Reference Guide: Optimizing Backup Strategies for Red Hat OpenShift Virtualization

Deploying Trilio For Kubernetes with OpenShift & Red Hat Advanced Cluster Management Policies | Trilio

Table of Contents

Subscribe to Newsletter

Introduction

Organizations are moving towards Kubernetes as an operating environment, and protecting the data is paramount. It’s their top-most priority to protect the business-critical data and set up a business continuity plan in case of a disaster. A cloud-native backup and Disaster Recovery (DR) solution is the need of the hour, and the answer is Trilio for Kubernetes (T4K).

T4K is a cloud-native, application-centric data protection platform designed to support the scale, performance, and mobility requirements of Kubernetes container environments across any public or hybrid cloud environment. It offers backup and DR solutions for the entire application, including data, metadata, and Kubernetes objects. It is protected and can be restored at any point in time.

RHACM is a management solution designed to help organizations extend and scale Red Hat OpenShift, the leading enterprise Kubernetes platform. It enables management consistency across hybrid cloud deployments, including on-premises and public clouds.

Integration between T4K and RHACM provides an automated solution to protect containers, Kubernetes, and cloud infrastructure using the policy framework. This powerful framework allows users to govern multiple clusters in the data center using policies. The T4K policies enable the users to protect their OpenShift clusters and provide continued protection for existing and new clusters.

This blog provides a walk-through on how to deploy the T4K policies on RHACM. It’s an efficient way to protect your cloud workloads.

Prerequisites

Be sure to meet the following prerequisites:

  • Install Red Hat OpenShift Kubernetes (version 4.8 and later) clusters.
  • Meet Trilio prerequisites. See Prerequisites for using Trilio for Kubernetes
  • Create an environment that supports CSI Driver with snapshot capability. See CSI Drivers and Snapshot capabilities for more information.
  • Install VolumeSnapshot CRDs. See Installing VolumeSnapShot CRDs.

Install RHACM

RHACM can be used to comply with enterprise and industry standards for aspects, such as security and regulatory compliance, resiliency, and software engineering. Deviation from defined values for such standards represents a configuration drift, which can be detected using the built-in configuration policy controller of RHACM.

Install RHACM version 2.6 as outlined in the product documentation.

Deploy Trilio for Kubernetes policies

In the RHACM policy collection from the community folder, there are three T4K policies available. View the following table for the T4K policy descriptions:

Policy Description Prerequisites
Policy to install T4K Operator Use this policy to install Trilio for Kubernetes Operator and a trial license on OpenShift clusters with the label protected-by=triliovault. Use this policy to create a namespace-based backup using T4K and Kyverno template on OpenShift clusters with the label protected-by=triliovault. It creates a backup of the namespaces that have the following label, protected-by=tvk-ns-backup.
Policy to create namespace-based backup using Trilio for Kubernetes Use this policy to create namespace-based backups using T4K on OpenShift clusters with the label protected-by=triliovault. Requires OpenShift 4.8 or later. Note: T4K must be installed to use this policy. On the hub cluster, create a secret named aws-s3-secret with S3 credentials and a ConfigMap named aws-s3-configmap with S3 bucket name, region name & threshold capacity in the namespace, where this policy is created (details given in the policy). For more information, refer to the Trilio documentation.
Policy to create namespace-based backup using T4K and Kyverno template Use this policy to create a namespace-based backup using T4K and Kyverno templates on OpenShift clusters with the label protected-by=triliovault. It creates a backup of the namespaces that have the following label, protected-by=tvk-ns-backup. Requires OpenShift 4.8 or later. Note: Kyverno controller must be installed to use the kyverno policy. See the Policy to install Kyverno. T4K must be installed to use this policy. On the hub cluster, create a secret named aws-s3-secret with S3 credentials, and a ConfigMap named aws-s3-configmap with S3 bucket name, region name & threshold capacity in the namespace, where this policy is created (details given in the policy). For more information, refer to the Trilio documentation.

Let’s start with the policy to install Trilio for Kubernetes (T4K).

Install T4K Using a Policy

Let’s use the policy to install T4K. This policy installs the latest T4K operator on any Openshift cluster with a label protected-by=triliovault.

For demo purposes, there are two OpenShift Container Platform clusters; one of them runs RHACM and is the hub cluster. You can view the clusters from the RHACM console Clusters page. View the following screen capture:

ACM managed Clusters Openshift

Note: Notice the clusters are prelabeled with the label protected-by=triliovault. There are no T4K policies created on the RHACM cluster yet, so let’s start with our first example.

