Skip to content

Commit 608c14c

Browse files
committed
updates recommended by Diana Richards
1 parent 2777efb commit 608c14c

10 files changed

Lines changed: 22 additions & 22 deletions

articles/backup/aks-backup-faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ sections:
3737
answer: |
3838
The pods associated with the AKS Backup Extension are deployed on the NodePools of the AKS cluster. To successfully deploy these pods and prevent them from interfering with your application resources, ensure the following:
3939
- The AKS cluster must have the agent node pool with the `Linux` operating system including both Azure Linux and Ubuntu.
40-
- The agent node pool must have VMSS SKUs based on non-ARM64 based architecture.
40+
- The agent node pool must have Azure Virtual Machine Scale Sets SKUs based on non-ARM64 based architecture.
4141
- The agent node pool must have the taint `CriticalAddOnOnly` associated with it. This taint is automatically added to the node pool when the AKS Cluster is created via Portal. It ensures that only critical add-on pods, such as the AKS Backup Extension pods, are scheduled on the node pool. This prevents interference with your application workloads and ensures that backup operations are isolated from other workloads in the cluster. In case the taint isn't present, you can add it manually before installing the AKS Backup Extension.
4242
4343
- question: |
@@ -70,10 +70,10 @@ sections:
7070
As part of the Backup Extension installation, a User Identity also gets created in the Node Resource Group of the cluster. This identity is used by the AKS Backup Extension to access the Azure resources required for backup operations. The User Identity is assigned `Storage Blob Data Contributor` role over the storage account to enable access for the Extension. Whenever extension is uninstalled from the AKS cluster, the identity also gets deleted.
7171
7272
- question: |
73-
Why should Velero shouldn't be used in the cluster alongside of AKS Backup Extension?
73+
Why Velero shouldn't be used in the cluster alongside of AKS Backup Extension?
7474
answer: |
7575
Velero is a third-party backup solution for Kubernetes that can conflict with the AKS Backup Extension. It's recommended to use only the AKS Backup Extension for backup operations in a cluster, but not both simultaneously.
76-
AKS Backup Extension also deploys Velero CRDs in the cluster. In case standalone Velero is installed in the AKS cluster along with Backup Extension and the versions used by each installation differ at any point in time can lead to failures due to contract mismatches. Additionally, custom Velero configurations created by the yousuch as a VolumeSnapshotClass for Velero CSI-based snapshotting—might interfere with the AKS Backup snapshotting setup. Velero annotations containing `velero.io` applied to various resources in the cluster can also impact the behavior of AKS Backup in unsupported ways.
76+
AKS Backup Extension also deploys Velero CRDs in the cluster. In case standalone Velero is installed in the AKS cluster along with Backup Extension and the versions used by each installation differ at any point in time can lead to failures due to contract mismatches. Additionally, custom Velero configurations created by you such as a VolumeSnapshotClass for Velero CSI-based snapshotting—might interfere with the AKS Backup snapshotting setup. Velero annotations containing `velero.io` applied to various resources in the cluster can also impact the behavior of AKS Backup in unsupported ways.
7777
7878
- question: |
7979
What is a snapshot resource group?

articles/backup/azure-kubernetes-service-backup-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -454,7 +454,7 @@ You incur charges for:
454454

455455
* **Snapshot fee**: Azure Backup for AKS protects disk- and file-based Persistent Volumes by creating snapshots. For Azure Disks, snapshots are stored in a resource group in your subscription; for Azure Files, they’re stored alongside the file share in your subscription. These snapshots incur standard snapshot storage charges. Because the snapshots aren’t copied to the Backup vault, vault storage charges don’t apply. Although if vault tier is enabled, snapshot charges will still remain applicable. For more information on snapshot pricing, see [Managed Disks pricing](https://azure.microsoft.com/pricing/details/managed-disks/) and [Azure Files pricing](https://azure.microsoft.com/pricing/details/storage/files/).
456456

457-
* **Backup storage fee**: Azure Backup for AKS also supports storing backups in the Vault Tier. You can store backups in the Vault Tier by defining retention rules for vault standard in the backup policy, with one restore point per day eligible to be moved into the vault. Restore points stored in the Vault Tier are charged a separate fee (called a Backup storage fee) according to the total data stored (in gigabytes) and redundancy type enable on the Backup vault.
457+
* **Backup storage fee**: Azure Backup for AKS also supports storing backups in the Vault Tier. You can store backups in the Vault Tier by defining retention rules for vault standard in the backup policy, with one restore point per day elligible to be moved into the vault. Restore points stored in the Vault Tier are charged a separate fee (called a Backup storage fee) according to the total data stored (in gigabytes) and redundancy type enable on the Backup vault.
458458

459459
## Related content
460460

articles/backup/azure-kubernetes-service-cluster-backup-support-matrix.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
3737
- Azure Backup for AKS supports only CSI driver-based persistent volumes. In-tree volume plugins aren't supported. Ensure that the CSI driver and snapshot are enabled for your cluster. If they're disabled, [enable these settings](/azure/aks/csi-storage-drivers#enable-csi-storage-drivers-on-an-existing-cluster). Also, if your workloads use in-tree volumes, [migrate them to CSI-based volumes to enable backup support](/azure/aks/csi-migrate-in-tree-volumes).
3838

3939
- Azure Backup for AKS supports the following persistent volume types provisioned using the CSI driver:
40-
- **Azure Disk-based persistent volumes**: Supported disk SKUs include Standard HDD, Standard SSD, Premium SSD, Premium SSD v2, and Ultra Disks. While snapshot and restore operations are supported across all these SKUs, both operations for Premium SSD v2 and Ultra Disks may take longer. This is because the both processes involves copying data from the volume to a snapshot and back. As a result, the snapshot may appear available and the volume may be mounted before the underlying data copy operation is fully completed, causing a delay before the restored data becomes visible.
40+
- **Azure Disk-based persistent volumes**: Supported disk SKUs include Standard HDD, Standard SSD, Premium SSD, Premium SSD v2, and Ultra Disks. While snapshot and restore operations are supported across all these SKUs, both operations for Premium SSD v2 and Ultra Disks may take longer. This is because both processes involves copying data from the volume to a snapshot and back. As a result, the snapshot may appear available and the volume may be mounted before the underlying data copy operation is fully completed, causing a delay before the restored data becomes visible.
4141
- **Azure Files-based persistent volumes (SMB protocol only)**: Both Standard and Premium file shares are supported. The CSI driver version must be 1.32 or higher. Azure Files using NFS protocol isn't supported.
4242

4343
- Both dynamically and statically provisioned volumes are supported; however, for static volumes, the *storage class* must be explicitly defined in the **YAML** specification—otherwise, the volume is skipped during backup.
@@ -60,7 +60,7 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
6060

6161
- To enable Azure Backup for AKS using Terraform, use version 3.99.0 or later.
6262

63-
- Azure Backup for AKS requires a backup extension to be installed. This extension requires a storage account and preferably an empty blob container inside it as input while installing. Don't use a blob container with non backup related files.
63+
- Azure Backup for AKS requires a backup extension to be installed. This extension requires a storage account and preferably an empty blob container inside it as input while installing. Do not use a blob container with non backup related files.
6464

6565
- The storage account specified during the installation of the backup extension must be in the same region as the AKS cluster. Only General-purpose v2 storage accounts are supported; Premium storage accounts aren't supported.
6666

@@ -76,7 +76,7 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
7676

7777
- Azure Backup for AKS supports [Enhanced Soft Delete](backup-azure-enhanced-soft-delete-about.md) for backups stored in the Vault Tier, providing protection against accidental or malicious deletion. For backups stored in the Operational Tier, the underlying snapshots aren't protected by soft delete and can be permanently deleted.
7878

79-
- Azure Backup for AKS supports [Multi-user authorization (MUA)](multi-user-authorization-concept.md) allowing you to add an another layer of protection to critical operations on your Backup vaults where backups are configured.
79+
- Azure Backup for AKS supports [Multi-user authorization (MUA)](multi-user-authorization-concept.md) allowing you to add another layer of protection to critical operations on your Backup vaults where backups are configured.
8080

8181
- Azure Backup for AKS supports the [Immutable vault](backup-azure-immutable-vault-concept.md), which helps protect your backup data by preventing operations that could result in the loss of recovery points. However, WORM (Write Once, Read Many) storage for backups isn't currently supported.
8282

@@ -130,13 +130,13 @@ China East 2, China East 3, China North 2, China North 3, US GOV Arizona, US GOV
130130

131131
- **Mixed Workloads**: You can back up both Azure Disk and Azure Files volumes in the same backup instance. However, if you need different backup targets (Vault Tier for Disks and Operational Tier for Files), you must create separate backup instances—one for each resource type.
132132

