You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/patterns/ansible-edge-gitops-kasten/_index.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,5 @@
1
1
---
2
2
title: OpenShift Virtualization Data Protection with Veeam Kasten
3
-
date: 2024-10-28
4
3
tier: sandbox
5
4
summary: This pattern uses OpenShift Virtualization to simulate an edge environment for VMs, protected by Veeam Kasten.
6
5
rh_products:
@@ -26,7 +25,7 @@ links:
26
25
27
26
## Background
28
27
29
-
Organizations are interested in accelerating their deployment speeds and improving delivery quality in their Edge environments, where many devices may not fully or even partially embrace the GitOps philosophy. Further, there are VMs and other devices that can and should be managed with Ansible. This pattern explores some of the possibilities of using an OpenShift-based Ansible Automated Platform deployment and managing edge devices, based on work done with a partner in the Chemical space.
28
+
This example extends the standard [Ansible Edge GitOps pattern](https://validatedpatterns.io/patterns/ansible-edge-gitops/) to include automated deployment and configuration of [Veeam Kasten](https://www.veeam.com/products/cloud/kubernetes-data-protection.html), the #1 Kubernetes data protection and mobility solution.
30
29
31
30
This pattern uses **Red Hat OpenShift Virtualization** (the productization of KubeVirt) to provision VMs alongside Kubernetes-native workloads on the cluster. As VMs are inherently stateful workloads, a GitOps approach alone is not sufficient to recover an environment in the event of accidental data loss, malware attack, or infrastructure failure - especially in edge environments where infrastructure may be less resilient or subject to harsh environments. This example extends the standard [Ansible Edge GitOps pattern](https://validatedpatterns.io/patterns/ansible-edge-gitops/) to include automated deployment and configuration of [Veeam Kasten](https://www.veeam.com/products/cloud/kubernetes-data-protection.html), the #1 Kubernetes data protection and mobility solution.
# Deploying the OpenShift Virtualization Data Protection Pattern
8
8
9
9
# General Prerequisites
10
10
@@ -28,7 +28,7 @@ In addition to the OpenShift cluster, you will need to prepare a number of secre
28
28
in the pattern in various ways. To do this, copy the [values-secret.yaml template](https://github.com/kastenhq/ansible-edge-gitops-kasten/blob/main/values-secret.yaml.template) to your home directory as `values-secret.yaml` and replace the explanatory text as follows:
29
29
30
30
* AWS Credentials (an access key and a secret key). These are used to provision the metal worker in AWS (which hosts
31
-
the VMs) and to access a pre-created S3 bucket for exporting VM backups with Veeam Kasten.
31
+
the VMs) and (by default) to access a pre-created S3 bucket for exporting VM backups with Veeam Kasten.
32
32
33
33
```yaml
34
34
---
@@ -178,27 +178,36 @@ To install a collection that is not currently installed:
178
178
179
179
```sh
180
180
git checkout -b my-branch
181
-
vi overrides/values-kasten-defaults.yaml
181
+
vi values-kasten.yaml
182
182
```
183
183
184
184
```yaml
185
185
---
186
186
kasten:
187
-
locationProfile:
188
-
name: default-location-profile
189
-
bucketName: your-bucket-name # Replace with the AWS S3 bucket name to store backup data
190
-
region: us-east-1 # Replace with the AWS S3 bucket region
191
-
immutable: false # Set true only if AWS S3 bucket was created with Versioning/Object Lock enabled; otherwise false
192
-
protectionPeriod: 120h0m0s # Adjust to specify amount of time for retained RestorePoints to remain immutable. Caution!
187
+
kdrSecretKey: secret/data/hub/kastendr-passphrase
193
188
194
189
policyDefaults:
190
+
locationProfileName: my-location-profile
195
191
presetName: daily-backup
196
192
ignoreExceptions: false
193
+
194
+
locationProfileDefaults:
195
+
secretKey: secret/data/hub/aws-creds
196
+
immutable: false
197
+
protectionPeriod: 120h0m0s # 5 Days
198
+
s3Region: us-east-1
199
+
200
+
locationProfiles:
201
+
location-profile-1:
202
+
name: my-location-profile
203
+
bucketName: your-bucket-name # REPLACE with the AWS S3 bucket name to store backup data
204
+
immutable: false # SET true only if AWS S3 bucket was created with Versioning/Object Lock enabled; otherwise false
205
+
protectionPeriod: 168h0m0s # 7 Days # OPTIONAL, override default immutablility period. Caution, you will not be able to delete backup data for this amount of time!
0 commit comments