From d087a3963481ec70037a0cc2548877841ce0e539 Mon Sep 17 00:00:00 2001 From: Shruti Deshpande Date: Wed, 12 Nov 2025 15:22:46 +0530 Subject: [PATCH] add note about restic not supported Signed-off-by: Shruti Deshpande --- .../installing/installing-oadp-azure.adoc | 25 ++++++++++++++----- modules/oadp-auth-azure-sts.adoc | 23 +++++++++++------ 2 files changed, 34 insertions(+), 14 deletions(-) diff --git a/backup_and_restore/application_backup_and_restore/installing/installing-oadp-azure.adoc b/backup_and_restore/application_backup_and_restore/installing/installing-oadp-azure.adoc index 9e16df985e..58582e2cb2 100644 --- a/backup_and_restore/application_backup_and_restore/installing/installing-oadp-azure.adoc +++ b/backup_and_restore/application_backup_and_restore/installing/installing-oadp-azure.adoc @@ -20,12 +20,14 @@ To install the OADP Operator in a restricted network environment, you must first include::modules/migration-configuring-azure.adoc[leveloffset=+1] -include::modules/oadp-about-backup-snapshot-locations-secrets.adoc[leveloffset=+1] -include::modules/oadp-auth-azure-methods.adoc[leveloffset=+1] -include::modules/oadp-auth-azure-secret-based.adoc[leveloffset=+1] -include::modules/oadp-auth-azure-sts.adoc[leveloffset=+1] -You can configure the Data Protection Application by setting Velero resource allocations or enabling self-signed CA certificates. +include::modules/oadp-about-backup-snapshot-locations-secrets.adoc[leveloffset=+1] + +include::modules/oadp-auth-azure-methods.adoc[leveloffset=+1] + +include::modules/oadp-auth-azure-secret-based.adoc[leveloffset=+1] + +include::modules/oadp-auth-azure-sts.adoc[leveloffset=+1] include::modules/oadp-setting-resource-limits-and-requests.adoc[leveloffset=+1] @@ -34,20 +36,31 @@ include::snippets/oadp-nodeselector-snippet.adoc[] For more details, see xref:../../../backup_and_restore/application_backup_and_restore/installing/installing-oadp-azure.adoc#oadp-configuring-node-agents_installing-oadp-azure[Configuring node agents and node labels]. include::modules/oadp-self-signed-certificate.adoc[leveloffset=+1] + include::modules/oadp-using-ca-certificates-with-velero-command.adoc[leveloffset=+1] -// include::modules/oadp-installing-dpa-1-2-and-earlier.adoc[leveloffset=+1] include::modules/oadp-installing-dpa-1-3.adoc[leveloffset=+1] + include::modules/oadp-configuring-client-burst-qps.adoc[leveloffset=+1] + include::modules/oadp-configuring-node-agents.adoc[leveloffset=+1] + include::modules/oadp-configuring-node-agent-load-affinity.adoc[leveloffset=+1] + include::modules/oadp-node-agent-load-affinity-guidelines.adoc[leveloffset=+1] + include::modules/oadp-configuring-node-agent-load-concurrency.adoc[leveloffset=+1] + include::modules/oadp-configuring-node-agent-non-root.adoc[leveloffset=+1] + include::modules/oadp-configuring-repository-maintenance.adoc[leveloffset=+1] + include::modules/oadp-configuring-velero-load-affinity.adoc[leveloffset=+1] + include::modules/oadp-configuring-imagepullpolicy.adoc[leveloffset=+1] + include::modules/oadp-enabling-csi-dpa.adoc[leveloffset=+2] + include::modules/oadp-about-disable-node-agent-dpa.adoc[leveloffset=+2] [role="_additional-resources"] diff --git a/modules/oadp-auth-azure-sts.adoc b/modules/oadp-auth-azure-sts.adoc index 25291b8407..30cbc98479 100644 --- a/modules/oadp-auth-azure-sts.adoc +++ b/modules/oadp-auth-azure-sts.adoc @@ -11,6 +11,10 @@ You can use Microsoft Entra Workload ID to access Azure storage for {oadp-short} To use the Azure Security Token Service (STS) configuration, you need the `credentialsMode` field set to `Manual` during cluster installation. This approach uses the Cloud Credential Operator (`ccoctl`) to set up the workload identity infrastructure, including the OpenID Connect (OIDC) provider, issuer configuration, and user-assigned managed identities. +[NOTE] +==== +{oadp-short} with Azure STS configuration does not support `restic` File System Backups (FSB) and restores. +==== .Prerequisites @@ -173,9 +177,9 @@ spec: backupLocations: - bucket: cloudStorageRef: - name: # <1> + name: config: - storageAccount: # <2> + storageAccount: useAAD: "true" credential: key: azurekey @@ -195,18 +199,21 @@ spec: - name: default velero: config: - resourceGroup: # <3> - subscriptionId: # <4> + resourceGroup: + subscriptionId: credential: key: azurekey name: cloud-credentials-azure provider: azure EOF ---- -<1> Specify the `CloudStorage` CR name. -<2> Specify the Azure storage account name. -<3> Specify the resource group. -<4> Specify the subscription ID. ++ +where: + +:: Specify the `CloudStorage` CR name. +:: Specify the Azure storage account name. +:: Specify the resource group. +:: Specify the subscription ID. .Verification