Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Restore Velero Backup Data Without Velero

Velero is the most popular tool for backing up and restoring Kubernetes cluster resources and persistent volumes. However, there may be situations where you need to restore Velero backup data without using Velero itself. For example, if Velero is not installed and configured correctly, or if more fine-grained restore control is required. In this post, we will explore how to do this when either Restic or Kopia was used by Velero to store the persistent volume (PV) data.

Getting Started with Persistent Volumes

This is the first of our series on Velero – the open source Kubernetes backup and recovery tool. While it’s powerful and flexible, the initial setup can be daunting to a beginner. Persistent Volumes also require CSI configuration, which varies from provider to provider. In this webinar, we will present all the information you need to get started with Velero. We will walk through the following configuration accompanied by a live demonstration.

CloudCasa July Feature Updates

It’s been about three months since the last CloudCasa feature release in April, and we are now approaching the Dog Days of summer. These, as you may know, are named for the heliacal rising of Sirius, the Dog Star, in this sultry season, though the term more often conjures images of dogs lazing in the hot summer sun. We have been doing no summer lazing here at CloudCasa, though! Since our April release, we have focused much of our development effort on performance and reliability improvements.

Anatomy of Ransomware Attack: Preventing Attacks on Your Backup Infrastructure

Featuring industry experts, CTOs Danny Allan from Veeam, Sagi Brody from Opti9, and cybersecurity expert Guy Mizrahi, CEO of CyPROS. Gain invaluable insights into the ever-evolving world of ransomware attacks and learn how you can fortify your Veeam installations with the cutting-edge AI-powered anomaly detection tool, Observr.

How to Install Velero for Kubernetes Backups

Velero is an open-source backup and recovery tool designed specifically for Kubernetes clusters. It provides a straightforward way to protect your Kubernetes resources, including persistent volumes, namespaces, and custom resources, by taking backups and restoring them in case of data loss or disaster recovery scenarios. In this blog you will learn the different use cases for Velero and the two ways to install Velero, using the Velero CLI and using a Helm chart.

Concerned About Sensitive Data Loss? Opti9 to the Rescue

A strong misconception abounds that managed providers are impervious to data loss. The truth, however, is that accidents can happen at any time, to any business. Finding a provider that takes data backup and protection seriously, therefore, is critical to the well-being of your business. Opti9—a leading provider of managed cloud solutions—is one company that is addressing this problem head-on.

Endpoint Data Protection Made Easy: Unleashing the Power of BDRSuite

Watch our new webinar video to learn why endpoint backup is crucial for businesses. Data loss can have significant risks, but with endpoint backup, you can guarantee uninterrupted operations and data accessibility. Our solution offers automated scheduling, robust encryption, efficient storage utilization, and centralized management, ensuring business continuity and data availability.

GitProtect v. 1.5.1 Features Forever Incremental, SLA Reports, Archiving User Logs

We present to you the new version of GitProtect – 1.5.1, and along with it… the long-awaited backup plan scheme – Forever Incremental! Amongst the novelties, you can also notice the SLA Reports for improved security control, log archiving, and several other enhancements aiming to speed up the app’s operation.

CloudCasa Partners With Clastix To Ready Namespace-as-a-Service For Mass Adoption

With Kubernetes, companies have the ability to spin up applications with the click of a button or a declarative one-line command statement. As they spin up the services, they are hosting them within clusters, but they do not really want to deploy multiple clusters for each application or service that they’re looking to host within their website or within their application.