-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Backup results in Access Denied for PutObject operation to S3 #8062
Backup results in Access Denied for PutObject operation to S3 #8062
Comments
Could you provide the velero debug bundle by running |
Here you go, @Lyndon-Li: bundle-2024-08-05-19-30-46.tar.gz Thanks in advance! |
FYI, @reasonerjt - I came back to this after some weeks and realized it's just caused by a missing So, |
@chrisRedwine Hmm. I don't think I've ever added that one. The velero doc suggestion has always worked for me. I wonder whether this is a setting that is only needed by certain S3 providers. |
@chrisRedwine Are you using aws s3 object tagging ? (Like passing any tag keys in BSL s3 config) If yes then maybe that explains why we need this additional permission. |
Hmm. Yeah then it makes sense to add |
@chrisRedwine Ahh, ok that makes sense then. Yes, by default tagging isn't used, so that permission isn't needed. But if you use that, you'd need it. Does it make sense to note that in your PR, maybe in the description text before the policy sample? -- '"s3:PutObjectTagging" is only needed if you make use of the |
@sseago Makes sense to me - I've added the notes to the PR in this commit |
What steps did you take and what happened:
I’m testing out Velero, and when trying to do a backup for a set of Redis PVCs/PVs, I get the following error:
velero backup create redis-test-2 --include-resources=pvc,pv --selector app.kubernetes.io/name=redis
VolumeSnapshotClass
CR createdEnableCSI
feature flag setIRSA Policy:
BackupStorageLocation spec:
Terraform for S3 bucket:
What did you expect to happen:
No 403 errors when uploading to S3
The following information will help us better understand what's going on:
velero debug --backup redis-test-2
support bundle contained info I'm not comfortable sharing (e.g., IPs) - if needed, I can DM through Slack or go through and redact everything, just let me know.Anything else you would like to add:
Slack message for this issue is here.
I suspect the problem has something to do with the way SSE is set up or the bucket configuration or perhaps
caCert
being required, but I’m not certain. Any help would be greatly appreciated!Environment:
velero version
):v1.14.0
7.1.2
1.10.0
velero client config get features
): This returnsfeatures: <NOT SET>
, though I can confirm that the velero server container is running with--uploader-type=kopia --backup-sync-period=1m --fs-backup-timeout=4h --client-burst=30 --client-page-size=500 --client-qps=20 --default-backup-ttl=72h --default-item-operation-timeout=4h --garbage-collection-frequency=1h --log-format=json --log-level=debug --store-validation-frequency=1m --terminating-resource-timeout=10m --features=EnableCSI
kubectl version
):v1.29.6-eks-db838b0
eks.10
/etc/os-release
):Amazon Linux 2
Vote on this issue!
This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.
The text was updated successfully, but these errors were encountered: