Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

What's the expected behavior when creating additional BSL when using AWS IRSA as Velero installation credential #7290

Closed
danfengliu opened this issue Jan 9, 2024 · 1 comment

Comments

@danfengliu
Copy link
Contributor

Describe the problem/challenge you have

In EKS cluster, when install Velero with service account of IRSA instead of secret file, BSL and VSL are all using this SA for credential, what if we need other BSL, --credential should not be used in velero create backup-location in this case, we should document it.

Describe the solution you'd like

Anything else you would like to add:

Environment:

  • Velero version (use velero version):
  • Kubernetes version (use kubectl version):
  • Kubernetes installer & version:
  • Cloud provider or hardware configuration:
  • OS (e.g. from /etc/os-release):

Vote on this issue!

This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.

  • 👍 for "The project would be better with this feature added"
  • 👎 for "This feature will not enhance the project in a meaningful way"
@danfengliu danfengliu changed the title Needs document for creating additional BSL when using AWS IRSA as credential What's the expected behavior when creating additional BSL when using AWS IRSA as Velero installation credential Jan 12, 2024
@reasonerjt
Copy link
Contributor

IMO the credentials set in additional BSL should have higher priority than the IRSA setting.
This is a dup of #7302

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants