You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/aks-backup-faq.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ sections:
37
37
answer: |
38
38
The pods associated with the AKS Backup Extension are deployed on the NodePools of the AKS cluster. To successfully deploy these pods and prevent them from interfering with your application resources, ensure the following:
39
39
- The AKS cluster must have the agent node pool with the `Linux` operating system including both Azure Linux and Ubuntu.
40
-
- The agent node pool must have VMSS SKUs based on non-ARM64 based architecture.
40
+
- The agent node pool must have Azure Virtual Machine Scale Sets SKUs based on non-ARM64 based architecture.
41
41
- The agent node pool must have the taint `CriticalAddOnOnly` associated with it. This taint is automatically added to the node pool when the AKS Cluster is created via Portal. It ensures that only critical add-on pods, such as the AKS Backup Extension pods, are scheduled on the node pool. This prevents interference with your application workloads and ensures that backup operations are isolated from other workloads in the cluster. In case the taint isn't present, you can add it manually before installing the AKS Backup Extension.
42
42
43
43
- question: |
@@ -70,10 +70,10 @@ sections:
70
70
As part of the Backup Extension installation, a User Identity also gets created in the Node Resource Group of the cluster. This identity is used by the AKS Backup Extension to access the Azure resources required for backup operations. The User Identity is assigned `Storage Blob Data Contributor` role over the storage account to enable access for the Extension. Whenever extension is uninstalled from the AKS cluster, the identity also gets deleted.
71
71
72
72
- question: |
73
-
Why should Velero shouldn't be used in the cluster alongside of AKS Backup Extension?
73
+
Why Velero shouldn't be used in the cluster alongside of AKS Backup Extension?
74
74
answer: |
75
75
Velero is a third-party backup solution for Kubernetes that can conflict with the AKS Backup Extension. It's recommended to use only the AKS Backup Extension for backup operations in a cluster, but not both simultaneously.
76
-
AKS Backup Extension also deploys Velero CRDs in the cluster. In case standalone Velero is installed in the AKS cluster along with Backup Extension and the versions used by each installation differ at any point in time can lead to failures due to contract mismatches. Additionally, custom Velero configurations created by the you—such as a VolumeSnapshotClass for Velero CSI-based snapshotting—might interfere with the AKS Backup snapshotting setup. Velero annotations containing `velero.io` applied to various resources in the cluster can also impact the behavior of AKS Backup in unsupported ways.
76
+
AKS Backup Extension also deploys Velero CRDs in the cluster. In case standalone Velero is installed in the AKS cluster along with Backup Extension and the versions used by each installation differ at any point in time can lead to failures due to contract mismatches. Additionally, custom Velero configurations created by yousuch as a VolumeSnapshotClass for Velero CSI-based snapshotting—might interfere with the AKS Backup snapshotting setup. Velero annotations containing `velero.io` applied to various resources in the cluster can also impact the behavior of AKS Backup in unsupported ways.
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-backup-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -454,7 +454,7 @@ You incur charges for:
454
454
455
455
* **Snapshot fee**: Azure Backup for AKS protects disk- and file-based Persistent Volumes by creating snapshots. For Azure Disks, snapshots are stored in a resource group in your subscription; for Azure Files, they’re stored alongside the file share in your subscription. These snapshots incur standard snapshot storage charges. Because the snapshots aren’t copied to the Backup vault, vault storage charges don’t apply. Although if vault tier is enabled, snapshot charges will still remain applicable. For more information on snapshot pricing, see [Managed Disks pricing](https://azure.microsoft.com/pricing/details/managed-disks/) and [Azure Files pricing](https://azure.microsoft.com/pricing/details/storage/files/).
456
456
457
-
* **Backup storage fee**: Azure Backup for AKS also supports storing backups in the Vault Tier. You can store backups in the Vault Tier by defining retention rules for vault standard in the backup policy, with one restore point per day eligible to be moved into the vault. Restore points stored in the Vault Tier are charged a separate fee (called a Backup storage fee) according to the total data stored (in gigabytes) and redundancy type enable on the Backup vault.
