Skip to content

Commit 0f337ad

Browse files
committed
updated support matrix doc
1 parent 1c5fb10 commit 0f337ad

1 file changed

Lines changed: 21 additions & 21 deletions

File tree

articles/backup/azure-kubernetes-service-cluster-backup-support-matrix.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -32,37 +32,37 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
3232
3333
## Supported Scenarios
3434

35-
- Azure Backup for AKS supports only clusters running supported Kubernetes versions. [Here's the list of the supported Kubernetes versions](/azure/aks/supported-kubernetes-versions). If your cluster is on an unsupported version, backup operations may still run, but failures during backup or restore are not covered. To ensure full support and reliability, upgrade to a supported version, validate your backups, and reach out to support if issues persist.
35+
- Azure Backup for AKS supports only clusters running supported Kubernetes versions. [Here's the list of the supported Kubernetes versions](/azure/aks/supported-kubernetes-versions). If your cluster is on an unsupported version, backup operations may still run, but failures during backup or restore aren't covered. To ensure full support and reliability, upgrade to a supported version, validate your backups, and reach out to support if issues persist.
3636

37-
- Azure Backup for AKS supports only CSI driver-based persistent volumes. In-tree volume plugins are not supported. Ensure that the CSI driver and snapshot are enabled for your cluster. If they're disabled, [enable these settings](/azure/aks/csi-storage-drivers#enable-csi-storage-drivers-on-an-existing-cluster). Also, if your workloads use in-tree volumes, [migrate them to CSI-based volumes to enable backup support](/azure/aks/csi-migrate-in-tree-volumes).
37+
- Azure Backup for AKS supports only CSI driver-based persistent volumes. In-tree volume plugins aren't supported. Ensure that the CSI driver and snapshot are enabled for your cluster. If they're disabled, [enable these settings](/azure/aks/csi-storage-drivers#enable-csi-storage-drivers-on-an-existing-cluster). Also, if your workloads use in-tree volumes, [migrate them to CSI-based volumes to enable backup support](/azure/aks/csi-migrate-in-tree-volumes).
3838

3939
- Azure Backup for AKS supports the following persistent volume types provisioned using the CSI driver:
4040
- **Azure Disk-based persistent volumes**: Supported disk SKUs include Standard HDD, Standard SSD, Premium SSD, Premium SSD v2, and Ultra Disks. While snapshot and restore operations are supported across all these SKUs, both operations for Premium SSD v2 and Ultra Disks may take longer. This is because the both processes involves copying data from the volume to a snapshot and back. As a result, the snapshot may appear available and the volume may be mounted before the underlying data copy operation is fully completed, causing a delay before the restored data becomes visible.
41-
- **Azure Files-based persistent volumes (SMB protocol only)**: Both Standard and Premium file shares are supported. The CSI driver version must be 1.32 or higher. Azure Files using NFS protocol is not supported.
41+
- **Azure Files-based persistent volumes (SMB protocol only)**: Both Standard and Premium file shares are supported. The CSI driver version must be 1.32 or higher. Azure Files using NFS protocol isn't supported.
4242

43-
- Both dynamically and statically provisioned volumes are supported; however, for static volumes, the *storage class* must be explicitly defined in the **YAML** specification—otherwise, the volume will be skipped during backup.
43+
- Both dynamically and statically provisioned volumes are supported; however, for static volumes, the *storage class* must be explicitly defined in the **YAML** specification—otherwise, the volume is skipped during backup.
4444

45-
- Azure Backup for AKS supports clusters that use either a [system-assigned](/azure/aks/use-managed-identity#update-an-existing-aks-cluster-to-use-a-system-assigned-managed-identity) or [user-assigned managed identity](/azure/aks/use-managed-identity#update-an-existing-cluster-to-use-a-user-assigned-managed-identity). Clusters configured with a service principal are not supported. To enable backup, update your cluster to use a system-assigned managed identity or a user-assigned managed identity.
45+
- Azure Backup for AKS supports clusters that use either a [system-assigned](/azure/aks/use-managed-identity#update-an-existing-aks-cluster-to-use-a-system-assigned-managed-identity) or [user-assigned managed identity](/azure/aks/use-managed-identity#update-an-existing-cluster-to-use-a-user-assigned-managed-identity). Clusters configured with a service principal aren't supported. To enable backup, update your cluster to use a system-assigned managed identity or a user-assigned managed identity.
4646

