Skip to main content
Version: Develop

Forking a Service Instance

danger

Currently, a9s KeyValue, a9s MariaDB, a9s Messaging, a9s MongoDB, and a9s PostgreSQL are the only Data Services that support performing forking for a Service Instance via the Disaster Recovery API or Plugin. All other a9s Data Services will need some manual interaction, which are not specified and may vary from Data Service to Data Service.

Trying to apply the information contained on this document to an a9s Data Service aside from the ones mentioned above can leave the Service Instances in an irrecuperable state.

This document helps the Application Developer in creating a fork of an existing Service Instance, based on a specific backup.

Creating a fork of a service instance is based on the Disaster Recovery API/Plugin.

For an Application Developer to be able to Create a Fork via Disaster Recovery, both the a9s Backup Manager and the Service Instances need to be prepared. In other words the Platform Operator must configure the a9s Backup Manager and a fresh and compatible Service Instance must be ready for use.

Overview

The steps needed to create a Fork of a Service Instance is very similar to the one needed to perform a Disaster Recovery. The difference is that in order to fork from a specific backup instead of the last one, it is necessary retrieve the backup_id instead of the backup_guid. so the steps are the following:

  • Procuring the backup_id of the wanted backup.
  • Procuring the encryption key.
  • Performing the operation.

This document provides the general steps to execute forking of a Service Instance via both the a9s Cloud Foundry CLI plugin for disaster recovery and the a9s Public API v1.

note

The a9s Backup Manager does not provide the encryption key, as this must be set by the Application Developer.

Downloading and Installing the a9s Cloud Foundry CLI Plugin

The plugin can be obtained from our public S3 bucket. The plugin is available for the following operating systems:

  • Linux (sha:493bd71f62baea006f9de8ac1df6a4e5382c3a3a3e95303482ce9072a13491fc)
  • MacOS (sha:3616fdf1dadd8452e439a3d49796cfb1b8f085c1e041adce08ae70e69ed164e5)
  • Windows (sha:d609d4bb70eade48141e145153ac1a59b6ab9e8a9b0d075706d1103063d9fbd3)

Once the binary file has been downloaded, it can be installed into the Cloud Foundry CLI with the following command:

cf install-plugin <source-path>/cf-disaster-recovery-plugin -f

Please notice that the -f flag is used in the command. This is necessary because this plugin is not signed by Cloud Foundry, therefore the -f flag is needed to ignore the unsigned certificate when installing the binary to the CLI.

Prepare the Service Instance

It is mandatory to have some information about the original Service Instance holding the data to be forked, as it is required in order to locate the correct backup collection and, if necessary, create a fresh Service Instance with the same settings:

KeyDescription
Dashboard URLThe URL to the Dashboard of the Service Instance. Used to retrieve the Backup GUID.
Backup IDThe ID that is used by the Backup Manager to retrieve the specific Backup to fork from.
Backup Encryption KeyThe encryption key used to encrypt the backup
Service NameThe name of the service used to create the Service Instance.
Plan NameThe name of the plan used to create the Service Instance
Custom Service ParametersCustom parameter set during creating or updating of the Service Instance

It is strongly recommended to retrieve this information as soon as possible, especially when updating the encryption key, and storing it in a secure place.

When using Cloud Foundry, most of the information can be retrieved using the Cloud Foundry CLI with a simple cf service <service-instance-name>, except:

note

It is worth noting the following caveats:

  • The new Service Instance has a completely different Backup GUID. This means that any backup that is created in the new Service Instance will have a different Backup GUID. Therefore it is imperative to properly distinguish them during the process and when saving them for future reference.

  • The new Service Instance will not have a user defined encryption key until one is set by the Application Developer. This encryption key will not affect the current disaster recovery, but it is important to note it down. It is imperative to properly distinguish both encryption key during the process and when saving them for future reference.

Setting the Backup's Encryption Key

For setting the backup's encryption key, follow the instructions in: Disaster Recovery - Setting the encryption Key

Retrieving the Wanted Backup's ID

In order to retrieve the backup_id, the endpoint API V1 - List All Backup can be called. This endpoint will return a array of Objects that are composed of multiple fields, the required field for this step is backup_id.

Perform the Fork

To be able to create a fork via Disaster Recovery, a new Service Instance must be created to host the data to recover. This requires the new Service Instance to be created with the same parameters and with the same or bigger plan as the old Service Instance to avoid unexpected behavior when restoring the data (e.g. a persistent disk that can not store the whole data). This information must be gathered in the Prepare the Service Instance step.

Cloud Foundry Example:

cf create-service <service name> <plan_name> my_psql_service -c <custom service parameters>

E.g.:

cf create-service a9s-postgresql13 postgresql-replica-small my_psql_service -c '{"continuous_archiving": "enabled"}'

After that, a disaster recovery can be triggered, with the additional information shown below:

KeyRequiredDescription
Backup IDTrueThe ID that is used by the Backup Manager to retrieve the specific Backup to fork from.
Backup Encryption KeyTrueThe encryption key used to decrypt the Backup.
note

If a Service Instance is configured with continuous archiving it can only be recovered to a Service Instance configured with continuous archiving.

tip

checking the status of the disaster recovery task is possible using the a9s Dashboard of the Service Instance recovering the data. After the task is finished with success, the Service Instance is ready for use.

note

After the restore finishes, a new service binding to the new Service Instance must be created in order to be able to access the data.

Perform Forking Using the Disaster Recovery API Directly

Create new Service Instance

First, create a new Service Instance, as shown in the example below:

cf create-service a9s-postgresql13 postgresql-replica-small my_recovered_psql_service -c '{"continuous_archiving": "enabled"}'

Authentication

To use the API, it is required to be authenticated and authorized, as well as creating a cookie, which will store the authenticated session. The necessary steps to do so are explained in the a9s Public API documentation.

After the authentication step, bearer_token will be obtained, and url environment variables and the cookie file called session.cookie will be created.

note

The url variable to be specified in the API call to perform the disaster recovery must use the a9s Service Dashboard URL of the new Service Instance, as the call is made against it.

Endpoint

POST /v1/instances/:instance_id/disaster-recovery/perform

Parameters

NameTypeDescription
backup_idstring
encryption_keystringThe encryption key that was used to encrypt the backups.

Perform Disaster Recovery with cURL

To perform a disaster recovery via cURL, the request must be executed against the full url of the new Service Instance as described in the example below:

curl -X POST --cookie test.cookie --cookie-jar test.cookie --location \
--header "Content-Type: application/json" \
--header "Authorization: ${bearer_token}" \
"${url}/disaster-recovery/perform" \
--data '{"encryption_key":"<encryption_key>", "backup_id":"<backup_id>"}'

Perform Disaster Recovery via the CF CLI Plugin

A specific backup can be restored by running the following command:

cf disaster-recovery-restore <service-instance> <backup-id> <encryption-key>

This will restore a specific backup from the original instance on a fresh Service Instance.