Skip to content

absctl restore

The restore subcommand (absctl restore) restores backups created with absctl backup. You can restore to specific bins or sets, secure connections using username/password credentials or TLS (or both), and use YAML configuration files to automate restore operations.

You can restore from local backup files or directly from Amazon S3, Google Cloud Storage, and Azure Blob Storage.

Considerations for Aerospike restore

When using absctl restore, be aware of the following considerations:

  • Supported Database version 5.7.0 and higher.
  • The TTL of restored keys is preserved, but the last-update-time and generation count are reset to the current time.
  • absctl restore creates records from the backup. If records exist in the namespace on the cluster, you can configure a write policy to determine whether the backup records or the records in the namespace take precedence when using absctl restore.
  • If a restore transaction fails, you can configure timeout options for retries.
  • Restore is cluster-configuration-agnostic. A backup can be restored to a cluster of any size and configuration. Restored data is evenly distributed among cluster nodes, regardless of cluster configuration.
  • Backups created by absctl backup include separate metadata_*.asb files that contain UDF and secondary index metadata (when backing up to a directory).

Privileges required for absctl restore

The privileges required to run absctl restore depend on the type of objects in the namespace.

  • If the namespace does not contain user-defined functions or secondary indexes, read-write is the minimum necessary privilege.

  • If the namespace contains user-defined functions, udf-admin is the minimum necessary privilege to restore UDFs for Database 6.0.0 or newer. Otherwise, use data-admin.

  • If the namespace contains secondary indexes, sindex-admin is the minimum necessary privilege to restore secondary indexes for Database 6.0.0 or later. Otherwise, use data-admin.

For more information about Aerospike’s role-based access control system, see Configuring access control.

Feedback

Was this page helpful?

What type of feedback are you giving?

What would you like us to know?

+Capture screenshot

Can we reach out to you?