Skip to content

Commit 80e00e6

Browse files
committed
Merge branch 'aksbackup26082024' of https://github.com/rajats22/azure-docs-pr into aksbackup26082024
2 parents b4f33a2 + 2a71553 commit 80e00e6

18 files changed

+122
-123
lines changed

articles/backup/azure-kubernetes-service-backup-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ After the Backup extension is installed and Trusted Access is enabled, you can c
3535
The backup solution enables the backup operations for your AKS datasources that are deployed in the cluster and for the data that's stored in the persistent volume for the cluster, and then store the backups in a blob container. The disk-based persistent volumes are backed up as disk snapshots in a snapshot resource group. The snapshots and cluster state in a blob both combine to form a recovery point that is stored in your tenant called Operational Tier. You can also convert backups (first successful backup in a day, week, month, or year) in the Operational Tier to blobs, and then move them to a Vault (outside your tenant) once a day.
3636

3737
> [!NOTE]
38-
> Currently, Azure Backup supports only persistent volumes in CSI driver-based Azure Disk Storage. During backups, the solution skips other persistent volume types, such as Azure File Share and blobs. Also, backups are eligible to be moved to the vault if the persistent volumes are of size less than or equal to 1 TB.
38+
> Currently, Azure Backup supports only persistent volumes in CSI driver-based Azure Disk Storage. During backups, the solution skips other persistent volume types, such as Azure File Share and blobs. Also, if you have defined retention rules for Vault tier then backups are only eligible to be moved to the vault if the persistent volumes are of size less than or equal to 1 TB.
3939
4040
## Configure backup
4141

@@ -438,7 +438,7 @@ You incur charges for:
438438

439439
- **Snapshot fee**: Azure Backup for AKS protects a disk-based persistent volume by taking snapshots that are stored in the resource group in your Azure subscription. These snapshots incur snapshot storage charges. Because the snapshots aren't copied to the Backup vault, backup storage cost doesn't apply. For more information on the snapshot pricing, see [Managed Disk pricing](https://azure.microsoft.com/pricing/details/managed-disks/).
440440

441-
- **Backup Storage fee**: Azure Backup for AKS also supports storing backups in Vault Tier. This can be achieved by defining retention rules for **vault-standard** in the backup policy, with one restore point per day elligible to be moved into the Vault. Restore points stored in the Vault Tier are charged a separate fees called Backup Storage fee as per the total data stored (in GBs) and redundancy type enable on the Backup Vault.
441+
- **Backup Storage fee**: Azure Backup for AKS also supports storing backups in Vault Tier. This can be achieved by defining retention rules for **vault-standard** in the backup policy, with one restore point per day eligible to be moved into the Vault. Restore points stored in the Vault Tier are charged a separate fee called Backup Storage fee as per the total data stored (in GBs) and redundancy type enable on the Backup Vault.
442442

443443

444444
## Next step

articles/backup/azure-kubernetes-service-backup-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -349,7 +349,7 @@ These error codes can appear while you enable AKS backup to store backups in a v
349349

350350
**Cause**: To perform a restore operation, user needs to have a **read** permission over the backed up AKS cluster.
351351

352-
**Recommended action**: Assign Reader role over the source AKS cluster and then proceed to perform the restore operation.
352+
**Recommended action**: Assign Reader role on the source AKS cluster and then proceed to perform the restore operation.
353353

354354
## Next steps
355355

articles/backup/azure-kubernetes-service-cluster-backup-concept.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,7 @@ Your Azure resources access AKS clusters through the AKS regional gateway using
5050

5151
For AKS backup, the Backup vault accesses your AKS clusters via Trusted Access to configure backups and restores. The Backup vault is assigned a predefined role **Microsoft.DataProtection/backupVaults/backup-operator** in the AKS cluster, allowing it to only perform specific backup operations.
5252

53-
To enable Trusted Access between a Backup vault and an AKS cluster, you must register the `TrustedAccessPreview` feature flag on `Microsoft.ContainerService` at the subscription level. Learn more [to register the resource provider](azure-kubernetes-service-cluster-manage-backups.md#enable-the-feature-flag).
54-
55-
Learn [how to enable Trusted Access](azure-kubernetes-service-cluster-manage-backups.md#register-the-trusted-access).
53+
To enable Trusted Access between a Backup vault and an AKS cluster. Learn [how to enable Trusted Access](azure-kubernetes-service-cluster-manage-backups.md#trusted-access-related-operations)
5654

5755
>[!Note]
5856
>- You can install the Backup Extension on your AKS cluster directly from the Azure portal under the *Backup* section in AKS portal.
Lines changed: 34 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Audit and Enforce Backup Operations for Azure Kubernetes Service clusters using Azure Policy
2+
title: Audit and enforce backup operations for Azure Kubernetes Service clusters using Azure Policy
33
description: 'An article describing how to use Azure Policy to audit and enforce backup operations for all Azure Kubernetes Service clusters created in a given scope'
44
ms.topic: how-to
55
ms.date: 08/26/2024
@@ -8,19 +8,19 @@ author: AbhishekMallick-MS
88
ms.author: v-abhmallick
99
---
1010

11-
# Audit and Enforce Backup Operations for Azure Kubernetes Service clusters using Azure Policy
11+
# Audit and enforce backup operations for Azure Kubernetes Service clusters using Azure Policy
1212

1313
One of the key responsibilities of a Backup or Compliance Admin in an organization is to ensure that all business-critical machines are backed up with the appropriate retention.
1414

15-
Today, Azure Backup provides various built-in policies (using [Azure Policy](../governance/policy/overview.md)) to help you automatically ensure that your Azure Kubernetes Service clusters are prepped for backup configuration. Depending on how your backup teams and resources are organized, you can use any one of the below policies:
15+
Azure Backup provides various built-in policies (using [Azure Policy](../governance/policy/overview.md)) to help you automatically ensure that your Azure Kubernetes Service clusters are ready for backup configuration. Depending on how your backup teams and resources are organized, you can use any one of the below policies:
1616

1717
## Policy 1 - Azure Backup Extension should be installed in AKS clusters
1818

19-
It is an [audit-only](../governance/policy/concepts/effects.md#audit) policy. This policy identifies which AKS clusters don't have backup extension installed but doesn't automatically install backup extension for these AKS clusters. It is useful when you're only looking to evaluate the overall preparedness of the AKS clusters for backup compliance but not looking to take action immediately.
19+
Use this [audit-only](../governance/policy/concepts/effects.md#audit) policy to identify the AKS clusters that don't have the backup extension installed. However, this policy doesn't automatically install the backup extension to these AKS clusters. It's useful only to evaluate the overall readiness of the AKS clusters for backup compliance, and not to take action immediately.
2020

2121
## Policy 2 - Azure Backup should be enabled for AKS clusters
2222

23-
It is an [audit-only](../governance/policy/concepts/effects.md#audit) policy. This policy identifies which clusters don't have backup enabled but doesn't automatically configure backups for these clusters. It's useful when you're only looking to evaluate the overall compliance of the clusters but not looking to take action immediately.
23+
Use this [audit-only](../governance/policy/concepts/effects.md#audit) policy to identify the clusters that don't have backups enabled. However, this policy doesn't automatically configure backups for these clusters. It's useful only to evaluate the overall compliance of the clusters, and not to take action immediately.
2424

2525
## Policy 3 - Install Azure Backup Extension in AKS clusters (Managed Cluster) with a given tag.
2626

@@ -32,6 +32,8 @@ A central backup team in an organization can use this policy to install backup e
3232

3333
## Supported Scenarios
3434

35+
Before you audit and enforce backups for AKS clusters, see the following scenarios supported:
36+
3537
* The built-in policy is currently supported only for Azure Kubernetes Service clusters.
3638

3739
* Users must take care to ensure that the necessary [prerequisites](azure-kubernetes-service-cluster-backup-concept.md#Backup Extension) are enabled before Policies 3 and 4 are assigned.
@@ -42,26 +44,40 @@ A central backup team in an organization can use this policy to install backup e
4244

4345
## Using the built-in policies
4446

45-
The below steps describe the end-to-end process of assigning Policy 3: **Install Azure Backup Extension in AKS clusters (Managed Cluster) with a given tag**. Similar instructions apply for the other policies. Once assigned, any new AKS cluster created under this scope has backup extension installed automatically.
47+
This section describes the end-to-end process of assigning Policy 3: **Install Azure Backup Extension in AKS clusters (Managed Cluster) with a given tag**. Similar instructions apply for the other policies. Once assigned, any new AKS cluster created under this scope has backup extension installed automatically.
48+
49+
To assign Policy 3, follow these steps:
4650

