Back up and Restore GitLab with gitlab-backup-cli

Tier: Free, Premium, Ultimate Offering: Self-managed Status: Experiment
History

This tool is under development and is ultimately meant to replace the Rake tasks used for backing up and restoring GitLab. You can follow the development of this tool in the epic: Next Gen Scalable Backup and Restore.

Feedback on the tool is welcome in the feedback issue.

Taking a backup

To take a backup of the current GitLab installation:

sudo gitlab-backup-cli backup all

Backing up object storage

Only Google Cloud is supported. See epic 11577 for the plan to add more vendors.

GCP

gitlab-backup-cli creates and runs jobs with the Google Cloud Storage Transfer Service to copy GitLab data to a separate backup bucket.

Prerequisites:

  • Review the service accounts overview to authenticate with a service account.
  • This document assumes you are setting up and using a dedicated Google Cloud service account for managing backups.
  • If no other credentials are provided, and you are running inside Google Cloud, then the tool attempts to use the access of the infrastructure it is running on. For security reasons, you should run the tool with separate credentials, and restrict access to the created backups from the application.

To create a backup:

  1. Create a role:
    1. Create a file role.yaml with the following definition:
    ---
    description: Role for backing up GitLab object storage
    includedPermissions:
       - storagetransfer.jobs.create
       - storagetransfer.jobs.get
       - storagetransfer.jobs.run
       - storagetransfer.jobs.update
       - storagetransfer.operations.get
       - storagetransfer.projects.getServiceAccount
    stage: GA
    title: GitLab Backup Role
    
    1. Apply the role:

      gcloud iam roles create --project=<YOUR_PROJECT_ID> <ROLE_NAME> --file=role.yaml
      
  2. Create a service account for backups, and add it to the role:

    gcloud iam service-accounts create "gitlab-backup-cli" --display-name="GitLab Backup Service Account"
    # Get the service account email from the output of the following
    gcloud iam service-accounts list
    # Add the account to the role created previously
    gcloud projects add-iam-policy-binding <YOUR_PROJECT_ID> --member="serviceAccount:<SERVICE_ACCOUNT_EMAIL>" --role="roles/<ROLE_NAME>"
    
  3. To authenticate with a service account, see service account credentials. The credentials can be saved to a file, or stored in a predefined environment variable.
  4. Create a destination bucket to backup to in Google Cloud Storage. The options here are highly dependent on your requirements.
  5. Run the backup:

    sudo gitlab-backup-cli backup all --backup-bucket=<BUCKET_NAME>
    

    If you want to backup the container registry bucket, add the option --registry-bucket=<REGISTRY_BUCKET_NAME>.

  6. The backup creates a backup under backups/<BACKUP_ID>/<BUCKET> for each of the object storage types in the bucket.

Backup directory structure

Example backup directory structure:

backups
└── 1714053314_2024_04_25_17.0.0-pre
    ├── artifacts.tar.gz
    ├── backup_information.json
    ├── builds.tar.gz
    ├── ci_secure_files.tar.gz
    ├── db
    │   ├── ci_database.sql.gz
    │   └── database.sql.gz
    ├── lfs.tar.gz
    ├── packages.tar.gz
    ├── pages.tar.gz
    ├── registry.tar.gz
    ├── repositories
    │   ├── default
    │   │   ├── @hashed
    │   │   └── @snippets
    │   └── manifests
    │       └── default
    ├── terraform_state.tar.gz
    └── uploads.tar.gz

The db directory is used to back up the GitLab PostgreSQL database using pg_dump to create an SQL dump. The output of pg_dump is piped through gzip in order to create a compressed SQL file.

The repositories directory is used to back up Git repositories, as found in the GitLab database.

Backup ID

Backup IDs identify individual backups. You need the backup ID of a backup archive if you need to restore GitLab and multiple backups are available.

Backups are saved in a directory set in backup_path, which is specified in the config/gitlab.yml file.

  • By default, backups are stored in /var/opt/gitlab/backups.
  • By default, backup directories are named after backup_id’s where <backup-id> identifies the time when the backup was created and the GitLab version.

