This page show you how to clone a database cluster in Kubernetes using local backup of an AlloyDB Omni database cluster.
The steps on this page assume that your source and target database clusters are created on Google Kubernetes Engine, and the backup disks are Compute Engine persistent disks. It also assumes that the Compute Engine persistent disks that are used as a backup in the database aren't used by any other database cluster.
The following workflow explains the steps used to clone:
- Identify the backup disk information, such as the persistent volume name and Compute Engine persistent disk handler, for the source database cluster backup disk.
- Create a
PersistentVolume
resource to use an existing backup disk on the target database cluster to access the backup disk of the source database cluster. - Create and apply the
DBCluster
resource manifest file on the target database cluster with thelivenessProbe
parameter disabled and backup disk information added. - Use
pgBackRest
commands to verify source backups can be accessed. - Use
pgBackRest
commands to restore the backup to the target database cluster.
Before you begin
- Make sure you have access to the backup disk where your source database cluster backup is stored.
- The source database cluster backup disk must be able to mount to the target database cluster. For more information about steps to ensure your disk is mountable, see Persistent Volumes.
- Since the source backup disk is mounted to the target database cluster, the
pgBackRest.conf
file is reused as-is. - Ensure you are logged in to the database as the
postgres
user.
Get source backup disk information
As part of the restore process, determine the backup disk Persistent Volume Claim (PVC) name for your source database cluster. PVCs are used within Kubernetes to manage persistent storage for applications.
The following sample commands help locate the underlying PV name and the Compute Engine persistent disk handler. In the example, all the backup disks are Compute Engine persistent disks, which can be accessed across Compute Engine VMs using the disk handler identifier.
Connect to your target database cluster to find the PVC name:
kubectl get pvc -n DB_CLUSTER_NAMESPACE | grep DB_CLUSTER_NAME | grep backupdisk
Replace the following:
DB_CLUSTER_NAMESPACE
: the Kubernetes namespace for this backup plan. It must match the namespace of the database cluster.DB_CLUSTER_NAME
: the name of this database cluster—for example,my-db-cluster
.
The following is the sample response.
backupdisk-al-fe8c-my-db-cluster-0 Bound pvc-36d8f05d-ef1a-4750-ac01-9bb330c15b3a 10Gi RWO standard-rwo 5d21h
Use the backup disk PVC name from the previous step-—for example,
backupdisk-al-fe8c-my-db-cluster-0
, to find the underlying PV name and Compute Engine persistent disk handler:kubectl get pvc/PVC_NAME -n DB_CLUSTER_NAME -o jsonpath={.spec.volumeName}
Replace the following:
PVC_NAME
: the PVC name of the backup disk from response in the previous step—for examplebackupdisk-al-fe8c-dbcluster-sample-0
.
Export the configurations based on the PV name as variables to be used in the subsequent sections:
export DISK_SIZE=$(kubectl get pv/PV_NAME -o jsonpath="{.spec.capacity.storage}") export FS_TYPE=$(kubectl get pv/PV_NAME -o jsonpath="{.spec.csi.fsType}") export VOLUME_HANDLER=$(kubectl get pv/PV_NAME -o jsonpath="{.spec.csi.volumeHandle}") export STORAGE_CLASS=$(kubectl get pv/PV_NAME -o jsonpath="{.spec.storageClassName}")
Replace the following:
PV_NAME
: the PV name of the backup disk from response in the previous step.
Create persistent volume resource in the target database cluster
Using the disk handler name, create a PersistentVolume
resource.
In the target database cluster, create the
PersistentVolume
manifest file:apiVersion: v1 kind: PersistentVolume metadata: name: backupdisk spec: storageClassName: "${STORAGE_CLASS}" capacity: storage: "${DISK_SIZE}" accessModes: - ReadWriteOnce csi: driver: pd.csi.storage.gke.io volumeHandle: "${VOLUME_HANDLER}" fsType: "${FS_TYPE}"
Apply the manifest file:
kubectl apply -f PV_FILENAME
Replace the following:
- PV_FILENAME: the name of the
PersistentVolume
manifest file created in the previous step.
