You can customize your backup and restore settings.
MinIO gateway mode
The backup and restore operator and MinIO are deployed with the default settings. The MinIO can be deployed as a statefulset or it can be deployed as a proxy (gateway) to the external datastore. The default behavior is to deploy the MinIO as the statefulset.
Note: When the MinIO is deployed as the statefulset the backup are stored in MinIO Persistent Volumes (PV), and the backups are not externalized. Which means when the Kubernetes cluster or the MinIO PV is deleted the backups will be erased. To avoid this, you must deploy MinIO as a gateway.
Procedure to deploy MinIO as gateway using Deployment Container:
- Update gateway.enabled=true, accesskey, and secretkey parameters along with the bucket name for the br operator in the merged_yamls.yaml file which is generated in step 3 as shown in the following snippet:
minio: helmChartName: minio-custom helmOverrides: minio: gateway: auth: s3: accessKey: null secretKey: null enabled: false type: s3 persistence: size: 8Gi statefulset: replicaCount: 4 brOperator: helmOverrides: metric: backupEnabled: false minio: backupBucketName: <your-bucket-name>
Note: You can add MinIO and custom bucket configuration in a single command. - Set the DEPLOYMENT_ACTION to deploy-apps in the deploy.settings file.
- Run the tcx_app_deployment.sh script in the Deployment Container, which triggers the Helm upgrade.
Procedure to deploy MinIO as gateway using
VMware Telco Cloud Automation UI:
- For deploying MinIO as a gateway, ensure that you have already extracted the VMware Telco Cloud Service Assurance bundle. If you do not have the bundle, you can refer to steps in Extract the Downloaded Package and Installer topic.
- Ensure that you use the same Deployment Container used during base deployment. If you do not have the Deployment Container, you must download and launch it. For procedure, see Download and Launch the Deployment Container section.
- Run the merge-product-yaml-files.sh script as described in Generate a Single Merged YAML File required for MinIO deployment and copy the resulting merged_yamls.yaml file to your local machine.
Note: Retain the same footprint value used during initial deployment.
- Update the values for the parameters in the updated merged_yamls.yaml file which is generated in step 3. The following snippet is an example of demo footprint.
elasticsearch: retentionInterval: '' footprint: demo grafana: accessIp: null ingressHostname: edgeServices: null product: null privateNetwork: false registryRootUrl: null statusChecker: enabled: true
Set them to the same values used during initial VMware Telco Cloud Service Assurance deployment.
- ingressHostname.product=<LoadBalancerIP>
- grafana.accessIP=<LoadBalancerIP>
- registryRootUrl=<your-registry-url/your-project-name/tcx>
- Update the statusChecker.enabled parameter. The default value is
true
. Set the value asfalse
. - Update the retentionInterval value with the same value used during initial CNF instantiation.
- Update the additionalValuesFile parameter in the merged_yamls.yaml file based on the retention interval value.
elasticsearch: additionalValuesFile: ''
- Update the following parameters in the merged_yamls.yaml file to the required footprint.
- footprint
- helmOverride.productInfo.footPrints
Note: Based on the footprint size of deployment, update the value for footprint.
- If you are configuring MinIO as gateway using AWS S3 or vSAN, update the parameters accordingly.
- For AWS S3, update gateway.enabled=true, accesskey, and secretkey in the merged_yamls.yaml which is generated in step3 as shown in the following snippet.
minio: helmChartName: minio-custom helmOverrides: minio: gateway: auth: s3: accessKey: null secretKey: null enabled: false type: s3 persistence: size: 8Gi statefulset: replicaCount: 4
- For vSAN, update gateway.enabled=true, type=nas, accesskey, and secretkey in the merged_yamls.yaml which is generated in step3 as shown in the following snippet.
minio: helmChartName: minio-custom helmOverrides: minio: gateway: auth: s3: accessKey: null secretKey: null enabled: false type: nas persistence: size: 8Gi statefulset: replicaCount: 4
For NFS Provisioner, update nfsProvisioner.enabled=true, nfs.path, and nfs.server parameters.nfsProvisioner: enabled: false helmChartName: nfs-provisioner helmOverrides: nfs-subdir-external-provisioner: nfs: path: null server: null
Note: The backups taken on the previous StatefulSet MinIO are not available in the updated MinIO as a gateway. - For AWS S3, update gateway.enabled=true, accesskey, and secretkey in the merged_yamls.yaml which is generated in step3 as shown in the following snippet.
