title: 示例 description: description keywords:
- rancher
- rancher中文
- rancher中文文档
- rancher官网
- rancher文档
- Rancher
- rancher 中文
- rancher 中文文档
- rancher cn
- 备份和恢复
- rancher 2.5
- 示例
本节包含 Backup 和 Restore 自定义资源的示例。
默认的备份存储位置是在安装或升级rancher-backup operator 时配置的。
只有 Restore 自定义资源使用与创建备份相同的加密配置 secret 时,才能还原加密的备份。
备份
本节包含 Backup 自定义资源的示例。
在默认位置进行加密备份
apiVersion: resources.cattle.io/v1kind: Backupmetadata:name: default-location-encrypted-backupspec:resourceSetName: rancher-resource-setencryptionConfigSecretName: encryptionconfig
在默认位置进行定期备份
apiVersion: resources.cattle.io/v1kind: Backupmetadata:name: default-location-recurring-backupspec:resourceSetName: rancher-resource-setschedule: "@every 1h"retentionCount: 10
在默认位置进行加密的定期备份
apiVersion: resources.cattle.io/v1kind: Backupmetadata:name: default-enc-recurring-backupspec:resourceSetName: rancher-resource-setencryptionConfigSecretName: encryptionconfigschedule: "@every 1h"retentionCount: 3
Minio 中的加密备份
apiVersion: resources.cattle.io/v1kind: Backupmetadata:name: minio-backupspec:storageLocation:s3:credentialSecretName: minio-credscredentialSecretNamespace: defaultbucketName: rancherbackupsendpoint: minio.sslip.ioendpointCA: LS0tLS1CRUdJTi3VUFNQkl5UUT.....pbEpWaVzNkRS0tLS0tresourceSetName: rancher-resource-setencryptionConfigSecretName: encryptionconfig
使用 AWS Credential Secret 在 S3 中备份
apiVersion: resources.cattle.io/v1kind: Backupmetadata:name: s3-backupspec:storageLocation:s3:credentialSecretName: s3-credscredentialSecretNamespace: defaultbucketName: rancher-backupsfolder: ecm1region: us-west-2endpoint: s3.us-west-2.amazonaws.comresourceSetName: rancher-resource-setencryptionConfigSecretName: encryptionconfig
使用 AWS Credential Secret 在 S3 中进行定期备份
apiVersion: resources.cattle.io/v1kind: Backupmetadata:name: s3-recurring-backupspec:storageLocation:s3:credentialSecretName: s3-credscredentialSecretNamespace: defaultbucketName: rancher-backupsfolder: ecm1region: us-west-2endpoint: s3.us-west-2.amazonaws.comresourceSetName: rancher-resource-setencryptionConfigSecretName: encryptionconfigschedule: "@every 1h"retentionCount: 10
从具有访问 S3 的 IAM 权限的 EC2 节点进行备份
这个例子表明,如果运行 rancher-backup 的节点拥有这些访问 S3 的权限,就不必提供 AWS 的凭证 secret 来创建备份。
apiVersion: resources.cattle.io/v1kind: Backupmetadata:name: s3-iam-backupspec:storageLocation:s3:bucketName: rancher-backupsfolder: ecm1region: us-west-2endpoint: s3.us-west-2.amazonaws.comresourceSetName: rancher-resource-setencryptionConfigSecretName: encryptionconfig
恢复
本节包含 Restore 自定义资源的示例。
使用默认备份文件位置还原
apiVersion: resources.cattle.io/v1kind: Restoremetadata:name: restore-defaultspec:backupFilename: default-location-recurring-backup-752ecd87-d958-4d20-8350-072f8d090045-2020-09-26T12-29-54-07-00.tar.gz# encryptionConfigSecretName: test-encryptionconfig
恢复 Rancher 迁移
apiVersion: resources.cattle.io/v1kind: Restoremetadata:name: restore-migrationspec:backupFilename: backup-b0450532-cee1-4aa1-a881-f5f48a007b1c-2020-09-15T07-27-09Z.tar.gzprune: falsestorageLocation:s3:credentialSecretName: s3-credscredentialSecretNamespace: defaultbucketName: rancher-backupsfolder: ecm1region: us-west-2endpoint: s3.us-west-2.amazonaws.com
从加密的备份中恢复
apiVersion: resources.cattle.io/v1kind: Restoremetadata:name: restore-encryptedspec:backupFilename: default-test-s3-def-backup-c583d8f2-6daf-4648-8ead-ed826c591471-2020-08-24T20-47-05Z.tar.gzencryptionConfigSecretName: encryptionconfig
从 Minio 恢复加密的备份
apiVersion: resources.cattle.io/v1kind: Restoremetadata:name: restore-miniospec:backupFilename: default-minio-backup-demo-aa5c04b7-4dba-4c48-9ac4-ab7916812eaa-2020-08-30T13-18-17-07-00.tar.gzstorageLocation:s3:credentialSecretName: minio-credscredentialSecretNamespace: defaultbucketName: rancherbackupsendpoint: minio.sslip.ioendpointCA: LS0tLS1CRUdJTi3VUFNQkl5UUT.....pbEpWaVzNkRS0tLS0tencryptionConfigSecretName: test-encryptionconfig
使用 AWS 凭证 Secre 访问 S3 从备份中还原
apiVersion: resources.cattle.io/v1kind: Restoremetadata:name: restore-s3-demospec:backupFilename: test-s3-recurring-backup-752ecd87-d958-4d20-8350-072f8d090045-2020-09-26T12-49-34-07-00.tar.gz.encstorageLocation:s3:credentialSecretName: s3-credscredentialSecretNamespace: defaultbucketName: rancher-backupsfolder: ecm1region: us-west-2endpoint: s3.us-west-2.amazonaws.comencryptionConfigSecretName: test-encryptionconfig
从具有 IAM 权限的 EC2 节点还原以访问 S3
这个例子表明,如果运行 rancher-backup 的节点拥有这些访问 S3 的权限,就不必提供 AWS 的凭证 secret 来从备份中还原。
apiVersion: resources.cattle.io/v1kind: Restoremetadata:name: restore-s3-demospec:backupFilename: default-test-s3-recurring-backup-84bf8dd8-0ef3-4240-8ad1-fc7ec308e216-2020-08-24T10#52#44-07#00.tar.gzstorageLocation:s3:bucketName: rajashree-backup-testfolder: ecm1region: us-west-2endpoint: s3.us-west-2.amazonaws.comencryptionConfigSecretName: test-encryptionconfig
在 S3 中存储备份的凭证 Secret 示例
apiVersion: v1kind: Secretmetadata:name: credstype: Opaquedata:accessKey: <Enter your base64-encoded access key>secretKey: <Enter your base64-encoded secret key>
EncryptionConfiguration 示例
apiVersion: apiserver.config.k8s.io/v1kind: EncryptionConfigurationresources:- resources:- secretsproviders:- aesgcm:keys:- name: key1secret: c2VjcmV0IGlzIHNlY3VyZQ==- name: key2secret: dGhpcyBpcyBwYXNzd29yZA==- aescbc:keys:- name: key1secret: c2VjcmV0IGlzIHNlY3VyZQ==- name: key2secret: dGhpcyBpcyBwYXNzd29yZA==- secretbox:keys:- name: key1secret: YWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXoxMjM0NTY=
