Use Cases

Backup and Recovery

Automated backup and recovery of all your production
stateful Kubernetes applications

K10 in Action

Accidental or Malicious Data Loss

What K10 does
Recover to a known good state of your application following a data outage that may be caused by accidental deletion or overwriting of application data or by malicious activity such as a security breach or unauthorized data manipulation.

Infrastructure or Hardware Failure

What K10 does
While many modern storage solutions and data services provide built-in redundancy and protection against isolated hardware failures, robust backup is still needed to protect non-replicated databases and against broad failures.

Application Misconfiguration

What K10 does
Repair badly misconfigured applications by restoring application artifacts and configurations to a known good state.

Compliance Audit Environment

What K10 does
Comply with audit requests that require reproducing an application environment configuration and state, including underlying data, from a given period in the past.

Key Features

Complete application protection

Automatically capture and protect an entire application stack including resource definitions, configuration, and underlying data.

Coordinated application recovery

Always restore a consistent copy of your entire application. Properly orchestrate and order the restore of data, resource, and configuration components.

Policy-based backup automation
and monitoring

Manage backups at scale through dynamic policies that apply to auto-discovered applications. Monitor data management compliance and easily take corrective action.

Application-specific protection

WWhen volume-level protection is not sufficient, extend the workflow with a Kanister blueprint to apply application-specific operations.

Unified backup catalog

All data protections artifacts and metadata are automatically managed and maintained for all backup and recovery workflows.

Role-based actions and self-service

Use Kubernetes roles to delegate data management privileges to application operators. Enable self-service backup policies and restore operations.