Sign InTry Free

Restore a TiDB Cluster from EBS Volume Snapshots

This document describes how to restore backup data in AWS EBS snapshots from S3 storage to a TiDB cluster.

The restore method described in this document is implemented based on CustomResourceDefinition (CRD) in TiDB Operator. For the underlying implementation, BR is used to restore the data. BR stands for Backup & Restore, which is a command-line tool for distributed backup and recovery of the TiDB cluster data. The backup data based on AWS EBS snapshots contains two parts, the snapshots of the TiDB cluster data volumes, and the backup metadata of the snapshots and the cluster.

Requirements

  • Snapshot restore is applicable to TiDB Operator v1.4.0 or above, and TiDB v6.3.0 or above.

  • Snapshot restore only supports restoring to a cluster with the same number of TiKV nodes and volumes configuration. That is, the number of TiKV nodes and volume configurations is identical between the restore cluster and backup cluster.

  • Snapshot restore is currently not supported for TiFlash, TiCDC, DM, and TiDB Binlog nodes.

  • Snapshot restore supports only the default configuration (3000IOPS/125 MB) of GP3. To perform restore using other configurations, you can specify the volume type or configuration, such as --volume-type=io2, --volume-iops=7000, or --volume-throughput=400.

    spec: backupType: full restoreMode: volume-snapshot serviceAccount: tidb-backup-manager toolImage: pingcap/br:v7.5.0 br: cluster: basic clusterNamespace: tidb-cluster sendCredToTikv: false options: - --volume-type=gp3 - --volume-iops=7000 - --volume-throughput=400

Step 1. Set up the environment for EBS volume snapshot restore

Before using TiDB Operator to restore backup metadata and EBS snapshots from S3 storage to TiDB, prepare the restore environment by following the steps below:

  1. Download the file backup-rbac.yaml.

  2. Create the RBAC-related resources required for the restore in the test2 namespace by running the following command:

    kubectl apply -f backup-rbac.yaml -n test2
  3. Grant permissions to access remote storage.

    To restore data from Amazon S3, you need to grant permissions to remote storage. Three ways are available. See AWS account permissions.

Step 2. Prepare the restore cluster

Deploy a cluster to which you want to restore data. See Deploy TiDB on AWS EKS.

Add the recoveryMode: true field to spec and run the following command to create the resources required for the restore in the test2 namespace:

kubectl apply -f tidb-cluster.yaml -n test2

Step 3. Restore backup data to the TiDB cluster

Based on the authorization method you selected in step 1 to grant remote storage access, you can restore data to TiDB using any of the following methods accordingly:

  • Method 1: If you grant permissions by accessKey and secretKey, you can create the Restore CR as follows:

    kubectl apply -f restore-aws-s3.yaml

    The restore-aws-s3.yaml file has the following content:

    --- apiVersion: pingcap.com/v1alpha1 kind: Restore metadata: name: demo2-restore-s3 namespace: test2 spec: backupType: full restoreMode: volume-snapshot br: cluster: demo2 clusterNamespace: test2 # logLevel: info s3: provider: aws secretName: s3-secret region: us-west-1 bucket: my-bucket prefix: my-folder
  • Method 2: If you grant permissions by associating Pod with IAM, you can create the Restore CR as follows:

    kubectl apply -f restore-aws-s3.yaml

    The restore-aws-s3.yaml file has the following content:

    --- apiVersion: pingcap.com/v1alpha1 kind: Restore metadata: name: demo2-restore-s3 namespace: test2 annotations: iam.amazonaws.com/role: arn:aws:iam::123456789012:role/user spec: backupType: full restoreMode: volume-snapshot br: cluster: demo2 sendCredToTikv: false clusterNamespace: test2 # logLevel: info s3: provider: aws region: us-west-1 bucket: my-bucket prefix: my-folder
  • Method 3: If you grant permissions by associating ServiceAccount with IAM, you can create the Restore CR as follows:

    kubectl apply -f restore-aws-s3.yaml

    The restore-aws-s3.yaml file has the following content:

    --- apiVersion: pingcap.com/v1alpha1 kind: Restore metadata: name: demo2-restore-s3 namespace: test2 spec: backupType: full restoreMode: volume-snapshot serviceAccount: tidb-backup-manager br: cluster: demo2 sendCredToTikv: false clusterNamespace: test2 # logLevel: info s3: provider: aws region: us-west-1 bucket: my-bucket prefix: my-folder

When configuring restore-aws-s3.yaml, note the following:

  • For detailed descriptions of the restoreMode field, see BR fields.
  • For storage configurations of S3-compatible storage, see S3 storage fields.
  • Some parameters in .spec.br are optional, such as logLevel. You can decide whether to configure them based on your needs.

After creating the Restore CR, you can check the restore status using the following command:

kubectl get rt -n test2 -o wide

Troubleshooting

If you encounter any problem during the restore process, see Common Deployment Failures of TiDB on Kubernetes.

Was this page helpful?

Download PDFRequest docs changesAsk questions on Discord
Playground
New
One-stop & interactive experience of TiDB's capabilities WITHOUT registration.
Products
TiDB
TiDB Dedicated
TiDB Serverless
Pricing
Get Demo
Get Started
© 2024 PingCAP. All Rights Reserved.
Privacy Policy.