-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Backup/Restore does not include the secrets used for clientSecretName and helmSecretName in fleet gitrepos #163
Comments
This may be a Feature Request. We will discuss with PM and respond back. |
Thanks! Please keep in mind that loosing the secrets is somewhat similar to data-loss as customers might have created the secrets manually or in the fleet UI and it is not documented that these must be backed up separate/manually... |
@nickwsuse , Eli believes this is already fixed. |
Could we retest this usecase with latest Rancher version and latest Backup-restore operator to see if the issue is still seen? There is a high chance that latest versions might have this resolved already |
@eliyamlevy @prachidamle I'm not seeing the secrets I made before taking the backup after I deleted them and restored. The secrets I made are opaque, so not sure if there's an expected secret type for this to work, but I would assume it should keep all secrets in the namespaces regardless of type? Steps:
This test was a local restore, but I imagine we'd get the same results with a restore done in a migration as well. |
@eliyamlevy , we checked with Ron and he said it would be ok to add this to the Q1 release. |
Hello all, The reason for this approach is because these gitrepo secrets can be in any namespace and can have any name, which makes it difficult to identify them through the resource selectors unless they have some kind of standard identifier. This label will serve as that identifier to allow anyone to make sure any secret gets backed up. The only caveat is to make sure to encrypt the backup if you are storing sensitive information, since the backup is in plain text unless encrypted. Encryption is already available through the Backup Restore Operator. The way I tested this was to create many secrets with different names in different namespaces and added the |
I repeated the steps I mentioned in my earlier comment, this time adding the I did both an encrypted and unencrypted backup/restore just to be sure both still work. |
SURE-3503
SURE-3531 - closed as duplicate
After a rancher restore in Rancher 2.5.9 the gitrepos defined in fleet do not work anymore as we have to use authentication against git and against the helm repo (harbor in our case) and the secrets defined in clientSecretName and helmSecretName of the gitrepos defined are not backed up / restored.
Could we get the backup operator fixed in a way that it automatically creates a backup of these secrets in the fleet-default / fleet-local namespaces, too? (maybe also in other fleet namespaces if additional ones have been created)
The text was updated successfully, but these errors were encountered: