Skip to content

Commit 3ebdb05

Browse files
authored
Merge pull request validatedpatterns#497 from mattbator/main
Update Veeam pattern name and getting started steps
2 parents b9be4d1 + 0735792 commit 3ebdb05

File tree

2 files changed

+21
-13
lines changed

2 files changed

+21
-13
lines changed

content/patterns/ansible-edge-gitops-kasten/_index.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
22
title: OpenShift Virtualization Data Protection with Veeam Kasten
3-
date: 2024-10-28
43
tier: sandbox
54
summary: This pattern uses OpenShift Virtualization to simulate an edge environment for VMs, protected by Veeam Kasten.
65
rh_products:
@@ -26,7 +25,7 @@ links:
2625

2726
## Background
2827

29-
Organizations are interested in accelerating their deployment speeds and improving delivery quality in their Edge environments, where many devices may not fully or even partially embrace the GitOps philosophy. Further, there are VMs and other devices that can and should be managed with Ansible. This pattern explores some of the possibilities of using an OpenShift-based Ansible Automated Platform deployment and managing edge devices, based on work done with a partner in the Chemical space.
28+
This example extends the standard [Ansible Edge GitOps pattern](https://validatedpatterns.io/patterns/ansible-edge-gitops/) to include automated deployment and configuration of [Veeam Kasten](https://www.veeam.com/products/cloud/kubernetes-data-protection.html), the #1 Kubernetes data protection and mobility solution.
3029

3130
This pattern uses **Red Hat OpenShift Virtualization** (the productization of KubeVirt) to provision VMs alongside Kubernetes-native workloads on the cluster. As VMs are inherently stateful workloads, a GitOps approach alone is not sufficient to recover an environment in the event of accidental data loss, malware attack, or infrastructure failure - especially in edge environments where infrastructure may be less resilient or subject to harsh environments. This example extends the standard [Ansible Edge GitOps pattern](https://validatedpatterns.io/patterns/ansible-edge-gitops/) to include automated deployment and configuration of [Veeam Kasten](https://www.veeam.com/products/cloud/kubernetes-data-protection.html), the #1 Kubernetes data protection and mobility solution.
3231

content/patterns/ansible-edge-gitops-kasten/getting-started.md

Lines changed: 20 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ weight: 10
44
aliases: /ansible-edge-gitops-kasten/getting-started/
55
---
66

7-
# Deploying the Ansible Edge GitOps Pattern
7+
# Deploying the OpenShift Virtualization Data Protection Pattern
88

99
# General Prerequisites
1010

@@ -28,7 +28,7 @@ In addition to the OpenShift cluster, you will need to prepare a number of secre
2828
in the pattern in various ways. To do this, copy the [values-secret.yaml template](https://github.com/kastenhq/ansible-edge-gitops-kasten/blob/main/values-secret.yaml.template) to your home directory as `values-secret.yaml` and replace the explanatory text as follows:
2929

3030
* AWS Credentials (an access key and a secret key). These are used to provision the metal worker in AWS (which hosts
31-
the VMs) and to access a pre-created S3 bucket for exporting VM backups with Veeam Kasten.
31+
the VMs) and (by default) to access a pre-created S3 bucket for exporting VM backups with Veeam Kasten.
3232

3333
```yaml
3434
---
@@ -178,27 +178,36 @@ To install a collection that is not currently installed:
178178

179179
```sh
180180
git checkout -b my-branch
181-
vi overrides/values-kasten-defaults.yaml
181+
vi values-kasten.yaml
182182
```
183183

184184
```yaml
185185
---
186186
kasten:
187-
locationProfile:
188-
name: default-location-profile
189-
bucketName: your-bucket-name # Replace with the AWS S3 bucket name to store backup data
190-
region: us-east-1 # Replace with the AWS S3 bucket region
191-
immutable: false # Set true only if AWS S3 bucket was created with Versioning/Object Lock enabled; otherwise false
192-
protectionPeriod: 120h0m0s # Adjust to specify amount of time for retained RestorePoints to remain immutable. Caution!
187+
kdrSecretKey: secret/data/hub/kastendr-passphrase
193188
194189
policyDefaults:
190+
locationProfileName: my-location-profile
195191
presetName: daily-backup
196192
ignoreExceptions: false
193+
194+
locationProfileDefaults:
195+
secretKey: secret/data/hub/aws-creds
196+
immutable: false
197+
protectionPeriod: 120h0m0s # 5 Days
198+
s3Region: us-east-1
199+
200+
locationProfiles:
201+
location-profile-1:
202+
name: my-location-profile
203+
bucketName: your-bucket-name # REPLACE with the AWS S3 bucket name to store backup data
204+
immutable: false # SET true only if AWS S3 bucket was created with Versioning/Object Lock enabled; otherwise false
205+
protectionPeriod: 168h0m0s # 7 Days # OPTIONAL, override default immutablility period. Caution, you will not be able to delete backup data for this amount of time!
197206
```
198207

199208
```sh
200-
git add overrides/values-kasten-defaults.yaml
201-
git commit overrides/values-kasten-defaults.yaml
209+
git add values-kasten.yaml
210+
git commit values-kasten.yaml
202211
git push origin my-branch
203212
```
204213

0 commit comments

Comments
 (0)