Rubrik Data Resource Backup Kubernetes
Rubrik Data Resource Backup Kubernetes
3 WHY KUBERNETES?
What to Protect 6
Focus on Restores 7
Rubrik, the Zero Trust Data Security Company™, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security
and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery,
and orchestrated application recovery. This means data is ready at all times so you can recover the data you need, and avoid paying a ransom. Because
when you secure your data, you secure your applications, and you secure your business.For more information please visit www.rubrik.com and follow
@rubrikInc on Twitter and Rubrik, Inc. on LinkedIn. Rubrik is a registered trademark of Rubrik, Inc. Other marks may be trademarks of their respective owners.
ebk-data-protection-for-kubernetes / 20220408
Why Kubernetes?
To keep up with the competition, companies need the ability to deliver software rapidly, update it
frequently, and run it reliably. Given the increasing importance of digital services in all areas of your
business, how do you manage application delivery at scale? And, how do you ensure applications run the
same on-premises, in the cloud, and at the edge?
Many companies are turning to cloud native architectures and modern application development
methods to deliver new software and services more quickly. New applications are increasingly packaged
in containers, providing lightweight executables designed to run consistently across on-premises and
cloud infrastructure. Using Agile and DevOps methods, teams are able to deliver new code quicker, scale
operations more easily to meet demand, and move applications across different environments.
Containerized applications are different from applications running in VMs. Modern applications typically
use a microservices design—with each application service running in its own container(s). Containers
proliferate quickly and require a different management approach.
With Kubernetes, on the other hand, containers come and go quickly and you may have many instances
of the same container, so it doesn’t make sense for a container to store data. Instead, long-lived data is
stored in persistent volumes or PVs. A PV represents a storage volume accessible to the cluster that can
be provisioned upfront by an administrator or dynamically provisioned via an API call.
Kubernetes supports the wide variety of storage available in most data centers (and in public clouds)
via the Cluster Storage Interface (CSI). Storage vendors create CSI plugins to enable you to access the
underlying capabilities of their storage. Depending on your Kubernetes cluster configuration, you may
have access to object, file, or block storage—or a combination.
These differences change the nature of data management and data protection in Kubernetes
environments. There are specific elements that must be backed up so that your application and your
environment can be recovered in the event of a failure. This includes Kubernetes metadata that describes
each component and its resources, Kubernetes objects that represent the state of the cluster, and PVs as
just described.
Because data protection in a dynamic Kubernetes environment is a lot different than what you may be
used to, this ebook examines the operational and data protection challenges created by containers and
Kubernetes and takes a deep dive into protecting and securing data in dynamic, distributed Kubernetes
environments.
Good backups are a must for any computing environment. However, it seems like every time a new
computing paradigm comes along, the industry has to learn the same lessons all over again. As
Kubernetes becomes a critical part of production in enterprise IT, it is essential to have robust tools
for Kubernetes data protection. The Kubernetes community is only now coming to terms with these
requirements.
In the battle against ransomware, traditional approaches to security and data protection are failing
and traditional backups are vulnerable. Many ransomware attacks target backups to prevent recovery
and force payment. Traditional backup methods are great for recovering from natural disasters and
operational failures, but they were not built to withstand cyber threats and are therefore vulnerable.
As you plan your data protection strategy for Kubernetes, the ability to protect against ransomware
should be front and center in your thinking.
To learn more about ransomware and ransomware protection—for Kubernetes and your entire IT
environment—Prepare and Recover from a Ransomware Attack with Rubrik.
Your data protection strategy has to be able to accommodate an environment that is distributed and
dynamic. A data protection approach that worked well when you had one or two clusters and a
handful of nodes may not meet your needs as your fleet of Kubernetes clusters grows.
What to Protect
In addition to coping with the distributed and dynamic nature of Kubernetes, your data protection
strategy needs to encompass the diverse elements that make up a Kubernetes environment, ensure
backup and recovery for both stateless and stateful applications, and protect against ransomware
threats. In particular, it should include protection for:
Persistent Volumes
As described in the previous chapter, PVs are used to store data that needs to persist
beyond the lifetime of a container. Because applications running on Kubernetes can
create PVs dynamically, your backup strategy may need to discover and protect PVs as
they are created. Because PVs store potentially critical application data, that data needs
to be stored in an immutable format that is safe from ransomware; you must be certain
the data can not be edited, modified, encrypted or deleted so you can ensure application
availability and protect business operations.
Kubernetes Objects
Kubernetes objects—such as Pods, ReplicationSets, ReplicationControllers, Deployments,
DaemonSets, and Namespaces—represent the state of your cluster, including what
applications are running (and where), what resources are available to those applications,
and policies related to each application. As a result, protecting an application requires
protecting the associated objects along with the application’s persistent data, so you
can ensure full application recovery in the event of a cyber or natural disaster. All state
information for a Kubernetes cluster is typically stored in /etcd.
Focus on Restores
When a cyber-attack, failure, or natural disaster occurs, you need to be sure you can get back your IT
operations as quickly as possible to ensure business continuity and avoid revenue loss. The means that
fast and flexible restores are a critical consideration.
• Speed. Can you restore fast enough to meet the SLAs of your most important applications?
• Visibility. If a cluster or application fails, how easy is it to determine what has been affected?
Can you see restore point options in one place?
• Flexibility. Can you restore a single file from a namespace? An entire application and all its
components? An entire cluster? Can you restore to a different cluster? (This can be useful for
migration and disaster recovery.) Can you restore to a sandbox environment? (This can be
essential when recovering from ransomware or other malware attacks.)
With Kubernetes, your goal should be to back up the entire application, including front-end services,
supporting microservices, PVs, and all associated Kubernetes object data so you can recover application
state to any point in time.
If you’re reading this book, it’s a sign that you’ve already recognized the importance of Kubernetes data
protection and security. Here are some best practices that will help ensure your environment is well
protected.
• Each namespace should have unique PVs. As above, if PVs are shared between
namespaces (and applications) any failure will have a bigger blast radius.
• Each PV should have a single function. If you use a PV to store persistent data for
multiple services, then a failure or data corruption event may affect all those services—
as will a restore. For example, if your product catalog is important to the function of
your application, don’t store other data in the same PV.
• Frequency. How often you back up should be based on how critical the app is, what
happens if it fails, and how much data you can afford to lose. Snapshot-based backups
help increase frequency while minimizing impact on running applications.
• Ad hoc backups. Given the dynamic nature of Kubernetes and the high rate of change
of modern applications, you will likely need the ability to perform ad hoc application
backups in response to events like updates and new application deployments, enabling
you to quickly roll back if something goes wrong.
• Custom SLAs. You may want the ability to implement custom SLAs on a per-
application, per-PV, or per-object basis.
Embrace DevSecOps
Given the increase in security concerns and cyber threats, many organizations are turning
to DevSecOps—combining DevOps and security functions—in order to ensure that new
software is created using security best practices and that when new vulnerabilities are
found—such as the recently discovered log4j vulnerability—affected software can be easily
identified and quickly patched.
Choose Immutability
Backups are the last line of defense against ransomware, and hackers have learned to go
after them. If they gain access to your backup software, they may turn backups off or alter
schedules and hope you don’t notice. Careful access control is the first line of defense
for your backups. Immutability—the ability to prevent any changes to a backup once it
is written—is the second line of defense. Immutability ensures that backup files can’t be
altered or encrypted once they are written—even if hackers gain full access to them.
The ideal Kubernetes data protection strategy includes automated backup and recovery, scheduling
and retirement policies, the ability to meet your recovery SLAs, and protection against ransomware
encryption. All of this has to be accomplished at scale, with the minimum of manual tasks, for every
application in every production Kubernetes cluster. And it all needs to be as secure as possible.
Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for
enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform,
including Zero Trust Data Protection, Ransomware Investigation, Incident Containment, Sensitive Data
Discovery, and Orchestrated Application Recovery. This means data is ready at all times so you can
recover the data you need, and avoid paying a ransom. Because when you secure your data, you secure
your applications, and you secure your business.
Rubrik for Kubernetes extends Rubrik’s proven data protection capabilities to dynamic Kubernetes
environments to protect modern applications and their data. Rubrik’s powerful SLA engine eliminates
the complexity of manual or job-centric approaches, automating the protection of Kubernetes objects
and persistent volumes and enabling granular recovery of namespaces, individual PVs, and specific files.
Rubrik snapshots can be replicated from one Kubernetes cluster to another, enabling remote recovery,
even if an entire cluster fails.
Rubrik immutable backups can’t be altered in any way. Your Kubernetes and other backups are
guaranteed to be unchanged and can be deployed immediately to production servers or sandbox
environments in case of ransomware attacks. In addition to protecting against malicious data corruption,
having an immutable backup helps you comply with regulatory requirements—ensuring that accurate
copies of data are retained.
When you protect your Kubernetes environment with Rubrik, all backup data is stored on Rubrik’s
immutable storage platform, so you always have a good point in time to recover from, ensuring the
availability of your applications—and your business.
• Application Protection
– Protect stateless data. Kubernetes metadata describing the component and its
resources.
– Protect stateful data. Persistent Volumes linked to a resource via a Persistent
Volume Claim.
– Persistent entities. Kubernetes objects which uniquely represent the state of a cluster.
• Cyber Resiliency
All applications and data protected by Rubrik are stored in an immutable manner to prevent
encryption from hackers. Snapshot chains guarantee almost instantaneous restore.
• Data Migration
Migrate data across clusters to enable quick experimentation.