1.0 Introduction
This article describes the Fortanix-Data-Security-Manager (DSM) password based backup and restore procedures for an SGX machine using SCP backup type.
2.0 Configuring Backup Using SCP
This section describes the steps to configure backups using SCP before or after creating a Fortanix Data Security Manager cluster.
Perform the following steps:
Edit the
config.yaml
file to add the following properties to enable backups in SCP, which is your backup destination. To know more about theconfig.yaml
file, refer to the Fortanix DSM Installation Guide, Section 5.4:NOTE
By default, all the CRON jobs schedules are in the UTC time zone.
For fortanix DSM version 3.23 and above, use the following sample configuration:
backup: cron_schedule: "1 1 * * *" backup_mode: "snapshot" exclude_auditlog: true scp: server_ip: "ip_address" username: "administrator" password: "********" path: "/home/administrator/backup"
For Fortanix DSM version 4.6 and above, use the
authmode
parameter with the valuepassword
orprivatekey
:backup: cron_schedule: "1 1 * * *" backup_mode: "snapshot" exclude_auditlog: true scp: server_ip: "ip_address" authmode: “password” username: "administrator" password: "********" path: "/home/administrator/backup"
Where,
authmode
can be set to eitherpassword
orprivatekey
.backup_mode
can be set to snapshot.exclude_autditlog
can be set to eithertrue
orfalse
. It is recommended that the value is set totrue
.
Run the following command to redeploy the cluster to apply changes to the
config.yaml
file:sdkms-cluster deploy --config config.yaml --stage DEPLOY
Run the following command to navigate to
bin
folder:cd /opt/fortanix/sdkms/bin
Run the following command to execute the
run_sdkms_backup.sh
script to perform the manual backup:./run_sdkms_backup.sh
Run the following command to verify the status of the backup:
kubectl logs -l job-name=sdkms-backup-manual
After executing the
run_sdkms_backup.sh
script, theDEPLOY
pod andsdkms-manual backup
pod starts or shows the status asRUNNING
. Wait until the job is completed and the status changes toCOMPLETED
.NOTE
Ensure that Cassandra and appropriate data and secrets are backed up to the SCP (target node) as shown in the following image:
Figure 1: SCP Backup
For steps to back up the audit log, refer to the Fortanix DSM Backup for Audit Log.
3.0 Recovering the Data
For a step-by-step procedure on data recovery, refer to the Fortanix DSM Restoration Guide - Automated.