Was this page helpful?
Caution
You're viewing documentation for a previous version of Scylla Manager. Switch to the latest stable version.
There are multiple S3 API compatible providers that can be used with Scylla Manager. Due to minor differences between them we require that exact provider is specified in the config file for full compatibility. The available providers are Alibaba, AWS, Ceph, DigitalOcean, IBMCOS, Minio, Wasabi, Dreamhost, Netease.
You need to create a bucket in your storage system of choice.
This procedure is required so that Scylla Manager can access your bucket. You need to configure bucket access policy in your storage system and set credentials in the Scylla Manager Agent config file.
The user must have list, read, write and delete privileges to the bucket, for specifics consult the sample AWS IAM policy.
With MinIO you can use the the same policy files as with AWS.
Procedure
Given myminio is an alias for your MinIO deployment.
Create a user by providing access and secret keys.
mc admin user add myminio "${MINIO_USER_ACCESS_KEY}" "${MINIO_USER_SECRET_KEY}"
Copy the sample AWS IAM policy as user-policy.json
.
Replace scylla-manager-backup
in user-policy.json
with your bucket name.
Create a user policy.
mc admin policy add myminio sm-user-policy user-policy.json
Attach the policy to the user.
mc admin policy set myminio sm-user-policy user="${MINIO_USER_ACCESS_KEY}"
Note that this procedure needs to be repeated for each Scylla node.
Procedure
Edit the /etc/scylla-manager-agent/scylla-manager-agent.yaml
Uncomment the s3:
line, for parameters note the two spaces in front, it’s a yaml file.
Uncomment and set access_key_id
and secret_access_key
.
Uncomment and set provider
to one of the supported providers.
Uncomment and set endpoint
to the base URL of your storage.
Validate that the manager has access to the backup location. If there is no response, the S3 bucket is accessible. If not, you will see an error.
scylla-manager-agent check-location --location s3:<your S3 bucket name>
Restart Scylla Manager Agent service.
sudo systemctl restart scylla-manager-agent
s3:
access_key_id: AKIAIOSFODNN7EXAMPLE
secret_access_key: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
provider: Minio
endpoint: http://192.168.121.99:9000
To troubleshoot Node to bucket connectivity issues you can run:
scylla-manager-agent check-location --debug --location s3:<your S3 bucket name>
Some providers, such as MinIO, support the option to choose a custom Certificate Authority for verifying the authenticity. See Network Encryption (TLS) in the MinIO documentation for details.
To ensure that ScyllaDB Manager functions correctly with MinIO’s enhanced security, you must add that specific Certificate Authority to the system’s Certificate Authorities on every VM where the ScyllaDB Manager Agent is running.
sudo cp <source_path>/rootCA.pem /usr/local/share/ca-certificates/rootCA.crt sudo update-ca-certificatescp <source_path>/rootCA.pem /etc/pki/ca-trust/source/anchors/rootCA.crt update-ca-trust extract
Was this page helpful?