Skip to content

Latest commit

 

History

History
247 lines (166 loc) · 10.3 KB

restore-data-using-tidb-lightning.md

File metadata and controls

247 lines (166 loc) · 10.3 KB
title summary aliases
Restore Data into TiDB in Kubernetes
Learn how to quickly restore data into a TiDB cluster in Kubernetes with TiDB Lightning.
/docs/tidb-in-kubernetes/dev/restore-data-using-tidb-lightning/

Restore Data into TiDB in Kubernetes

This document describes how to restore data into a TiDB cluster in Kubernetes using TiDB Lightning.

TiDB Lightning contains two components: tidb-lightning and tikv-importer. In Kubernetes, the tikv-importer is inside the separate Helm chart of the TiDB cluster. And tikv-importer is deployed as a StatefulSet with replicas=1 while tidb-lightning is in a separate Helm chart and deployed as a Job.

Therefore, both the tikv-importer and tidb-lightning need to be deployed to restore data with TiDB Lightning.

Deploy tikv-importer

You can deploy tikv-importer using the Helm chart. See the following example:

  1. Make sure that the PingCAP Helm repository is up to date:

    {{< copyable "shell-regular" >}}

    helm repo update

    {{< copyable "shell-regular" >}}

    helm search tikv-importer -l
  2. Get the default values.yaml file for easier customization:

    {{< copyable "shell-regular" >}}

    helm inspect values pingcap/tikv-importer --version=${chart_version} > values.yaml
  3. Modify the values.yaml file to specify the target TiDB cluster. See the following example:

    clusterName: demo
    image: pingcap/tidb-lightning:v3.0.8
    imagePullPolicy: IfNotPresent
    storageClassName: local-storage
    storage: 20Gi
    pushgatewayImage: prom/pushgateway:v0.3.1
    pushgatewayImagePullPolicy: IfNotPresent
    config: |
      log-level = "info"
      [metric]
      job = "tikv-importer"
      interval = "15s"
      address = "localhost:9091"

    clusterName must match the target TiDB cluster.

  4. Deploy tikv-importer:

    {{< copyable "shell-regular" >}}

    helm install pingcap/tikv-importer --name=${cluster_name} --namespace=${namespace} --version=${chart_version} -f values.yaml

    Note:

    You must deploy tikv-importer in the same namespace where the target TiDB cluster is deployed.

Deploy TiDB Lightning

Configure

Use the following command to get the default configuration of TiDB Lightning:

{{< copyable "shell-regular" >}}

helm inspect values pingcap/tidb-lightning --version=${chart_version} > tidb-lightning-values.yaml

TiDB Lightning Helm chart supports both local and remote data sources.

  • Local

    The local mode requires Mydumper backup data to be on one of the Kubernetes node. This mode can be enabled by setting dataSource.local.nodeName to the node name and dataSource.local.hostPath to Mydumper backup data directory path which contains a file named metadata.

  • Remote

    Unlike the local mode, the remote mode needs to use rclone to download Mydumper backup tarball file from a network storage to a PV. Any cloud storage supported by rclone should work, but currently only the following have been tested: Google Cloud Storage (GCS), Amazon S3, Ceph Object Storage.

    To restore backup data from the remote source, take the following steps:

    1. Make sure that dataSource.local.nodeName and dataSource.local.hostPath in values.yaml are commented out.

    2. Create a Secret containing the rclone configuration. A sample configuration is listed below. Only one cloud storage configuration is required. For other cloud storages, refer to rclone documentation. Using Amazon S3 as the storage is the same as restoring data using BR and Mydumper.

      There are three methods to grant permissions. The configuration varies with different methods. For details, see Backup the TiDB Cluster on AWS using BR.

      • If you grant permissions by importing Amazon S3 AccessKey and SecretKey, or if you use Ceph or GCS as the storage, use the following configuration:

        {{< copyable "" >}}

        apiVersion: v1
        kind: Secret
        metadata:
          name: cloud-storage-secret
        type: Opaque
        stringData:
          rclone.conf: |
            [s3]
            type = s3
            provider = AWS
            env_auth = false
            access_key_id = ${access_key}
            secret_access_key = ${secret_key}
            region = us-east-1
        
            [ceph]
            type = s3
            provider = Ceph
            env_auth = false
            access_key_id = ${access_key}
            secret_access_key = ${secret_key}
            endpoint = ${endpoint}
            region = :default-placement
        
            [gcs]
            type = google cloud storage
            # The service account must include Storage Object Viewer role
            # The content can be retrieved by `cat ${service-account-file} | jq -c .`
            service_account_credentials = ${service_account_json_file_content}
      • If you grant permissions by associating Amazon S3 IAM with Pod or with ServiceAccount, you can ignore s3.access_key_id and s3.secret_access_key:

        {{< copyable "" >}}

        apiVersion: v1
        kind: Secret
        metadata:
          name: cloud-storage-secret
        type: Opaque
        stringData:
          rclone.conf: |
            [s3]
            type = s3
            provider = AWS
            env_auth = true
            access_key_id =
            secret_access_key =
            region = us-east-1

        Fill in the placeholders with your configurations and save it as secret.yaml, and then create the Secret via kubectl apply -f secret.yaml -n ${namespace}.

    3. Configure the dataSource.remote.storageClassName to an existing storage class in the Kubernetes cluster.

Deploy

The method of deploying TiDB Lightning varies with different methods of granting permissions and with different storages.

  • If you grant permissions by importing Amazon S3 AccessKey and SecretKey, or if you use Ceph or GCS as the storage, run the following command to deploy TiDB Lightning:

    {{< copyable "shell-regular" >}}

    helm install pingcap/tidb-lightning --name=${release_name} --namespace=${namespace} --set failFast=true -f tidb-lightning-values.yaml --version=${chart_version}
  • If you grant permissions by associating Amazon S3 IAM with Pod, take the following steps:

    1. Create the IAM role:

      Create an IAM role for the account, and grant the required permission to the role. The IAM role requires the AmazonS3FullAccess permission because TiDB Lightning needs to access Amazon S3 storage.

    2. Modify tidb-lightning-values.yaml, and add the iam.amazonaws.com/role: arn:aws:iam::123456789012:role/user annotation in the annotations field.

    3. Deploy TiDB Lightning:

      {{< copyable "shell-regular" >}}

      helm install pingcap/tidb-lightning --name=${release_name} --namespace=${namespace} --set failFast=true -f tidb-lightning-values.yaml --version=${chart_version}

      Note:

      arn:aws:iam::123456789012:role/user is the IAM role created in Step 1.

  • If you grant permissions by associating Amazon S3 with ServiceAccount, take the following steps:

    1. Enable the IAM role for the service account on the cluster:

      To enable the IAM role permission on the EKS cluster, see AWS Documentation.

    2. Create the IAM role:

      Create an IAM role. Grant the AmazonS3FullAccess permission to the role, and edit Trust relationships of the role.

    3. Associate IAM with the ServiceAccount resources:

      {{< copyable "shell-regular" >}}

      kubectl annotate sa ${servieaccount} -n eks.amazonaws.com/role-arn=arn:aws:iam::123456789012:role/user
    4. Deploy TiDB Lightning:

      {{< copyable "shell-regular" >}}

      helm install pingcap/tidb-lightning --name=${release_name} --namespace=${namespace} --set-string failFast=true,serviceAccount=${servieaccount} -f tidb-lightning-values.yaml --version=${chart_version}

      Note:

      arn:aws:iam::123456789012:role/user is the IAM role created in Step 1. ${service-account} is the ServiceAccount used by TiDB Lightning. The default value is default.

When TiDB Lightning fails to restore data, you cannot simply restart it. Manual intervention is required. So the TiDB Lightning's Job restart policy is set to Never.

If the lightning fails to restore data, follow the steps below to do manual intervention:

  1. Delete the lightning job by running kubectl delete job -n ${namespace} ${release_name}-tidb-lightning.

  2. Create the lightning job again with failFast disabled by helm template pingcap/tidb-lightning --name ${release_name} --set failFast=false -f tidb-lightning-values.yaml | kubectl apply -n ${namespace} -f -.

  3. When the lightning pod is running again, use kubectl exec -it -n ${namespace} ${pod_name} sh to exec into the lightning container.

  4. Get the startup script by running cat /proc/1/cmdline.

  5. Diagnose the lightning following the troubleshooting guide.

Destroy TiDB Lightning

Currently, TiDB Lightning can only restore data offline. When the restoration finishes and the TiDB cluster needs to provide service for applications, the TiDB Lightning should be deleted to save cost.

  • To delete tikv-importer, run helm delete ${release_name} --purge.

  • To delete tidb-lightning, run helm delete ${release_name} --purge.