4751
1. Sign in to the Azure portal and navigate to the **Policy** Dashboard.
52+
4853
2. Select **Definitions** in the left menu to get a list of all built-in policies across Azure Resources.
54+
4955
3. Filter the list for **Category=Backup** and select the policy named *Install Azure Backup Extension in AKS clusters (Managed Cluster) with a given tag*.
50-
:::image type="content" source="./media/azure-kubernetes-service-cluster-backup-policy/policy-dashboard-inline.png" alt-text="Screenshot showing how to filter the list by category on Policy dashboard." lightbox="./media/backup-azure-auto-enable-backup/policy-dashboard-expanded.png":::
51-
4. Select the name of the policy. You're then redirected to the detailed definition for this policy.
52-
![Screenshot showing the Policy Definition pane.](./media/azure-kubernetes-service-cluster-backup-policy/policy-definition-blade.png)
53-
5. Select the **Assign** button at the top of the pane. This redirects you to the **Assign Policy** pane.
54-
6. Under **Basics**, select the three dots next to the **Scope** field. It opens up a right context pane where you can select the subscription for the policy to be applied on. You can also optionally select a resource group, so that the policy is applied only for AKS clusters in a particular resource group.
55-
![Screenshot showing the Policy Assignment Basics tab.](./media/azure-kubernetes-service-cluster-backup-policy/policy-assignment-basics.png)
56-
7. In the **Parameters** tab, choose a location from the drop-down, and select the storage account to which the backup extension installed in the AKS cluster in the scope must be associated. You can also choose to specify a tag name and an array of tag values. An AKS cluster that contains any of the specified values for the given tag are excluded from the scope of the policy assignment.
57-
![Screenshot showing the Policy Assignment Parameters pane.](./media/azure-kubernetes-service-cluster-backup-policy/policy-assignment-parameters.png)
58-
8. Ensure that **Effect** is set to deployIfNotExists.
59-
9. Navigate to **Review+create** and select **Create**.
56+
57+
:::image type="content" source="./media/azure-kubernetes-service-cluster-backup-policy/policy-dashboard-inline.png" alt-text="Screenshot showing how to filter the list by category on Policy dashboard." lightbox="./media/azure-kubernetes-service-cluster-backup-policy/policy-dashboard-inline.png":::
58+
59+
5. Select the name of the policy. You're then redirected to the detailed definition for this policy.
60+
61+
:::image type="content" source="./media/azure-kubernetes-service-cluster-backup-policy/policy-definition-blade.png" alt-text="Screenshot showing the Policy Definition tab." lightbox="./media/azure-kubernetes-service-cluster-backup-policy/policy-definition-blade.png":::
62+
63+
7. Select the **Assign** button at the top of the pane. This redirects you to the **Assign Policy** pane.
64+
65+
8. Under **Basics**, select the three dots next to the **Scope** field. It opens up a right context pane where you can select the subscription for the policy to be applied on. You can also optionally select a resource group, so that the policy is applied only for AKS clusters in a particular resource group.
66+
67+
:::image type="content" source="media/azure-kubernetes-service-cluster-backup-policy/policy-assignment-basics.png" alt-text="Screenshot showing the Policy Assignment Basics tab." lightbox="media/azure-kubernetes-service-cluster-backup-policy/policy-assignment-basics.png":::
68+
69+
8. In the **Parameters** tab, choose a location from the drop-down, and select the storage account to which the backup extension installed in the AKS cluster in the scope must be associated. You can also choose to specify a tag name and an array of tag values. An AKS cluster that contains any of the specified values for the given tag are excluded from the scope of the policy assignment.
70+
71+
:::image type="content" source="./media/azure-kubernetes-service-cluster-backup-policy/policy-assignment-parameters.png" alt-text="Screenshot showing the Policy Assignment Parameters pane." lightbox="./media/azure-kubernetes-service-cluster-backup-policy/policy-assignment-parameters.png":::
72+
73+
10. Ensure that **Effect** is set to deployIfNotExists.
74+
75+
11. Navigate to **Review+create** and select **Create**.
6076

6177
> [!NOTE]
6278
>
63-
> - Azure Policy can also be used on existing AKS clusters, using [remediation](../governance/policy/how-to/remediate-resources.md).
79+
> - Use [remediation](../governance/policy/how-to/remediate-resources.md) to enable these policies on existing AKS clusters.
6480
6581
## Next step
6682

67-
[Learn more about Azure Policy](../governance/policy/overview.md)
83+
[Learn more about Azure Policy](../governance/policy/overview.md)

0 commit comments

Comments
 (0)