You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We introduced several changes for the Velero Azure plugin to resolve #4267 in v1.11.0 timeframe, but besides the Azure plugin, the support for Azure AD auth is also needed in Restic/Kopia side.
However, Restic/Kopia only supports authentication/authorization by access key and SAS token but not Azure AD at this moment, so in order to work with filesystem backup/restore with Restic/Kopia, listing storage account access key is still needed on Azure.
For users who don't use filesystem backup/restore and cannot list the storage account access key, they can refer to the doc to workaround it.
We'll remove the listing storage account access key completely once Kopia supports auth via Azure AD.
Vote on this issue!
This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.
👍 for "I would like to see this bug fixed as soon as possible"
👎 for "There are more important bugs to focus on right now"
The text was updated successfully, but these errors were encountered:
We introduced changes in vmware-tanzu#111 to remove the logic of listing storage account access key, the Velero Azure plugin supports auth via Azure AD directly after the changes, but that isn't enough as Restic/Kopia still doesn't support auth via Azure AD at this moment, this will cause filesystem backup failure on Azure.
So we revert the doc change in this commit and Velero still needs the permission of listing storage access key to work as expected. But as we keep the code changes, users can workaround the permission issue by refer to vmware-tanzu/velero#5984
Signed-off-by: Wenkai Yin(尹文开) <[email protected]>
@ywk253100
IMO we should consider it as a higher priority as it's an enhancement to security.
Let's see if we can fix it on kopia side.
But given this has external dependency, let's leave it as candidate for now and triage later.
We can start the work to fix it on the Kopia side in the 1.12 timeframe, but it is very likely that we cannot make it in v1.12 as this has external dependency.
We introduced several changes for the Velero Azure plugin to resolve #4267 in v1.11.0 timeframe, but besides the Azure plugin, the support for Azure AD auth is also needed in Restic/Kopia side.
However, Restic/Kopia only supports authentication/authorization by access key and SAS token but not Azure AD at this moment, so in order to work with filesystem backup/restore with Restic/Kopia, listing storage account access key is still needed on Azure.
For users who don't use filesystem backup/restore and cannot list the storage account access key, they can refer to the doc to workaround it.
Issue is opened for Kopia.
We'll remove the listing storage account access key completely once Kopia supports auth via Azure AD.
Vote on this issue!
This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.
The text was updated successfully, but these errors were encountered: