Standard backup best practices apply when creating your OpenStack back up policy. For example, how often to backup your data is closely related to how quickly you need to recover from data loss.
Note | |
---|---|
If you cannot have any data loss at all, you should also focus on a highly available deployment. The OpenStack High Availability Guide offers suggestions for elimination of a single point of failure that could cause system downtime. While it is not a completely prescriptive document, it offers methods and techniques for avoiding downtime and data loss. |
Other backup considerations include:
How many backups to keep?
Should backups be kept off-site?
How often should backups be tested?
Just as important as a backup policy is a recovery policy (or at least recovery testing).
While OpenStack is composed of many components and moving parts, backing up the critical data is quite simple.
This chapter describes only how to back up configuration files and databases that the various OpenStack components need to run. This chapter does not describe how to back up objects inside Object Storage or data contained inside Block Storage. Generally these areas are left for users to back up on their own.
The example OpenStack architecture designates the cloud controller as the MySQL server. This MySQL server hosts the databases for nova, glance, cinder, and keystone. With all of these databases in one place, it's very easy to create a database backup:
# mysqldump --opt --all-databases > openstack.sql
If you only want to backup a single database, you can instead run:
# mysqldump --opt nova > nova.sql
where nova
is the database you want to back
up.
You can easily automate this process by creating a cron job that runs the following script once per day:
#!/bin/bash backup_dir="/var/lib/backups/mysql" filename="${backup_dir}/mysql-`hostname`-`eval date +%Y%m%d`.sql.gz" # Dump the entire MySQL database /usr/bin/mysqldump --opt --all-databases | gzip > $filename # Delete backups older than 7 days find $backup_dir -ctime +7 -type f -delete
This script dumps the entire MySQL database and deletes any backups older than seven days.
This section discusses which files and directories should be backed up regularly, organized by service.
The /etc/nova
directory on both the
cloud controller and compute nodes should be regularly
backed up.
/var/log/nova
does not need to be backed up if
you have all logs going to a central area. It is
highly recommended to use a central logging server or
back up the log directory.
/var/lib/nova
is another important
directory to back up. The exception to this is the
/var/lib/nova/instances
subdirectory
on compute nodes. This subdirectory contains the KVM
images of running instances. You would want to
back up this directory only if you need to maintain backup
copies of all instances. Under most circumstances, you
do not need to do this, but this can vary from cloud
to cloud and your service levels. Also be aware that
making a backup of a live KVM instance can cause that
instance to not boot properly if it is ever restored
from a backup.
/etc/glance
and
/var/log/glance
follow the same rules
as their nova counterparts.
/var/lib/glance
should also be backed up.
Take special notice of
/var/lib/glance/images
. If you are
using a file-based backend of glance,
/var/lib/glance/images
is where the
images are stored and care should be taken.
There are two ways to ensure stability with this directory. The first is to make sure this directory is run on a RAID array. If a disk fails, the directory is available. The second way is to use a tool such as rsync to replicate the images to another server:
# rsync -az --progress /var/lib/glance/images backup-server:/var/lib/glance/images/
/etc/keystone
and
/var/log/keystone
follow the same
rules as other components.
/var/lib/keystone
, although it should not
contain any data being used, can also be backed up
just in case.
/etc/cinder
and
/var/log/cinder
follow the same rules
as other components.
/var/lib/cinder
should also be backed
up.
/etc/swift
is very important to have
backed up. This directory contains the swift
configuration files as well as the ring files and ring
builder files, which if
lost render the data on your cluster inaccessible. A
best practice is to copy the builder files to all
storage nodes along with the ring files. Multiple
backup copies are spread throughout your storage
cluster.
Recovering backups is a fairly simple process. To begin,
first ensure that the service you are recovering is not
running. For example, to do a full recovery of nova on the
cloud controller, first stop all nova
services:
# stop nova-api # stop nova-cert # stop nova-consoleauth # stop nova-novncproxy # stop nova-objectstore # stop nova-scheduler
Now you can import a previously backed-up database:
# mysql nova < nova.sql
You can also restore backed-up nova directories:
# mv /etc/nova{,.orig} # cp -a /path/to/backup/nova /etc/
Once the files are restored, start everything back up:
# start mysql # for i in nova-api nova-cert nova-consoleauth nova-novncproxy nova-objectstore nova-scheduler > do > start $i > done
Other services follow the same process, with their respective directories and databases.
Backup and subsequent recovery is one of the first tasks system administrators learn. However, each system has different items that need attention. By taking care of your database, image service, and appropriate file system locations, you can be assured you can handle any event requiring recovery.