Documentation for version v1.14 is no longer actively maintained. The version you are currently viewing is a static snapshot. For up-to-date documentation, see the latest version.
These tips can help you troubleshoot known issues. If they don’t help, you can file an issue, or talk to us on the #velero channel on the Kubernetes Slack server.
You can use the velero bug
command to open a
Github issue by launching a browser window with some prepopulated values. Values included are OS, CPU architecture, kubectl
client and server versions (if available) and the velero
client version. This information isn’t submitted to Github until you click the Submit new issue
button in the Github UI, so feel free to add, remove or update whatever information you like.
You can use the velero debug
command to generate a debug bundle, which is a tarball
that contains:
Please use command velero debug --help
to see more usage details.
You can increase the verbosity of the Velero server by editing your Velero deployment to look like this:
kubectl edit deployment/velero -n velero
...
containers:
- name: velero
image: velero/velero:latest
command:
- /velero
args:
- server
- --log-level # Add this line
- debug # Add this line
...
Note: Velero plugins are started as separate processes and once the Velero operation is done (either successfully or not), they exit. So, if you see received EOF, stopping recv loop messages in debug logs, that does not mean an error occurred, just that a plugin finished executing.
Because of how Kubernetes handles Service objects of type=LoadBalancer
, when you restore these objects you might encounter an issue with changed values for Service UIDs. Kubernetes automatically generates the name of the cloud resource based on the Service UID, which is different when restored, resulting in a different name for the cloud load balancer. If the DNS CNAME for your application points to the DNS name of your cloud load balancer, you’ll need to update the CNAME pointer when you perform a Velero restore.
Alternatively, you might be able to use the Service’s spec.loadBalancerIP
field to keep connections valid, if your cloud provider supports this value. See
the Kubernetes documentation about Services of Type LoadBalancer.
The
Admission webhooks may forbid a resource to be created based on the input, it may optionally mutate the input as well.
Because velero calls the API server to restore resources, it is possible that the admission webhooks are invoked and cause unexpected failures, depending on the implementation and the configuration of the webhooks.
To work around such issue, you may disable the webhooks or create a restore item action plugin to modify the resources before they are restored.
custom resource not found
errors when starting up.Velero’s server will not start if the required Custom Resource Definitions are not found in Kubernetes. Run velero install
again to install any missing custom resource definitions.
velero backup logs
returns a SignatureDoesNotMatch
errorDownloading artifacts from object storage utilizes temporary, signed URLs. In the case of S3-compatible providers, such as Ceph, there may be differences between their implementation and the official S3 API that cause errors.
Here are some things to verify if you receive SignatureDoesNotMatch
errors:
Velero cannot resume backups that were interrupted. Backups stuck in the InProgress
phase can be deleted with kubectl delete backup <name> -n <velero-namespace>
.
Backups in the InProgress
phase have not uploaded any files to object storage.
Steps to troubleshoot:
ports:
- containerPort: 8085
name: metrics
protocol: TCP
$ kubectl -n <YOUR_VELERO_NAMESPACE> port-forward <YOUR_VELERO_POD> 8085:8085
Forwarding from 127.0.0.1:8085 -> 8085
Forwarding from [::1]:8085 -> 8085
.
.
.
Now, visiting http://localhost:8085/metrics on a browser should show the metrics that are being scraped from Velero.
Cloud provider credentials are given to Velero to store and retrieve backups from the object store and to perform volume snapshotting operations.
These credentials are either passed to Velero at install time using:
--secret-file
flag to the velero install
command. OR--set-file credentials.secretContents.cloud
flag to the helm install
command.Or, they are specified when creating a BackupStorageLocation
using the --credential
flag.
If using the credentials provided at install time, they are stored in the cluster as a Kubernetes secret named cloud-credentials
in the same namespace in which Velero is installed.
Follow the below troubleshooting steps to confirm that Velero is using the correct credentials:
Confirm that the cloud-credentials
secret exists and has the correct content.
$ kubectl -n velero get secrets cloud-credentials
NAME TYPE DATA AGE
cloud-credentials Opaque 1 11h
$ kubectl -n velero get secrets cloud-credentials -ojsonpath={.data.cloud} | base64 --decode
<Output should be your credentials>
Confirm that velero deployment is mounting the cloud-credentials
secret.
$ kubectl -n velero get deploy velero -ojson | jq .spec.template.spec.containers[0].volumeMounts
[
{
"mountPath": "/plugins",
"name": "plugins"
},
{
"mountPath": "/scratch",
"name": "scratch"
},
{
"mountPath": "/credentials",
"name": "cloud-credentials"
}
]
If
File System Backup is enabled, then, confirm that the node-agent daemonset is also mounting the cloud-credentials
secret.
$ kubectl -n velero get ds node-agent -ojson |jq .spec.template.spec.containers[0].volumeMounts
[
{
"mountPath": "/host_pods",
"mountPropagation": "HostToContainer",
"name": "host-pods"
},
{
"mountPath": "/scratch",
"name": "scratch"
},
{
"mountPath": "/credentials",
"name": "cloud-credentials"
}
]
Confirm if the correct credentials are mounted into the Velero pod.
$ kubectl -n velero exec -ti deploy/velero -- bash
nobody@velero-69f9c874c-l8mqp:/$ cat /credentials/cloud
<Output should be your credentials>
BackupStorageLocation
and VolumeSnapshotLocation
credentialsFollow the below troubleshooting steps to confirm that Velero is using the correct credentials if using credentials specific to a
BackupStorageLocation
or VolumeSnapshotLocation
:
Confirm that the object storage provider plugin being used supports multiple credentials.
If the logs from the Velero deployment contain the error message "config has invalid keys credentialsFile"
, the version of your object storage plugin does not yet support multiple credentials.
The object storage plugins maintained by the Velero team support this feature, so please update your plugin to the latest version if you see the above error message.
If you are using a plugin from a different provider, please contact them for further advice.
Confirm that the secret and key referenced by the BackupStorageLocation
or VolumeSnapshotLocation
exists in the Velero namespace and has the correct content:
# Determine which secret and key the BackupStorageLocation is using
BSL_SECRET=$(kubectl get backupstoragelocations.velero.io -n velero <bsl-name> -o yaml -o jsonpath={.spec.credential.name})
BSL_SECRET_KEY=$(kubectl get backupstoragelocations.velero.io -n velero <bsl-name> -o yaml -o jsonpath={.spec.credential.key})
# Confirm that the secret exists
kubectl -n velero get secret $BSL_SECRET
# Print the content of the secret and ensure it is correct
kubectl -n velero get secret $BSL_SECRET -ojsonpath={.data.$BSL_SECRET_KEY} | base64 --decode
# Determine which secret and key the VolumeSnapshotLocation is using
VSL_SECRET=$(kubectl get volumesnapshotlocations.velero.io -n velero <vsl-name> -o yaml -o jsonpath={.spec.credential.name})
VSL_SECRET_KEY=$(kubectl get volumesnapshotlocations.velero.io -n velero <vsl-name> -o yaml -o jsonpath={.spec.credential.key})
# Confirm that the secret exists
kubectl -n velero get secret $VSL_SECRET
# Print the content of the secret and ensure it is correct
kubectl -n velero get secret $VSL_SECRET -ojsonpath={.data.$VSL_SECRET_KEY} | base64 --decode
If the secret can’t be found, the secret does not exist within the Velero namespace and must be created.
If no output is produced when printing the contents of the secret, the key within the secret may not exist or may have no content.
Ensure that the key exists within the secret’s data by checking the output from kubectl -n velero describe secret $BSL_SECRET
or kubectl -n velero describe secret $VSL_SECRET
.
If it does not exist, follow the instructions for
editing a Kubernetes secret to add the base64 encoded credentials data.
To help you get started, see the documentation.