133-
- **CLI Support**: Currently, ability to backup AFS based Persistent Volumes is only available by Azure Portal. Powershell, Azure CLI, Terraform and other programmatic tools are currently not supported.
133+
- **CLI Support**: Currently, ability to backup AFS based Persistent Volumes is only available by Azure portal. Powershell, Azure CLI, Terraform and other programmatic tools are currently not supported.
134134

135135
- **File Size limits**: Only Fileshares with ≤ 25,000 files are supported. Larger fileshares may result in failures during restoration.
136136

137137
- **NFS File Support**: Fileshares using SMB protocol are only supported with NFS protocol based Files are skipped while creating a backup.
138138

139-
- **Retention Duration**: Backup policies used for File-based Persistent Volumes support a maximum retention of 30 days. This limit is imposed due the maximum of 200 snapshots that can exist concurrently for an Azure File Share.
139+
- **Retention Duration**: Backup policies used for File-based Persistent Volumes support a maximum retention of 30 days. This limit is imposed due to the maximum of 200 snapshots that can exist concurrently for an Azure File Share.
140140

141141

142142
### Supported Scenarios and limitations specific for Vaulted backup and Cross Region Restore

articles/backup/azure-kubernetes-service-cluster-manage-backups.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ To ensure successful backup and restore operations, manually update the resource
133133

134134
![Screenshot shows how to select Extensions + Applications.](./media/azure-kubernetes-service-cluster-manage-backups/aks-cluster-extension-applications.png)
135135

136-
1. Click on the extension titled "azure-aks-backup".
136+
1. Select on the extension titled "azure-aks-backup".
137137

138138
![Screenshot shows how to open Backup extension settings.](./media/azure-kubernetes-service-cluster-manage-backups/aks-cluster-extension-azure-aks-backup.png)
139139

@@ -150,7 +150,7 @@ To ensure successful backup and restore operations, manually update the resource
150150

151151
#### Verifying the Changes
152152

153-
After applying the changes, either wait for a scheduled backup to run or initiate an on-demand backup. If you still experience an OOMKilled failure, repeat the steps above and gradually increase memory limits and if it still persists increase `resources.limits.cpu` parameter also.
153+
Once changes are applied, either wait for a scheduled backup to run or initiate an on-demand backup. If you still experience an OOMKilled failure, repeat the steps above and gradually increase memory limits and if it still persists increase `resources.limits.cpu` parameter also.
154154

155155
### Monitor a backup operation
156156

@@ -253,19 +253,19 @@ AKS Backup now allows you to modify the configuration of an existing backup inst
253253

254254
1. Find your AKS cluster backup instance, open it and click on **Edit backup instance** on top.
255255

256-
:::image type="content" source="./media/quick-backup-aks/start-edit-backup-instance.png" alt-text="Screenshot showing how to open edit backup instance experience" lightbox="./media/quick-backup-aks/start-edit-backup-instance.png":::
256+
:::image type="content" source="./media/quick-backup-aks/start-edit-backup-instance.png" alt-text="Screenshot showing how to open the edit backup instance experience." lightbox="./media/quick-backup-aks/start-edit-backup-instance.png":::
257257

258-
1. On the new screen, options are available to modify the backup policy, managed identity being used by backup vault and the backup instance configuration. Click on **Select** in the **Modify backup instace** section
258+
1. On the new screen, options are available to modify the backup policy, managed identity being used by backup vault and the backup instance configuration. Select on **Select** in the **Modify backup instance** section.
259259

260260
:::image type="content" source="./media/quick-backup-aks/modify-backup-instance.png" alt-text="Screenshot showing how to initiate editing backup configuration." lightbox="./media/quick-backup-aks/modify-backup-instance.png":::
261261

262-
1. On the right hand side pane, to include Files based volumes to backup, open the dropdown **Select Volume Types** and select the checkbox for **Azure SMB Fileshares**. Additionally select the checkbox **Include Secrets**. You can use this pane, to update any other exisiting backup configurations including labels. Then click on **Select**.
262+
1. On the right hand side pane, to include Files based volumes to backup, open the dropdown **Select Volume Types** and select the checkbox for **Azure SMB Fileshares**. Additionally select the checkbox **Include Secrets**. You can use this pane, to update any other existing backup configurations including labels. Then click on **Select**.
263263

264264
:::image type="content" source="./media/quick-backup-aks/select-backup-instance.png" alt-text="Screenshot showing how to select resources including Azure Files volumes." lightbox="./media/quick-backup-aks/select-backup-instance.png":::
265265

266266
1. After updating the backup configuration, click **Validate** to ensure all prerequisites for using Azure Files are met. If required roles are missing for the Backup vault identity, a role assignment error will appear. If you have the necessary permissions on the relevant resources, you can resolve this by clicking **Grant Permissions**.
267267

268-
1. Click on **Apply** to finish off the modification of backup instance configuration.
268+
1. Select on **Apply** to finish off the modification of backup instance configuration.
269269

270270

271271
#### Stop Protection and Retain Data

articles/backup/azure-kubernetes-service-cluster-restore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Restore Azure Kubernetes Service (AKS) using Azure Backup
2+
title: Restore Azure Kubernetes Service (AKS) using Azure Backup.
33
description: This article explains how to restore backed-up Azure Kubernetes Service (AKS) using Azure Backup.
44
ms.topic: how-to
55
ms.service: azure-backup
-912 Bytes
Loading

articles/backup/media/quick-backup-aks/resources-to-backup-afs.png renamed to articles/backup/media/quick-backup-aks/resources-to-backup-azure-files.png

File renamed without changes.
42 Bytes
Loading
28.6 KB
Loading

articles/backup/tutorial-backup-aks-azure-files.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ If you haven't already installed the Backup extension, follow these steps:
7878
1. Select **Create** and wait for the extension installation to complete.
7979

8080
> [!NOTE]
81-
> If you already have the Backup extension installed, verify it's version v0.0.03004.544 or later. If needed, enable auto-upgrade to update to the latest version.
81+
> If you already have the Backup extension installed, verify its version v0.0.03004.544 or later. If needed, enable auto-upgrade to update to the latest version.
8282
8383
### Configure backup for AKS cluster with Azure Files
8484

@@ -108,7 +108,7 @@ If you haven't already installed the Backup extension, follow these steps:
108108
- **Persistent Volumes**: Select **Azure Files** to back up Azure Files-based volumes.
109109
- **Secrets**: Enable **Backup Secrets** if you're using Kubernetes secrets to store storage account keys (required for restore operations).
110110

111-
:::image type="content" source="./media/quick-backup-aks/resources-to-backup.png" alt-text="Screenshot showing how to select resources including Azure Files volumes." lightbox="./media/quick-backup-aks/resources-to-backup-afs.png":::
111+
:::image type="content" source="./media/quick-backup-aks/resources-to-backup.png" alt-text="Screenshot showing how to select resources including Azure Files volumes." lightbox="./media/quick-backup-aks/resources-to-backup-azure-files.png":::
112112

113113
1. For **Snapshot resource group**, select the resource group to store Azure Disk snapshots (required even if you're only backing up Azure Files volumes). Then select **Validate**.
114114

@@ -129,9 +129,9 @@ To create an immediate backup:
129129
1. Track the backup progress in **Backup Jobs**.
130130

131131
1. Once the backup completes, verify the Azure Files snapshot:
132-
- Go to the storage account containing your file share.
133-
- Navigate to the file share used by your persistent volume.
134-
- Select **Snapshots** to view the backup snapshot created by Azure Backup.
132+
1. Go to the storage account containing your file share.
133+
1. Navigate to the file share used by your persistent volume.
134+
1. Select **Snapshots** to view the backup snapshot created by Azure Backup.
135135

136136
### Verify backup configuration
137137

@@ -157,7 +157,7 @@ This section explains how you can modify an existing backup instance and start b
157157

158158
1. Find your AKS cluster backup instance, open it and click on **Edit backup instance** on top.
159159

160-
:::image type="content" source="./media/quick-backup-aks/start-edit-backup-instance.png" alt-text="Screenshot showing how to open edit backup instance experience" lightbox="./media/quick-backup-aks/start-edit-backup-instance.png":::
160+
:::image type="content" source="./media/quick-backup-aks/start-edit-backup-instance.png" alt-text="Screenshot showing how to open edit backup instance experience." lightbox="./media/quick-backup-aks/start-edit-backup-instance.png":::
161161

162162
1. On the new screen, options are available to modify the backup policy, managed identity being used by backup vault and the backup instance configuration. Click on **Select** in the **Modify backup instance** section
163163

0 commit comments

Comments
 (0)