This section will illustrate how to configure backups on StackGres using AWS S3. To do so, you will need to have the AWS CLI installed to create the right permissions and the bucket on AWS S3.
First, let’s create the required permissions and the user with the following characteristics (that you may change):
Create the right permissions and the user with following characteristics (that you may change):
export S3_BACKUP_BUCKET=backup-demo-of-stackgres-io
read -d '' policy <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [ "s3:ListBucket", "s3:GetBucketLocation" ],
"Resource": [ "arn:aws:s3:::${S3_BACKUP_BUCKET}" ]
},
{
"Effect": "Allow",
"Action": [ "s3:PutObject", "s3:GetObject", "s3:DeleteObject" ],
"Resource": [ "arn:aws:s3:::${S3_BACKUP_BUCKET}/*" ]
}
]
}
EOF
export AWS_PROFILE=# optional
export AWS_REGION=us-west-2
export S3_BACKUP_BUCKET_USER=stackgres-demo-k8s-sa-user
aws iam create-user --region $AWS_REGION --user-name $S3_BACKUP_BUCKET_USER
aws iam put-user-policy --region $AWS_REGION --user-name $S3_BACKUP_BUCKET_USER \
--policy-name ${S3_BACKUP_BUCKET_USER}-policy --policy-document $policy
Now, we need to create the access key that is used for the backup creation.
The following creates a key and saves it to a file credentials.json
:
aws --output json iam create-access-key --region $AWS_REGION --user-name $S3_BACKUP_BUCKET_USER > credentials.json
Finally, create the bucket (mb
stands for ‘make bucket’):
aws s3 mb s3://$S3_BACKUP_BUCKET --region $AWS_REGION
Create a Kubernetes secret with the contents of our credentials:
export CLUSTER_NAMESPACE=demo
export CREDENTIALS_FILE=credentials.json # your credentials file
accessKeyId=$(jq -r '.AccessKey.AccessKeyId' "$CREDENTIALS_FILE")
secretAccessKey=$(jq -r '.AccessKey.SecretAccessKey' "$CREDENTIALS_FILE")
kubectl -n $CLUSTER_NAMESPACE create secret generic s3-backup-bucket-secret \
--from-literal="accessKeyId=$accessKeyId" \
--from-literal="secretAccessKey=$secretAccessKey"
Having the credentials secret created, we now need to create the object storage configuration and to set the backup configuration. The object storage configuration it is governed by the SGObjectStorage CRD. This CRD allows to specify the object storage technology, required parameters, as well as a reference to the credentials secret.
Create a file sgobjectstorage-backupconfig1.yaml
with the following contents:
apiVersion: stackgres.io/v1beta1
kind: SGObjectStorage
metadata:
name: backup-config-stackgres-demo
spec:
type: s3
s3:
bucket: backup-demo-of-stackgres-io
awsCredentials:
secretKeySelectors:
accessKeyId:
name: eks-backup-bucket-secret
key: accessKeyId
secretAccessKey:
name: eks-backup-bucket-secret
key: secretAccessKey
and deploy to Kubernetes:
kubectl apply -f sgobjectstorage-backupconfig1.yaml
The backup configuration can be set unser the section .spec.configurations.backups
of the CRD
SGCluster, among others, the retention window for the automated backups,
when base backups are performed and performance parameters of the backup process.
An example cluster configuration looks as follows:
apiVersion: stackgres.io/v1
kind: SGCluster
# [...]
spec:
configurations:
backups:
- sgObjectStorage: backupconfig1
cronSchedule: '*/5 * * * *'
retention: 6
Note that for this tutorial and demo purposes, backups are created every 5 minutes. Modify the
.spec.backups[0].cronSchedule
parameter above to adjust to your own needs.
The above configuration will be applied when the SGCluster resource is created.