Skip to main content
logoTetrate Service ExpressVersion: Latest

Restoring a failed Management Plane component

In the case that the Tetrate Management Plane fails, you will need to restore the Management Plane to resume normal operational status. This guide provides an overview of the process, and you should refer to Tetrate Technical Support for assistance with this procedure.

To prepare for unexpected failure of the Management components, we recommend that you consider the following recommendations:

  • Either maintain the Postgres database in a reliable, redundant cluster, or (in the case of TSE), make use of the regular Postgres backups.
  • Maintain a backup of the iam-signing-key
  • If preserving metrics is important, maintain the ElasticSearch database in a reliable, redundant cluster, or make regular backups so that it can be restored if necessary.

Overview

Should the Management Plane fail or the cluster hosting the Management plane become non-operational, you will need to restore the Management Plane to resume normal operation status. The recovery is done using a helm base install. This scenario will walk through the task of restoring configuration from our failed Management Cluster on a new Management Cluster.

Prerequisites

This guide makes the following assumptions:

  • The PostgreSQL Database (configuration) is available. Either, the database is external to failed cluster, or it can be restored from a backup (TSE only)
  • The ElasticSearch Database (metrics) is available. Either, the database is external to failed cluster, it can be restored from a backup, or a fresh (empty) ElasticSearch database can be used and loss-of-metrics tolerated
  • All Certificates for the new Management Plane cluster use the same Root Certificate Authority as previous failed cluster
  • You can update any DNS record used to discover the Management Plane
  • You have a backup of the iam-signing-key

Procedure

Please work with Tetrate Technical Support to go through the following procedure:

  1. Deploy a new cluster

    Deploy new cluster where the Management Plane will be restored to

  2. Install Dependencies

    Install the required dependencies into the cluster. These dependencies will likely include:

    • Cert-Manager (if you're not using the bundled cert-manager instance) and related issuers/certificates. Ensure you use the same root CA
    • Any secrets that hold credentials/certificates for the Management Plane
    • The iam-signing-key from the failed Management Plane cluster - optional

    Install the iam-signing-key secret using kubectl apply. If this is not possible, you will need to reconfigure each Control Plane with a fresh secret later in this procedure.

  3. Prepare the configuration

    Using the same mp-values.yaml as failed cluster, update any required fields such as hub or registry, or any other environment dependent fields if required.

    There is no need to update the Elastic/Postgres configuration if using external IP endpoints, but may need to adjust firewall rules.

  4. Install the Management Plane

    Perform the helm install for Management Plane using mp-values.yaml, and monitor progress using:

    kubectl get pod -n tsb
    kubectl logs -f -n tse -l name=tsb-operator

    In the case of Tetrate Service Express (TSE), the components are installed in the tse namespace (not tsb).

  5. Get the Management Plane address

    Once installation has completed, obtain the front envoy public ip address, for example:

    kubectl get svc -n tsb envoy

    Log into the UI with Envoy IP Address:

    • Verify that your Tetrate configuration has been preserved in the Postgres DB
    • Check the Elastic historical data if available

    This confirms that the rebuild was successful.

  6. Update DNS

    Update the DNS A Record used to locate the Management Plane with the new IP Address acquired in step 5. Remote control plane clusters will use this DNS record to communicate with the Management Plane

    Propagation may take time. Once the change has propagated, verify that you can access the Management Plane UI using the FQDN

  7. Verify Control Plane operation

    In the Management Plane UI, verify that the workload cluster Control Planes are connecting and synchronising with the new Management Plane

    Refresh the Control Plane tokens

    The iam-signing-key is used to generate, validate and rotate tokens that are given to the Control Plane Clusters for communication to the Management Plane.

    If you could not recover and restore the original iam-signing-key, you will need to refresh the tokens on each Control Plane manually:

    1. Log into each Control Plane cluster

    2. Rotate tokens by deleting the old tokens:

      kubectl delete secret otel-token oap-token ngac-token xcp-edge-central-auth-token -n istio-system
    3. Verify that the Control Planes are now connecting to and synchronising with the new Management Plane

With a successful restore of a new Management Plane, you will have fully recovered from the failure and your Workload Clusters will be under the control of the new Management Plane instance.

Troubleshooting

The Management Plane and Control Plane installations are managed by operators. If you make a configuration change, you can monitor the operator logs to watch progress and identify any errors.

The Control Planes won't synchronize

Check the logs of ControlPlane Envoy, looking for errors regarding connections to the Management Plane or errors regarding token validation:

kubectl logs deploy/edge -n istio-system -f

Delete the existing tokens on the Control Plane as described above, and verify that these tokens are re-generated on the Control Plane.

kubectl get secrets otel-token oap-token ngac-token xcp-edge-central-auth-token -n istio-system

If the tokens are not regenerated:

  • Check the firewall rules between the Control Pane instance and the new Management Plane instance, and ensure that connections are allowed
  • Ensure that the Management Plane is using the same Root CA

Can’t Access external components such as postgres

  1. Validate the firewall rules to postgres or any other external component.
  2. Verify the credentials passed via helm or in mp-values.yaml