Install and configure Trident protect
If your environment meets the requirements for Trident protect, you can follow these steps to install Trident protect on your cluster. You can obtain Trident protect from NetApp, or install it from your own private registry. Installing from a private registry is helpful if your cluster cannot access the Internet.
Install Trident protect
-
Add the Trident Helm repository:
helm repo add netapp-trident-protect https://netapp.github.io/trident-protect-helm-chart -
Use Helm to install Trident protect. Replace
<name-of-cluster>with a cluster name, which will be assigned to the cluster and used to identify the cluster's backups and snapshots:helm install trident-protect netapp-trident-protect/trident-protect --set clusterName=<name-of-cluster> --version 100.2510.0 --create-namespace --namespace trident-protect -
Optionally, to enable debug logging (recommended for troubleshooting), use:
helm install trident-protect netapp-trident-protect/trident-protect --set clusterName=<name-of-cluster> --set logLevel=debug --version 100.2510.0 --create-namespace --namespace trident-protectDebug logging helps NetApp support troubleshoot issues without requiring log level changes or problem reproduction.
You can install Trident protect from a private image registry if your Kubernetes cluster is unable to access the Internet. In these examples, replace values in brackets with information from your environment:
-
Pull the following images to your local machine, update the tags, and then push them to your private registry:
docker.io/netapp/controller:25.10.0 docker.io/netapp/restic:25.10.0 docker.io/netapp/kopia:25.10.0 docker.io/netapp/kopiablockrestore:25.10.0 docker.io/netapp/trident-autosupport:25.10.0 docker.io/netapp/exechook:25.10.0 docker.io/netapp/resourcebackup:25.10.0 docker.io/netapp/resourcerestore:25.10.0 docker.io/netapp/resourcedelete:25.10.0 docker.io/netapp/trident-protect-utils:v1.0.0For example:
docker pull docker.io/netapp/controller:25.10.0docker tag docker.io/netapp/controller:25.10.0 <private-registry-url>/controller:25.10.0docker push <private-registry-url>/controller:25.10.0To obtain the Helm chart, first download the Helm chart on a machine with internet access using helm pull trident-protect --version 100.2510.0 --repo https://netapp.github.io/trident-protect-helm-chart, then copy the resultingtrident-protect-100.2510.0.tgzfile to your offline environment and install usinghelm install trident-protect ./trident-protect-100.2510.0.tgzinstead of the repository reference in the final step. -
Create the Trident protect system namespace:
kubectl create ns trident-protect -
Log in to the registry:
helm registry login <private-registry-url> -u <account-id> -p <api-token> -
Create a pull secret to use for private registry authentication:
kubectl create secret docker-registry regcred --docker-username=<registry-username> --docker-password=<api-token> -n trident-protect --docker-server=<private-registry-url> -
Add the Trident Helm repository:
helm repo add netapp-trident-protect https://netapp.github.io/trident-protect-helm-chart -
Create a file named
protectValues.yaml. Ensure that it contains the following Trident protect settings:--- imageRegistry: <private-registry-url> imagePullSecrets: - name: regcredThe imageRegistryandimagePullSecretsvalues apply to all component images includingresourcebackupandresourcerestore. If you push images to a specific repository path within your registry (for example,example.com:443/my-repo), include the full path in the registry field. This will ensure that all images are pulled from<private-registry-url>/<image-name>:<tag>. -
Use Helm to install Trident protect. Replace
<name_of_cluster>with a cluster name, which will be assigned to the cluster and used to identify the cluster's backups and snapshots:helm install trident-protect netapp-trident-protect/trident-protect --set clusterName=<name_of_cluster> --version 100.2510.0 --create-namespace --namespace trident-protect -f protectValues.yaml -
Optionally, to enable debug logging (recommended for troubleshooting), use:
helm install trident-protect netapp-trident-protect/trident-protect --set clusterName=<name-of-cluster> --set logLevel=debug --version 100.2510.0 --create-namespace --namespace trident-protect -f protectValues.yamlDebug logging helps NetApp support troubleshoot issues without requiring log level changes or problem reproduction.
|
|
For additional Helm chart configuration options, including AutoSupport settings and namespace filtering, refer to Customize Trident protect installation. |