Skip to content

Commit ef5ab63

Browse files
martyavbtat
andauthored
#686 clarify when values should be raw or manually base64 encoded (#761)
* 686 clarify when values should be raw or manually base64 encoded * rm'd section as duplicate of https://ranchermanager.docs.rancher.com/reference-guides/backup-restore-configuration/backup-configuration#example-credentialsecret * UI instructions for finding Backup: Create + link to how-to on secret creation * sync language * Apply suggestions from code review Co-authored-by: Billy Tat <[email protected]> --------- Co-authored-by: Billy Tat <[email protected]>
1 parent 58d3cc3 commit ef5ab63

File tree

2 files changed

+6
-16
lines changed

2 files changed

+6
-16
lines changed

docs/reference-guides/backup-restore-configuration/backup-configuration.md

+6-3
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: Backup Configuration
33
---
44

5-
The Backup Create page lets you configure a schedule, enable encryption and specify the storage location for your backups.
5+
The **Backup: Create** page lets you configure a schedule, enable encryption and specify the storage location for your backups.
66

7+
You must first [install](../../how-to-guides/new-user-guides/backup-restore-and-disaster-recovery/back-up-rancher.md) the `rancher-backup` operator. After you do so, you can access the **Backup: Create** page:
78

89
## Schedule
910

@@ -76,7 +77,7 @@ If you use an S3 backup target, make sure that every cluster has its own bucket
7677

7778
The S3 storage location contains the following configuration fields:
7879

79-
1. **Credential Secret** (optional): If you need to use the AWS Access keys Secret keys to access s3 bucket, create a secret with your credentials with keys and the directives `accessKey` and `secretKey`. It can be in any namespace. An example secret is [here.](#example-credentialsecret) This directive is unnecessary if the nodes running your operator are in EC2 and set up with IAM permissions that allow them to access S3, as described in [this section.](#iam-permissions-for-ec2-nodes-to-access-s3) The Credential Secret dropdown lists the secrets in all namespaces.
80+
1. **Credential Secret** (optional): If you need an AWS access key or secret key to access an S3 bucket, [create a secret](../../how-to-guides/new-user-guides/kubernetes-resources-setup/secrets.md) using your credentials, with keys and directives named `accessKey` and `secretKey`. The secret can be in any namespace. An example secret is [here](#example-credentialsecret). This directive is unnecessary if the nodes running your operator are in EC2 and assigned [IAM permissions to access S3](#iam-permissions-for-ec2-nodes-to-access-s3). The **Credential Secret** dropdown lists secrets in all namespaces.
8081
1. **Bucket Name**: The name of the S3 bucket where backup files will be stored.
8182
1. **Region** (optional): The AWS [region](https://aws.amazon.com/about-aws/global-infrastructure/regions_az/) where the S3 bucket is located. This field isn't needed for configuring MinIO.
8283
1. **Folder** (optional): The name of the folder in the S3 bucket where backup files will be stored. Nested folders (e.g., `rancher/cluster1`) are not supported. If this field is left empty, the default behavior is to store the backup files in the root folder of the S3 bucket.
@@ -85,9 +86,11 @@ The S3 storage location contains the following configuration fields:
8586
1. **Skip TLS Verifications** (optional): Set to true if you are not using TLS.
8687

8788

89+
#### YAML Directive Fields
90+
8891
| YAML Directive Name | Description | Required |
8992
| ---------------- | ---------------- | ------------ |
90-
| `credentialSecretName` | If you need to use the AWS Access keys Secret keys to access s3 bucket, create a secret with your credentials with keys and the directives `accessKey` and `secretKey`. It can be in any namespace as long as you provide that namespace in `credentialSecretNamespace`. An example secret is [here.](#example-credentialsecret) This directive is unnecessary if the nodes running your operator are in EC2 and set up with IAM permissions that allow them to access S3, as described in [this section.](#iam-permissions-for-ec2-nodes-to-access-s3) | |
93+
| `credentialSecretName` | If you need an AWS access key or secret key to access an S3 bucket, [create a secret](../../how-to-guides/new-user-guides/kubernetes-resources-setup/secrets.md) using your credentials, with keys and directives named `accessKey` and `secretKey`. The secret can be in any namespace. An example secret is [here](#example-credentialsecret). This directive is unnecessary if the nodes running your operator are in EC2 and assigned [IAM permissions to access S3](#iam-permissions-for-ec2-nodes-to-access-s3). | |
9194
| `credentialSecretNamespace` | The namespace of the secret containing the credentials to access S3. This directive is unnecessary if the nodes running your operator are in EC2 and set up with IAM permissions that allow them to access S3, as described in [this section.](#iam-permissions-for-ec2-nodes-to-access-s3) | |
9295
| `bucketName` | The name of the S3 bucket where backup files will be stored. ||
9396
| `folder` | The name of the folder in the S3 bucket where backup files will be stored. Nested folders (e.g., `rancher/cluster1`) are not supported. If this field is left empty, the default behavior is to store the backup files in the root folder of the S3 bucket. | |

docs/reference-guides/backup-restore-configuration/examples.md

-13
Original file line numberDiff line numberDiff line change
@@ -242,19 +242,6 @@ spec:
242242
encryptionConfigSecretName: test-encryptionconfig
243243
```
244244

245-
## Example Credential Secret for Storing Backups in S3
246-
247-
```yaml
248-
apiVersion: v1
249-
kind: Secret
250-
metadata:
251-
name: creds
252-
type: Opaque
253-
data:
254-
accessKey: <Enter your base64-encoded access key>
255-
secretKey: <Enter your base64-encoded secret key>
256-
```
257-
258245
## Example EncryptionConfiguration
259246

260247
The snippet below demonstrates two different types of secrets and their relevance with respect to Backup and Restore of custom resources.

0 commit comments

Comments
 (0)