From the navigation menu, select Governance. This is also referred to as the policy engine. Then click the Create policy button as shown in the following screen capture:

ACM without policies

The Create policy form is displayed. By default, the YAML editor is also displayed alongside the form.

Creating Trilio for Kubernetes policy on Red Hat ACM

Let’s go to the policy from the GitHub page, click the Raw button to view the contents of the policy YAML, copy the YAML code from GitHub, and paste it into the YAML editor of RHACM.

Note: Before pasting the policy contents into RHACM, be sure to clear the YAML editor. Typically, you can use the shortcut, <ctrl>-a <ctrl>-c from the GitHub window, and <ctrl>-a <ctrl>-v from the RHACM window. After you paste the policy into that YAML editor, your console might resemble the following image:

Adding Trilio for Kubernetes policy in Red Hat ACM

 

In the last line of the policy code of the PlacementRule section, notice that this policy uses labels vendor=OpenShift and protected-by=triliovault. This indicates that the policy is deployed on all OpenShift clusters with the user-defined label, protected-by=triliovault. Before you create the policy, you need to select a namespace for the policy to be run. This is for internal organization reasons only; it does NOT affect the results of the policy engine itself. From the policy form, select the default namespace or any other namespace available on the hub cluster. You can create some specific policy-engine namespaces in advance to be able to group them more efficiently. For this example, select Inform as the remediation action.

Before you create the policy, let’s verify that T4K is not installed. Recheck the list of installed operators on the cluster itself, from the OpenShift console:

Trilio's operator is not yet installed using some ACM policy

It is verified that T4K is not installed, so let’s create the policy by clicking the Submit button in the Create policy dialog box. After a couple of moments, the policy is listed in the policy table. Notice that there is a cluster violation. Select the install-tvk policy to view the policy details and results. View the following image:

Submit Trilio policy in Red Hat ACM

Select the Results Tab to view the listed violations:

Violations Trilio Policy in ACM

The required operator elements are missing, which is why the policy failed. Let’s change the remediation action by navigating to the Governance Overview tab, selecting the Actions icon (three vertical dots), and clicking Enforce:

Enforcing Trilio Policy in Red Hat ACM

The Enforce policy dialog box is displayed. Click Enforce to confirm the action. View the following image:

Enforcing Trilio's policies in Red Hat ACM's UI

It takes a few minutes to enforcement of the policy. Recheck the details of the policy from the Results tab. View the following image:

Trilio is not in violation in Red Hat ACM policies

And you can confirm that the operator has been installed on your cluster with the protected-by=triliovault label.

Trilio's Backup Operator is installed thanks to Red Hat ACM Policy

This concludes how to install TrilioVault for Kubernetes (T4K) on the clusters managed by RHACM. This policy also protects new OpenShift Container Platform clusters with a label protected-by=triliovault.

Protect a Namespace in the Cluster Using the T4K Backup Creation Policy

Now that the T4K is installed and a trial license is created (as seen in the image, where T4K is listed as an installed operator), let’s start using T4K. To get started with T4K in your environment, be sure that all prerequisites are fulfilled as listed in the Prerequisites section. Once done, you must perform the following steps:

 

    • Create a T4K Target – Location where backups are stored

    • Create a backup plan – Details about the backup

    • Create a namespace-based backup

Creating a policy that creates a namespace-based backup using T4K helps to achieve the earlier-mentioned steps for a single namespace. Let’s take a look at how to apply the policy. For this example, the namespace is mysql, with the MySQL application running. Run the following command to receive a list of mysql applications:

				
					


# oc get all -n mysql
NAME                                                                  READY   STATUS      RESTARTS   AGE
pod/k8s-demo-app-mysql-78dbddc54f-dtpd6                               1/1     Running     0          1d

NAME                         TYPE        CLUSTER-IP   EXTERNAL-IP   PORT(S)    AGE
service/k8s-demo-app-mysql   ClusterIP   None         <none>        3306/TCP   1d

NAME                                 READY   UP-TO-DATE   AVAILABLE   AGE
deployment.apps/k8s-demo-app-mysql   1/1     1            1           1d

NAME                                            DESIRED   CURRENT   READY   AGE
replicaset.apps/k8s-demo-app-mysql-78dbddc54f   1         1         1       1d
#
				
			

Navigate to the create-tvk-backup policy in the policy-collection repository. As mentioned in the comments of the create-tvk-backup policy, you must create a secret and ConfigMap with AWS S3 details for T4K target creation. Your secret and ConfigMap might resemble the following content:

				
					


cat <<EOF | oc apply -f - -n default
apiVersion: v1
kind: Secret
metadata:
  name: aws-s3-secret
  namespace: default
type: Opaque
stringData:
  accessKey: "PROVIDE_ACCESS_KEY"
  secretKey: "PROVIDE_SECRET_KEY"
EOF

cat <<EOF | oc apply -f - -n default
apiVersion: v1
kind: ConfigMap
metadata:
  name: aws-s3-configmap
  namespace: default
data:
  bucketName: "PROVIDE_S3_BUCKET_NAME"
  region: "PROVIDE_REGION"
  thresholdCapacity: "100Gi"
EOF
				
			

Replace the test namespace used in the policy  mysql to create the backup. You can make this change from the YAML editor in RHACM.

