Step 1:
Create Object Bucket Claim.
When object bucket claim is created it creates a secret and configmap with the same name in the same namespace as object bucket claim.
Step 2:
Extract the secret and configmap which will provide the bucket name, access key id and access key password.
Step 3:
Create secret with name as cloud-credentials in namespace openshift-adp using key and secret extracted from secret created in object bucket claims namespace.
cat credentials-velero
(default)
aws access key_id=AWS_ACCESS_KEY_ID
aws secret access_key=AWS_SECRET_ACCESS_KEY
oc create secret generic cloud-credentials -n openshift-adp --from-file=cloud=credentials-velero
Step 4:
Create DPA (Data Protection Application) resource once the cloud-credentials secret is created.
Step 5:
Label the volumesnapshotclass for OADP to use volume snapshot class.
oc label volumesnapshotclass <volume-snapshot-storageclass> velero.io/csi-volumesnapshot-class="true"
Confirm Deletion policy is set to Retain.
oc get volumesnapshotclass -l velero.io/csi-volumesnapshot-class=true --show-labels
Step 6:
Verify OADP is configured properly
oc -n openshift-adp get deploy
oc -n openshift-adp get daemonset
oc -n openshift-adp get backupstoragelocation
oc-n openshift-adp describe backupstoragelocation backupstoragelocation-name
s3cmd --configure
Note: OpenShift Data Foundation requires "signature_v2: True" option set in .s3cmd
@Ravi_Shanker Thanks for sharing.
If I may just summarise in main points /steps what you have shared, here it is :
Step 1: Create ObjectBucketClaim (OBC)
Step 2: Extract Credentials
Step 3: Create cloud-credentials Secret
Step 4: Deploy the DPA (Data Protection Application)
Step 5: Configure CSI Volume Snapshots
Step 6: Verify OADP Deployment
Step 7( optional ) : For OpenShift Data Foundation, enable signature_v2
Red Hat
Learning Community
A collaborative learning environment, enabling open source skill development.