You are looking at the documentation of a prior release. To read the documentation of the latest release, please
visit here.
Handling Restored File Ownership in KubeStash
KubeStash preserves permission bits of the restored files. However, it may change ownership (owner uid
and gid
) of the restored files in some cases. This tutorial will explain when and how ownership of the restored files can be changed. Then, we are going to explain how we can avoid or resolve this problem.
Understanding Backup and Restore Behaviour
At first, let’s understand how backup and restore behaves in different scenario. A table with some possible backup and restore scenario is given below. We have run the containers as different user in different scenario using SecurityContext.
Case | Original File Owner | Backup Job User | Backup Succeed? | Restore Job User | Restore Succeed? | Restored File Owner | Restored File Editable to Original Owner? |
---|---|---|---|---|---|---|---|
1 | root | kubestash(65534) | ✓ | kubstash(root) | ✓ | root | ✓ |
2 | root | kubestash(65534) | ✓ | 65534 | ✓ | root | ✗ |
4 | 2000 | kubestash(65534) | ✓ | kubestash(root) | ✓ | 2000 | ✓ |
4 | 2000 | kubestash(65534) | ✓ | 65534 | ✓ | 65534 | ✗ |
5 | 2000 | root | ✓ | 65534 | ✓ | 65534 | ✗ |
6 | 2000 | 3000 | ✓ | kubestash(root) | ✓ | 2000 | ✓ |
7 | 2000 | 3000 | ✓ | 65534 | ✓ | 65534 | ✗ |
8 | 2000 | 3000 | ✓ | 3000 | ✓ | 3000 | ✗ |
If we look at the table carefully, we are going to notice the following behaviors:
- The user of the backup
job
does not have any effect on backup. It just needs read permission of the target files. - If the restore job runs as
root
user then original ownership of the restored files are preserved. - If the restore job runs as
non-root
user then the ownership of the restored files is changed to restore jobs’s user and restored files become read-only to the original user unless it wasroot
user.
So, we can see when we run restore job as non-root
user, it raises some serious concerns as the restored files become read-only to the original user. Next section will discuss how we can avoid or fix this problem.
Avoid or Fix Ownership Issue
As we have seen when the ownership of the restored files gets changed, they can be unusable to the original user. We need to avoid or fix this issue.
There could be two scenarios for the restored files user.
- Restored files user is the same as the original user.
- Restored files user is different than the original user.
Restored files user is the same as the original user
This is likely to be the most common scenario. Generally, the same application whose data was backed up will use the restored files after a restore. In this case, if your cluster supports running containers as root
user, then it is fairly easy to avoid this issue. You just need to run the restore job as root
user which kubeStash does by default. However, things get little more complicated when your cluster does not support running containers as root
user. In this case, you can do followings:
- Run restore job as the same user as the original job.
- Change the ownership of the restored files using
chown
after the restore is completed.
For the first method, we can achieve this configuring SecurityContext under SecurityContext
of RestoreSession.spec.addon.jobTemplate.spec
object. A sample RestoreSession
objects configured SecurityContext to run as the same user as the original user (let original user is 2000) is shown below.
apiVersion: core.kubestash.com/v1alpha1
kind: RestoreSession
metadata:
name: deployment-restore
namespace: demo
spec:
target:
apiGroup:
kind: Deployment
name: kubestash-demo
namespace: demo
dataSource:
repository: deployment-demo-gcs
snapshot: latest
encryptionSecret:
name: encryption-secret # some addon may not support encryption
namespace: demo
addon:
name: workload-addon
tasks:
- name: logical-backup-restore
jobTemplate:
spec:
securityContext:
runAsUser: 2000
runAsGroup: 2000
The second method is necessary when the backup job was not run as the same user as the original job. This is similar to the process when the restored files user is different than the original user. In this case, you have to change the ownership of restored files using chown
after restore.
Restored file user is different than the original user
If you want to use the restore files with a different user than the original one, then you have to change the ownership after restore. You can use an init-container
in your workload that will run chown
command to change the permissions to the desired owner or you can exec into workload pod to change ownership yourself.