consul-snapshot is a backup and restore utility for Consul (https://www.consul.io). This is slightly different than some other utilities out there as this runs as a daemon for backups and ships them to S3. consul snapshot in its current state is designed only for disaster recovery scenarios and full restore. There is no support for single key or path based backups at the moment.
This is intended to run under Nomad (https://www.nomadproject.io) and connected to Consul (https://www.consul.io) and registered as a service with health checks. It also runs fine outside of Nomad standalone and can even be used for single backups, however it is designed to run as a daemon.
consul-snapshot runs a small http server that can be used for consul health checks on backup state. Right now if the backup is older than 1 hour it will return 500s to health check requests at /health making it easy for consul health checking. There is no consul service registration as that is expected to be done in the nomad job spec or manually.
consul-snapshot has been used in production since February 2016.
- Back up K/V Store
- Back up ACLs
- Back up Prepared Queries (Consul 0.6.x)
- Store backups in Amazon S3
- Restore backups directly from S3
- AWS encrypted backups and restores with configurable passphrase
- Consul compatible health checks for age of last backup
- Configurable consul settings and backup interval
- EC2 IAM instance profile support(no credentials needed)
Grab the binary from Releases
With go get:
go get github.com/pshima/consul-snapshot
From source:
git clone https://github.com/pshima/consul-snapshot
cd consul-snapshot
make
make install
Configuration is done from environment variables.
- S3BUCKET (the s3 bucket where backups should be delivered)
- S3REGION (the region the s3 bucket is located)
- AWS_ACCESS_KEY_ID (the access key id used to access the bucket)
- AWS_SECRET_ACCESS_KEY (the secret key used to access the bucket)
- BACKUPINTERVAL (how often you want the backup to run in seconds)
- CRYPTO_PASSWORD (sets a password for encrypting and decrypting backups)
- SNAPSHOT_TMP_DIR (sets the directory for temporary files, defaults to "/tmp")
- CONSUL_SNAPSHOT_UPLOAD_PREFIX (an arbitrary prefix to be prepended to the
name of each uploaded object, e.g.,
consul-dc1
. Default isbackups
.) - CONSUL_SNAPSHOT_S3_SSE (optional server-side encryption
algorithm, e.g.,
AES256
oraws:kms
) - CONSUL_SNAPSHOT_S3_SSE_KMS_KEY_ID (optional KMS key ID, if
server-side encryption is used, and
aws:kms
is used for the encryption algorithm) - LOCAL_DIR (the directory to store the local backup file and skip further remote uploading)
- LOCAL_BACKUP_FILE (the name of the backup file to restore from; must be inside the LOCAL_DIR)
- LOCAL_DRY_RUN (do not actually restore the LOCAL_DIR/LOCAL_BACKUP_FILE)
And through the consul api there are several options available (https://github.com/hashicorp/consul/blob/master/api/api.go#L126)
- CONSUL_HTTP_ADDR (default: 127.0.0.1:8500)
- CONSUL_HTTP_TOKEN (default: nil)
- CONSUL_HTTP_AUTH (default: nil)
- CONSUL_HTTP_SSL (default: nil)
- CONSUL_HTTP_SSL_VERIFY (default: nil)
Authentication is done through the above environment variables. Credentials can be ommitted in place of an EC2 Instance IAM profile with write access to the S3 Bucket.
Running a backup:
% consul-snapshot backup
[INFO] v0.1.4: Starting Consul Snapshot
2016/07/08 12:01:47 [DEBUG] Backup starting on interval: 5s
2016/07/08 12:01:52 [INFO] Starting Backup At: 1468004512
2016/07/08 12:01:52 [INFO] Listing keys from consul
2016/07/08 12:01:52 [INFO] Converting 2 keys to JSON
2016/07/08 12:01:52 [INFO] Writing Local Backup File
2016/07/08 12:01:52 [DEBUG] Wrote 257 bytes to file, /tmp/consul.backup.1468004512.gz
2016/07/08 12:01:52 [INFO] Writing Backup to Remote File
2016/07/08 12:01:52 [INFO] Uploading test9898989/backups/2016/7/8/consul.backup.1468004512.gz to S3 in us-west-2
2016/07/08 12:01:52 [INFO] Running post processing
2016/07/08 12:01:52 [INFO] Backup completed successfully
Running a restore:
% consul-snapshot restore backups/2016/7/8/consul.backup.1468004512.gz
[INFO] v0.1.4: Starting Consul Snapshot
2016/07/08 12:23:14 [DEBUG] Starting restore of test9898989/backups/2016/7/8/consul.backup.1468004512.gz
2016/07/08 12:23:14 [INFO] Downloading test9898989/tmp/backups/2016/7/8/consul.backup.1468004512.gz from S3 in us-west-2
2016/07/08 12:23:14 [INFO] Download completed
2016/07/08 12:23:14 [INFO] Extracting Backup File
2016/07/08 12:23:14 [INFO] Extracted 2 keys to restore
2016/07/08 12:23:14 [INFO] Restored 2 keys with 0 errors
2016/07/08 12:23:14 [INFO] Restore completed.
There are some unit tests but not near full coverage.
There is an acceptance test that:
- Spins up a local consul agent in dev mode
- Generates random k/v data and inserts it
- Takes a backup locally
- Wipes consul k/v
- Restores the backup
- Verifies that the k/v is still correct
To run the acceptance test set ACCEPTANCE_TEST=1
- Add safety checks or confirm dialog for restore
- Add restore dry run
- Inspect app performance on larger data structures
- Backup in chunks instead of all at once
- Add a web interface to view backups
- Add metrics
- Add single key backups
- Use transactions for backups and restores
- Add support for just running once