457
+
* **Backup storage fee**: Azure Backup for AKS also supports storing backups in the Vault Tier. You can store backups in the Vault Tier by defining retention rules for vault standard in the backup policy, with one restore point per day elligible to be moved into the vault. Restore points stored in the Vault Tier are charged a separate fee (called a Backup storage fee) according to the total data stored (in gigabytes) and redundancy type enable on the Backup vault.
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-backup-support-matrix.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
37
37
- Azure Backup for AKS supports only CSI driver-based persistent volumes. In-tree volume plugins aren't supported. Ensure that the CSI driver and snapshot are enabled for your cluster. If they're disabled, [enable these settings](/azure/aks/csi-storage-drivers#enable-csi-storage-drivers-on-an-existing-cluster). Also, if your workloads use in-tree volumes, [migrate them to CSI-based volumes to enable backup support](/azure/aks/csi-migrate-in-tree-volumes).
38
38
39
39
- Azure Backup for AKS supports the following persistent volume types provisioned using the CSI driver:
40
-
-**Azure Disk-based persistent volumes**: Supported disk SKUs include Standard HDD, Standard SSD, Premium SSD, Premium SSD v2, and Ultra Disks. While snapshot and restore operations are supported across all these SKUs, both operations for Premium SSD v2 and Ultra Disks may take longer. This is because the both processes involves copying data from the volume to a snapshot and back. As a result, the snapshot may appear available and the volume may be mounted before the underlying data copy operation is fully completed, causing a delay before the restored data becomes visible.
40
+
-**Azure Disk-based persistent volumes**: Supported disk SKUs include Standard HDD, Standard SSD, Premium SSD, Premium SSD v2, and Ultra Disks. While snapshot and restore operations are supported across all these SKUs, both operations for Premium SSD v2 and Ultra Disks may take longer. This is because both processes involves copying data from the volume to a snapshot and back. As a result, the snapshot may appear available and the volume may be mounted before the underlying data copy operation is fully completed, causing a delay before the restored data becomes visible.
41
41
-**Azure Files-based persistent volumes (SMB protocol only)**: Both Standard and Premium file shares are supported. The CSI driver version must be 1.32 or higher. Azure Files using NFS protocol isn't supported.
42
42
43
43
- Both dynamically and statically provisioned volumes are supported; however, for static volumes, the *storage class* must be explicitly defined in the **YAML** specification—otherwise, the volume is skipped during backup.
@@ -60,7 +60,7 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
60
60
61
61
- To enable Azure Backup for AKS using Terraform, use version 3.99.0 or later.
62
62
63
-
- Azure Backup for AKS requires a backup extension to be installed. This extension requires a storage account and preferably an empty blob container inside it as input while installing. Don't use a blob container with non backup related files.
63
+
- Azure Backup for AKS requires a backup extension to be installed. This extension requires a storage account and preferably an empty blob container inside it as input while installing. Do not use a blob container with non backup related files.
64
64
65
65
- The storage account specified during the installation of the backup extension must be in the same region as the AKS cluster. Only General-purpose v2 storage accounts are supported; Premium storage accounts aren't supported.
66
66
@@ -76,7 +76,7 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
76
76
77
77
- Azure Backup for AKS supports [Enhanced Soft Delete](backup-azure-enhanced-soft-delete-about.md) for backups stored in the Vault Tier, providing protection against accidental or malicious deletion. For backups stored in the Operational Tier, the underlying snapshots aren't protected by soft delete and can be permanently deleted.
78
78
79
-
- Azure Backup for AKS supports [Multi-user authorization (MUA)](multi-user-authorization-concept.md) allowing you to add an another layer of protection to critical operations on your Backup vaults where backups are configured.
79
+
- Azure Backup for AKS supports [Multi-user authorization (MUA)](multi-user-authorization-concept.md) allowing you to add another layer of protection to critical operations on your Backup vaults where backups are configured.
80
80
81
81
- Azure Backup for AKS supports the [Immutable vault](backup-azure-immutable-vault-concept.md), which helps protect your backup data by preventing operations that could result in the loss of recovery points. However, WORM (Write Once, Read Many) storage for backups isn't currently supported.