In the PlacementRule section, notice that this policy is defined to be applied on all clusters with labels vendor=OpenShift and protected-by=triliovault. This policy is expected to be deployed on all OpenShift clusters with user-defined label protected-by=triliovault. Before you select the Create button, you still need to select a namespace in which this policy needs to be applied. This is for internal organization reasons only; it does NOT affect the results of the policy engine itself. From the Create policy form, you can select the default namespace on the hub cluster. View the following image:

Policy Review

Click Submit to create the policy. Afterwards a Policy created banner appears. View the following image:

Policy Created Banner

Notice, that RHACM detected a cluster violation. This is because the remediation action must be set to enforce to create a backup for the T4K operator. Return to the Policies tab and select the Actions icon for the create-tvk-backup policy. Select the Enforce option.

TVK Action List Policies Tab

From the Enforce policy box, click Enforce to confirm the remediation action change:

Enforce Policy Box

It takes a few minutes for the policy to be enforced. Select the policy name to see the details and results. Select the Results tab to view the cluster violations. Based on the following image, there are no longer any violations:

Results without Violation

As expected and displayed in the previous screenshot, the policy created a secret that uses AWS S3 credentials, a target to store backup data in the specified S3 bucket,  BackupPlan with a daily backup schedule, and a first full backup of the namespace mysql. With this, the namespace mysql is protected, and a new backup is used daily.

Let’s also log in to the T4K console and sign in through your OpenShift cluster. Refer to OpenShift Environments in the Trilio documentation for more details. View the following image:

Trilio UI

View the backups created for the mysql namespace from the Trilio management console, as shown in the following image:

mysql Backup Trilio

This concludes how to create a namespace-based backup using the T4K policy on OpenShift clusters with the label, protected-by=triliovault, which is managed by RHACM.

However, you must update the namespace name to create the backup manually. Note, it is expected that the same namespace is present on all the OpenShift clusters with the label protected-by=triliovault.

Continue reading to learn how to protect multiple namespaces on any OpenShift clusters, matching the placement rule managed by RHACM.

Protect Multiple Namespaces in Any Cluster Using the T4K Backup Creation Policy

Before starting, be sure that all prerequisites are fulfilled as listed in the previous section, Protect a namespace in the cluster using the T4K backup creation policy.

Creating a policy that creates a namespace-based backup using T4K and a Kyverno template, creates a backup of the namespaces that have the protected-by=tvk-ns-backup label on all the OpenShift clusters with a protected-by=triliovault label. In addition to installing T4K, the Kyverno controller must be installed to use the kyverno policy. See the Policy to install Kyverno from the policy-collection.

Note – Grant additional privileges to the Kyverno service account for the namespaces.

Once the prerequisites are met, this policy performs the following steps for each existing or newly created namespace, with the protected-by=tvk-ns-backup label:

 

    • Create a T4K Target – Location where backups are stored.

    • Create a backup plan – Details about the backup

    • Create a namespace-based backup

As a reminder, T4K is already installed with the install-tvk policy. Now, let’s create the policy-kyverno-tvk-create-ns-backup policy. Click the Create Policy button. Return to the policy example in the policy-collection repository to copy the contents, and paste them in the RHACM YAML editor. View the following image:

Kyverno TVK Policy

In the PlacementRule section, notice that this policy is defined to be applied on all clusters with the labels vendor=OpenShift and protected-by=triliovault. This policy is expected to be deployed on all OpenShift clusters with the user-defined label, protected-by=triliovault. Before you select the Create button, you still need to select a namespace in which this policy needs to be applied. This is for internal organization reasons only; it does NOT affect the results of the policy engine itself. From the Create policy form, you can select the default namespace on the hub cluster. View the following image:

Kyverno YAML Editor

Click Submit to create the policy. After the policy is created, the policy details are displayed similarly in the following image:

Kyverno Cluster Violation

Similar to the previous example in the earlier section, RHACM detected a cluster violation. There is a cluster violation because the remediation action must be set to enforce. From the Details tab, select the Actions drop-down menu and click Enforce. View the following image:

Kyverno Action List Policies Tab

Click Enforce to confirm that action from the Enforce policy box.

