-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document backup repository password configuration method #6443
Comments
@Lyndon-Li I can work on this issue if needed. |
@shubham-pampattiwar |
Does this password cause the backups to S3 to be encrypted? |
@clouedoc, that is correct. Both Restic and Kopia (tools that Velero uses to do file system backups) encrypt data using the repo password. Check their documentation which has more details. But do check the limitations mentioned at https://velero.io/docs/v1.11/file-system-backup/#limitations. |
@shubham-pampattiwar, @Lyndon-Li, Documenting this would be very useful. Note that we should cover the case where user wants to modify the secret after few backups were done. Would this result in repo password being changed or it applies to only new repos? |
@draghuram Configuring the secret after repos are created is possible, but users will see different manners for new and old repos:
|
Changing password for existing repos is another task which involves lots of changes, yet for sure it is a useful feature, I've opened a new issue #6537 to track it. |
This is further complicated by the fact that a BSL can be used in several clusters, so if any one cluster that uses this BSL for filesystem backups changes the password, all velero instances that use this need the same change. |
Agreed. I think the password configuration should be documented sooner rather than later. |
@draghuram the docs says
What does this mean? This is not clear. Does that mean that the key/password is stored en-clair in the backup storage next to the encrypted data ? Or that you are using the same keys in every Velero installs by any user ? I am trying to understand how having a static key stored in-cluster somehow makes the encrypted Minio storage insecure for anyone who has access to the Minio instance... Can someone clarify? Thanks |
If you haven't changed repo password after installing Velero and did a file system or Snapshot datamover backup, Kopia/Restic repo will be created in the target storage. Now if a person has access to that storage, they can simply connect to that storage using kopia/restic CLI, and list backups and even restore them, because they can easily provide the repo password. Hope this helps. |
Wait I am even more confused.
Yes and this data, on the target storage (S3), is encrypted correct ? The encryption key is what you call the "repo password" correct?
Wait. How can they "easily provide the repo password" if they only have access to that S3 bucket ("backup storage" in the docs) ? Isn't the encryption password (repo password) only stored in a secret in the source and destination clusters ? If that person does not have access to any of these clusters but has access to S3 bucket how can they provide the password and access your data ? Trying to understand thanks |
Yes, repo password is what gets used in encrypting the data. And any one who has ever used Velero on any cluster knows the repo password because it is the same password every where (unless you changed it). So if I get access to your storage, I can easily try to read the contents using the hard-coded password and see if that works. It is similar to your home router coming with a standard password from the factory. |
Ok thanks So the answer to this question :
is yes. Maybe the docs should say
Which is more factual than the cryptic information currently displayed. I think It would make it clearer for everyone. What do you reckon ? I can do the PR if you point me to the right repo/location. |
Sure, you can submit PR with doc changes. See #6618 for the exact location where changes may need to go. |
At present, Velero has a default backup repository password saved in secret
velero-repo-credentials
, the way to configure the password to to modify this secret.However, this secret and its usage is not documented, many users don't know this.
The text was updated successfully, but these errors were encountered: