-
Notifications
You must be signed in to change notification settings - Fork 708
br: pitr filter feature release doc (#21109) #22199
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: release-8.5
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -498,3 +498,153 @@ tiup br restore point --pd="${PD_IP}:2379" | |||||
| --master-key-crypter-method aes128-ctr | ||||||
| --master-key "local:///path/to/master.key" | ||||||
| ``` | ||||||
| <<<<<<< HEAD | ||||||
| ======= | ||||||
|
|
||||||
| ### Restore data using filters | ||||||
|
|
||||||
| Starting from TiDB v9.0.0, you can use filters during PITR to restore specific databases or tables, enabling more fine-grained control over the data to be restored. | ||||||
|
|
||||||
| The filter patterns follow the same [table filtering syntax](/table-filter.md) as other BR operations: | ||||||
|
|
||||||
| - `'*.*'`: matches all databases and tables. | ||||||
| - `'db1.*'`: matches all tables in the database `db1`. | ||||||
| - `'db1.table1'`: matches the specific table `table1` in the database `db1`. | ||||||
| - `'db*.tbl*'`: matches databases starting with `db` and tables starting with `tbl`. | ||||||
| - `'!mysql.*'`: excludes all tables in the `mysql` database. | ||||||
|
|
||||||
| Usage examples: | ||||||
|
|
||||||
| ```shell | ||||||
| # restore specific databases | ||||||
| tiup br restore point --pd="${PD_IP}:2379" \ | ||||||
| --storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --start-ts "2025-06-02 00:00:00+0800" \ | ||||||
| --restored-ts "2025-06-03 18:00:00+0800" \ | ||||||
| --filter 'db1.*' --filter 'db2.*' | ||||||
|
|
||||||
| # restore specific tables | ||||||
| tiup br restore point --pd="${PD_IP}:2379" \ | ||||||
| --storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --start-ts "2025-06-02 00:00:00+0800" \ | ||||||
| --restored-ts "2025-06-03 18:00:00+0800" \ | ||||||
| --filter 'db1.users' --filter 'db1.orders' | ||||||
|
|
||||||
| # restore using pattern matching | ||||||
| tiup br restore point --pd="${PD_IP}:2379" \ | ||||||
| --storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --start-ts "2025-06-02 00:00:00+0800" \ | ||||||
| --restored-ts "2025-06-03 18:00:00+0800" \ | ||||||
| --filter 'db*.tbl*' | ||||||
| ``` | ||||||
|
|
||||||
| > **Note:** | ||||||
| > | ||||||
| > - Before restoring data using filters, ensure that the target cluster does not contain any databases or tables that match the filter. Otherwise, the restore will fail with an error. | ||||||
| > - The filter options apply during the restore phase for both snapshot and log backups. | ||||||
| > - You can specify multiple `--filter` options to include or exclude different patterns. | ||||||
| > - PITR filtering does not support system tables yet. If you need to restore specific system tables, use the `br restore full` command with filters instead. Note that this command restores only the snapshot backup data (not log backup data). | ||||||
|
|
||||||
| ### Concurrent restore operations | ||||||
|
|
||||||
| Starting from TiDB v9.0.0, you can run multiple PITR restore tasks concurrently. This feature allows you to restore different datasets in parallel, improving efficiency for large-scale restore scenarios. | ||||||
|
|
||||||
| Usage example for concurrent restores: | ||||||
|
|
||||||
| ```shell | ||||||
| # terminal 1 - restore database db1 | ||||||
| tiup br restore point --pd="${PD_IP}:2379" \ | ||||||
| --storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --start-ts "2025-06-02 00:00:00+0800" \ | ||||||
| --restored-ts "2025-06-03 18:00:00+0800" \ | ||||||
| --filter 'db1.*' | ||||||
|
|
||||||
| # terminal 2 - restore database db2 (can run simultaneously) | ||||||
| tiup br restore point --pd="${PD_IP}:2379" \ | ||||||
| --storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --start-ts "2025-06-02 00:00:00+0800" \ | ||||||
| --restored-ts "2025-06-03 18:00:00+0800" \ | ||||||
| --filter 'db2.*' | ||||||
| ``` | ||||||
|
|
||||||
| > **Note:** | ||||||
| > | ||||||
| > Each concurrent restore operation must target a different database or a non-overlapping set of tables. Attempting to restore overlapping datasets concurrently will result in an error. | ||||||
|
|
||||||
| ### Compatibility between ongoing log backup and snapshot restore | ||||||
|
|
||||||
| Starting from v9.0.0, when a log backup task is running, if all of the following conditions are met, you can still perform snapshot restore (`br restore [full|database|table]`) and allow the restored data to be properly recorded by the ongoing log backup (hereinafter referred to as "log backup"): | ||||||
|
|
||||||
| - The node performing backup and restore operations has the following necessary permissions: | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||||||
| - Read access to the external storage containing the backup source, for snapshot restore | ||||||
