320 lines
14 KiB
Plaintext
320 lines
14 KiB
Plaintext
---
|
|
layout: docs
|
|
page_title: 'Commands: Snapshot Agent'
|
|
sidebar_title: agent
|
|
---
|
|
|
|
# Consul Snapshot Agent
|
|
|
|
Command: `consul snapshot agent`
|
|
|
|
<EnterpriseAlert />
|
|
|
|
~> The [`agent`](/docs/commands/snapshot/agent) subcommand described here is
|
|
available only in [Consul Enterprise](https://www.hashicorp.com/products/consul/)
|
|
version 0.7.1 and later. All other [snapshot subcommands](/docs/commands/snapshot)
|
|
are available in the open source version of Consul.
|
|
|
|
The `snapshot agent` subcommand starts a process that takes snapshots of the
|
|
state of the Consul servers and saves them locally, or pushes them to an
|
|
optional remote storage service.
|
|
|
|
The agent can be run as a long-running daemon process or in a one-shot mode
|
|
from a batch job, based on the [`-interval`](#interval) argument. Snapshotting
|
|
a remote datacenter is only available in one-shot mode.
|
|
|
|
As a long-running daemon, the agent will perform a leader election so multiple
|
|
processes can be run in a highly available fashion with automatic failover. The
|
|
agent will also register itself with Consul as a service, along with health
|
|
checks that show the agent is alive ("Consul Snapshot Agent Alive") and able to
|
|
take snapshots ("Consul Snapshot Agent Saving Snapshots"). The latter check is
|
|
only added on agents who have become a leader, so it's possible for operators to
|
|
tell which instances are alive and on standby and which instance has become
|
|
leader and starting saving snapshots.
|
|
|
|
As snapshots are saved, they will be reported in the log produced by the agent:
|
|
|
|
```text
|
|
2016/11/16 21:21:13 [INFO] Snapshot agent running
|
|
2016/11/16 21:21:13 [INFO] Waiting to obtain leadership...
|
|
2016/11/16 21:21:13 [INFO] Obtained leadership
|
|
2016/11/16 21:21:13 [INFO] Saved snapshot 1479360073448728784
|
|
```
|
|
|
|
The number shown with the saved snapshot is its ID, which is based on a UNIX
|
|
timestamp with nanosecond resolution, so collisions are unlikely and IDs are
|
|
monotonically increasing with time. This makes it easy to locate the latest
|
|
snapshot, even if the log data isn't available. The snapshot ID always appears
|
|
in the file name when using local storage, or in the object key when using
|
|
remote storage.
|
|
|
|
Snapshots can be restored using the
|
|
[`consul snapshot restore`](/docs/commands/snapshot/restore) command, or
|
|
the [HTTP API](/api/snapshot).
|
|
|
|
If ACLs are enabled the following privileges are required:
|
|
|
|
| Resource | Segment | Permission | Explanation |
|
|
| --------- | ---------------- | ---------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
|
| `acl` | N/A | `write` | All snapshotting operations require this privilege due to snapshots containing ACL tokens including unredacted secrets. |
|
|
| `key` | `<lock key>` | `write` | The lock key (which defaults to `consul-snapshot/lock`) is used during snapshot agent leader election. |
|
|
| `session` | `<agent name>` | `write` | The session used for locking during leader election is created against the agent name of the Consul agent that the Snapshot agent is registering itself with. |
|
|
| `service` | `<service name>` | `write` | The Snapshot agent registers itself with the local Consul agent and must have write privileges on its service name which is configured with `-service`. |
|
|
|
|
## Usage
|
|
|
|
Usage: `consul snapshot agent [options]`
|
|
|
|
#### API Options
|
|
|
|
@include 'http_api_options_client.mdx'
|
|
|
|
#### Config File Options:
|
|
|
|
- `-config-dir` - Directory to look for JSON config files. Files will be read in
|
|
alphabetical order and must end with the extension ".json". This won't
|
|
recursively descend directories. This can be specified multiple times on the
|
|
command line.