Kyverno TVK Backup Editor Enforce

It takes a few minutes for the policy to be enforced. After you select the policy name, select the Results tab:

Kyverno Results without Violation

The previous screenshot shows that the policy created a Kyverno policy on the target cluster. This Kyverno policy monitors all the namespaces and creates a target to store backup data in the specified S3 bucket,  BackupPlan with a daily backup schedule, and a first, full backup for all the namespaces that have the protected-by=tvk-ns-backup label. This is also applied to any new namespace created with the same label.

Let’s log in to the T4K console through OpenShift to check if the backups are created:

TVK Console Monitoring

As seen in the previous screenshot, there are no backups from the Monitoring page in the Cluster Dashboard section. This is because there are no namespaces in the target cluster with the label protected-by=tvk-ns-backup.

For this demo, let’s create a namespace named postgres with the PostgreSQL application running. Run the following command:

				
					


# oc get all -n postgres
NAME                  READY   STATUS    RESTARTS   AGE
pod/postgres-demo-0   1/1     Running   0          5m28s
pod/postgres-demo-1   1/1     Running   0          5m3s

NAME               TYPE       CLUSTER-IP     EXTERNAL-IP   PORT(S)          AGE
service/postgres   NodePort   172.30.17.37   <none>        5432:30992/TCP   5m29s

NAME                             READY   AGE
statefulset.apps/postgres-demo   2/2     5m29s
#
				
			

Apply the protected-by=tvk-ns-backup label to the postgres namespace with the following command:

				
					


# oc label ns postgres protected-by=tvk-ns-backup
namespace/postgres labeled
#
				
			

It takes a few minutes for the Kyverno policy to come into effect. When you check the details, notice that the resource details within the namespace are displayed using the following command:

				
					# oc get target,backupplan,backup -n postgres 
NAME TYPE THRESHOLD CAPACITY VENDOR STATUS BROWSING ENABLED 
target.triliovault.trilio.io/tvk-postgres-s3-target ObjectStore 100Gi AWS Available 
NAME TARGET RETENTION POLICY INCREMENTAL SCHEDULE FULL BACKUP SCHEDULE STATUS 
backupplan.triliovault.trilio.io/tvk-postgres-backupplan tvk-postgres-s3-target trilio-daily-schedule-policy Available 
NAME BACKUPPLAN BACKUP TYPE STATUS DATA SIZE CREATION TIME START TIME END TIME PERCENTAGE COMPLETED BACKUP SCOPE DURATION 
backup.triliovault.trilio.io/tvk-postgres-backup tvk-postgres-backupplan Full Available 112328704 2022-09-29T10:15:03Z 2022-09-29T10:15:03Z 2022-09-29T10:23:22Z 100 Namespace 8m19.479134026s #
				
			

Let’s check the Monitoring page for the Cluster Dashboard in the T4K console. In the following screen capture, notice a backup is created for the postgres namespace:

TVK Console Monitoring Backup

This concludes how to create a namespace-based backup using Kyverno-based, T4K policy for all the namespaces that have the protected-by=tvk-ns-backup label on the OpenShift clusters with the protected-by=triliovault label, which is managed by RHACM. Apply the protected-by=tvk-ns-backup label for any namespace to be protected.

Conclusion

Trilio for Kubernetes (T4K) is a cloud-native, application-centric, data protection platform designed to support the scale, performance, and mobility requirements of Kubernetes container environments across any public or hybrid cloud environment. It offers backup and recovery of the entire application, including data, metadata, and Kubernetes objects. It is protected and can be restored at any point in time.

T4K provides the following wide range of helpful features:

    • Native Kubernetes application

    • Storage of metadata and all application resources to a specified target

    • Support for Helm, Label, and Operators application deployment types and support for S3 or NFS-based backup targets

    • Provisioning of application hooks to provide data-consistent backups

    • Support for RHACM policies to install T4K and create backups for namespaces

T4K provides a strong platform for enterprise database backups. For more information on T4K, request a demo or download your free trial today.

References

    • Welcome to Trilio For Kubernetes (T4K) documentation

Sharing

Author

Picture of Sachin Kulkarni

Sachin Kulkarni

Specialized Solution Architect seasoned in Product Engineering Services, with expertise in Cloud, Virtualization, and Storage domains with special focus on OpenStack, Kubernetes, DevOps, Backup & DR.

Related Articles

Copyright © 2024 by Trilio

Powered by Trilio