LightBeam Documentation
Installer GuidesData SourcesPlaybooksInsightsPrivacyOpsGovernance
  • 💡What is LightBeam?
  • 🚀Getting Started
    • ⚙️Installer Guides
      • Pre-Requisites / Security Configurations
        • Firewall Requirements
        • Securing LightBeam on EKS with AWS Certificate Manager on Elastic Load Balancer
        • Configure HTTPS for LightBeam Endpoint FQDN Standalone deployment
        • Using Custom Certificates with LightBeam
        • Securing LightBeam on GKE with Google Certificate Manager and GCE Ingress
      • Core
        • LightBeam Deployment Instructions
        • LightBeam Installer
        • Web App Deployment
        • LightBeam Diagnostics
        • LightBeam Cluster Backup & Restore using Velero
      • Platform Specific
        • AWS
        • Microsoft Azure
        • Google Cloud (GKE)
        • Standalone Virtual Machine
        • Deployment on an Existing Managed Kubernetes Cluster
        • Azure Marketplace Deployment
      • Integration and Setup
        • Setting Up AWS PrivateLink for RDS-EKS Interaction
        • Twingate and LightBeam Integration Guide
        • Data Subject Request Web Application Server
        • Generate CSR for LightBeam
  • 🧠Core Features
    • 🔦Spectra AI
      • 🔗Data Sources
        • Cloud Platforms
          • AWS Auto Discovery
          • GCP Auto Discovery
        • Databases and Datalakes
          • PostgreSQL
          • Aurora (PostgreSQL)
          • Snowflake
          • MS SQL
          • MySQL
          • Aurora (MySQL)
          • BigQuery
          • AWS Redshift
          • Oracle
          • DynamoDB
          • MongoDB
          • CosmosDB (PostgreSQL)
          • CosmosDB (MongoDB)
          • CosmosDB (NoSQL)
          • Looker
          • AWS Glue
          • Databricks
          • SAP HANA
          • CSV Files as a Datasource
        • Messaging
          • Gmail
          • Slack
          • MS Teams
          • MS Outlook
        • Developer Tools
          • Zendesk
          • ServiceNow
          • Jira
          • GitHub
          • Confluence
        • File Repositories
          • NetDocuments
          • AWS S3
          • Azure Blob
          • Google Drive
          • OneDrive
          • SharePoint
          • Viva Engage
          • Dropbox
          • Box
          • SMB
        • CRM
          • Hubspot
          • Salesforce
          • Automated Data Processing (ADP)
          • Marketo
          • Iterable
          • MS Dynamics 365 Sales
          • Salesforce Marketing Cloud
      • 🔔PlayBooks
        • What is LightBeam Playbooks?
        • Policy and Alerts
          • Types of Policies
          • How to create a rule set
            • File Extension Filter
          • Configuring Retention Policies
          • Viewing Alerts
          • Sub Alerts
            • Reassigning Sub-Alerts
            • Sub-alert States
          • Levels of Actions on Alerts
          • User Roles and Permissions
            • Admin View
            • Alert Owner View
            • Onboarding New Users
              • User Management
              • Okta Integration
              • Alert Assignment Settings
              • Email Notifications
            • Planned Enhancements
          • Audit Logs
          • No Scan List
          • Permit List
          • Policy in read-only mode
      • 📊Insights
        • Entity Workflow
        • Document Classification
        • Attribute Management Overview
          • Attributes Page View
          • Attribute Sets
          • Creating Custom Attribute
          • Attributes List
        • Template Builder
        • Label Management
          • MIP Integration
          • Google Labels Integration
      • 🗃️Reporting
        • Delta Reporting
        • Executive Report
        • LightBeam Lens
      • Scanning and Redaction of Files
        • On-demand scanning
      • How-to Guides
        • Leveraging LightBeam insights for structured data sources
      • LightBeam Dashboard Outlay
      • Risk Score
    • 🏛️PrivacyOps
      • Data Subject Request (DSR)
        • What is DSR?
        • Accessing the DSR Module
        • DSR Form Builder (DPO View)
          • Creating a New DSR Form
            • Using a Predefined Template
            • Creating a Custom Form
          • Form Configuration
          • Form Preview and Publishing
          • Multi-Form Management
          • Messaging Templates
        • Form Submission & Email Verification (Data Subject View)
        • DSR Management Dashboard (DPO View)
        • Processing DSR Requests
          • Data Protection Officer (DPO) Workflow
          • Self Service Workflow (Direct Validation)
          • Data Source Owner (DSO) Workflow
        • DSR Report
      • 🚧Consent Management
        • Overview
        • Consent Logs
        • Preference Centre
        • Settings
      • 🍪Cookie Consent
        • Dashboard
        • Banners
        • Domains
        • Settings
        • CMP Deployment Guide for Google Tag Manager
        • FAQs
      • 🔏Privacy Impact Assessment (PIA)
        • PIA Templates
        • PIA Assessment Workflow
        • Collaborator View
        • Process Owner Login View (With Collaborator)
        • Filling questionnaire without collaborator
        • Submitting the assessment for DPO review
        • DPO review process
        • Marking the assessment as reviewed
        • Editing and resubmitting assessments after DPO review
        • Revoke review request
        • Edit Reviewer
        • PIA Reports
      • ⏺️Records of Processing Activity (RoPA)
        • Creating a RoPA Template
          • How to clone a template
          • How to use a template
        • How to create a process
          • Adding Process Details
          • Adding Data Elements
          • Adding Data Subjects
          • Adding Data Retention
          • Adding Safeguards
          • Adding Transfers
          • Adding a Custom Section
          • Setting a Review Schedule
          • Data Flow Diagram
        • How to add a collaborator
        • Overview Section
        • Generating a RoPA Report Using LightBeam
        • Collaborator working on a ticket
    • 🛡️Governance
      • Access
        • Dashboard
        • Users
        • Groups
        • Objects
        • Active Directory Settings
        • Access Governance at a Data Source Level
        • Policies and Alerting
        • Access Governance Statistics
        • Governance Module Dashboard
      • Privacy At Partners
  • 📊Tools & Resources
    • 🔀API Documentation
      • API to Create Reports for Structured Datasource
    • ❓Onboarding Assessments
      • Structured Datasource Onboarding Questionnaire
        • MongoDB/CosmosDB Questionnaire
        • Oracle Datasource Questionnaire
      • SMB Questionnaire
    • 🛠️Administration
      • Audit Logs
      • SMTP
        • Basic and oAuth Configuration
      • User Management
        • SAML Identity Providers
          • Okta
            • LightBeam Okta SAML Configuration Guide
          • Azure
            • Azure AD SAML Configuration for LightBeam
          • Google
            • Google IDP
        • Local User Management
          • Adding a User to the LightBeam Dashboard
          • Reset Default Admin Password
  • 📚Support & Reference
    • 📅Release Notes
      • LightBeam v2.2.0
      • Reporting Release Notes
      • Q1 2024 Key Enhancements
      • Q2 2024 Key Enhancements
      • Q3 2024 Key Enhancements
      • Q4 2024 Key Enhancements
    • 📖Glossary
Powered by GitBook
On this page
  • Why Velero
  • Requirements
  • Install Velero CLI
  • Configure OIDC Identity Provider:
  • Install python modules:
  • LightBeam Spectra:
  • Install velero plugins and take backup:
  • Perform a backup on the same K8s cluster:
  • Perform restore on same K8s cluster:
  • LightBeam PrivacyOps:
  • Perform a backup on the same K8s cluster:
  • Perform restore on same K8s cluster:
  • Backup Operations with Velero CLI:
  • Configure Schedule
  • Restore Operations with Velero CLI:
  1. Getting Started
  2. Installer Guides
  3. Core

