-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
S3 client-side encryption support #3218
Comments
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Not stale. |
@Lyndon-Li am I right to assume that this would come after Kopia integration? |
@eleanor-millman More Details:
This is to say we will have the good enough Client-Side Encryption after Kopia Integration, but we don't use AWS's Client-Side Encryption, because AWS's solution is vendor specific, we want to have a generic solution that work for every backup storage. Gaps after Kopia Integration:
To make it better in future: |
@Lyndon-Li Thanks so much for the detail! It is clear then that we won't tackle this for 1.10, but I'm happy that the other 1.10+ work (described above by you) will move us towards implementing this issue. |
Hi, we are interested in having a changeable Restic repository password.
Do you have any more ideas or suggestions? |
EDIT: Strange, it seems that the files stored on S3 are not encrypted at all. Could it be that Restic is only used for the in-cluster storage of the backups? |
Yes, it is implemented and we will document it, follow #5443 |
Thanks for the quick response! We're currently looking into adding encryption support into the AWS S3 Velero Plugin as it's the easiest solution. A rough prototype can be found here: https:/cloudogu/velero-plugin-for-aws/tree/feature/encrypted_aws |
There are two kinds of data in Velero's backup object store:
For 1, personally I don't see any technical blockings, just architecture change and efforts. |
Ah, I see. As we're using Longhorn as a storage provider, (2) doesn't do anything for us. Yeah, I realize that implementing it in the plugin is not the best solution. It was just a quick PoC. Thanks for clearing things up. |
Describe the problem/challenge you have
In addition to server-side encryption requested in #1782, it would be great to also support client-side encryption with client-provided master key.
This would allow using not fully trusted Minio instance for example. As far as I know, right now data is encrypted using static key which does not add any protection.
Describe the solution you'd like
Add support for specifying client-side encryption master key for S3 backup storage location.
Anything else you would like to add:
S3 documentation: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingClientSideEncryption.html
I guess this could be workaround using some sort of S3 proxy, which would handle the encryption independent from Velero.
Vote on this issue!
This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.
The text was updated successfully, but these errors were encountered: