Gluu Server Backup#
The Gluu Server should be backed up frequently--we recommend at least one daily and one weekly backup of Gluu's data and/or VM.
There are multiple methods for backing up the Gluu Server. A few recommended strategies are provided below.
VM Snapshot Backup#
In the event of a production outage, a proper snapshot of the last working condition will help rapidly restore service.
Most platform virtualization software and cloud vendors have snapshot backup features. For instance, Digital Ocean has Live Snapshot and Droplet Snapshot; VMWare has Snapshot Manager, etc.
Snaphots should be taken for all Gluu environments (e.g. Prod, Dev, QA, etc.) and tested periodically to confirm consistency and integrity.
Tarball Method#
All Gluu Server files live in a single folder: /opt. The entire Gluu Server CE chroot folder can be archived using the tar command: 
- 
Stop the server:
service gluu-server stopor/sbin/gluu-serverd stop - 
Use
tarto take a backup:tar cvf gluu40-backup.tar /opt/gluu-server/ - 
Start the server again:
service gluu-server startor/sbin/gluu-serverd start 
LDIF Data Backup#
From time to time (daily or weekly), the LDAP database should be exported in a standard LDIF format. Having the data in plain text offers some options for recovery that are not possible with a binary backup.
Instructions are provided below for exporting OpenDJ data. The below instructions address situations where unused and expired cache and session related entries are piling and causing issues with functionality. Read more about this issue.
OpenDJ#
Errors that this may help fix include but are not restricted to:
- Out of Memory
 
If your Gluu Server is backed by OpenDJ, follow these steps to backup your data:
- 
First check your cache entries by running the following command:
/opt/opendj/bin/ldapsearch -h localhost -p 1636 -Z -X -D "cn=directory manager" -w <password> -b 'o=gluu' -T 'oxAuthGrantId=*' dn | grep 'dn:' | wc -l - 
Dump the data as LDIF
- Log in to root:
 
sudo su -- Log in to Gluu-Server-4.1:
 
service gluu-server loginor
/sbin/gluu-serverd login- 
Stop the
identity,oxauthandopendjservices - 
If you are moving to a new LDAP, copy over your schema files from the following directory. Otherwise simply copy it for backup:
 
/opt/opendj/config/schema/- Now export the LDIF and save it somewhere safe. You will not be importing this if you choose to apply any filters as below:
 
/opt/opendj/bin/export-ldif -n userRoot -h localhost -l exactdatabackup_date.ldif- Now exclude 
oxAuthGrantIdso the command becomes: 
/opt/opendj/bin/export-ldif -n userRoot -h localhost -l yourdata_withoutoxAuthGrantId.ldif --includeFilter '(!(oxAuthGrantId=*))'- You may also wish to exclude 
oxMetricso the command becomes: 
/opt/opendj/bin/export-ldif -n userRoot -h localhost -l yourdata_withoutGrantIdMetic.ldif --includeFilter '(&(!(oxAuthGrantId=*))(! (objectClass=oxMetric)))' - 
Now, only if needed, rebuild indexes:
- Check status of indexes:
 
/opt/opendj/bin/backendstat show-index-status --backendID userRoot --baseDN o=gluuTake note of all indexes that need to be rebuilt. If no indexing is needed, move on to step 4.
- 
Start the
opendjservice - 
Build backend index for all indexes that need it accoring to previous status command, change passoword
-wand index name accordingly. This command has to be run for every index separately: 
/opt/opendj/bin/dsconfig create-backend-index --port 4444 --hostname localhost --bindDN "cn=directory manager" -w password --backend-name userRoot --index-name iname --set index-type:equality --set index-entry-limit:4000 --trustAll --no-prompt- 
Stop the
opendjservice - 
Rebuild the indexes as needed, here are examples :
 
/opt/opendj/bin/rebuild-index --baseDN o=gluu --index iname /opt/opendj/bin/rebuild-index --baseDN o=gluu --index uid /opt/opendj/bin/rebuild-index --baseDN o=gluu --index mail- Check status again :
 
/opt/opendj/bin/backendstat show-index-status --backendID userRoot --baseDN o=gluu- Verify indexes:
 
/opt/opendj/bin/verify-index --baseDN o=gluu --countErrors - 
Next import your previously exported LDIF. Here, we are importing without
oxAuthGrantId. 
Note
You may import the exact export of your ldap exactdatabackup_date.ldif.Do not import your exact copy of your LDIF if you are following instructions to to clean your cache entries
/opt/opendj/bin/import-ldif -n userRoot -l yourdata_withoutoxAuthGrantId.ldif
If you moved to a new LDAP, copy back your schema files to this directory:
```bash
/opt/opendj/config/schema/
```
- 
Start the
identity,oxauthandopendjservices - 
Finally, verify the cache entries have been removed:
/opt/opendj/bin/ldapsearch -h localhost -p 1636 -Z -X -D "cn=directory manager" -w <password> -b 'o=gluu' -T 'oxAuthGrantId=*' dn | grep 'dn:' | wc –l 
You should be done and everything should be working perfectly. You may notice your Gluu Server responding slower than before. That is expected -- your LDAP is adjusting to the new data, and indexing might be in process. Give it some time and it should be back to normal.
Backing up data and restoring from backup Kubernetes instructions#
Overview#
This guide introduces how to backup data and restore from a backup file.
Couchbase#
Install backup strategy#
A typical installation of Gluu using pygluu-kubernetes.pyz  will automatiically install a backup strategy that will backup Couchbase every 5 mins to a persistent volume. However, the Couchbase backup can be setup manually:
- 
Download
pygluu-kubernetes.pyz. This package can be built manually. - 
Run :
./pygluu-kubernetes.pyz install-couchbase-backup 
Note
./pygluu-kubernetes.pyz install-couchbase-backup will not install couchbase.
Uninstall backup strategy#
A file named couchbase-backup.yaml will have been generated during installation of backup strategy. Use that as follows to remove the backup strategy:
kubectl delete -f ./couchbase-backup.yaml
Restore from backup#
Please save a copy of the configurations to a file.
kubectl get cm gluu -n <Gluu-namespace> -o yaml > configs-<date>.yaml
kubectl get secret gluu -n <Gluu-namespace> -o yaml > secrets-<date>.yaml
Note
An existing Gluu setup must exist for this to work. Please do not attempt to delete any resources and be very careful in handling Gluu configurations and secrets.
Couchbase restore step#
- 
Install a new Couchbase if needed.
./pygluu-kubernetes.pyz install-couchbase - 
Create a pod definition file called
restore-cb-pod.yamland paste the below yaml changing thevolumes,volumeMountsandnamespaceif they are different.Note
./pygluu-kubernetes.pyz install-couchbase-backupuses thevolumesandvolumeMountsas seen in the yaml belowapiVersion: v1 kind: Pod metadata: name: restore-node namespace: cbns spec: # specification of the pod's contents containers: - name: restore-pod image: couchbase/server:enterprise-6.5.0 # Just spin & wait forever command: [ "/bin/bash", "-c", "--" ] args: [ "while true; do sleep 30; done;" ] volumeMounts: - name: "couchbase-cluster-backup-volume" mountPath: "/backups" volumes: - name: couchbase-cluster-backup-volume persistentVolumeClaim: claimName: backup-pvc restartPolicy: Never - 
Apply
restore-cb-pod.yaml.kubectl apply -f restore-cb-pod.yaml - 
Access the
restore-nodepod.kubectl exec -it restore-node -n cbns -- /bin/bash - 
Choose the backup of choice
cbbackupmgr list --archive /backups --repo couchbaseWe will choose the oldest we received from the command above
2020-02-20T10_05_13.781131773Z - 
Preform the restore using the
cbbackupmgrcommand.cbbackupmgr restore --archive /backups --repo couchbase --cluster cbgluu.cbns.svc.cluster.local --username admin --password passsword --start 2020-02-20T10_05_13.781131773Z --end 2020-02-20T10_05_13.781131773ZLearn more about
cbbackupmgrcommand and its options. - 
Once done delete the
restore-nodepod.kubectl delete -f restore-cb-pod.yaml -n cbns 
Gluu restore step#
- 
Download
pygluu-kubernetes.pyz. This package can be built manually. - 
Run :
./pygluu-kubernetes.pyz restore 
OpenDJ / Wren:DS#
Install backup strategy#
A typical installation of Gluu using pygluu-kubernetes.pyz  will automatiically install a backup strategy that will backup opendj / wren:ds every 10 mins /opt/opendj/ldif. However, the couchbase backup can be setup manually:
- 
Download
pygluu-kubernetes.pyz. This package can be built manually. - 
Run :
./pygluu-kubernetes.pyz install-ldap-backup 
Note
Up to 6 backups will be stored at /opt/opendj/ldif on the running opendj pod. The backups will carry the name backup-0.ldif to backup-5.ldif and will be overwritten to save data.
Uninstall backup strategy#
A file named ldap-backup.yaml will have been generated during installation of backup strategy. Use that as follows to remove the backup strategy:
kubectl delete -f ./couchbase-backup.yaml
Restore from backup#
Note
An existing Gluu setup must exist for this to work. Please do not attempt to delete any resources and be very careful in handling Gluu configurations and secrets.
OpenDJ / Wren:DS restore step#
- 
Opendj volume attached should carry the backups at
/opt/opendj/ldif - 
If this is a fresh installation , attach the older volume to the new pod.
 - 
Access the opendj pod.
kubectl exec -ti opendj-0 -n gluu /bin/sh - 
Choose the backup of choice and rename it to
backup-this-copy.ldif. Thepygluu-kubernetes.pyzwill preform the import.ls /opt/opendj/ldif cd /opt/opendj/ldif cp backup-1.ldif backup-this-copy.ldif - 
Run :
./pygluu-kubernetes.pyz restore