Archival
Temporal-operator supports configuring archival for Temporal clusters. You can get more informations about Event histories backup on Temporal documentation. The operator supports the following providers:
- AWS s3 (and any s3-compatible provider)
- Google Cloud storage
- Filestore
Set up Archival using S3 on an Amazon EKS cluster
On EKS clusters, to connect and archive data with s3 you first need to create an IAM role with enough permissions to upload files to s3.
First, create an IAM role with the following s3 policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:PutObjectAcl",
"s3:PutObject",
"s3:GetObjectVersion",
"s3:GetObject",
"s3:DeleteObject"
],
"Resource": "arn:aws:s3:::<bucket_name>/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::<bucket_name>"
}
]
}
Then create a trust relationships for your EKS cluster:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Federated": "arn:aws:iam::<account_id>:oidc-provider/oidc.eks.<aws_region>.amazonaws.com/id/<cluster_id>"
},
"Action": "sts:AssumeRoleWithWebIdentity",
"Condition": {
"StringEquals": {
"oidc.eks.<aws_region>.amazonaws.com/id/<cluster_id>:sub": ["system:serviceaccount:<temporal_ns>:<temporal_history_sa>"]
}
}
}
]
}
Then create a TemporalCluster with archival enabled and specify the role name you want to use:
apiVersion: temporal.io/v1beta1
kind: TemporalCluster
metadata:
name: prod
namespace: demo
spec:
version: 1.24.2
numHistoryShards: 1
# [...]
archival:
enabled: true
provider:
s3:
roleName: "arn:aws:iam::<account_id>:role/<aws_iam_role_id>"
region: eu-west-1
history:
enabled: true
enableRead: true
path: "my-bucket-name"
paused: false
visibility:
enabled: true
enableRead: true
path: "my-bucket-name2"
paused: false
Set up Archival using S3 on an s3-compatible object storage
If you want to archive data on an s3-compatible object storage like OVHCloud Object storage or minio you have provide your credentials using a secret reference and then reference this secret in the TemporalCluster archival specifications. You also need to specify the s3 custom endpoint.
kubectl create secret generic archival-credentials --from-literal=AWS_ACCESS_KEY_ID=XXXX --from-literal=AWS_SECRET_ACCESS_KEY=XXXX -n demo
apiVersion: temporal.io/v1beta1
kind: TemporalCluster
metadata:
name: prod
namespace: demo
spec:
version: 1.24.2
numHistoryShards: 1
# [...]
archival:
enabled: true
provider:
s3:
region: gra
endpoint: s3.gra.io.cloud.ovh.net
credentials:
accessKeyIdRef:
name: archival-credentials
key: AWS_ACCESS_KEY_ID
secretKeyRef:
name: archival-credentials
key: AWS_SECRET_ACCESS_KEY
history:
enabled: true
enableRead: true
path: "dev-temporal-archival"
paused: false
visibility:
enabled: true
enableRead: true
path: "dev-temporal-archival-visibility"
paused: false
Set up Archival using Filestore
Warning: To use your the storage you desired for filestore archival, you'll need to use overrides.
apiVersion: temporal.io/v1beta1
kind: TemporalCluster
metadata:
name: prod
spec:
version: 1.24.2
numHistoryShards: 1
# [...]
services:
overrides:
deployment:
spec:
template:
spec:
containers:
- name: service
volumeMounts:
- name: archival-data
mountPath: /etc/archival
volumes:
- name: archival-data
emptyDir: {}
archival:
enabled: true
provider:
filestore: {}
history:
enabled: true
enableRead: true
path: "/etc/archival/history"
paused: false
visibility:
enabled: true
enableRead: true
path: "/etc/archival/visibility"
paused: false
Set Up Archival using GCS
To use GCS archival you have to provide a secret containing your service account key. To create a service account and get a key you can follow the Google Cloud IAM documentation.
Your service account should have enough rights to write to the bucket you provide to the TemporalCluster
's archival spec.
Once your have downlaoded your service account key, create a secret containing this file:
apiVersion: temporal.io/v1beta1
kind: TemporalCluster
metadata:
name: prod
namespace: demo
spec:
version: 1.24.2
numHistoryShards: 1
# [...]
archival:
enabled: true
provider:
gcs:
credentialsRef:
name: gcs-credentials
history:
enabled: true
enableRead: true
path: "temporal-operator-dev-default/temporal_archival/history"
visibility:
enabled: true
enableRead: true
path: "temporal-operator-dev-default/temporal_archival/visibility"