Skip to content

Commit d77cae8

Browse files
Merge pull request #276001 from rajats22/aksbackupupdate-2205-01
update aks backup document
2 parents 361794f + 1351ea1 commit d77cae8

File tree

2 files changed

+18
-13
lines changed

2 files changed

+18
-13
lines changed

articles/backup/azure-kubernetes-service-cluster-restore.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Azure Backup now allows you to back up AKS clusters (cluster resources and persi
2121
2222
## Before you start
2323

24-
- AKS backup allows you to restore to original AKS cluster (that was backed up) and to an alternate AKS cluster. AKS backup allows you to perform a full restore and item-level restore. You can utilize [restore configurations](#restore-configurations) to define parameters based on the cluster resources that will be picked up during the restore.
24+
- AKS backup allows you to restore to original AKS cluster (that was backed up) and to an alternate AKS cluster. AKS backup allows you to perform a full restore and item-level restore. You can utilize [restore configurations](#restore-configurations) to define parameters based on the cluster resources that are to be restored.
2525

2626
- You must [install the Backup Extension](azure-kubernetes-service-cluster-manage-backups.md#install-backup-extension) in the target AKS cluster. Also, you must [enable Trusted Access](azure-kubernetes-service-cluster-manage-backups.md#register-the-trusted-access) between the Backup vault and the AKS cluster.
2727

@@ -70,12 +70,15 @@ To restore the backed-up AKS cluster, follow these steps:
7070

7171
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/select-resources-to-restore-page.png" alt-text="Screenshot shows the Select Resources to restore page.":::
7272

73-
6. If you have opted for restore from *Vault-standard datastore*, then provide a *snapshot resource group* and *storage account* as the staging location.
73+
6. If you seleted a recovery point for restore from *Vault-standard datastore*, then provide a *snapshot resource group* and *storage account* as the staging location.
7474

7575
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/restore-parameters.png" alt-text="Screenshot shows the parameters to add for restore from Vault-standard storage.":::
7676

7777
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/restore-parameter-storage.png" alt-text="Screenshot shows the storage parameter to add for restore from Vault-standard storage.":::
7878

79+
>[!Note]
80+
>Currently, resources created in the staging location can't belong within a Private Endpoint. Ensure that you enable _public access_ on the storage account provided as a staging location.
81+
7982
7. Select **Validate** to run validation on the cluster selections for restore.
8083

8184
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/validate-restore-parameters.png" alt-text="Screenshot shows the validation of restore parameters.":::
@@ -113,7 +116,7 @@ As part of item-level restore capability of AKS backup, you can utilize multiple
113116

114117
Azure Backup for AKS currently supports the following two options when doing a restore operation when resource clash happens (backed-up resource has the same name as the resource in the target AKS cluster). You can choose one of these options when defining the restore configuration.
115118

116-
- **Skip**: This option is selected by default. For example, if you have backed up a PVC named *pvc-azuredisk* and you're restoring it in a target cluster that has the PVC with the same name, then the backup extension skips restoring the backed-up persistent volume claim (PVC). In such scenarios, we recommend you to delete the resource from the cluster, and then do the restore operation so that the backed-up items are only available in the cluster and aren't skipped.
119+
- **Skip**: This option is selected by default. For example, if you backed up a PVC named *pvc-azuredisk* and you're restoring it in a target cluster that has the PVC with the same name, then the backup extension skips restoring the backed-up persistent volume claim (PVC). In such scenarios, we recommend you to delete the resource from the cluster, and then do the restore operation.
117120

118121
- **Patch**: This option allows the patching mutable variable in the backed-up resource on the resource in the target cluster. If you want to update the number of replicas in the target cluster, you can opt for patching as an operation.
119122

@@ -126,5 +129,5 @@ To restore the AKS cluster in the secondary region, [configure Geo redundancy an
126129

127130
## Next steps
128131

129-
- [Manage Azure Kubernetes Service cluster backups](azure-kubernetes-service-cluster-manage-backups.md)
132+
- [Manage Azure Kubernetes Service cluster backup](azure-kubernetes-service-cluster-manage-backups.md)
130133
- [About Azure Kubernetes Service cluster backup](azure-kubernetes-service-cluster-backup-concept.md)

articles/backup/tutorial-restore-aks-backups-across-regions.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Tutorial - Enable Vault Tier protection for AKS clusters and restore backups in secondary region using Azure Backup
2+
title: Tutorial - Enable Vault Tier protection for Azure Kubernetes Cluster (AKS) clusters and restore backups in secondary region using Azure Backup
33
description: Learn how to enable Vault Tier protection for AKS clusters and restore backups in secondary region using Azure Backup.
44
ms.topic: tutorial
55
ms.date: 12/25/2023
@@ -12,9 +12,9 @@ ms.author: v-abhmallick
1212

1313
# Tutorial: Enable Vault Tier backups for AKS and restore across regions by using Azure Backup (preview)
1414

15-
This tutorial describes how to create backups for an AKS cluster available in the Secondary Region (Azure Paired region) and perform a disaster recovery by using Cross Region Restore.
15+
This tutorial describes how to create backups for an AKS cluster stored in the Secondary Region (Azure Paired region). Then perform a Cross Region Restore to recover the AKS Cluster during regional disaster.
1616

17-
Azure Backup allows you to store AKS cluster backups in both **Operational Tier as snapshot** and **Vault Tier as blobs** (preview). This feature enables you to move snapshot-based AKS backups stored in Operational Tier to a Vault-standard Tier. You can use the backup policy, to define whether to store backups just in Operational Tier as snapshots or also protect them in Vault Tier along with Operational. Vaulted backups are stored offsite, which protects them from tenant compromise, malicious attacks, and ransomware threats. You can also retain the backup data for long term and can do Cross Region Restore by configuring the Backup vault with storage redundancy set as global and Cross Region Restore property as enabled. [Learn more](azure-kubernetes-service-backup-overview.md).
17+
Azure Backup allows you to store AKS cluster backups in both **Operational Tier as snapshot** and **Vault Tier as blobs** (preview). This feature enables you to move snapshot-based AKS backups stored in Operational Tier to a Vault-standard Tier. You can use the backup policy, to define whether to store backups just in Operational Tier as snapshots or also protect them in Vault Tier along with Operational. Vaulted backups are stored offsite, which protects them from tenant compromise, malicious attacks, and ransomware threats. You can also retain the backup data for long term. Additionally, you can perform Cross Region Restore by configuring the Backup vault with storage redundancy set as global and Cross Region Restore property enabled. [Learn more](azure-kubernetes-service-backup-overview.md).
1818

1919
## Consideration
2020

@@ -57,17 +57,16 @@ With the new backup policy, you can [configure protection for the AKS cluster](a
5757

5858
## Restore in secondary region (preview)
5959

60-
In case of primary region outage, you can use the recovery points stored in Vault Tier in secondary region to bring back the AKS cluster.
61-
60+
If there is an outage in the primary region, you can use the recovery points stored in Vault Tier in the secondary region to restore the AKS cluster.
6261
Follow these steps:
6362

6463
1. Go to **Backup center** and select **Restore**.
6564

6665
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/start-kubernetes-cluster-restore.png" alt-text="Screenshot shows how to start the restore process.":::
6766

68-
2. On the next page, click **Select backup instance**, and then select the *instance* that you want to restore.
67+
2. On the next page, select **Select backup instance**, and then select the *instance* that you want to restore.
6968

70-
In case of disaster recovery, select **Secondary Region**. This allows you to choose recovery points available in the [Azure Paired Region](../reliability/cross-region-replication-azure.md#azure-paired-regions).
69+
If a disaster occurs and there is an outage in the Primary Region, select Secondary Region. Then, it allows you to choose recovery points available in the [Azure Paired Region](../reliability/cross-region-replication-azure.md#azure-paired-regions).
7170

7271
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/select-backup-instance-for-restore.png" alt-text="Screenshot shows selection of backup instance for restore.":::
7372

@@ -93,12 +92,15 @@ Follow these steps:
9392
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/set-for-restore-after-parameter-selection.png" alt-text="Screenshot shows the Restore page with the selection of Kubernetes parameter.":::
9493

9594

96-
6. If you have opted for restore from *Vault-standard datastore*, then provide a *snapshot resource group* and *storage account* as the staging location.
95+
6. The backups stored in the Vault need to be moved to a Staging Location before being restored to the AKS Cluster. Provide a *snapshot resource group* and *storage account* as a Staging Location.
9796

9897
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/restore-parameters.png" alt-text="Screenshot shows the parameters to add for restore from Vault-standard storage.":::
9998

10099
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/restore-parameter-storage.png" alt-text="Screenshot shows the storage parameter to add for restore from Vault-standard storage.":::
101100

101+
>[!Note]
102+
>Currently, resources created in the staging location can't belong within a Private Endpoint. Ensure that you enable _public access_ on the storage account provided as a staging location.
103+
102104
7. Select **Validate** to run validation on the cluster selections for restore.
103105

104106
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/validate-restore-parameters.png" alt-text="Screenshot shows the validation of restore parameters.":::
@@ -114,4 +116,4 @@ Follow these steps:
114116

115117
> [!div class="nextstepaction"]
116118
> [Restore a backup for an AKS cluster](./azure-kubernetes-service-cluster-restore.md)
117-
> [Manage Azure Kubernetes Service cluster backups](azure-kubernetes-service-cluster-manage-backups.md)
119+
> [Manage Azure Kubernetes Service cluster backups](azure-kubernetes-service-cluster-manage-backups.md)

0 commit comments

Comments
 (0)