Suscríbase al feed

Recently one of our Customers asked how to move from a standalone RHACM setup to an Active/Passive Hub one given that the Hub Backup and Restore feature went GA on Red Hat Advanced Cluster Management 2.5.

The Customer Scenario

The Customer had a 3 data-centers setup, each one with its own RHACM Cluster Hub responsible of managing the local OCP clusters. They planned their setup with disaster recovery in mind so there were no object name collisions. The initial DR plan was to manually import OpenShift clusters of the failed Cluster Hub into one of the other two.

rhacm-consolidation-standalone-hubs

All the policies were synchronized on all the Cluster Hubs via GitOps, while this approach permitted sort of hot standby capability - importing clusters would've been enough to start applying policies on them - it caused a lot of policies with unknown state since the clusters where they were supposed to be applied weren't present.

Another problem was the loss of cluster creation data in case of Cluster Hub failure: our Customer leveraged RHACM to create OpenShift clusters on VMware infrastructure running on their 3 data-centers, this data would not be automatically imported into another Cluster Hub.

Given all of that, Customer was really keen to adopt the new Business Continuity model offered by RHACM 2.5 Backup and Restore feature. We'll not discuss the setup of the feature here - you can find a great explanation here - we'll focus instead on the procedure adopted to move from 3 standalone RHACM Cluster Hubs to one Active Cluster Hub and two Passive Cluster Hubs.

rhacm-consolidation-active-passive-hubs

Moving Standalone Cluster Hubs to Active/Passive Procedure

RHACM Backup and Restore feature was leveraged by Red Hat Consulting to move the managed clusters from the soon-to-be Passive Hubs into the designated Primary Hub by following this procedure:

  1. Hub Backup was configured on all the RHACM cluster hubs, each Hub initially pointed to a dedicated prefix on the object storage bucket to have a valid backup for each of the hubs separately.

    Hub1 example DataProtectionApplication:

    apiVersion: oadp.openshift.io/v1alpha1
    kind: DataProtectionApplication
    metadata:
    name: dpa-hub1
    spec:
    configuration:
    velero:
    defaultPlugins:
    - openshift
    - aws
    restic:
    enable: false
    backupLocations:
    - name: default
    velero:
    provider: aws
    default: true
    objectStorage:
    bucket: my-bucket
    prefix: hub1 # <<<< Set a dedicated prefix for each of the hubs
    config:
    region: us-east-1
    profile: "default"
    credential:
    name: cloud-credentials
    key: cloud
    snapshotLocations:
    - name: default
    velero:
    provider: aws
    config:
    region: us-west-2
    profile: "default"
  2. Once all the Hub backups are completed, delete the BackupSchedule CR to stop the Hub backups.

  3. Delete the DataProtectionApplication from the Primary Hub and recreate it using the prefix of the first Cluster Hub you wish to make Passive.

    Hub1 example DataProtectionApplication pointing to Hub2 prefix:

    apiVersion: oadp.openshift.io/v1alpha1
    kind: DataProtectionApplication
    metadata:
    name: dpa-hub1
    spec:
    configuration:
    velero:
    defaultPlugins:
    - openshift
    - aws
    restic:
    enable: false
    backupLocations:
    - name: default
    velero:
    provider: aws
    default: true
    objectStorage:
    bucket: my-bucket
    prefix: hub2 # <<<< points to hub2 backup location
    config:
    region: us-east-1
    profile: "default"
    credential:
    name: cloud-credentials
    key: cloud
    snapshotLocations:
    - name: default
    velero:
    provider: aws
    config:
    region: us-west-2
    profile: "default"
  4. Verify that the velero pod is running and check if the BackupStorageLocation is available:

    oc -n open-cluster-management-backup get backupstoragelocation
    NAME PHASE LAST VALIDATED AGE DEFAULT
    dpa-hub1-1 Available 58s 2d true

    You can also verify in the velero pod logs that the backups are discovered and imported.

  5. Detach all the managed clusters from the Cluster Hub that you are making Passive, wait for the process to complete.

  6. On the Primary Hub, create a one-shot Restore Custom Resource to import the managed clusters previously attached to the hub you are making Passive:

    apiVersion: cluster.open-cluster-management.io/v1beta1
    kind: Restore
    metadata:
    name: import-hub2-clusters
    namespace: open-cluster-management-backup
    spec:
    cleanupBeforeRestore: None # IMPORTANT: prevent the restore to delete anything from the Primary Hub during the restore
    veleroManagedClustersBackupName: latest
    veleroCredentialsBackupName: latest
    veleroResourcesBackupName: latest

    ATTENTION: it is really important to set the cleanupBeforeRestore value to None to prevent accidental deletion of restored objects from the Primary Hub.

