You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-restore.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Azure Backup now allows you to back up AKS clusters (cluster resources and persi
21
21
22
22
## Before you start
23
23
24
-
- AKS backup allows you to restore to original AKS cluster (that was backed up) and to an alternate AKS cluster. AKS backup allows you to perform a full restore and item-level restore. You can utilize [restore configurations](#restore-configurations) to define parameters based on the cluster resources that will be picked up during the restore.
24
+
- AKS backup allows you to restore to original AKS cluster (that was backed up) and to an alternate AKS cluster. AKS backup allows you to perform a full restore and item-level restore. You can utilize [restore configurations](#restore-configurations) to define parameters based on the cluster resources that are to be restored.
25
25
26
26
- You must [install the Backup Extension](azure-kubernetes-service-cluster-manage-backups.md#install-backup-extension) in the target AKS cluster. Also, you must [enable Trusted Access](azure-kubernetes-service-cluster-manage-backups.md#register-the-trusted-access) between the Backup vault and the AKS cluster.
27
27
@@ -70,12 +70,15 @@ To restore the backed-up AKS cluster, follow these steps:
70
70
71
71
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/select-resources-to-restore-page.png" alt-text="Screenshot shows the Select Resources to restore page.":::
72
72
73
-
6. If you have opted for restore from *Vault-standard datastore*, then provide a *snapshot resource group* and *storage account* as the staging location.
73
+
6. If you seleted a recovery point for restore from *Vault-standard datastore*, then provide a *snapshot resource group* and *storage account* as the staging location.
74
74
75
75
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/restore-parameters.png" alt-text="Screenshot shows the parameters to add for restore from Vault-standard storage.":::
76
76
77
77
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/restore-parameter-storage.png" alt-text="Screenshot shows the storage parameter to add for restore from Vault-standard storage.":::
78
78
79
+
>[!Note]
80
+
>Currently, resources created in the staging location can't belong within a Private Endpoint. Ensure that you enable _public access_ on the storage account provided as a staging location.
81
+
79
82
7. Select **Validate** to run validation on the cluster selections for restore.
80
83
81
84
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/validate-restore-parameters.png" alt-text="Screenshot shows the validation of restore parameters.":::
@@ -113,7 +116,7 @@ As part of item-level restore capability of AKS backup, you can utilize multiple
113
116
114
117
Azure Backup for AKS currently supports the following two options when doing a restore operation when resource clash happens (backed-up resource has the same name as the resource in the target AKS cluster). You can choose one of these options when defining the restore configuration.
115
118
116
-
-**Skip**: This option is selected by default. For example, if you have backed up a PVC named *pvc-azuredisk* and you're restoring it in a target cluster that has the PVC with the same name, then the backup extension skips restoring the backed-up persistent volume claim (PVC). In such scenarios, we recommend you to delete the resource from the cluster, and then do the restore operation so that the backed-up items are only available in the cluster and aren't skipped.
119
+
-**Skip**: This option is selected by default. For example, if you backed up a PVC named *pvc-azuredisk* and you're restoring it in a target cluster that has the PVC with the same name, then the backup extension skips restoring the backed-up persistent volume claim (PVC). In such scenarios, we recommend you to delete the resource from the cluster, and then do the restore operation.
117
120
118
121
-**Patch**: This option allows the patching mutable variable in the backed-up resource on the resource in the target cluster. If you want to update the number of replicas in the target cluster, you can opt for patching as an operation.
119
122
@@ -126,5 +129,5 @@ To restore the AKS cluster in the secondary region, [configure Geo redundancy an
126
129
127
130
## Next steps
128
131
129
-
-[Manage Azure Kubernetes Service cluster backups](azure-kubernetes-service-cluster-manage-backups.md)
132
+
-[Manage Azure Kubernetes Service cluster backup](azure-kubernetes-service-cluster-manage-backups.md)
130
133
-[About Azure Kubernetes Service cluster backup](azure-kubernetes-service-cluster-backup-concept.md)
Copy file name to clipboardExpand all lines: articles/backup/tutorial-restore-aks-backups-across-regions.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Tutorial - Enable Vault Tier protection for AKS clusters and restore backups in secondary region using Azure Backup
2
+
title: Tutorial - Enable Vault Tier protection for Azure Kubernetes Cluster (AKS) clusters and restore backups in secondary region using Azure Backup
3
3
description: Learn how to enable Vault Tier protection for AKS clusters and restore backups in secondary region using Azure Backup.
4
4
ms.topic: tutorial
5
5
ms.date: 12/25/2023
@@ -12,9 +12,9 @@ ms.author: v-abhmallick
12
12
13
13
# Tutorial: Enable Vault Tier backups for AKS and restore across regions by using Azure Backup (preview)
14
14
15
-
This tutorial describes how to create backups for an AKS cluster available in the Secondary Region (Azure Paired region) and perform a disaster recovery by using Cross Region Restore.
