Skip to content

Commit

Permalink
Add iam.serviceAccounts.signBlob into permission array.
Browse files Browse the repository at this point in the history
Signed-off-by: Xun Jiang <[email protected]>
  • Loading branch information
Xun Jiang committed Jan 12, 2023
1 parent 640927b commit dc7608a
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -123,6 +123,7 @@ These permissions are required by Velero to manage snapshot resources in the GCP
storage.objects.delete
storage.objects.get
storage.objects.list
iam.serviceAccounts.signBlob
)
gcloud iam roles create velero.server \
Expand All @@ -138,10 +139,9 @@ These permissions are required by Velero to manage snapshot resources in the GCP
```
Note:
To allow [Velero's Kubernetes Service Account](#Option-2:-Using-Workload-Identity) to create signed urls for the GCS bucket,
add `iam.serviceAccounts.signBlob` permissions above.
This is required if you want to run `velero backup logs`:
the Velero server has access to GCS but the CLI does not.
`iam.serviceAccounts.signBlob` permission is used to allow [Velero's Kubernetes Service Account](#Option-2:-Using-Workload-Identity) to create signed urls for the GCS bucket.
This is required if you want to run `velero backup logs`, `velero backup download`, `velero backup describe` and `velero restore describe`.
This is due to those commands need to download some metadata files from S3 bucket to display information needed, and the Velero server has access to GCS but the CLI does not.

### Grant access to Velero
This can be done in 2 different options.
Expand Down

0 comments on commit dc7608a

Please sign in to comment.