Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion modules/migration-configuring-aws-s3.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -111,7 +111,7 @@ $ cat > velero-policy.json <<EOF
EOF
----

. Attach the policies to give the `velero` user the necessary permissions:
. Attach the policies to give the `velero` user the minimum necessary permissions:
+
[source,terminal]
----
Expand Down
23 changes: 23 additions & 0 deletions modules/migration-configuring-azure.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -127,6 +127,29 @@ $ AZURE_STORAGE_ACCOUNT_ACCESS_KEY=`az storage account keys list \
--query "[?keyName == 'key1'].value" -o tsv`
----

. Create a custom role that has the minimum required permissions:
+
[source,terminal,subs="attributes+"]
----
AZURE_ROLE=Velero
az role definition create --role-definition '{
"Name": "'$AZURE_ROLE'",
"Description": "Velero related permissions to perform backups, restores and deletions",
"Actions": [
"Microsoft.Compute/disks/read",
"Microsoft.Compute/disks/write",
"Microsoft.Compute/disks/endGetAccess/action",
"Microsoft.Compute/disks/beginGetAccess/action",
"Microsoft.Compute/snapshots/read",
"Microsoft.Compute/snapshots/write",
"Microsoft.Compute/snapshots/delete",
"Microsoft.Storage/storageAccounts/listkeys/action",
"Microsoft.Storage/storageAccounts/regeneratekey/action"
],
"AssignableScopes": ["/subscriptions/'$AZURE_SUBSCRIPTION_ID'"]
}'
----

. Create a `credentials-velero` file:
+
[source,terminal,subs="attributes+"]
Expand Down
2 changes: 1 addition & 1 deletion modules/migration-configuring-gcp.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ $ SERVICE_ACCOUNT_EMAIL=$(gcloud iam service-accounts list \
--format 'value(email)')
----

. Attach the policies to give the `velero` user the necessary permissions:
. Attach the policies to give the `velero` user the minimum necessary permissions:
+
[source,terminal]
----
Expand Down