82
82
@@ -130,13 +130,13 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
130
130
131
131
-**Mixed Workloads**: You can back up both Azure Disk and Azure Files volumes in the same backup instance. However, if you need different backup targets (Vault Tier for Disks and Operational Tier for Files), you must create separate backup instances—one for each resource type.
132
132
133
-
-**CLI Support**: Currently, ability to backup AFS based Persistent Volumes is only available by Azure Portal. Powershell, Azure CLI, Terraform and other programmatic tools are currently not supported.
133
+
-**CLI Support**: Currently, ability to backup AFS based Persistent Volumes is only available by Azure portal. Powershell, Azure CLI, Terraform and other programmatic tools are currently not supported.
134
134
135
135
-**File Size limits**: Only Fileshares with ≤ 25,000 files are supported. Larger fileshares may result in failures during restoration.
136
136
137
137
-**NFS File Support**: Fileshares using SMB protocol are only supported with NFS protocol based Files are skipped while creating a backup.
138
138
139
-
-**Retention Duration**: Backup policies used for File-based Persistent Volumes support a maximum retention of 30 days. This limit is imposed due the maximum of 200 snapshots that can exist concurrently for an Azure File Share.
139
+
-**Retention Duration**: Backup policies used for File-based Persistent Volumes support a maximum retention of 30 days. This limit is imposed due to the maximum of 200 snapshots that can exist concurrently for an Azure File Share.
140
140
141
141
142
142
### Supported Scenarios and limitations specific for Vaulted backup and Cross Region Restore
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-manage-backups.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,7 +133,7 @@ To ensure successful backup and restore operations, manually update the resource
133
133
134
134

135
135
136
-
1.Click on the extension titled "azure-aks-backup".
136
+
1.Select on the extension titled "azure-aks-backup".
137
137
138
138

139
139
@@ -150,7 +150,7 @@ To ensure successful backup and restore operations, manually update the resource
150
150
151
151
#### Verifying the Changes
152
152
153
-
After applying the changes, either wait for a scheduled backup to run or initiate an on-demand backup. If you still experience an OOMKilled failure, repeat the steps above and gradually increase memory limits and if it still persists increase `resources.limits.cpu` parameter also.
153
+
Once changes are applied, either wait for a scheduled backup to run or initiate an on-demand backup. If you still experience an OOMKilled failure, repeat the steps above and gradually increase memory limits and if it still persists increase `resources.limits.cpu` parameter also.
154
154
155
155
### Monitor a backup operation
156
156
@@ -253,19 +253,19 @@ AKS Backup now allows you to modify the configuration of an existing backup inst
253
253
254
254
1. Find your AKS cluster backup instance, open it and click on **Edit backup instance** on top.
255
255
256
-
:::image type="content" source="./media/quick-backup-aks/start-edit-backup-instance.png" alt-text="Screenshot showing how to open edit backup instance experience" lightbox="./media/quick-backup-aks/start-edit-backup-instance.png":::
256
+
:::image type="content" source="./media/quick-backup-aks/start-edit-backup-instance.png" alt-text="Screenshot showing how to open the edit backup instance experience." lightbox="./media/quick-backup-aks/start-edit-backup-instance.png":::
257
257
258
-
1. On the new screen, options are available to modify the backup policy, managed identity being used by backup vault and the backup instance configuration. Click on **Select** in the **Modify backup instace** section
258
+
1. On the new screen, options are available to modify the backup policy, managed identity being used by backup vault and the backup instance configuration. Select on **Select** in the **Modify backup instance** section.
259
259
260
260
:::image type="content" source="./media/quick-backup-aks/modify-backup-instance.png" alt-text="Screenshot showing how to initiate editing backup configuration." lightbox="./media/quick-backup-aks/modify-backup-instance.png":::
261
261
262
-
1. On the right hand side pane, to include Files based volumes to backup, open the dropdown **Select Volume Types** and select the checkbox for **Azure SMB Fileshares**. Additionally select the checkbox **Include Secrets**. You can use this pane, to update any other exisiting backup configurations including labels. Then click on **Select**.
