Getting Started with Container Resilience

Getting Started with Container Resilience

Kubernetes Connections

Through Appranix, connect and discover Kubernetes Cluster resources automatically. You can discover and protect on-prem Kubernetes Cluster or managed Kubernetes Services like Google Kubernetes Engine, Azure Kubernetes Services, or Elastic Kubernetes Services from AWS for multi-cloud resiliency.


  • A terminal to run kubectl, gcloud and gsutil commands

  • kubectl must be connected to the cluster that is to be protected

  • gcloud must point to the same project where the bucket is to be created

  • gsutil must have access to the same GCP project where the bucket is to be created

Steps to add Kubernetes Connection:

  1. Enter the name and description of the cluster 

  2. To install the Appranix Controller, copy and run the command on a terminal connected to the Kubernetes cluster

  3. Run the script in the terminal with the above prerequisites

  4. Enter the name of the GCP project where the bucket is to be created

  5. Enter a new bucket name to be created

          NOTE: If you are going to recover to another cluster, then while adding that cluster, you must enter the same bucket name

      6. Once theinstallation is complete, click “FINISH” to create the Kubernetes Connection

Steps to create Protection Policies

  1. Before creating a Container Assembly, Policy Template has to be created to define the frequency in which the backups have to be taken

  2. After signing in, click on Policy Templates in the left navigation menu and click on CREATE POLICY TEMPLATE

  3. Enter the policy name, select a frequency for protection and click Save

Steps to Create a Container Assembly

  1. Click on Container Assemblies from the left navigation menu and click on CREATE CONTAINER ASSEMBLY

  2. Enter the name of the application you are protecting and select the protection policy from the listed templates

  3. Select the source cluster that is to be protected

  4. Click on Protect all the namespaces or Protect only the selected namespaces and select the namespaces related to the application you are protecting or migrating

  5. Review and click Finish


Steps to Migrate/Restore resources

  1. From the Timeline tab, select the backup you want to recover and click on RECOVER under ACTIONS

  2. Select the destination cluster where you want to restore the backup and click on RECOVER

  3. Monitor the progress in the Activity tab

Data sent to object storage

The object storage bucket that the client configures during the installation process is where all the K8s resources from the cluster are extracted and stored to restore to the target cluster.

Appranix doesn’t have access to the bucket and its contents.

The credentials to access the bucket passed during installation are stored as a secret within the cluster and not sent to Appranix.

    • Related Articles

    • Getting Started

      Cloud Application Resilience Appranix Cloud Application Resilience Service offers protection and recovery of entire application environments using cloud-native services and cloud-native data lifecycle management. BCDR administrators, SREs, and Cloud ...
    • GCP Kubernetes Protection Service

      Overview Protect and recover your entire Kubernetes apps, configurations, and data for your app resilience Protect your on-prem or on-cloud clusters for high availability Become compliant with organizational DR policies No infrastructure required, ...
    • AKS Prerequisites and Configuration

      Getting Started with Container Resilience for Azure Prerequisites 1. az, kubectl, curl executables on the bash terminal from where you will be running installation script 2. An Azure Blob Storage container with Storage Account Access Key to access ...
    • Resilience Insights

      Appranix’s “Resilience Insights” provides a comprehensive daily report of all the protection and recovery activities. By default, the previous day’s report is displayed, but the date can be chosen to show the report for any particular day. Overall ...
    • Getting started with OpenShift protection

      Prerequisites:  A storage bucket in GCPandcredentials to access it.  A Configmap and SecretonyourOpenShiftcluster for the bucket config and credentials.  Creating the Configmap and Secret inOpenShift. Step 1: Creating a storage bucket  You can create ...