4747
- Azure Backup for AKS offers both Operational Tier and Vault Tier backups. Operational Tier backups consist of snapshots of supported persistent volume types (Azure Disks and Azure Files), along with metadata stored in the blob container specified during the installation of the backup extension. Vault Tier backups, on the other hand, are stored offsite—securely and outside of your tenant. Note that Vault Tier is only supported for Azure Disk-based volumes; Azure Files volumes are backed up to Operational Tier only. Using the backup policy, you can choose to enable both Operational and Vault Tier backups, or use only the Operational Tier.
4848

49-
- The Persistent Volume snapshots taken as part of Operational Tier backup are crash consistent by nature. Although Azure Backup for AKS does not currently support taking snapshots of all PVs at the exact same millisecond to achieve consistent snapshots across volumes.
49+
- The Persistent Volume snapshots taken as part of Operational Tier backup are crash consistent by nature. Although Azure Backup for AKS doesn't currently support taking snapshots of all PVs at the exact same millisecond to achieve consistent snapshots across volumes.
5050

51-
- The minimum supported backup frequency in Azure Backup for AKS is every 4 hours, with additional options for 6, 8, 12, and 24-hour intervals. Backups are expected to be completed within a 2-hour window from the scheduled start time. These frequencies apply to Operational Tier backups, allowing multiple backups per day. However, only the first successful backup in a 24-hour period is eligible to be transferred to the Vault Tier (applicable only to Azure Disk-based volumes). For Azure Files-based volumes, backup retention is limited to a maximum of 30 days in the Operational Tier. Once a backup is created in the Operational Tier, it can take up to four hours for it to be moved to the Vault Tier.
51+
- The minimum supported backup frequency in Azure Backup for AKS is every 4 hours, with another options for 6, 8, 12, and 24-hour intervals. Backups are expected to be completed within a 2-hour window from the scheduled start time. These frequencies apply to Operational Tier backups, allowing multiple backups per day. However, only the first successful backup in a 24-hour period is eligible to be transferred to the Vault Tier (applicable only to Azure Disk-based volumes). For Azure Files-based volumes, backup retention is limited to a maximum of 30 days in the Operational Tier. Once a backup is created in the Operational Tier, it can take up to four hours for it to be moved to the Vault Tier.
5252

5353
- Backup Vault and the AKS cluster should be located in the same region. However, they can reside in different subscriptions as long as they are within the same tenant.
5454

5555
- Azure Backup for AKS supports restoring backups to the same or a different AKS cluster using both Operational and Vault Tier backups. The target AKS cluster can be in the same subscription or a different subscription, known as *Cross-Subscription Restore*.
5656

5757
- When restoring from the Operational Tier, the target AKS cluster must be in the same region as the backups. However, if the backups are stored in the Vault Tier with *Geo-redundant storage setting* and *Cross-Region Restore* enabled on the Backup Vault, you can restore to a different region within an Azure Paired Region.
5858

59-
- To enable Azure Backup for AKS using Azure CLI, ensure you are using version 2.41.0 or later. You can upgrade the CLI by running the az upgrade command.
59+
- To enable Azure Backup for AKS using Azure CLI, ensure you're using version 2.41.0 or later. You can upgrade the CLI by running the az upgrade command.
6060

6161
- To enable Azure Backup for AKS using Terraform, use version 3.99.0 or later.
6262

63-
- Azure Backup for AKS requires a backup extension to be installed. This extension requires a storage account and preferably an empty blob container inside it as input while installing. Do not use a blob container with non backup related files.
63+
- Azure Backup for AKS requires a backup extension to be installed. This extension requires a storage account and preferably an empty blob container inside it as input while installing. Don't use a blob container with non backup related files.
6464

65-
- The storage account specified during the installation of the backup extension must be in the same region as the AKS cluster. Only General-purpose v2 storage accounts are supported; Premium storage accounts are not supported.
65+
- The storage account specified during the installation of the backup extension must be in the same region as the AKS cluster. Only General-purpose v2 storage accounts are supported; Premium storage accounts aren't supported.
6666

6767
- If the AKS cluster is deployed within a private virtual network, a private endpoint must be configured to enable backup operations.
6868

@@ -74,35 +74,35 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
7474

7575
- Azure Backup for AKS supports various backup-related reports. Currently, backup data can only be viewed by selecting “All” for workload type in the report filters. The supported backup reports [are available here](monitoring-and-alerts-overview.md)
7676

