You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Support user configs, user secrets and separate environments for cassandra and sidecar (#218)
* Initial work for clouds secrets and user-defined configmap
Signed-off-by: Alex Lourie <[email protected]>
* PR comments fixes
Fixes#213Fixes#208
* Fixed some comments from PR review
* Added Env to CRD to allow specifying environment for containers
(exists in java version)
* Added userConfigMap handling (#213)
* Restored PrivelegedSupported handling (#208)
* Backup secret volume allows providing GOOGLE_APPLICATION_CREDENTIALS
in a secret
* Cloud providers creds can be set using Env field in CRD
Signed-off-by: Alex Lourie <[email protected]>
* Support TLS certificates for internal communication
Signed-off-by: Alex Lourie <[email protected]>
* PR comments, docs updates
Signed-off-by: Alex Lourie <[email protected]>
* Cleanups
Signed-off-by: Alex Lourie <[email protected]>
* Path naming update
Signed-off-by: Alex Lourie <[email protected]>
* Cleanups
* go fmt
Signed-off-by: Alex Lourie <[email protected]>
Copy file name to clipboardexpand all lines: doc/backup_restore.md
+8-5
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ You can inspect the secret created via `kubectl describe secrets/awsbackuptest`
22
22
Create a `CassandraDataCenter` CRD that injects the secret as environment variables that matches the AWS client libraries expected env variables:
23
23
24
24
```yaml
25
-
env:
25
+
sidecarEnv:
26
26
- name: AWS_ACCESS_KEY_ID
27
27
valueFrom:
28
28
secretKeyRef:
@@ -65,7 +65,7 @@ spec:
65
65
resources:
66
66
requests:
67
67
storage: 100Mi
68
-
env:
68
+
sidecarEnv:
69
69
- name: AWS_ACCESS_KEY_ID
70
70
valueFrom:
71
71
secretKeyRef:
@@ -85,6 +85,9 @@ spec:
85
85
To create a cluster using this yaml file use `kubectl apply -f myBackupCluster.yaml`
86
86
87
87
## Configuring GCP Object Storage via environment variables
88
+
The backup credentials will be added to the sidecar container at the `/tmp/backup-creds` location.
89
+
Use this location to set GOOGLE_APPLICATION_CREDENTIALS environment variable to the key json file stored in the secret.
90
+
88
91
First create a secret in kubernetes to hold a Google service account token/file (assuming they are stored in files named access and secret respectively).
0 commit comments