15
+
This tutorial describes how to create backups for an AKS cluster stored in the Secondary Region (Azure Paired region). Then perform a Cross Region Restore to recover the AKS Cluster during regional disaster.
16
16
17
-
Azure Backup allows you to store AKS cluster backups in both **Operational Tier as snapshot** and **Vault Tier as blobs** (preview). This feature enables you to move snapshot-based AKS backups stored in Operational Tier to a Vault-standard Tier. You can use the backup policy, to define whether to store backups just in Operational Tier as snapshots or also protect them in Vault Tier along with Operational. Vaulted backups are stored offsite, which protects them from tenant compromise, malicious attacks, and ransomware threats. You can also retain the backup data for long term and can do Cross Region Restore by configuring the Backup vault with storage redundancy set as global and Cross Region Restore property as enabled. [Learn more](azure-kubernetes-service-backup-overview.md).
17
+
Azure Backup allows you to store AKS cluster backups in both **Operational Tier as snapshot** and **Vault Tier as blobs** (preview). This feature enables you to move snapshot-based AKS backups stored in Operational Tier to a Vault-standard Tier. You can use the backup policy, to define whether to store backups just in Operational Tier as snapshots or also protect them in Vault Tier along with Operational. Vaulted backups are stored offsite, which protects them from tenant compromise, malicious attacks, and ransomware threats. You can also retain the backup data for long term. Additionally, you can perform Cross Region Restore by configuring the Backup vault with storage redundancy set as global and Cross Region Restore property enabled. [Learn more](azure-kubernetes-service-backup-overview.md).
18
18
19
19
## Consideration
20
20
@@ -57,17 +57,16 @@ With the new backup policy, you can [configure protection for the AKS cluster](a
57
57
58
58
## Restore in secondary region (preview)
59
59
60
-
In case of primary region outage, you can use the recovery points stored in Vault Tier in secondary region to bring back the AKS cluster.
61
-
60
+
If there is an outage in the primary region, you can use the recovery points stored in Vault Tier in the secondary region to restore the AKS cluster.
62
61
Follow these steps:
63
62
64
63
1. Go to **Backup center** and select **Restore**.
65
64
66
65
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/start-kubernetes-cluster-restore.png" alt-text="Screenshot shows how to start the restore process.":::
67
66
68
-
2. On the next page, click**Select backup instance**, and then select the *instance* that you want to restore.
67
+
2. On the next page, select**Select backup instance**, and then select the *instance* that you want to restore.
69
68
70
-
In case of disaster recovery, select **Secondary Region**. This allows you to choose recovery points available in the [Azure Paired Region](../reliability/cross-region-replication-azure.md#azure-paired-regions).
69
+
If a disaster occurs and there is an outage in the Primary Region, select Secondary Region. Then, it allows you to choose recovery points available in the [Azure Paired Region](../reliability/cross-region-replication-azure.md#azure-paired-regions).
71
70
72
71
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/select-backup-instance-for-restore.png" alt-text="Screenshot shows selection of backup instance for restore.":::
73
72
@@ -93,12 +92,15 @@ Follow these steps:
93
92
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/set-for-restore-after-parameter-selection.png" alt-text="Screenshot shows the Restore page with the selection of Kubernetes parameter.":::
94
93
95
94
96
-
6.If you have opted for restore from *Vault-standard datastore*, then provide a *snapshot resource group* and *storage account* as the staging location.
95
+
6.The backups stored in the Vault need to be moved to a Staging Location before being restored to the AKS Cluster. Provide a *snapshot resource group* and *storage account* as a Staging Location.
97
96
98
97
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/restore-parameters.png" alt-text="Screenshot shows the parameters to add for restore from Vault-standard storage.":::
99
98
100
99
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/restore-parameter-storage.png" alt-text="Screenshot shows the storage parameter to add for restore from Vault-standard storage.":::
101
100
101
+
>[!Note]
102
+
>Currently, resources created in the staging location can't belong within a Private Endpoint. Ensure that you enable _public access_ on the storage account provided as a staging location.
103
+
102
104
7. Select **Validate** to run validation on the cluster selections for restore.
103
105
104
106
:::image type="content" source="./media/azure-kubernetes-service-cluster-restore/validate-restore-parameters.png" alt-text="Screenshot shows the validation of restore parameters.":::
@@ -114,4 +116,4 @@ Follow these steps:
114
116
115
117
> [!div class="nextstepaction"]
116
118
> [Restore a backup for an AKS cluster](./azure-kubernetes-service-cluster-restore.md)
117
-
> [Manage Azure Kubernetes Service cluster backups](azure-kubernetes-service-cluster-manage-backups.md)
119
+
> [Manage Azure Kubernetes Service cluster backups](azure-kubernetes-service-cluster-manage-backups.md)
0 commit comments