LightBeam Cluster Backup & Restore using Velero

Backup and restore are only supported for the AWS cloud provider and EKS cluster.

Why Velero

Velero is a powerful tool designed for backup and restore operations within Kubernetes clusters. Here's why Velero might be the right choice for you:

  • Data Protection: Velero helps protect your applications and data by taking backups of your entire cluster or selected resources. It enables you to capture a consistent snapshot of your applications and their associated volumes, ensuring that you can recover your data in case of accidental deletions, hardware failures, or other disasters.

  • Application Mobility: With Velero, you can easily migrate your applications and data between Kubernetes clusters. It provides a seamless way to transfer your workloads and associated resources from one cluster to another, helping with cluster upgrades, cloud migrations, or setting up disaster recovery environments.

  • Selective Backup and Restore: Velero allows you to define backup schedules and specify which resources to include or exclude from backups. You can choose to back up entire namespaces, specific applications, or even individual resources. This flexibility enables you to customize your backup and restore operations based on your specific needs.

  • Consistency and Data Integrity: Velero ensures the integrity of your backups by capturing a point-in-time snapshot of your applications and their associated volumes. It maintains the consistency of your data by coordinating the backup process with the underlying storage provider, ensuring that all data is captured accurately.

  • Incremental Backups: Velero supports incremental backups, which means that after the initial full backup, subsequent backups only capture the changes made since the last backup. This approach reduces backup time and storage requirements while still providing a comprehensive backup history.

  • Restoration Flexibility: Velero allows you to restore your applications and data to the same cluster or a different cluster. You can recover individual resources, entire namespaces, or even the entire cluster. This flexibility enables you to perform granular or full-scale restores as needed.

  • Extensibility: Velero is extensible and can be integrated with various storage providers and cloud platforms. It supports different object storage solutions, allowing you to choose the most suitable option for your backup storage needs. It also provides hooks for executing custom pre- and post-backup/restore operations, enabling you to perform additional tasks or integrations during the backup and restore process.

Requirements

For the clustering services if the volume of one of the replicas becomes unavailable then a new volume for the replica should work which means clustering should take care of the data.

