in the same region.
21
+
- Currently, AKS Backup supports only Azure Disk Storage-based persistent volumes enabled by CSI driver. Backup data can be stored as snapshots in Operational Tier or can also be moved to Vault Tier for long term storage along with snapshots. The Backup vault and AKS cluster can be in different subscriptions within same tenant and region.
22
+
22
23
- AKS Backup uses a blob container and a resource group to store the backups. The blob container holds the AKS cluster resources. Persistent volume snapshots are stored in the resource group. The AKS cluster and the storage locations must be in the same region. Learn [how to create a blob container](../storage/blobs/storage-quickstart-blobs-portal.md#create-a-container).
24
+
23
25
- Currently, AKS Backup supports once-a-day backups. It also supports more frequent backups (in 4-hour, 8-hour, and 12-hour intervals) per day. This solution allows you to retain your data for restore for up to 360 days. Learn how to [create a backup policy](#create-a-backup-policy).
26
+
24
27
- You need to [install the Backup extension](azure-kubernetes-service-cluster-manage-backups.md#install-backup-extension) to configure backup and restore operations for an AKS cluster. Learn more [about the Backup extension](azure-kubernetes-service-cluster-backup-concept.md#backup-extension).
28
+
25
29
- Make sure you have `Microsoft.KubernetesConfiguration`, `Microsoft.DataProtection`, and `Microsoft.ContainerService` registered for your subscription before you initiate backup configuration and restore operations.
30
+
26
31
- Make sure you complete [all prerequisites](azure-kubernetes-service-cluster-backup-concept.md) before you initiate a backup or restore operation for AKS Backup.
27
32
28
33
For more information on supported scenarios, limitations, and availability, see the [support matrix](azure-kubernetes-service-cluster-backup-support-matrix.md).
@@ -130,11 +135,15 @@ Azure Backup for AKS allows you to define the application boundary within AKS cl
130
135
1. Expand **Additional Resource Settings** to see filters that you can use to choose cluster resources to back up. You can choose to back up resources based on the following categories:
131
136
132
137
-**Labels**: You can filter AKS resources by using [labels](https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/) that you assign to types of resources. Enter labels in the form of key/value pairs. You can combine multiple labels using `AND` logic. For example, if you enter the labels `env=prod;tier!=web`, the process selects resources that have a label with the `env` key and the `prod` value, and a label with the `tier` key for which the value isn't `web`.
138
+
133
139
-**API groups**: You can also include resources by providing the AKS API group and kind. For example, you can choose for backup AKS resources like Deployments. You can access the list of Kubernetes defined API Groups [here](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.30/).
140
+
134
141
-**Other options**: You can enable or disable backup for cluster-scoped resources, persistent volumes, and secrets. Cluster-scoped resources and persistent volumes are enabled by default.
135
142
136
143
> [!NOTE]
137
144
> You should add the labels to every single YAML file that is deployed and to be backed up. This includes namespace-scoped resources like persistent volume claims, and cluster-scoped resources like persistent volumes.
145
+
>
146
+
> If you want to exclude specific Persistent Volume Claims from your backups, add the annotation `velero.io/exclude-from-backup=true`. This Velero annotation is supported by Azure Backup for AKS.
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-manage-backups.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,11 +113,11 @@ Azure Backup for AKS relies on pods deployed within the AKS cluster as part of t
113
113
#### Default Resource Reservations
114
114
115
115
```
116
-
1. Memory: requests - 128Mi, limits - 1280Mi
116
+
1. Memory: requests - 256Mi, limits - 1280Mi
117
117
2. CPU: requests - 500m, limits - 1000m
118
118
```
119
119
120
-
However, if the number of resources in the cluster exceeds 1000, the pods may require additional CPU and memory beyond the default reservation. If the required resources exceed the allocated limits, you might encounter a BackupPluginPodRestarted error due to OOMKilled (Out of Memory) error during backup jobs.
120
+
However, if the number of resources in the cluster exceeds 1000, the extension pod `dataprotection-microsoft-kubernetes-agent`may require additional CPU and memory beyond the default reservation. If the required resources exceed the allocated limits, you might encounter a UserErrorBackupPluginPodRestartedDuringBackup or UserErrorBackupPluginPodRestartedDuringRestore error due to OOMKilled (Out of Memory) error during backup or restore operation.
121
121
122
122
#### Resolving OOMKilled Errors by Increasing CPU and Memory
123
123
@@ -141,6 +141,11 @@ To ensure successful backup and restore operations, manually update the resource
141
141
142
142

143
143
144
+
> [!NOTE]
145
+
>
146
+
> If the node where the extension pod is provisioned doesn't have the required CPU or memory, and you've only updated the resource limits, the pod may be repeatedly killed. To resolve this, update the configuration settings using `resources.requests.cpu` and `resources.requests.memory`. This ensures the pod is scheduled on a node that meets the requested resource requirements.
147
+
148
+
144
149
#### Verifying the Changes
145
150
146
151
After applying the changes, either wait for a scheduled backup to run or initiate an on-demand backup. If you still experience an OOMKilled failure, repeat the steps above and gradually increase memory limits and if it still persists increase `resources.limits.cpu` parameter also.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-database-postgresql-support-matrix.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Azure Database for PostgreSQL server backup is available in all regions, except
26
26
27
27
## Feature considerations and limitations
28
28
29
-
-Recommended limit for the maximum database size is 400 GB.
29
+
-The maximum supported database size is 400GB, which is a hard limit for a single server..
30
30
- Cross-region backup isn't supported. Therefore, you can't back up an Azure PostgreSQL server to a vault in another region. Similarly, you can only restore a backup to a server within the same region as the vault. However, we support cross-subscription backup and restore.
31
31
- Private endpoint-enabled Azure PostgreSQL servers can be backed up by allowing trusted Microsoft services in the network settings.
32
32
- Only the data is recovered during restore; _roles_ aren't restored.
Copy file name to clipboardExpand all lines: articles/backup/manage-backup-vault.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,13 +24,13 @@ This section explains how to use the Backup vault **Overview** dashboard to moni
24
24
25
25
### Manage Backup instances
26
26
27
-
In the **Jobs** tile, you get a summarized view of all backup and restore related jobs in your Backup vault. Selecting any of the numbers in this tile allows you to view more information on jobs for a particular datasource type, operation type, and status.
27
+
In the **Backup Instances** tile, you get a summarized view of all backup instances in your Backup vault. Selecting any of the numbers in this tile allows you to view more information on backup instances for a particular datasource typeand protection status.
28
28
29
29
:::image type="content" source="./media/backup-vault-overview/backup-instances.png" alt-text="Screenshot shows the Backup instances.":::
30
30
31
31
### Manage Backup jobs
32
32
33
-
In the **Backup Instances** tile, you get a summarized view of all backup instances in your Backup vault. Selecting any of the numbers in this tile allows you to view more information on backup instances for a particular datasource type and protection status.
33
+
In the **Jobs** tile, you get a summarized view of all backup and restore related jobs in your Backup vault. Selecting any of the numbers in this tile allows you to view more information on jobs for a particular datasource type, operation type, and status.
34
34
35
35
:::image type="content" source="./media/backup-vault-overview/backup-jobs.png" alt-text="Screenshot shows the Backup jobs.":::
*[Create a random value for the Azure resource group name](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/pet) using random_pet.
@@ -210,14 +214,16 @@ To implement the Terraform code for AKS backup flow, run the following scripts:
0 commit comments