|
|
|
|
- `-config-file` - File to read JSON configuration from. Files must end with the
|
|
extension ".json". This can be specified multiple times on the command line.
|
|
|
|
Config files referenced using `-config-dir` and `-config-file` have the following
|
|
format (shown populated with default values):
|
|
|
|
```json
|
|
{
|
|
"snapshot_agent": {
|
|
"http_addr": "127.0.0.1:8500",
|
|
"token": "",
|
|
"datacenter": "",
|
|
"ca_file": "",
|
|
"ca_path": "",
|
|
"cert_file": "",
|
|
"key_file": "",
|
|
"tls_server_name": "",
|
|
"log": {
|
|
"level": "INFO",
|
|
"enable_syslog": false,
|
|
"syslog_facility": "LOCAL0"
|
|
},
|
|
"snapshot": {
|
|
"interval": "1h",
|
|
"retain": 30,
|
|
"stale": false,
|
|
"service": "consul-snapshot",
|
|
"deregister_after": "72h",
|
|
"lock_key": "consul-snapshot/lock",
|
|
"max_failures": 3,
|
|
"local_scratch_path": ""
|
|
},
|
|
"local_storage": {
|
|
"path": "."
|
|
},
|
|
"aws_storage": {
|
|
"access_key_id": "",
|
|
"secret_access_key": "",
|
|
"s3_region": "",
|
|
"s3_bucket": "",
|
|
"s3_key_prefix": "consul-snapshot",
|
|
"s3_server_side_encryption": false,
|
|
"s3_static_snapshot_name": ""
|
|
},
|
|
"azure_blob_storage": {
|
|
"account_name": "",
|
|
"account_key": "",
|
|
"container_name": ""
|
|
},
|
|
"google_storage": {
|
|
"bucket": ""
|
|
}
|
|
}
|
|
}
|
|
```
|
|
|
|
All fields are optional, and config files without a `snapshot_agent` object will
|
|
be ignored. At least one config file needs to have a `snapshot_agent` object, or the
|
|
snapshot agent will fail to start. The Consul agent is set up to ignore any
|
|
`snapshot_agent` object, so it's safe to use common config directories for both agents
|
|
if desired.
|
|
|
|
#### Snapshot Options
|
|
|
|
- `-interval` - Interval at which to perform snapshots as
|
|
a time with a unit suffix, which can be "s", "m", "h" for seconds, minutes, or
|
|
hours. If 0 is provided, the agent will take a single snapshot and then exit, which
|
|
is useful for running snapshots via batch jobs. Defaults to "1h"
|
|
|
|
- `-lock-key` - A prefix in Consul's KV store used to coordinate between
|
|
different instances of the snapshot agent order to only have one active instance
|
|
at a time. For highly available operation of the snapshot agent, simply run
|
|
multiple instances. All instances must be configured with the same lock key in
|
|
order to properly coordinate. Defaults to "consul-snapshot/lock".
|
|
|
|
- `-max-failures` - Number of snapshot failures after which the snapshot agent
|
|
will give up leadership. In a highly available operation with multiple snapshot
|
|
agents available, this gives another agent a chance to take over if an agent
|
|
is experiencing issues, such as running out of disk space for snapshots.
|
|
Defaults to 3.
|
|
|
|
- `-retain` - Number of snapshots to retain. After each snapshot is taken, the
|
|
oldest snapshots will start to be deleted in order to retain at most this many
|
|
snapshots. If this is set to 0, the agent will not perform this and snapshots
|
|
will accumulate forever. Defaults to 30.
|
|
|
|
- `-local-scratch-path` - Location to store all temporary snapshots in prior to
|
|
sending them off to the configured storage backend. If not configured the
|
|
system temporary directory will be used. When using the local storage backend
|
|
this is not configurable and `-local-path` will be used.
|
|
|
|
#### Agent Options
|
|
|
|
- `-deregister-after` - An interval, after which if the agent is unhealthy it will be
|
|
automatically deregistered from Consul service discovery. This is a time with a
|
|
unit suffix, which can be "s", "m", "h" for seconds, minutes, or hours. If 0 is
|
|
provided, this will be disabled. Defaults to "72h".
