New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
design for multi-tenancy support #18
Comments
@yastij is also interested in helping out here |
+1 |
+1. I'm willing to help too. I will start by getting familiar with the codebase and come up with a proposal |
Guys, do you please know in which upcomming release this feature will be available ? |
@abessifi we haven't slated it for a release yet - we are still in the stage of needing to do some R&D/design work to figure out how this would work. we'll update here as/when it progresses! If you have any input on this item - please feel free to add comments on this issue about your use case, that would be helpful for the team. |
Moving this into v1.3 for tracking purposes, as we have some community members who are interested in helping to design/implement. |
I am interested on helping with this feature. Maybe we could take this up to the velero community meeting and discuss it with all the other interested community members? |
@nzoueidi please attend our next community meeting and we can discuss your use case. Karl from the Cruise team was spearheading this effort if you want to sync with them as well. |
I expect users to interract with Velero only through CRDs. This is the best way to abstract the access to Velero and it's underlying infra (Restic in this case). I think the challenge here is more about redesigning Velero to support multi-tenancy out-of-the-box which may lead to a lot of code refactoring. |
Can we imagine a model that fits more directly with RBAC principles?
One thing that doesn't fit well with this model is a multi-namespace backup, which seems like a typical pattern for Velero. Should we sacrifice this for the sake of multi-tenancy? Probably not... |
@bgagnon yeah, I have been thinking about something like that as well. Another challenge is how cluster-scoped resources are dealt with - Persistent Volumes being the first one that comes to mind. If you have a constrained service account per namespace, then it needs to be able to GET these cluster-scoped resources in order to back them up. |
Even then, there's a need for carefully managing the PV binding references. For one thing, there's a need to permanently annotate PVs (and/or their corresponding cloud volume) with the name of the tenant that owns it. This info can later be used to restrict was is allowed or not-allowed as a PVC source. Overall, I think some sort of coordination with another instance of velero running with elevated privileges is going to be necessary for the pieces that involve mutating |
Hello, any progress to introduce multi-tenancy in Velero? |
Per discussion, we decided to put this in the backlog and revisit in planning some future release. |
Any update on multitenancy implementation in Velero? |
My team and I are also running into this issue. Is there any suggestion on where to start with an MR to add support for this? We would be interested in contributing towards a solution. Thanks |
Hi - do you please know in which up-coming release this feature will be available ? A timeline would helpful. Thanks! |
Hi! We do run k8s as a platform for hosted namespaces so this would hugely benefit our usecase! Thanks! |
+1 for the feature! |
Allow users other than cluster-admin to use Ark. This has security implications:
The text was updated successfully, but these errors were encountered: