You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
On AKS, we backup persistent volumes backed by Azure Disk via CSI snapshot and data movement.
Authentication against the object storage (Azure blob) used to upload backup metadata and CSI snapshot data is performed via Azure Workload Identity.
Starting with velero 1.15.0 (helm chart 8.0.0) the data upload actions were moved outside of the node agent into microservice pods, each dedicated to one DataUpload.
These pods, however, do not inherit the labels set to velero and node-agent pods via the helm value podLabels. On the other hand these pods uses velero-server service account well.
Azure Workload identity requires the label azure.workload.identity/use: "true" to be set such that the pod can source the client id from the service account.
As a consequence of this missing label, authentication against Azure blob fails and the data upload cannot be completed.
Velero features (use velero client config get features): CSI, data mover
Kubernetes version : 1.29
Kubernetes installer & version: AKS
Cloud provider or hardware configuration: Azure
Vote on this issue!
This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.
👍 for "I would like to see this bug fixed as soon as possible"
👎 for "There are more important bugs to focus on right now"
The text was updated successfully, but these errors were encountered:
I recall i was a decision that the microservice DM pod should not copy all the labels and annotations of velero server and node-agent, we may add this label to the "white-list" and consider make the label configurable in future, if needed.
Instead of to have a green-list of labels to copy to the micro-service pods, it could be better to use a red-list with known labels so if someone use some custom labels there will be present without velero needing to know them. These labels could in the red list and excluded from copy :
app.kubernetes.io/instance
app.kubernetes.io/managed-by
app.kubernetes.io/name
app.kubernetes.io/version
helm.sh/chart
name
controller-revision-hash
pod-template-hash
pod-template-generation
Resumption of issue vmware-tanzu/helm-charts#627
What steps did you take and what happened:
On AKS, we backup persistent volumes backed by Azure Disk via CSI snapshot and data movement.
Authentication against the object storage (Azure blob) used to upload backup metadata and CSI snapshot data is performed via Azure Workload Identity.
Starting with velero 1.15.0 (helm chart 8.0.0) the data upload actions were moved outside of the node agent into microservice pods, each dedicated to one DataUpload.
These pods, however, do not inherit the labels set to velero and node-agent pods via the helm value
podLabels
. On the other hand these pods usesvelero-server
service account well.Azure Workload identity requires the label
azure.workload.identity/use: "true"
to be set such that the pod can source the client id from the service account.As a consequence of this missing label, authentication against Azure blob fails and the data upload cannot be completed.
Here the metadata description of such a pod :
What did you expect to happen:
The CSI snapshot is restored into a temporary PVC and uploaded towards Azure Blob.
Anything else you would like to add:
The creation of the micro-service pod for data movement is made by the csiSnapshotExposer.Expose method by providing labels issued from
csiExposeParam.HostingPodLabels
.These labels are a map initialized with the data-upload label, and completed with the exposer-pod-group label
Environment:
velero client config get features
): CSI, data moverVote on this issue!
This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.
The text was updated successfully, but these errors were encountered: