PersistentVolumeClaims "..." are bound to PersistentVolumes of
unsupported types "..." and cannot be backed up
说明:在来源集群中,PVC 绑定到非 Persistent Disk 卷的 PV。
原因:Backup for GKE 仅支持备份 Persistent Disk 卷数据。使用预配新卷并使用备份恢复卷数据政策恢复的非 Persistent Disk PVC 将不会恢复任何卷数据。但是,重复使用包含您的数据的现有卷政策允许将 PVC 重新连接到原始卷句柄。这对于由外部服务器提供支持的卷类型(如 NFS)非常有用。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-07。"],[],[],null,["# Enable permissive mode on a backup plan\n\nAutopilot Standard\n\n*** ** * ** ***\n\nThis page explains how to enable permissive mode on a backup plan.\n\nDuring backup execution, if Backup for GKE detects conditions that are likely\nto cause restore to fail, the backup itself fails. The reason for the failure\nis provided in the backup's\n[state_reason](/kubernetes-engine/docs/add-on/backup-for-gke/reference/rest/v1/projects.locations.backupPlans.backups#Backup.FIELDS.state_reason)\nfield. In the Google Cloud console, this field is termed as **Status reason**.\n| **Note:** You can [set up alerts](/kubernetes-engine/docs/add-on/backup-for-gke/how-to/alerts) to receive notifications if backups fail.\n\nAbout permissive mode\n---------------------\n\nWhen backup failures aren't acceptable and it's not possible to address the\nunderlying issues, you can enable *permissive mode* . Permissive mode ensures\nthat backups complete successfully, even if GKE resources that\ncould potentially cause restore failures are detected during the backup process.\nDetails about the issues are provided in the backup's **Status reason** field.\n\nWe recommend using this option only if you understand the issues and can\nimplement workarounds during the restoration process. For a list of potential\nerror messages in the backup's **Status reason** field with recommended actions,\nsee [Troubleshoot backup failures](/kubernetes-engine/docs/add-on/backup-for-gke/troubleshoot/permissive-mode#troubleshoot_backup_failures).\n\nEnable permissive mode\n----------------------\n\nUse the following instructions to enable permissive mode: \n\n### gcloud\n\nTo enable permissive mode, run the\n`gcloud beta container backup-restore backup-plans update` command: \n\n gcloud beta container backup-restore backup-plans update \u003cvar translate=\"no\"\u003eBACKUP_PLAN\u003c/var\u003e \\\n --project=\u003cvar translate=\"no\"\u003ePROJECT_ID\u003c/var\u003e \\\n --location=\u003cvar translate=\"no\"\u003eLOCATION\u003c/var\u003e\n --permissive-mode\n\nReplace the following:\n\n- \u003cvar translate=\"no\"\u003eBACKUP_PLAN\u003c/var\u003e: the name of the backup plan that you want to update.\n- \u003cvar translate=\"no\"\u003ePROJECT_ID\u003c/var\u003e: the ID of your Google Cloud project.\n- \u003cvar translate=\"no\"\u003eLOCATION\u003c/var\u003e: the\n [compute region](/compute/docs/regions-zones#available)\n for the resource, for example `us-central1`. See [About resource locations](/kubernetes-engine/docs/add-on/backup-for-gke/concepts/about-locations).\n\n For a full list of options, refer to the\n [gcloud beta container backup-restore backup-plans update](/sdk/gcloud/reference/beta/container/backup-restore/backup-plans/update)\n documentation.\n\n### Console\n\nUse the following instructions to enable permissive mode in the\nGoogle Cloud console:\n\n1. In the Google Cloud console, go to the **Google Kubernetes Engine** page.\n\n [Go to Google Kubernetes Engine](https://console.cloud.google.com/kubernetes/list)\n2. In the navigation menu, click **Backup for GKE**.\n\n3. Click the **Backup plans** tab.\n\n4. Expand the cluster and click the plan name.\n\n5. Click the **Details** tab to edit the plan details.\n\n6. Click **Edit** to edit the section with **Backup mode**.\n\n7. Click the **Permissive mode** checkbox and click **Save changes**.\n\n### Terraform\n\nUpdate the existing `google_gke_backup_backup_plan` resource. \n\n resource \"google_gke_backup_backup_plan\" \"\u003cvar translate=\"no\"\u003eNAME\u003c/var\u003e\" {\n ...\n backup_config {\n permissive_mode = true\n ...\n }\n }\n\nReplace the following:\n\n- \u003cvar translate=\"no\"\u003eNAME\u003c/var\u003e: the name of the `google_gke_backup_backup_plan` that you want to update.\n\nFor more information, see\n[gke_backup_backup_plan](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/gke_backup_backup_plan).\n\nTroubleshoot backup failures\n----------------------------\n\nThe following table provides explanations and recommended actions for various\nbackup failure messages displayed in the backup's **Status reason** field.\n\n### Common Custom Resource Definitions (CRDs) with issues and recommended actions\n\nHere are some common CRDs that have backup issues and the actions we recommend\nto address the issues:\n\n- `capacityrequests.internal.autoscaling.k8s.io`: This CRD was used temporarily in v1.21 clusters. Run `kubectl\n delete crd capacityrequests.internal.autoscaling.k8s.io` to remove the CRD.\n- `scalingpolicies.scalingpolicy.kope.io`: This CRD was used to control fluentd resources, but GKE has migrated to using fluentbit. Run `kubectl delete crd scalingpolicies.scalingpolicy.kope.io` to remove the CRD.\n- `memberships.hub.gke.io`: Run `kubectl delete crd memberships.hub.gke.io` to remove the CRD if there are no membership resources. Enable permissive mode if there are membership resources.\n- `applications.app.k8s.io`: Enable permissive mode with an understanding of restore behavior."]]