├── source-crs/
│ ├── ibu/
│ │ ├── ImageBasedUpgrade.yaml
│ │ ├── PlatformBackupRestore.yaml
│ │ ├── PlatformBackupRestoreLvms.yaml
│ │ ├── PlatformBackupRestoreWithIBGU.yaml
├── ...
├── kustomization.yaml
The source-crs/ibu/PlatformBackupRestoreWithIBGU.yaml
file is provided in the ZTP container image.
apiVersion: velero.io/v1
kind: Backup
metadata:
name: acm-klusterlet
annotations:
lca.openshift.io/apply-label: "apps/v1/deployments/open-cluster-management-agent/klusterlet,v1/secrets/open-cluster-management-agent/bootstrap-hub-kubeconfig,rbac.authorization.k8s.io/v1/clusterroles/klusterlet,v1/serviceaccounts/open-cluster-management-agent/klusterlet,scheduling.k8s.io/v1/priorityclasses/klusterlet-critical,rbac.authorization.k8s.io/v1/clusterroles/open-cluster-management:klusterlet-work:ibu-role,rbac.authorization.k8s.io/v1/clusterroles/open-cluster-management:klusterlet-admin-aggregate-clusterrole,rbac.authorization.k8s.io/v1/clusterrolebindings/klusterlet,operator.open-cluster-management.io/v1/klusterlets/klusterlet,apiextensions.k8s.io/v1/customresourcedefinitions/klusterlets.operator.open-cluster-management.io,v1/secrets/open-cluster-management-agent/open-cluster-management-image-pull-credentials" (1)
labels:
velero.io/storage-location: default
namespace: openshift-adp
spec:
includedNamespaces:
- open-cluster-management-agent
includedClusterScopedResources:
- klusterlets.operator.open-cluster-management.io
- clusterroles.rbac.authorization.k8s.io
- clusterrolebindings.rbac.authorization.k8s.io
- priorityclasses.scheduling.k8s.io
includedNamespaceScopedResources:
- deployments
- serviceaccounts
- secrets
excludedNamespaceScopedResources: []
---
apiVersion: velero.io/v1
kind: Restore
metadata:
name: acm-klusterlet
namespace: openshift-adp
labels:
velero.io/storage-location: default
annotations:
lca.openshift.io/apply-wave: "1"
spec:
backupName:
acm-klusterlet
1 | If your multiclusterHub CR does not have .spec.imagePullSecret defined and the secret does not exist on the open-cluster-management-agent namespace in your hub cluster, remove v1/secrets/open-cluster-management-agent/open-cluster-management-image-pull-credentials . |
If you perform the image-based upgrade directly on managed clusters, use the |
If you use LVM Storage to create persistent volumes, you can use the source-crs/ibu/PlatformBackupRestoreLvms.yaml
provided in the ZTP container image to back up your LVM Storage resources.
apiVersion: velero.io/v1
kind: Backup
metadata:
labels:
velero.io/storage-location: default
name: lvmcluster
namespace: openshift-adp
spec:
includedNamespaces:
- openshift-storage
includedNamespaceScopedResources:
- lvmclusters
- lvmvolumegroups
- lvmvolumegroupnodestatuses
---
apiVersion: velero.io/v1
kind: Restore
metadata:
name: lvmcluster
namespace: openshift-adp
labels:
velero.io/storage-location: default
annotations:
lca.openshift.io/apply-wave: "2" (1)
spec:
backupName:
lvmcluster
1 | The lca.openshift.io/apply-wave value must be lower than the values specified in the application Restore CRs. |