77-
- Azure Backup for AKS supports [Enhanced Soft Delete](backup-azure-enhanced-soft-delete-about.md) for backups stored in the Vault Tier, providing protection against accidental or malicious deletion. For backups stored in the Operational Tier, the underlying snapshots are not protected by soft delete and can be permanently deleted.
77+
- Azure Backup for AKS supports [Enhanced Soft Delete](backup-azure-enhanced-soft-delete-about.md) for backups stored in the Vault Tier, providing protection against accidental or malicious deletion. For backups stored in the Operational Tier, the underlying snapshots aren't protected by soft delete and can be permanently deleted.
7878

79-
- Azure Backup for AKS supports [Multi-user authorization (MUA)](multi-user-authorization-concept.md) allowing you to add an additional layer of protection to critical operations on your Backup vaults where backups are configured.
79+
- Azure Backup for AKS supports [Multi-user authorization (MUA)](multi-user-authorization-concept.md) allowing you to add an another layer of protection to critical operations on your Backup vaults where backups are configured.
8080

81-
- Azure Backup for AKS supports the [Immutable vault](backup-azure-immutable-vault-concept.md), which helps protect your backup data by preventing operations that could result in the loss of recovery points. However, WORM (Write Once, Read Many) storage for backups is not currently supported.
81+
- Azure Backup for AKS supports the [Immutable vault](backup-azure-immutable-vault-concept.md), which helps protect your backup data by preventing operations that could result in the loss of recovery points. However, WORM (Write Once, Read Many) storage for backups isn't currently supported.
8282

8383
- Azure Backup for AKS supports [Customer-Managed Key (CMK) encryption](backup-azure-immutable-vault-concept.md), but it is applicable only to backups stored in the Vault Tier.
8484

8585
- For successful backup and restore operations, the Backup vault's managed identity requires role assignments. For Azure Files-based volumes, both the source and target AKS clusters must have the **Storage File Data Privileged Contributor** role assigned on the storage account that hosts the file shares. For statically provisioned file shares, you must assign this role manually; for dynamically provisioned volumes, the Backup vault handles the role assignment automatically. If you don't have the required permissions, permission problems might happen during backup configuration or restore operations soon after you assign roles because the role assignments take a few minutes to take effect. [Learn about role definitions](azure-kubernetes-service-cluster-backup-concept.md#required-roles-and-permissions).
8686

8787
## Unsupported Scenarios and Limitations
8888

89-
- For Azure Files-based persistent volumes, only SMB protocol is supported. Azure Files using NFS protocol is not supported. Additionally, only file shares with 25,000 files or fewer are supported; larger file shares may result in restore failures. Azure Files with private network endpoints are not supported; only publicly accessible file shares (network endpoint type set to **All**) are supported.
89+
- For Azure Files-based persistent volumes, only SMB protocol is supported. Azure Files using NFS protocol isn't supported. Additionally, only file shares with 25,000 files or fewer are supported; larger file shares may result in restore failures. Azure Files with private network endpoints aren't supported; only publicly accessible file shares (network endpoint type set to **All**) are supported.
9090

91-
- Azure Blob Storage and Azure Container Storage based persistent volumes are not supported by AKS Backup. If you're using these types of persistent volumes in your AKS clusters, you can back them up separately using dedicated Azure Backup solutions. For more information, see [Azure Blob Storage backup](blob-backup-overview.md).
91+
- Azure Blob Storage and Azure Container Storage based persistent volumes aren't supported by AKS Backup. If you're using these types of persistent volumes in your AKS clusters, you can back them up separately using dedicated Azure Backup solutions. For more information, see [Azure Blob Storage backup](blob-backup-overview.md).
9292

9393
- Any unsupported persistent volume types are automatically skipped during the backup process for the AKS cluster. This includes in-tree volumes (where provisioner: `kubernetes.io/azure-disk` or `kubernetes.io/azure-file`) which must be migrated to CSI driver-based volumes.
9494

9595
- The Backup Extension cannot be installed on Windows-based node pools or ARM64-based node pools. AKS clusters using such nodes should provision a separate Linux-based node pool (preferably a system node pool with x86-based processors) to support the installation of the Backup Extension.
9696

9797
- Azure Backup for AKS is currently not supported for Network Isolated AKS clusters.
9898

99-
- Do not install the AKS Backup Extension alongside Velero or any Velero-based backup solutions, as this can cause conflicts during backup and restore operations. Additionally, ensure that your Kubernetes resources do not use labels or annotations containing the prefix `velero.io`, unless explicitly required by a supported scenario. The presence of such metadata may lead to unexpected behavior.
99+
- Don't install the AKS Backup Extension alongside Velero or any Velero-based backup solutions, as this can cause conflicts during backup and restore operations. Additionally, ensure that your Kubernetes resources do not use labels or annotations containing the prefix `velero.io`, unless explicitly required by a supported scenario. The presence of such metadata may lead to unexpected behavior.
100100

101-
- Modifying the backup configuration or the snapshot resource group assigned to a backup instance during AKS cluster backup setup is not supported. You cannot update existing backup instances to include Azure Files-based volumes; you must create a new backup instance to back up these volumes.
101+
- Modifying the backup configuration or the snapshot resource group assigned to a backup instance during AKS cluster backup setup isn't supported. You cannot update existing backup instances to include Azure Files-based volumes; you must create a new backup instance to back up these volumes.
102102

103103
- The following namespaces are skipped from Backup Configuration and cannot be configured for backups: `kube-system`, `kube-node-lease`, `kube-public`.
104104

105-
- Azure Backup does not automatically scale out AKS nodes, it only restores data and associated resources. Autoscaling is managed by AKS itself, using features like the Cluster Autoscaler. If autoscaling is enabled on the target cluster, it should handle resource scaling automatically. Before restoring, ensure that the target cluster has sufficient resources to avoid restore failures or performance issues.
105+
- Azure Backup doesn't automatically scale out AKS nodes, it only restores data and associated resources. Autoscaling is managed by AKS itself, using features like the Cluster Autoscaler. If autoscaling is enabled on the target cluster, it should handle resource scaling automatically. Before restoring, ensure that the target cluster has sufficient resources to avoid restore failures or performance issues.
106106

107107
- Here are the AKS backup limits:
108108

@@ -124,9 +124,9 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
124124

125125
- **Custom Storage Classes**: To back up Azure Files-based volumes created using custom storage classes, you must also back up the storage class itself.
126126

127-
- **Storage Account Locks**: Do not apply read or delete locks on storage accounts containing file shares, as this will prevent deletion of recovery points after their retention period expires.
127+
- **Storage Account Locks**: Don't apply read or delete locks on storage accounts containing file shares, as this will prevent deletion of recovery points after their retention period expires.
128128

129-
- **Cross-Region/Subscription Restore**: For Azure Files-based volumes, restore to a different subscription or region is not supported. Azure Files snapshots are tied to the storage account and cannot be restored across subscriptions or regions.
129+
- **Cross-Region/Subscription Restore**: For Azure Files-based volumes, restore to a different subscription or region isn't supported. Azure Files snapshots are tied to the storage account and cannot be restored across subscriptions or regions.
130130

131131
- **Mixed Workloads**: You can back up both Azure Disk and Azure Files volumes in the same backup instance. However, if you need different backup targets (Vault Tier for Disks and Operational Tier for Files), you must create separate backup instances—one for each resource type.
132132

@@ -149,7 +149,7 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
149149

150150
- *Disaster Recovery* feature is only available between Azure Paired Regions (if backup is configured in a Geo Redundant Backup vault with Cross Region Restore enabled on them). The backup data is only available in an Azure paired region. For example, if you have an AKS cluster in East US that is backed up in a Geo Redundant Backup vault with Cross Region Restore enabled on them, the backup data is also available in West US for restore.
151151

152-
- In the Vault Tier, only one scheduled recovery point is created per day, providing a Recovery Point Objective (RPO) of upto 24 hours in the primary region. In the secondary region, replication of this recovery point can take up to 12 additional hours, resulting in an effective RPO of up to 36 hours.
152+
- In the Vault Tier, only one scheduled recovery point is created per day, providing a Recovery Point Objective (RPO) of upto 24 hours in the primary region. In the secondary region, replication of this recovery point can take up to 12 another hours, resulting in an effective RPO of up to 36 hours.
153153

154154
- When a backup is created in the Operational Tier and becomes eligible for Vault Tier, it may take up to four hours for the tiering process to begin.
155155

0 commit comments

Comments
 (0)