gitpod icon indicating copy to clipboard operation
gitpod copied to clipboard

[kots]: allow for backup of resources in KOTS

Open mrsimonemms opened this issue 3 years ago • 1 comments

Description

Allows for triggering snapshots of your application in KOTS

Related Issue(s)

Fixes #9926

How to test

  • Install via KOTS
  • Create your Velero instance (see below or I can help with this)
  • Go to "Snapshots" in your KOTS dashboard
  • Under "Full snapshots", click "Start a snapshot" (this will probably trigger "ooops, something went wrong" - just refresh as this is a KOTS bug)

Creating your Velero instance

Velero maintains AWS, GCP and Azure as first-class citizens

  1. Following the GCP setup instructions
  2. The velero install command in the docs needs to have --use-restic appended to it, ie
velero install \                                           
    --provider gcp \
    --plugins velero/velero-plugin-for-gcp:v1.5.0 \
    --bucket $BUCKET \
    --secret-file ./credentials-velero \
    --use-restic \
    --wait

Restoring a Backup

  1. Ensure you have no gitpod or velero namespace on your cluster
  2. Install Velero using the velero install command above
  3. Run kubectl kots backup ls and select the backup ID you want
  4. Run kubectl kots restore --from-backup <backup-id>

After a few minutes, you should have everything restored.

Release Notes

[kots]: allow for backup of resources in KOTS

Documentation

Werft options:

  • [ ] /werft with-preview

mrsimonemms avatar Aug 08 '22 17:08 mrsimonemms

️✅ There are no secrets present in this pull request anymore.

If these secrets were true positive and are still valid, we highly recommend you to revoke them. Once a secret has been leaked into a git repository, you should consider it compromised, even if it was deleted immediately. Find here more information about risks.


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

Our GitHub checks need improvements? Share your feedbacks!

gitguardian[bot] avatar Aug 09 '22 09:08 gitguardian[bot]