To back up and restore your Event Endpoint Management and Event Gateway instances, use a storage class that supports the Container Storage Interface (CSI) snapshotting (for example, the Ceph File System).
You can use a backup tool such as Velero to perform backups.
If you are running on the Red Hat OpenShift Container Platform, the OADP operator uses Velero and simplifies the installation of the backup software on your cluster, and the management of your backups and restorations.
On other Kubernetes platforms, Velero provides a Helm chart which you can use to install the software or a command line tool.
Follow these instructions to back up and restore your Event Endpoint Management and Event Gateway instances.
Before you begin
-
To back up and restore the Event Endpoint Management and Event Gateway instances, you must back up the following:
- The main encryption key that is stored on a Kubernetes secret.
- The data that is added to the instance. This is stored on Kubernetes Persistent Volumes (PVs) and within Kubernetes Persistent Volume Claims (PVCs).
- The Event Endpoint Management and Event Gateway custom resource configurations, and the custom secrets and certificates that were used to create the related instances.
This means that your backup location and configuration must be able to store both Kubernetes objects and volumes. For more information about the solutions you can use to back up PVs and PVCs, see the OpenShift Container Platform or Velero documentation. For example, you can use a remote object store such as
AWS S3
and aCSI
compliant storage class to create the PVC for your instance. -
If you are on the OpenShift Container Platform and using the OADP operator to back up your instances, you must specify backup and snapshot configurations in the
DataProtectionApplication
custom resource. For more information about installing and configuring theDataProtectionApplication
custom resource, see the OpenShift Container Platform documentation and select the storage type you want to configure. -
In your CSI supported storage provider (such as Ceph), ensure you have the
VolumeSnapshotClass
configured for theCSI
storage provider in your cluster. -
To ensure that the correct items are backed up and restored properly, you can install the Velero client.
Backing up
If applicable, after your DataProtectionApplication
is configured and other dependencies are prepared, you can back up your Event Endpoint Management and Event Gateway instances.
Create two Backup
custom resources to back up your Event Endpoint Management and Event Gateway instances:
- One for the main encryption key and the PVCs containing the data of your instance deployments.
- The other for the Event Endpoint Management and Event Gateway custom resource configurations, and the custom secrets and certificates that were used to create the related instances.
Complete the following steps to create two Backup
custom resources:
-
To ensure that only the main encryption key and the PVCs that contain the data are being backed up, and to easily separate them from the other resources that are related to the Event Endpoint Management instance, add the
events.ibm.com/backup: required
label to the following resources:- The secret in the Event Endpoint Management instance namespace with the name that ends with
-mek-bak
. For example,<eem_instance_name>-ibm-eem-mek-bak
. - The PVCs in the Event Endpoint Management instance namespace with the name
manager-storage-<eem_instance_name>-ibm-eem-manager-0
.
- The secret in the Event Endpoint Management instance namespace with the name that ends with
-
To ensure only the Event Endpoint Management and Event Gateway custom resource configurations, and the custom secrets and certificates that were used to create the related instances are being backed up, and to easily separate them from the other resources, add the
events.ibm-event-endpoint-management.ibm.com/backup=required
label to those resources. -
After the labels are applied, create and apply a
Backup
custom resource as follows that backs up the encryption key and the PVCs containing the data of your instance. Also, include the snapshots in the custom resource if you are using aCSI
storage provider.apiVersion: velero.io/v1 kind: Backup metadata: name: <unique_name> namespace: openshift-adp spec: includedResources: - secrets - persistentvolumeclaims # To ensure the volume data is backed up when using CSI - volumesnapshots - volumesnapshotcontents ttl: 720h0m0s storageLocation: <backup_location_cr_name> includeClusterResources: true labelSelector: matchLabels: app.kubernetes.io/instance: <eem_instance_name> app.kubernetes.io/name: ibm-event-endpoint-management events.ibm.com/backup: required includedNamespaces: - <eem_instance_namespace> excludedResources: []
Note:
<eem_instance_namespace>
is the namespace where Event Endpoint Management instance installed.See the OADP and Velero documentation for more configuration options for the
Backup
custom resource. -
After the
Backup
custom resource is applied, check whether the custom resource is updated with status information similar to the following:status: progress: itemsBackedUp: 4 totalItems: 4 csiVolumeSnapshotsCompleted: 1 csiVolumeSnapshotsAttempted: 1 phase: Completed
-
To ensure the resources specified in the
Backup
custom resource are backed up properly, run the following command:velero backup describe <backup_name> --details -n openshift-adp
-
Create and apply another
Backup
custom resource as follows to back up the Event Endpoint Management and Event Gateway custom resource configurations, and the custom secrets and certificates that were used to create the related instances.apiVersion: velero.io/v1 kind: Backup metadata: name: <unique_name> namespace: openshift-adp spec: ttl: 720h0m0s defaultVolumesToRestic: false includeClusterResources: true storageLocation: <backup_location_cr_name> includedNamespaces: - <eem_instance_namespace> orLabelSelectors: - matchExpressions: - key: events.ibm-event-endpoint-management.ibm.com/backup operator: In values: - required
Note: Under
spec.includedNamespaces
add all namespaces where there are Event Endpoint Management and Event Gateway instances installed. -
After the
Backup
of your Event Endpoint Management and Event Gateway custom resource configurations and their custom secrets and certificates is applied, check whether theBackup
custom resource is updated with status information similar to the following:status: progress: itemsBackedUp: 4 totalItems: 4 phase: Completed
-
To ensure your Event Endpoint Management and Event Gateway custom resource configurations and their custom secrets and certificates are backed up properly, run the following command:
velero backup describe <backup_name> --details -n openshift-adp
If you are facing problems in creating a backup, see the troubleshooting information for OADP.
Important: The name of your Backup
custom resource is required to restore your instance from the backup.
Restoring
Restoring your instance might be required for a number of reasons:
- Loss of the entire Kubernetes cluster.
- Loss of a namespace.
- Loss of the Event Endpoint Management data or the encryption key.
- To wind back the data to a previous state.
- Loss of the Event Endpoint Management and Event Gateway instances.
You can restore the backed up Event Endpoint Management and Event Gateway instances as follows.
Before restoring your instance, the Event Endpoint Management operator must be installed again in the previously installed namespace if it was lost.
Note: In the namespace that you are restoring to, ensure that you do not have an instance with the same name as the one you are restoring. You cannot restore Event Endpoint Management and Event Gateway instances in the namespace if another instance with the same name already exists there. If you are trying to rewind your data, you must uninstall the Event Endpoint Management and Event Gateway instances you are restoring.
To restore your Event Endpoint Management and Event Gateway instances, complete the following steps:
-
To restore the encryption key secret and the PVC resources, create and apply a
Restore
custom resource similar to the following YAML:apiVersion: velero.io/v1 kind: Restore metadata: name: <unique_name> namespace: openshift-adp spec: backupName: <name_of_the_backup_to_restore> excludedResources: [] includedResources: [] restorePVs: true
Where
<name_of_the_backup_to_restore>
is the backup of the encryption key secret and the PVC resources.See the OADP and Velero documentation for more configuration options for the
Restore
custom resource. For example, you can configure your custom resource to restore to an alternative namespace. -
When you are applying this custom resource, the backup is loaded from the backup location and the
<eem_instance_name>-ibm-eem-mek-bak
secret andmanager-storage-<eem_instance_name>-ibm-eem-manager-0
PVC are re-created.Before proceeding to the next step, wait for the
Restore
custom resource to be applied and inCompleted
state, then check that both the encryption key secret and the PVC resources are created, and ensure that the resources are inReady
state.Note: Velero removes some labels and annotations such as the
volume.beta.kubernetes.io/storage-provisioner
annotation when restoring PVCs. For some providers, this might leave the PVC in aPending
state. To fix this manually, add thevolume.beta.kubernetes.io/storage-provisioner
annotation back into the PVC with the same value as thevolume.kubernetes.io/storage-provisioner
annotation. -
After the encryption key secret and the PVC resources are restored and in
Ready
state, you can restore the Event Endpoint Management and Event Gateway custom resource configurations, and the custom secrets and certificates that were used to create the related instances. To do this, create and apply aRestore
custom resource similar to the following YAML:apiVersion: velero.io/v1 kind: Restore metadata: name: <unique_name> namespace: openshift-adp spec: backupName: <name_of_the_backup_to_restore> includeClusterResources: true existingResourcePolicy: update hooks: {} includedNamespaces: - <eem_instance_namespace> itemOperationTimeout: 1h0m0s orLabelSelectors: - matchExpressions: - key: events.ibm-event-endpoint-management.ibm.com/backup operator: In values: - required
Where
<name_of_the_backup_to_restore>
is the backup of the Event Endpoint Management and Event Gateway custom resource configurations, and the custom secrets and certificates that were used to create the related instances.Note: Under
spec.includedNamespaces
add all namespaces where there are Event Endpoint Management and Event Gateway instances installed. -
After the
Restore
custom resource is applied and inCompleted
state, check that both the Event Endpoint Management and Event Gateway instances are created, and are inRunning
state. -
Secure your access again by following guidance in the managing access and managing roles topics.
You can access the Event Endpoint Management and Event Gateway instances again with the same configuration and data as when the back up happened.