| - Write access to the target external storage used by the log backup | ||||||
| - The target external storage for the log backup is Amazon S3 (`s3://`), Google Cloud Storage (`gcs://`), or Azure Blob Storage (`azblob://`). | ||||||
| - The data to be restored uses the same type of external storage as the target storage for the log backup. | ||||||
| - Neither the data to be restored nor the log backup has enabled local encryption. For details, see [log backup encryption](#encrypt-the-log-backup-data) and [snapshot backup encryption](/br/br-snapshot-manual.md#encrypt-the-backup-data). | ||||||
|
|
||||||
| If any of the above conditions are not met, you can restore the data by following these steps: | ||||||
|
|
||||||
| 1. [Stop the log backup task](#stop-a-log-backup-task). | ||||||
| 2. Perform the data restore. | ||||||
| 3. After the restore is complete, perform a new snapshot backup. | ||||||
| 4. [Restart the log backup task](#restart-a-log-backup-task). | ||||||
|
|
||||||
| > **Note:** | ||||||
| > | ||||||
| > When restoring a log backup that contains records of snapshot (full) restore data, you must use BR v9.0.0 or later. Otherwise, restoring the recorded full restore data might fail. | ||||||
|
|
||||||
| ### Compatibility between ongoing log backup and PITR operations | ||||||
|
|
||||||
| Starting from TiDB v9.0.0, you can perform PITR operations while a log backup task is running by default. The system automatically handles compatibility between these operations. | ||||||
|
|
||||||
| #### Important limitation for PITR with ongoing log backup | ||||||
|
|
||||||
| When you perform the PITR operations while a log backup is running, the restored data will also be recorded in the ongoing log backup. However, due to the nature of log restore operations, data inconsistencies might occur within the restore window. The system writes metadata to external storage to mark both the time range and data range where consistency cannot be guaranteed. | ||||||
|
|
||||||
| If such inconsistency occurs during the time range `[t1, t2)`, you cannot directly restore data from this period. Instead, choose one of the following alternatives: | ||||||
|
|
||||||
| - Restore data up to `t1` (to retrieve data before the inconsistent period). | ||||||
| - Perform a new snapshot backup after `t2`, and use it as the base for future PITR operations. | ||||||
|
|
||||||
| ### Abort restore operations | ||||||
|
|
||||||
| If a restore operation fails, you can use the `tiup br abort` command to clean up registry entries and checkpoint data. This command automatically locates and removes relevant metadata based on the original restore parameters, including entries in the `mysql.tidb_restore_registry` table and checkpoint data (regardless of whether it is stored in a local database or external storage). | ||||||
|
|
||||||
| > **Note:** | ||||||
| > | ||||||
| > The `abort` command only cleans up metadata. You need to manually delete any actual restored data from the cluster. | ||||||
|
|
||||||
| The examples of aborting restore operations using the same parameters as the original restore command are as follows: | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This sentence is a bit wordy. Consider a more concise phrasing to improve readability, as suggested by the style guide.
Suggested change
References
|
||||||
|
|
||||||
| ```shell | ||||||
| # Abort a PITR operation | ||||||
| tiup br abort restore point --pd="${PD_IP}:2379" \ | ||||||
| --storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' | ||||||
|
|
||||||
| # Abort a PITR operation with filters | ||||||
| tiup br abort restore point --pd="${PD_IP}:2379" \ | ||||||
| --storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --filter 'db1.*' | ||||||
|
|
||||||
| # Abort a full restore | ||||||
| tiup br abort restore full --pd="${PD_IP}:2379" \ | ||||||
| --storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' | ||||||
|
|
||||||
| # Abort a database restore | ||||||
| tiup br abort restore db --pd="${PD_IP}:2379" \ | ||||||
| --storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --db database_name | ||||||
|
|
||||||
| # Abort a table restore | ||||||
| tiup br abort restore table --pd="${PD_IP}:2379" \ | ||||||
| --storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \ | ||||||
| --db database_name --table table_name | ||||||
| ``` | ||||||
| >>>>>>> 5182861b86 (br: pitr filter feature release doc (#21109)) | ||||||
|
Comment on lines
+501
to
+650
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This block contains unresolved merge conflict markers ( ### Restore data using filters
Starting from TiDB v9.0.0, you can use filters during PITR to restore specific databases or tables, enabling more fine-grained control over the data to be restored.
