@@ -3,7 +3,7 @@ title: Manage Azure Kubernetes Service (AKS) backups using Azure Backup
3
3
description : This article explains how to manage Azure Kubernetes Service (AKS) backups using Azure Backup.
4
4
ms.topic : how-to
5
5
ms.service : backup
6
- ms.date : 03/27 /2023
6
+ ms.date : 04/21 /2023
7
7
author : jyothisuri
8
8
ms.author : jsuri
9
9
---
@@ -82,23 +82,23 @@ This section provides the set of Azure CLI commands to perform create, update, o
82
82
To install the Backup Extension, run the following command:
83
83
84
84
``` azurecli-interactive
85
- az k8s-extension create --name azure-aks-backup --extension-type Microsoft.DataProtection.Kubernetes --scope cluster --cluster-type managedClusters --cluster-name aksclustername --resource-group aksclusterrg --release-train stable --configuration-settings blobContainer=containername storageAccount=storageaccountname storageAccountResourceGroup=storageaccountrg storageAccountSubscriptionId=subscriptionid
85
+ az k8s-extension create --name azure-aks-backup --extension-type Microsoft.DataProtection.Kubernetes --scope cluster --cluster-type managedClusters --cluster-name < aksclustername> --resource-group < aksclusterrg> --release-train stable --configuration-settings blobContainer=< containername> storageAccount=< storageaccountname> storageAccountResourceGroup=< storageaccountrg> storageAccountSubscriptionId=< subscriptionid>
86
86
```
87
87
88
88
### View Backup Extension installation status
89
89
90
90
To view the progress of Backup Extension installation, use the following command:
91
91
92
92
``` azurecli-interactive
93
- az k8s-extension show --name azure-aks-backup --cluster-type managedClusters --cluster-name aksclustername --resource-group aksclusterrg
93
+ az k8s-extension show --name azure-aks-backup --cluster-type managedClusters --cluster-name < aksclustername> --resource-group < aksclusterrg>
94
94
```
95
95
96
96
### Update resources in Backup Extension
97
97
98
98
To update blob container, CPU, and memory in the Backup Extension, use the following command:
99
99
100
100
``` azurecli-interactive
101
- az k8s-extension update --name azure-aks-backup --cluster-type managedClusters --cluster-name aksclustername --resource-group aksclusterrg --release-train stable --configuration-settings [blobContainer=containername storageAccount=storageaccountname storageAccountResourceGroup=storageaccountrg storageAccountSubscriptionId=subscriptionid] [cpuLimit=1] [memoryLimit=1Gi]
101
+ az k8s-extension update --name azure-aks-backup --cluster-type managedClusters --cluster-name < aksclustername> --resource-group < aksclusterrg> --release-train stable --configuration-settings [blobContainer=< containername> storageAccount=< storageaccountname> storageAccountResourceGroup=< storageaccountrg> storageAccountSubscriptionId=< subscriptionid> ] [cpuLimit=1] [memoryLimit=1Gi]
102
102
103
103
[]: denotes the 3 different sub-groups of updates possible (discard the brackets while using the command)
104
104
@@ -109,15 +109,15 @@ To update blob container, CPU, and memory in the Backup Extension, use the follo
109
109
To stop the Backup Extension install operation, use the following command:
110
110
111
111
``` azurecli-interactive
112
- az k8s-extension delete --name azure-aks-backup --cluster-type managedClusters --cluster-name aksclustername --resource-group aksclusterrg
112
+ az k8s-extension delete --name azure-aks-backup --cluster-type managedClusters --cluster-name < aksclustername> --resource-group < aksclusterrg>
113
113
```
114
114
115
115
### Grant permission on storage account
116
116
117
117
To provide * Storage Account Contributor Permission* to the Extension Identity on storage account, run the following command:
118
118
119
119
``` azurecli-interactive
120
- az role assignment create --assignee-object-id $(az k8s-extension show --name azure-aks-backup --cluster-name aksclustername --resource-group aksclusterresourcegroup --cluster-type managedClusters --query aksAssignedIdentity .principalId --output tsv) --role 'Storage Account Contributor' --scope /subscriptions/subscriptionid/resourceGroups/storageaccountresourcegroup /providers/Microsoft.Storage/storageAccounts/storageaccountname
120
+ az role assignment create --assignee-object-id $(az k8s-extension show --name azure-aks-backup --cluster-name < aksclustername> --resource-group <aksclusterrg> --cluster-type managedClusters --query identity .principalId --output tsv) --role 'Storage Account Contributor' --scope /subscriptions/< subscriptionid> /resourceGroups/<storageaccountrg> /providers/Microsoft.Storage/storageAccounts/< storageaccountname>
121
121
```
122
122
123
123
@@ -127,12 +127,11 @@ To enable Trusted Access between Backup vault and AKS cluster, use the following
127
127
128
128
``` azurecli-interactive
129
129
az aks trustedaccess rolebinding create \
130
- -g $myResourceGroup \
131
- --cluster-name $myAKSCluster
132
- –n <randomRoleBindingName> \
133
- -s <vaultID > \
130
+ --resource-group <backupvaultrg> \
131
+ --cluster-name <aksclustername> \
132
+ --name <randomRoleBindingName> \
133
+ --source-resource-id /subscriptions/<subscriptionid>/resourcegroups/<backupvaultrg>/providers/Microsoft.DataProtection/BackupVaults/<backupvaultname > \
134
134
--roles Microsoft.DataProtection/backupVaults/backup-operator
135
-
136
135
```
137
136
138
137
Learn more about [ other commands related to Trusted Access] ( ../aks/trusted-access-feature.md#trusted-access-feature-overview ) .
@@ -141,4 +140,4 @@ Learn more about [other commands related to Trusted Access](../aks/trusted-acces
141
140
142
141
- [ Back up Azure Kubernetes Service cluster (preview)] ( azure-kubernetes-service-cluster-backup.md )
143
142
- [ Restore Azure Kubernetes Service cluster (preview)] ( azure-kubernetes-service-cluster-restore.md )
144
- - [ Supported scenarios for backing up Azure Kubernetes Service cluster (preview)] ( azure-kubernetes-service-cluster-backup-support-matrix.md )
143
+ - [ Supported scenarios for backing up Azure Kubernetes Service cluster (preview)] ( azure-kubernetes-service-cluster-backup-support-matrix.md )
0 commit comments