- PV_FILENAME: the name of the
Create a target database cluster
Create a database cluster by temporarily disabling the livenessProbe
parameter while the restore process completes.
Create the
DBCluster
manifest file:apiVersion: v1 kind: Secret metadata: name: db-pw-DB_CLUSTER_NAME type: Opaque data: DB_CLUSTER_NAME: "ENCODED_PASSWORD" --- apiVersion: alloydbomni.dbadmin.goog/v1 kind: DBCluster metadata: name: DB_CLUSTER_NAME spec: primarySpec: availabilityOptions: livenessProbe: "Disabled" adminUser: passwordRef: name: db-pw-DB_CLUSTER_NAME resources: memory: 100Gi cpu: 10 disks: - name: DataDisk size: 40Gi - name: BackupDisk size: ${DISK_SIZE} storageClass: ${STORAGE_CLASS} volumeName: backupdisk
Replace the following:
DB_CLUSTER_NAME
: the name of this database cluster—for example,my-db-cluster
.ENCODED_PASSWORD
: the database login password for the defaultpostgres
user role, encoded as a base64 string—for example,Q2hhbmdlTWUxMjM=
forChangeMe123
.
Apply the manifest file:
kubectl apply -f DBCLUSTER_FILENAME
Replace the following:
- DBCLUSTER_FILENAME: the name of the
DBCluster
manifest file created in the previous step.
- DBCLUSTER_FILENAME: the name of the
Use the kubectl describe
command to verify that the database cluster resource is in the READY
status.
Verify source backups in target database cluster
Run pgBackRest
commands to verify that the source database cluster backups are accessible on the target database cluster.
In your target database cluster, find the database cluster pod details:
kubectl get pod -l "alloydbomni.internal.dbadmin.goog/dbcluster=DB_CLUSTER_NAME, alloydbomni.internal.dbadmin.goog/task-type=database"
The response includes the name of the cluster database pod.
Log into the database pod:
kubectl exec -ti DATABASE_POD_NAME -- /bin/bash
Replace the following:
- DATABASE_POD_NAME : the name of the database cluster pod from the previous step.
Stop the pod before updating the
pgBackRest
configuration file:supervisorctl.par stop postgres
Verify the source backups in the database cluster pod:
pgbackrest --config-path=/backup --stanza=db --repo=1 info
The following is a sample response:
stanza: db status: ok cipher: none db (current) wal archive min/max (15): 000000010000000000000002/00000001000000000000000D full backup: 20240213-231400F timestamp start/stop: 2024-02-13 23:14:00+00 / 2024-02-13 23:17:14+00 wal start/stop: 000000010000000000000003 / 000000010000000000000003 database size: 38.7MB, database backup size: 38.7MB repo1: backup set size: 4.6MB, backup size: 4.6MB incr backup: 20240213-231400F_20240214-000001I timestamp start/stop: 2024-02-14 00:00:01+00 / 2024-02-14 00:00:05+00 wal start/stop: 00000001000000000000000D / 00000001000000000000000D database size: 38.7MB, database backup size: 488.3KB repo1: backup set size: 4.6MB, backup size: 84.2KB backup reference list: 20240213-231400F
The timestamps in the response are used either to restore the full backup or to restore from a point in time from the recovery window.
Restore the backup in the target database cluster
After you identify the backup or a point in time you want to restore to, run pgBackRest
commands in your target database cluster. For more information about these commands, see Restore Command.
The following are some sample pgBackRest
restore commands:
Restore from a backup
pgbackrest --config-path=/backup --stanza=db --repo=1 restore --set=20240213-231400F --type=immediate --target-action=promote --delta --link-all --log-level-console=info
Restore from a point in time
pgbackrest --config-path=/backup --stanza=db --repo=1 restore --target="2024-01-22 11:27:22" --type=time --target-action=promote --delta --link-all --log-level-console=info
Restart the pod
After the restore command completes successfully, you can start the postgres
process.
supervisorctl.par start postgres
After the postgres
process starts, you can connect to the primary instance and run queries to verify that the data is restored from the backup. For more information, see Connect to AlloyDB Omni running on Kubernetes.