- Launch the VMware Telco Cloud Automation and navigate to .
- Click TCSA CNF and select Reconfigure.
- Upload the updated merged_yamls.yaml file which is generated in step 3 VMware Telco Cloud Automation.
- Click .
Changing the backup bucket
The backup and restore operator is deployed with a default bucket vmware-tcsa-backup.
Procedure to override the bucket name using Deployment Container:
- Update bucket name for the br operator in the merged_yamls.yaml file which is generated in step 3 as shown in the following snippet:
brOperator: helmOverrides: metric: backupEnabled: false minio: backupBucketName: <your-bucket-name>
- Set the DEPLOYMENT_ACTION to deploy-apps in the deploy.settings file and run the tcx_app_deployment script, which triggers the Helm upgrade to modify the bucket nsme.
Procedure to override the bucket name using
VMware Telco Cloud Automation UI:
- For deploying MinIO as a gateway, ensure that you have already extracted the VMware Telco Cloud Service Assurance bundle. If you do not have the bundle, you can refer to steps in Extract the Downloaded Package and Installer topic.
- Ensure that you use the same Deployment Container used during base deployment. If you do not have the Deployment Container, you must download and launch it. For procedure, see Download and Launch the Deployment Container section.
- Run the merge-product-yaml-files.sh script as described in Generate a Single Merged YAML File required for MinIO deployment and copy the resulting merged_yamls.yaml file to your local machine.
Note: Retain the same footprint value used during initial deployment.
- Update the values for the parameters in the updated merged_yamls.yaml file which is generated in step 3. The following snippet is an example of demo footprint.
elasticsearch: retentionInterval: '' footprint: demo grafana: accessIp: null ingressHostname: edgeServices: null product: null privateNetwork: false registryRootUrl: null statusChecker: enabled: true
Set them to the same values used during initial VMware Telco Cloud Service Assurance deployment.
- ingressHostname.product=<LoadBalancerIP>
- grafana.accessIP=<LoadBalancerIP>
- registryRootUrl=<your-registry-url/your-project-name/tcx>
- Update the statusChecker.enabled parameter. The default value is
true
. Set the value asfalse
. - Update the retentionInterval value with the same value used during initial CNF instantiation.
- Update the additionalValuesFile parameter in the merged_yamls.yaml file based on the retention interval value.
elasticsearch: additionalValuesFile: ''
- Update the following parameters in the merged_yamls.yaml file to the required footprint.
- footprint
- helmOverride.productInfo.footPrints
Note: Based on the footprint size of deployment, update the value for footprint.
- If you are configuring MinIO as gateway using AWS S3 or vSAN, update the parameters accordingly.
- For AWS S3, update gateway.enabled=true, accesskey, and secretkey in the merged_yamls.yaml which is generated in step3 as shown in the following snippet.
minio: helmChartName: minio-custom helmOverrides: minio: gateway: auth: s3: accessKey: null secretKey: null enabled: false type: s3 persistence: size: 8Gi statefulset: replicaCount: 4
- For vSAN, update gateway.enabled=true and type=nas in the merged_yamls.yaml which is generated in step3 as shown in the following snippet.
minio: helmChartName: minio-custom helmOverrides: minio: gateway: auth: s3: accessKey: null secretKey: null enabled: false type: nas persistence: size: 8Gi statefulset: replicaCount: 4
For NFS Provisioner, update nfsProvisioner.enabled=true, nfs.path, and nfs.server parameters.nfsProvisioner: enabled: false helmChartName: nfs-provisioner helmOverrides: nfs-subdir-external-provisioner: nfs: path: null server: null
Note: The backups taken on the previous StatefulSet MinIO are not available after the mode change to AWS S3 or vSAN. - For AWS S3, update gateway.enabled=true, accesskey, and secretkey in the merged_yamls.yaml which is generated in step3 as shown in the following snippet.
- Update the bucket name in the merged_yamls.yaml file which is generated in step 3 as shown in the following snippet:
brOperator: helmOverrides: metric: backupEnabled: false minio: backupBucketName: <your-bucket-name>
- Launch the VMware Telco Cloud Automation and navigate to .
- Click TCSA CNF and select Reconfigure.
- Upload the updated merged_yamls.yaml file which is generated in step 3 in VMware Telco Cloud Automation.
- Click .
Note: The backups taken on the previous bucket will not be available in the new bucket.