|
|
|
|
- `-log-level` - Controls verbosity of snapshot agent logs. Valid options are
|
|
"TRACE", "DEBUG", "INFO", "WARN", "ERR". Defaults to "INFO".
|
|
|
|
- `-service` - The service name to used when registering the agent with Consul.
|
|
Registering helps monitor running agents and the leader registers an additional
|
|
health check to monitor that snapshots are taking place. Defaults to
|
|
"consul-snapshot".
|
|
|
|
- `-syslog` - This enables forwarding logs to syslog. Defaults to false.
|
|
|
|
- `-syslog-facility` - Sets the facility to use for forwarding logs to syslog.
|
|
Defaults to "LOCAL0".
|
|
|
|
#### Local Storage Options
|
|
|
|
- `-local-path` - Location to store snapshots locally. The default behavior
|
|
of the snapshot agent is to store snapshots locally in this directory. Defaults
|
|
to "." to use the current working directory. If an alternate storage option is
|
|
configured, then local storage will be disabled and this option will be ignored.
|
|
|
|
#### S3 Storage Options
|
|
|
|
Note that despite the AWS references, any S3-compatible endpoint can be specified with `-aws-s3-endpoint`.
|
|
|
|
- `-aws-access-key-id` and `-aws-secret-access-key` - These arguments supply
|
|
authentication information for connecting to S3. These may also be supplied using
|
|
the following alternative methods:<br />
|
|
|
|
- `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` environment variables
|
|
- A credentials file (`~/.aws/credentials` or the file at the path specified by the
|
|
`AWS_SHARED_CREDENTIALS_FILE` environment variable)
|
|
- ECS task role metadata (container-specific)
|
|
- EC2 instance role metadata
|
|
|
|
- `-aws-s3-bucket` - S3 bucket to use. Required for S3 storage, and setting this
|
|
disables local storage. This should be only the bucket name without any
|
|
part of the key prefix.
|
|
|
|
- `-aws-s3-key-prefix` - Prefix to use for snapshot files in S3. Defaults to
|
|
"consul-snapshot".
|
|
|
|
- `-aws-s3-region` - S3 region to use. Required for S3 storage.
|
|
|
|
- `-aws-s3-endpoint` - Optional S3 endpoint to use. Can also be specified using the
|
|
AWS_S3_ENDPOINT environment variable.
|
|
|
|
- `-aws-s3-server-side-encryption` - Enables saving snapshots to S3 using server side encryption with [Amazon S3-Managed Encryption Keys](http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html)
|
|
|
|
- `-aws-s3-static-snapshot-name` - If this is given, all snapshots are saved with the same file name. The agent will not rotate or versionize snapshots, and will save them with the same name each time.
|
|
Use this if you want to rely on [S3's versioning capabilities](http://docs.aws.amazon.com/AmazonS3/latest/dev/Versioning.html) instead of the agent handling it for you.
|
|
|
|
- `-aws-s3-enable-kms` - Enables using [Amazon KMS](https://aws.amazon.com/kms/) for encrypting snapshots.
|
|
|
|
- `-aws-s3-kms-key` - Optional Amazon KMS key to use, if this is not set the default KMS master key will be used. Set this if you want to manage key rotation yourself.
|
|
|
|
-> When using a S3-compatible storage exposing a self-signed certificate the agent will not be able to perform
|
|
the snapshot operations unless the CA used to sign the storage certificate is trusted by the node running
|
|
the agent. You can add the CA root certificate to the OS trust store to have Consul trust the storage endpoint.
|
|
|
|
#### S3 Required Permissions
|
|
|
|
Different S3 permissions are required depending on the configuration of the snapshot agent. In particular extra permissions are required when
|
|
snapshot rotation is enabled. S3 storage snapshot rotation is enabled when the `retain` configuration is greater than 0 and when there is
|
|
no `aws-s3-static-snapshot-name` configured.
|
|
|
|
| Permission | Resource | When you need it |
|
|
| -------------------- | ---------------------------------- | ----------------------------------------------- |
|
|
| `PutObject` | `arn:aws:s3:::<bucket name>/<key>` | Required for all operations. |
|
|
| `DeleteObject` | `arn:aws:s3:::<bucket name>/<key>` | Required only when snapshot rotation is enabled |
|
|
| `ListBucket` | `arn:aws:s3:::<bucket name>` | Required only when snapshot rotation is enabled |
|
|
| `ListBucketVersions` | `arn:aws:s3:::<bucket name>` | Required only when snapshot rotation is enabled |
|
|
|
|
Within the table `<key>` refers to the the key used to store the snapshot. When `aws-s3-static-snapshot-name` is configured the `<key>` is simply the value of that configuration. Otherwise the `<key>` will be the `<aws-s3-key-prefix configuration>/consul-*.snap`.
|
|
|
|
The following example IAM policy document assumes that the `aws-s3-bucket` is `consul-data` with defaults for `aws-s3-key-prefix`, `aws-s3-static-snapshot-name` and `retain`:
|
|
|
|
```json
|
|
{
|
|
"Version": "2012-10-17",
|
|
"Statement": [
|
|
{
|
|
"Sid": "",
|
|
"Effect": "Allow",
|
|
"Action": ["s3:PutObject", "s3:DeleteObject"],
|
|
"Resource": "arn:aws:s3:::consul-data/consul-snapshots/consul-*.snap"
|
|
},
|
|
{
|
|
"Sid": "",
|
|
"Effect": "Allow",
|
|
"Action": ["s3:ListBucketVersions", "s3:ListBucket"],
|
|
"Resource": "arn:aws:s3:::consul-data"
|
|
}
|
|
]
|
|
}
|
|
```
|
|
|
|
#### Azure Blob Storage options
|
|
|
|
** Note: This currently only works on non-Solaris platforms due to library limitations **
|
|
|
|
From Consul Enterprise version `1.5.0` onwards, you can store snapshots in Azure Blob storage.
|
|
|
|
- `-azure-blob-account-name` and `-azure-blob-account-key` - These arguments supply
|
|
authentication information for connecting to Azure Blob storage.
|
|
|
|
- `-azure-blob-container-name` - Container to use. Required for Azure blob storage, and setting this
|
|
disables local storage.
|
|
|
|
#### Google Cloud Storage options
|
|
|
|
From Consul Enterprise version `1.6.1` onwards, you can store snapshots in Google Cloud Storage. Authentication relies on automatic discovery through the sdk as described [here](https://cloud.google.com/docs/authentication/production):
|
|
|
|
- First, ADC checks to see if the environment variable GOOGLE_APPLICATION_CREDENTIALS is set. If the variable is set, ADC uses the service account file that the variable points to. The next section describes how to set the environment variable.
|
|
|
|
- If the environment variable isn't set, ADC uses the default service account that Compute Engine, Kubernetes Engine, App Engine, and Cloud Functions provide, for applications that run on those services.
|
|
|
|
- If ADC can't use either of the above credentials, an error occurs.
|
|
|
|
This integration needs the following information:
|
|
|
|
- `-gcs-bucket` supplies the bucket to use.
|
|
|
|
## Examples
|
|
|
|
Running the agent with no arguments will run a long-running daemon process that will
|
|
perform leader election for highly available operation, register itself with Consul
|
|
service discovery with health checks, take snapshots every hour, retain the last 30
|
|
snapshots, and save snapshots into the current working directory:
|
|
|
|
```shell-session
|
|
$ consul snapshot agent
|
|
```
|
|
|
|
To run a one-shot backup, set the backup interval to 0. This will run a single snapshot
|
|
and delete any old snapshots based on the retain settings, but it will not perform any
|
|
leader election or service registration:
|
|
|
|
```shell-session
|
|
$ consul snapshot agent -interval=0
|
|
```
|
|
|
|
Please see the [HTTP API](/api/snapshot) documentation for
|
|
more details about snapshot internals.
|