Note: To get the Backup and restore scripts email us at: support@lightbeam.ai

Install Velero CLI

Velero utilizes an AWS S3-compliant object store for backup storage. In this guide, we'll use AWS S3 as our storage solution.

  • Linux:

wget https://github.com/vmware-tanzu/velero/releases/download/v1.11.0/velero-v1.11.0-linux-amd64.tar.gz
tar -xvf velero-v1.11.0-linux-amd64.tar.gz
mv velero-v1.11.0-linux-amd64/velero /usr/local/bin
  • Mac:

brew install velero

Configure OIDC Identity Provider:

To create an IAM OIDC identity provider for your cluster with the AWS Management Console
- Open the Amazon EKS console at https://console.aws.amazon.com/eks/home#/clusters.
- In the left pane, select Clusters, and then select the name of your cluster on the Clusters page.
- In the Details section on the Overview tab, note the value of the OpenID Connect provider URL.
- Open the IAM console at https://console.aws.amazon.com/iam/.
- In the left navigation pane, choose Identity Providers under Access Management. If a Provider is listed that matches the URL for your cluster, then you already have a provider for your cluster. If a provider isn't listed that matches the URL for your cluster, then you must create one.
- To create a provider, choose Add provider.
- For Provider type, select OpenID Connect.
- For Provider URL, enter the OIDC provider URL for your cluster, and then choose Get thumbprint.
- For Audience, enter s and choose Add provider.

Install python modules:

pip install -r requirements.txt

LightBeam Spectra:

EKS Cluster / LightBeam Cluster

  • Nature: Stateful services, serving as Metadata.

  • Storage: Uses persistent volumes. Everything resides within the same cluster and AWS account.

Cluster Components

  • Compute: These are EC2 nodes that function as the worker nodes of the EKS Cluster.

  • Storage: The cluster uses EBS (Elastic Block Store) volumes for persistent storage.

Backup Strategy:

  • The complete lightbeam namespace undergoes backup, facilitating easy restoration on the same or an alternate cluster.

  • Depending on the chosen cloud provider, it's essential to use a volume snapshot CSI driver. This necessitates the configuration of a backup location for both storage and subsequent retrieval of backups.

Install velero plugins and take backup:

python velero.py --install --backup --provider aws

Note: We need to make sure velero is installed on the K8s cluster before taking a backup or performing a restore operation and velero can be installed using --install flag while taking backup performing store with required environment variables or providing input as prompt to the command.

  • The command requires the following input:

BUCKET_NAME (name of the bucket where backups will be stored)
AWS_REGION (AWS region)
AWS_ACCOUNT_ID (AWS account identifier)
EKS_OIDC_PROVIDER_URL (remove the https://)

above values can be set through the environment or passed as input as the above script prompts for input. ex:

export BUCKET_NAME="test"
export AWS_REGION="us-east-1"
export AWS_ACCOUNT_ID="12345678980"
export EKS_OIDC_PROVIDER_URL="oidc.eks.us-east-1.amazonaws.com/id/7346878943434163424141"

Perform a backup on the same K8s cluster:

cd lightbeam-chart/installer/velero-backup-restore/
python velero.py --backup --provider aws

Perform restore on same K8s cluster:

cd lightbeam-chart/installer/velero-backup-restore/
python velero.py --restore --provider aws

LightBeam PrivacyOps:

Perform a backup on the same K8s cluster:

cd lightbeam-chart/installer/velero-backup-restore/
python velero.py --backup --provider aws --privacy_ops

Perform restore on same K8s cluster:

cd lightbeam-chart/installer/velero-backup-restore/
python velero.py --restore --provider aws --privacy_ops

Backup Operations with Velero CLI:

  • Create a Backup:

    velero backup create lb-backup --include-namespaces lightbeam
  • List Backups:

    velero backup get
  • Check Logs of a Backup:

    velero backup logs <backup-name>
  • Describe a Backup:

    velero backup describe <backup-name>
  • Delete a Backup:

    velero backup delete <backup-name>

Configure Schedule

The Schedule API type is used as a repeatable request for the Velero server to perform a backup for a given cron notation. Once created, the Velero Server will start the backup process. It will then wait for the next valid point of the given cron expression and execute the backup process on a repeating basis.

When we install the velero server-side component on the EKS cluster we also create a cron schedule to take backup of the entire EKS cluster on a daily basis and default retention is 9 days.

  • List Schedules:

velero schedule get
  • Describe a Schedule:

velero schedule describe <schedule-name>

Restore Operations with Velero CLI:

  • Create a Restore:

    velero restore create 
  • List Restores:

    velero get restores
  • Describe a Restore:

    velero describe restore <restore-name>
  • Check Logs of a Restore:

    velero restore logs <restore-name>
  • Delete a Restore:

    velero restore delete <restore-name>
  • Uninstall Velero:

    kubectl delete namespace/velero clusterrolebinding/velero
    kubectl delete cards -l component=velero

PreviousLightBeam DiagnosticsNextPlatform Specific

Last updated 11 months ago

🚀
⚙️