Scenarios/AKS-Backup/backup-instance.tf (21 lines of code) (raw):
resource "azurerm_data_protection_backup_instance_kubernetes_cluster" "backup_instance_aks" {
name = "backup-instance-aks"
location = azurerm_resource_group.rg-backup.location
vault_id = azurerm_data_protection_backup_vault.backup-vault.id
kubernetes_cluster_id = data.azurerm_kubernetes_cluster.aks-1.id
snapshot_resource_group_name = azurerm_resource_group.rg-backup.name
backup_policy_id = azurerm_data_protection_backup_policy_kubernetes_cluster.backup_policy_aks.id
backup_datasource_parameters {
# excluded_namespaces = ["ns1"]
# excluded_resource_types = ["exvolumesnapshotcontents.snapshot.storage.k8s.io"]
cluster_scoped_resources_enabled = true
# included_namespaces = ["*"] # ["test-included-namespaces"]
# included_resource_types = ["*"] # ["involumesnapshotcontents.snapshot.storage.k8s.io"]
# label_selectors = ["*"] # ["kubernetes.io/metadata.name:test"]
volume_snapshot_enabled = true
}
depends_on = [
azurerm_role_assignment.extension_1_storage_account_contributor,
azurerm_role_assignment.vault_msi_read_on_cluster,
azurerm_role_assignment.vault_msi_read_on_snap_rg,
azurerm_role_assignment.cluster_msi_contributor_on_snap_rg,
azurerm_role_assignment.vault_msi_snapshot_contributor_on_snap_rg,
azurerm_role_assignment.vault_msi_data_operator_on_snap_rg,
azurerm_role_assignment.vault_msi_data_contributor_on_storage,
]
}