- Overview
- Requirements
- Installation
- Prerequisite checks
- Downloading the installation packages
- uipathctl cluster
- uipathctl cluster maintenance
- uipathctl cluster maintenance disable
- uipathctl cluster maintenance enable
- uipathctl cluster maintenance is-enabled
- uipathctl cluster migration
- uipathctl cluster migration export
- uipathctl cluster migration import
- uipathctl cluster migration run
- uipathctl cluster upgrade
- uipathctl config
- uipathctl config add-host-admin
- uipathctl config additional-ca-certificates
- uipathctl config additional-ca-certificates get
- uipathctl config additional-ca-certificates update
- uipathctl config alerts
- uipathctl config alerts add-email
- uipathctl config alerts remove-email
- uipathctl config alerts update-email
- uipathctl config argocd
- uipathctl config argocd ca-certificates
- uipathctl config argocd ca-certificates get
- uipathctl config argocd ca-certificates update
- uipathctl config argocd generate-dex-config
- uipathctl config argocd generate-rbac
- uipathctl config argocd registry
- uipathctl config argocd registry get
- uipathctl config argocd registry update
- uipathctl config enable-basic-auth
- uipathctl config orchestrator
- uipathctl config orchestrator get-config
- uipathctl config orchestrator update-config
- uipathctl config saml-certificates get
- uipathctl config saml-certificates rotate
- uipathctl config saml-certificates update
- uipathctl config tls-certificates
- uipathctl config tls-certificates get
- uipathctl config tls-certificates update
- uipathctl config token-signing-certificates
- uipathctl config token-signing-certificates get
- uipathctl config token-signing-certificates rotate
- uipathctl config token-signing-certificates update
- uipathctl health
- uipathctl health bundle
- uipathctl health check
- uipathctl health diagnose
- uipathctl health test
- uipathctl manifest
- uipathctl manifest apply
- uipathctl manifest diff
- uipathctl manifest get
- uipathctl manifest get-revision
- uipathctl manifest list-applications
- uipathctl manifest list-revisions
- uipathctl manifest render
- uipathctl prereq
- uipathctl prereq create
- uipathctl prereq run
- uipathctl resource
- uipathctl resource report
- uipathctl snapshot
- uipathctl snapshot backup
- uipathctl snapshot backup create
- uipathctl snapshot backup disable
- uipathctl snapshot backup enable
- uipathctl snapshot delete
- uipathctl snapshot list
- uipathctl snapshot restore
- uipathctl snapshot restore create
- uipathctl snapshot restore delete
- uipathctl snapshot restore history
- uipathctl snapshot restore logs
- uipathctl version
- Post-installation
- Migration and upgrade
- Upgrading Automation Suite on EKS/AKS
- Step 1: Moving the Identity organization data from standalone to Automation Suite
- Step 2: Restoring the standalone product database
- Step 3: Backing up the platform database in Automation Suite
- Step 4: Merging organizations in Automation Suite
- Step 5: Updating the migrated product connection strings
- Step 6: Migrating standalone Orchestrator
- Step 7: Migrating standalone Insights
- Step 8: Deleting the default tenant
- B) Single tenant migration
- Migrating from Automation Suite on Linux to Automation Suite on EKS/AKS
- Monitoring and alerting
- Cluster administration
- Product-specific configuration
- Troubleshooting
Configuring the backup store
input.json
.
input.json
before enabling a scheduled backup or taking an on-demand backup. Follow either the EKS or AKS configuration described in
the following sections, as applicable.
You can provide this information during the installation of the Automation Suite cluster or later, as a post-installation operation, while enabling or taking the backup of the cluster.
input.json
sample
"snapshot": {
"enabled": true,
"external_object_storage": {
"bucket_name": "<s3_bucket_used_for_backup>",
"storage_type": "s3",
"region": "<s3_bucket_region>"
}
}
"snapshot": {
"enabled": true,
"external_object_storage": {
"bucket_name": "<s3_bucket_used_for_backup>",
"storage_type": "s3",
"region": "<s3_bucket_region>"
}
}
input.json
parameters
Key |
Value |
---|---|
|
The name of the S3 bucket for storing the snapshot |
|
ARN for connecting with the S3. If the node has the necessary permissions to connect to the backup objectstore, then the ARN is not needed. Otherwise, make sure to create an IAM role with the necessary permissions and add the ARN. |
|
The region where the S3 is present. |
input.json
sample"snapshot" : {
"external_object_storage": {
"client_secret": "<azure_service_principal_client_secret>",
"resource_group": "<azure_resource_group_with_storage_account>",
"auth_mode": "ServicePrincipal",
"account_name": "<azure_account_name>",
"bucket_name": "<azure_container_name>",
"client_id": "<azure_service_principal_id>",
"subscription_id": "<azure_subscription_id>",
"cloud_name": "AzurePublicCloud"
},
"aks_infra_resource_group":"<azure_infra_resource_group>"
}
"snapshot" : {
"external_object_storage": {
"client_secret": "<azure_service_principal_client_secret>",
"resource_group": "<azure_resource_group_with_storage_account>",
"auth_mode": "ServicePrincipal",
"account_name": "<azure_account_name>",
"bucket_name": "<azure_container_name>",
"client_id": "<azure_service_principal_id>",
"subscription_id": "<azure_subscription_id>",
"cloud_name": "AzurePublicCloud"
},
"aks_infra_resource_group":"<azure_infra_resource_group>"
}
input.json
parameters
Key |
Value |
---|---|
|
Name of the container in Azure Storage Account for storing the snapshot |
|
Resource group in which the target Azure Storage Account for storing snapshot is present. |
|
Must be set to
ServicePrincipal |
|
Client ID for service principal authentication |
|
Client Secret for the service principal-based authentication |
|
Name of the Azure Storage Account where the snapshot is backed up |
|
Default value
AzurePublicCloud Change to one of the followin,g as applicable:
AzureUSGovernmentCloud , AzureChinaCloud ,
AzureGermanCloud |
|
Subscription ID where the Azure Storage Account for storing backup is stored. |
|
Resource group where the machines and other resources for the AKS cluster are
created. This is usually made and managed by Azure and starts with
MC_ While other values can remain the same during backup and restore, this value will be changed during restoration. This must be the new Resource Group where the Kubernetes resources of the new AKS cluster are provisioned. |
input.json
, as described in the previous section, run the following command to apply the configuration:
./uipathctl manifest apply input.json --only velero --versions versions.json
./uipathctl manifest apply input.json --only velero --versions versions.json