Hello everyone. I have question, for backup restore etcd (snapshot restore), als . . .

Israel Martin:
Hello everyone. I have question, for backup restore etcd (snapshot restore), also is necesary to specify the cert files authentication, endpoint, key and cert or this is only for save (snapshot restore)

suresh goli:
You dont need to specifiy the server certs, private key or ca cert for restore. Assumption is existing is corrupted and restoring from backup so that, you can communicate normal.

Mohamed Ayman:
No need to add them in the restore command.

Mohamed Ayman:
Also the initial cluster token , cluster name and initial-advertise-peer-urls are optional, especially when restoring back to the same cluster with a single master.

Mohamed Ayman:
Check this:
https://github.com/mmumshad/kubernetes-the-hard-way/blob/master/practice-questions-answers/cluster-maintenance/backup-etcd/etcd-backup-and-restore.md|https://github.com/mmumshad/kubernetes-the-hard-way/blob/master/practice-questions[…]wers/cluster-maintenance/backup-etcd/etcd-backup-and-restore.md

Israel Martin:
Thanks to everyone for your support

Sreenivas Chokkarapu:
@Mohamed Ayman: i thought we can’t use any links other than the http://kubernetes.io/docs|kubernetes.io/docs during the exam. so in the test labs, I scp’d from master to the node01 and the was able to take the backup. so I guess if etcdctl does not exists on the base server during the exam, we can scp from the base server to the master. correct me if i am wrong.

Israel Martin:
You can’t use any link other than the http://kubernetes.io|kubernetes.io. you can use SSH, I don’t know if is possible use scp. but you can use endpoint (–endpoint) with command etcdctl for to take the backup