As platform operator, you can create a data protection target location that you can use for storage of backups that you generate using VMware Tanzu Mission Control.
When you run a backup using Tanzu Mission Control, the resources that you specify to be backed up are written to a storage location that you identify. This location can be a storage location that you create and maintain in your cloud provider account (AWS S3 or S3-compatible storage or Azure Blob storage). This procedure shows how to create a target location that you can use for backups.
Prerequisites
Log in to the Tanzu Mission Control console.
Make sure that you have already created a data protection credential that provides the connection to your cloud provider account.
- For Azure Blob storage or AWS S3 or S3-compatible storage, see Create a Data Protection Credential for Self-Provisioned Storage.
Make sure that you have the appropriate permissions in your
Tanzu Mission Control organization.
- To create a target location, you must be associated with the organization.admin role.
Procedure
Results
When you click Create, Tanzu Mission Control generates a backup location that can be used by the specified clusters.
Note: The flags that you use when creating a target location for data protection using the command line in
Tanzu Mission Control Self-Managed differ from those you use for SaaS. Use the a command like the following to create a target location for data protection:
tmc dataprotection provider backuplocation create --name my-location-name --credential-name my-credential-name --region minio --assigned-cluster-groups default --bucket my-test-bucket --s-3-url http://some-prefix.us-west-2.elb.amazonaws.com:9000 --enable-s-3-force-path-style --public-url http://some-prefix.us-west-2.elb.amazonaws.com:9000 --ca-cert "-----BEGIN CERTIFICATE-----\nlong-credential-string-here\n-----END CERTIFICATE-----"Make sure you replace the values in this example with the appropriate strings for your situation, including all URLs. The
--ca-cert
flag requires a string where the newlines are replaced with
\n
.
You can alternatively store your certificate in a text file, and use the following for the
--ca-cert
flag:
--ca-cert "$(awk 1 ORS='\\n' cert.txt)"