262
+
1. On the right hand side pane, to include Files based volumes to backup, open the dropdown **Select Volume Types** and select the checkbox for **Azure SMB Fileshares**. Additionally select the checkbox **Include Secrets**. You can use this pane, to update any other existing backup configurations including labels. Then click on **Select**.
263
263
264
264
:::image type="content" source="./media/quick-backup-aks/select-backup-instance.png" alt-text="Screenshot showing how to select resources including Azure Files volumes." lightbox="./media/quick-backup-aks/select-backup-instance.png":::
265
265
266
266
1. After updating the backup configuration, click **Validate** to ensure all prerequisites for using Azure Files are met. If required roles are missing for the Backup vault identity, a role assignment error will appear. If you have the necessary permissions on the relevant resources, you can resolve this by clicking **Grant Permissions**.
267
267
268
-
1.Click on **Apply** to finish off the modification of backup instance configuration.
268
+
1.Select on **Apply** to finish off the modification of backup instance configuration.
Copy file name to clipboardExpand all lines: articles/backup/tutorial-backup-aks-azure-files.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ If you haven't already installed the Backup extension, follow these steps:
78
78
1. Select **Create** and wait for the extension installation to complete.
79
79
80
80
> [!NOTE]
81
-
> If you already have the Backup extension installed, verify it's version v0.0.03004.544 or later. If needed, enable auto-upgrade to update to the latest version.
81
+
> If you already have the Backup extension installed, verify its version v0.0.03004.544 or later. If needed, enable auto-upgrade to update to the latest version.
82
82
83
83
### Configure backup for AKS cluster with Azure Files
84
84
@@ -108,7 +108,7 @@ If you haven't already installed the Backup extension, follow these steps:
108
108
-**Persistent Volumes**: Select **Azure Files** to back up Azure Files-based volumes.
109
109
-**Secrets**: Enable **Backup Secrets** if you're using Kubernetes secrets to store storage account keys (required for restore operations).
110
110
111
-
:::image type="content" source="./media/quick-backup-aks/resources-to-backup.png" alt-text="Screenshot showing how to select resources including Azure Files volumes." lightbox="./media/quick-backup-aks/resources-to-backup-afs.png":::
111
+
:::image type="content" source="./media/quick-backup-aks/resources-to-backup.png" alt-text="Screenshot showing how to select resources including Azure Files volumes." lightbox="./media/quick-backup-aks/resources-to-backup-azure-files.png":::
112
112
113
113
1. For **Snapshot resource group**, select the resource group to store Azure Disk snapshots (required even if you're only backing up Azure Files volumes). Then select **Validate**.
114
114
@@ -129,9 +129,9 @@ To create an immediate backup:
129
129
1. Track the backup progress in **Backup Jobs**.
130
130
131
131
1. Once the backup completes, verify the Azure Files snapshot:
132
-
- Go to the storage account containing your file share.
133
-
- Navigate to the file share used by your persistent volume.
134
-
- Select **Snapshots** to view the backup snapshot created by Azure Backup.
132
+
1. Go to the storage account containing your file share.
133
+
1. Navigate to the file share used by your persistent volume.
134
+
1. Select **Snapshots** to view the backup snapshot created by Azure Backup.
135
135
136
136
### Verify backup configuration
137
137
@@ -157,7 +157,7 @@ This section explains how you can modify an existing backup instance and start b
157
157
158
158
1. Find your AKS cluster backup instance, open it and click on **Edit backup instance** on top.
159
159
160
-
:::image type="content" source="./media/quick-backup-aks/start-edit-backup-instance.png" alt-text="Screenshot showing how to open edit backup instance experience" lightbox="./media/quick-backup-aks/start-edit-backup-instance.png":::
160
+
:::image type="content" source="./media/quick-backup-aks/start-edit-backup-instance.png" alt-text="Screenshot showing how to open edit backup instance experience." lightbox="./media/quick-backup-aks/start-edit-backup-instance.png":::
161
161
162
162
1. On the new screen, options are available to modify the backup policy, managed identity being used by backup vault and the backup instance configuration. Click on **Select** in the **Modify backup instance** section
0 commit comments