The filter patterns follow the same [table filtering syntax](/table-filter.md) as other BR operations:
- `'*.*'`: matches all databases and tables.
- `'db1.*'`: matches all tables in the database `db1`.
- `'db1.table1'`: matches the specific table `table1` in the database `db1`.
- `'db*.tbl*'`: matches databases starting with `db` and tables starting with `tbl`.
- `'!mysql.*'`: excludes all tables in the `mysql` database.
Usage examples:
```shell
# restore specific databases
tiup br restore point --pd="${PD_IP}:2379" \
--storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--start-ts "2025-06-02 00:00:00+0800" \
--restored-ts "2025-06-03 18:00:00+0800" \
--filter 'db1.*' --filter 'db2.*'
# restore specific tables
tiup br restore point --pd="${PD_IP}:2379" \
--storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--start-ts "2025-06-02 00:00:00+0800" \
--restored-ts "2025-06-03 18:00:00+0800" \
--filter 'db1.users' --filter 'db1.orders'
# restore using pattern matching
tiup br restore point --pd="${PD_IP}:2379" \
--storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--start-ts "2025-06-02 00:00:00+0800" \
--restored-ts "2025-06-03 18:00:00+0800" \
--filter 'db*.tbl*'
Concurrent restore operationsStarting from TiDB v9.0.0, you can run multiple PITR restore tasks concurrently. This feature allows you to restore different datasets in parallel, improving efficiency for large-scale restore scenarios. Usage example for concurrent restores: # terminal 1 - restore database db1
tiup br restore point --pd="${PD_IP}:2379" \
--storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--start-ts "2025-06-02 00:00:00+0800" \
--restored-ts "2025-06-03 18:00:00+0800" \
--filter 'db1.*'
# terminal 2 - restore database db2 (can run simultaneously)
tiup br restore point --pd="${PD_IP}:2379" \
--storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--start-ts "2025-06-02 00:00:00+0800" \
--restored-ts "2025-06-03 18:00:00+0800" \
--filter 'db2.*'
Compatibility between ongoing log backup and snapshot restoreStarting from v9.0.0, when a log backup task is running, if all of the following conditions are met, you can still perform snapshot restore (
If any of the above conditions are not met, you can restore the data by following these steps:
Compatibility between ongoing log backup and PITR operationsStarting from TiDB v9.0.0, you can perform PITR operations while a log backup task is running by default. The system automatically handles compatibility between these operations. Important limitation for PITR with ongoing log backupWhen you perform the PITR operations while a log backup is running, the restored data will also be recorded in the ongoing log backup. However, due to the nature of log restore operations, data inconsistencies might occur within the restore window. The system writes metadata to external storage to mark both the time range and data range where consistency cannot be guaranteed. If such inconsistency occurs during the time range
Abort restore operationsIf a restore operation fails, you can use the
The examples of aborting restore operations using the same parameters as the original restore command are as follows: # Abort a PITR operation
tiup br abort restore point --pd="${PD_IP}:2379" \
--storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}'
# Abort a PITR operation with filters
tiup br abort restore point --pd="${PD_IP}:2379" \
--storage='s3://backup-101/logbackup?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--full-backup-storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--filter 'db1.*'
# Abort a full restore
tiup br abort restore full --pd="${PD_IP}:2379" \
--storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}'
# Abort a database restore
tiup br abort restore db --pd="${PD_IP}:2379" \
--storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--db database_name
# Abort a table restore
tiup br abort restore table --pd="${PD_IP}:2379" \
--storage='s3://backup-101/snapshot-20250602000000?access-key=${ACCESS-KEY}&secret-access-key=${SECRET-ACCESS-KEY}' \
--db database_name --table table_name |
||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This sentence is a bit long and complex. For better readability, consider rephrasing it to be more direct, in line with the style guide's emphasis on clarity and simplicity.
References