GCP Kubernetes Protection Service

GCP Kubernetes Protection Service


  • Protect and recover your entire Kubernetes apps, configurations, and data for your app resilience

  • Protect your on-prem or on-cloud clusters for high availability

  • Become compliant with organizational DR policies

  • No infrastructure required, delivered as a service from GCP

  • Seamlessly works with external GCP data services

For more information on Appranix, checkout the Appranix official website.

About Google Click to Deploy

Popular open stacks on Kubernetes packaged by Google.

1. Create a Google Kubernetes Engine cluster
2. Create a new cluster from the command line:

      export CLUSTER=appranix-cluster

      export ZONE=us-west1-a

      gcloud container clusters create "${CLUSTER}" --zone "${ZONE}"

3. Create a namespace for Appranix
      It is recommended to have a separate namespace for Appranix.
kubectl create namespace "${NAMESPACE}"

4. Get the Appranix cluster token
5. Log in to the Appranix Console and add your cluster.
6. Copy the token generated for the cluster.
7. Create a Google Storage Bucket
      A Google Cloud Storage Bucket is required to store all backed up manifests.
8. Run the following commands in Google Cloud Shell to create a bucket and a service account to access the bucket.
export BUCKET_NAME=<bucket name>
      gsutil mb -b on gs://$BUCKET_NAME/
      gcloud iam service-accounts create appranix --display-name "Appranix service account"
      gsutil iam ch serviceAccount:$AX_SERVICE_ACCOUNT_EMAIL:objectAdmin gs://${BUCKET_NAME}
      gcloud iam service-accounts keys create ax_service_account.json --iam-account $AX_SERVICE_ACCOUNT_EMAIL
      cat ax_service_account.json | jq -c | base64

Quick install with Google Cloud Marketplace

Get up and running with just a few clicks! Install Appranix to a Google Kubernetes Engine cluster by following the on-screen instructions within Google Cloud Marketplace.

Basic Usage

View the resources on the Appranix Console
Now you can login to Appranix and view the discovered resources and also set a protection policy for it.


Using the Google Cloud Platform Console
1. In the GCP Console, open Kubernetes Applications.
2. From the list of applications, click Appranix.
3. On the Application Details page, click Delete.

Using the command line
1. Delete the application
2. Set your installation name and Kubernetes namespace:
kubectl delete namespace ${NAMESPACE}

Delete the GKE cluster
Optionally, if you don't need the GKE cluster, you can use this command to delete the cluster:
gcloud container clusters delete "${CLUSTER}" --zone "${ZONE}"

    • Related Articles

    • What roles does Appranix service account need to protect GCP resources?

      Appranix creates a service account and assigns the below roles to the service account. The Role name and the purpose of the asking is explained in the below table. Discovery - Permission required to discover the resources and its metadata. ...
    • Getting Started with Container Resilience

      Kubernetes Connections Through Appranix, connect and discover Kubernetes Cluster resources automatically. You can discover and protect on-prem Kubernetes Cluster or managed Kubernetes Services like Google Kubernetes Engine, Azure Kubernetes Services, ...
    • GCP Environment Onboarding

      Subscribe from GCP market place Search for "Appranix" in GCP Marketplace. Subscribe to the "Appranix Cloud Application Resilience". Register an account with Appranix using the registration form. Activate your account through the verification email ...
    • What permissions does Appranix service account need to protect AWS resources?

      Appranix service account requires the following permissions to successfully discover and protect your cloud infrastructure in AWS and recover it in the DR/Recovery regions. The Role name and the purpose of the asking is explained in the below table. ...
    • Google Cloud IAM Policy Binding Issues and Remediation

      Google Cloud IAM Policy Binding Issues and Remediations During a Cloud Connection Creation: The issue that you may notice during Permission assignment: ERROR: Policy modification failed. For binding with the condition, run "gcloud alpha iam policies ...