For example, if the backup directory name is 1714053314_2024_04_25_17.0.0-pre, the time of creation is represented by 1714053314_2024_04_25 and the GitLab version is 17.0.0-pre.

Backup metadata file (backup_information.json)

History

backup_information.json is found in the backup directory, and it stores metadata about the backup. For example:

{
  "metadata_version": 2,
  "backup_id": "1714053314_2024_04_25_17.0.0-pre",
  "created_at": "2024-04-25T13:55:14Z",
  "gitlab_version": "17.0.0-pre"
}

Restore a backup

History

Prerequisites:

  • You have the backup ID of a backup created using gitlab-backup-cli.

To restore a backup of the current GitLab installation:

  • Run the following command:

    sudo gitlab-backup-cli restore all <backup_id>
    

Restore object storage data

You can restore data from Google Cloud Storage. Epic 11577 proposes to add support for other vendors.

Prerequisites:

  • You have the backup ID of a backup created using gitlab-backup-cli.
  • You configured the required permissions for the restore location.
  • You set up the object storage configuration gitlab.rb or gitlab.yml file, and matches the backup environment.
  • You tested the restore process in a staging environment.

To restore object storage data:

  • Run the following command:

    sudo gitlab-backup restore <backup_id>
    

The restore process:

  • Does not clear the destination bucket first.
  • Overwrites existing files with the same filenames in the destination bucket.
  • Might take a significant amount of time, depending on how much data is restored.

Always monitor your system resources during a restore. Keep your original files until you verify the restoration was successful.

Known issues

When working with gitlab-backup-cli, you might encounter the following issues.

Architecture compatibility

If you use the gitlab-backup-cli tool on architectures other than the 1K architecture, you might experience issues. This tool is supported only on 1K architecture and is recommended only for relevant environments.

Backup strategy

Changes to existing files during backup might cause issues on the GitLab instance. This issue occurs because the tool’s initial version does not use the copy strategy.

A workaround of this issue, is either to:

  • Transition the GitLab instance into Maintenance Mode.
  • Restrict traffic to the servers during backup to preserve instance resources.

We’re investigating an alternative to the copy strategy, see issue 428520.

What data is backed up?

  1. Git Repository Data
  2. Databases
  3. Blobs

What data is NOT backed up?

  1. Secrets and Configurations

  2. Transient and Cache Data

    • Redis: Cache
    • Redis: Sidekiq Data
    • Logs
    • Elasticsearch
    • Observability Data / Prometheus Metrics

Security considerations

Instead of using the same credentials, you should create a separate user account specifically with only the necessary permissions to perform backups. Running backups with the same credentials as the application is a poor security practice for several reasons:

  • Principle of least privilege - The backup process requires more extensive permissions (like read access to all data) than you need for normal application operations. A user or process should have the minimum access necessary to perform its function.
  • Risk of compromise - If the application credentials are compromised, an attacker can gain access to the application and all its backup data, exposing historical data as well.
  • Separation of duties - Using separate credentials for backups and applications helps maintain a separation of duties. This separation makes it harder for a single compromised account to cause widespread damage.
  • Audit trail - Separate credentials for backups make it easier to track and audit backup activities independently from regular application operations.
  • Granular access control - Different credentials allow for more granular access control. Backup credentials can be given read-only access to the data, while application credentials might need read-write access to specific tables or schemas.
  • Compliance requirements - Many regulatory standards and compliance frameworks (like GDPR, HIPAA, or PCI-DSS) require or strongly recommend separation of duties and access controls, which are easier to achieve with separate credentials.
  • Easier management of lifecycle - Application and backup processes may have different lifecycles. Using separate credentials makes it easier to manage these lifecycles independently. For example, you can rotate or revoke credentials without affecting the other process.
  • Protection against application vulnerabilities - If the application has a vulnerability that allows SQL injection or other forms of unauthorized data access, using separate backup credentials adds an extra layer of protection for the backup process.