    Check the Restore status by running

    oc -n open-cluster-management-backup describe restore import-hub2-clusters

    This Restore can be safely deleted once completed with the command

    oc -n open-cluster-management-backup delete restore import-hub2-clusters 
  7. Repeat the steps from 3 to 6 to move other Cluster Hubs to a Passive role.

  8. When you are done moving the managed clusters from the Passive Hubs to the Primary Hub, you can complete the configuration of the Active/Passive feature.

    Set a prefix on your DataProtectionApplication Custom Resource that will be used for both Active and Passive Hubs:

    apiVersion: oadp.openshift.io/v1alpha1
    kind: DataProtectionApplication
    metadata:
    name: dpa-hub1
    spec:
    configuration:
    velero:
    defaultPlugins:
    - openshift
    - aws
    restic:
    enable: false
    backupLocations:
    - name: default
    velero:
    provider: aws
    default: true
    objectStorage:
    bucket: my-bucket
    prefix: active-passive # <<<< final location of the backups, passive hubs will restore from here
    config:
    region: us-east-1
    profile: "default"
    credential:
    name: cloud-credentials
    key: cloud
    snapshotLocations:
    - name: default
    velero:
    provider: aws
    config:
    region: us-west-2
    profile: "default"

    Create the same DataProtectionApplication Custom Resource on all the Cluster Hubs.

  9. On the Primary Hub create the BackupSchedule Custom Resource to start taking backups to the new location.

  10. On the Passive Hubs create a one-shot Restore with the cleanupBeforeRestore set to CleanupAll to prepare the former standalone Hub to receive restores from the Primary Hub without any left-over:

    apiVersion: cluster.open-cluster-management.io/v1beta1
    kind: Restore
    metadata:
    name: restore-with-cleanupall
    namespace: open-cluster-management-backup
    spec:
    cleanupBeforeRestore: CleanupAll # This will cleanup ALL the resources from the Passive hub
    veleroManagedClustersBackupName: skip
    veleroCredentialsBackupName: latest
    veleroResourcesBackupName: latest

    Only the resources that would be backed up will be deleted by this Restore, the task will honor backup exclusion label.

    This Restore, once completed, can be safely deleted with the command

    oc -n open-cluster-management-backup delete restore restore-with-cleanup
  11. On the Passive Hubs create the Restore Custom Resource to periodically restore passive data from the Primary Hub: cluster_v1beta1_restore_passive_sync.yaml

Common pitfalls

  • Pay attention to the name of the objects, if you find name collisions deal with them prior to switch to Active/Passive.

  • Policies applied to the Cluster Hub itself are backed up automatically, if those are different across your Cluster Hubs, exclude them using the label

    velero.io/exclude-from-backup: "true"

Conclusions

Applying the procedure described earlier allowed the Customer to move to the new Business Continuity feature offered by Red Hat Advanced Cluster Management 2.5.


Sobre los autores

UI_Icon-Red_Hat-Close-A-Black-RGB

Navegar por canal

automation icon

Automatización

Las últimas novedades en la automatización de la TI para los equipos, la tecnología y los entornos

AI icon

Inteligencia artificial

Descubra las actualizaciones en las plataformas que permiten a los clientes ejecutar cargas de trabajo de inteligecia artificial en cualquier lugar

open hybrid cloud icon

Nube híbrida abierta

Vea como construimos un futuro flexible con la nube híbrida

security icon

Seguridad

Vea las últimas novedades sobre cómo reducimos los riesgos en entornos y tecnologías

edge icon

Edge computing

Conozca las actualizaciones en las plataformas que simplifican las operaciones en el edge

Infrastructure icon

Infraestructura

Vea las últimas novedades sobre la plataforma Linux empresarial líder en el mundo

application development icon

Aplicaciones

Conozca nuestras soluciones para abordar los desafíos más complejos de las aplicaciones

Original series icon

Programas originales

Vea historias divertidas de creadores y líderes en tecnología empresarial