added documentation for how velero handles encryption (#3463)

Signed-off-by: Madhav Jivrajani <madhav.jiv@gmail.com>
This commit is contained in:
Madhav Jivrajani
2021-02-23 00:05:42 +05:30
committed by GitHub
parent 45d53178ae
commit 046cb596d0
2 changed files with 4 additions and 0 deletions

View File

@@ -31,6 +31,8 @@ This configuration design enables a number of different use cases, including:
- Restic data is stored under a prefix/subdirectory of the main Velero bucket, and will go into the bucket corresponding to the `BackupStorageLocation` selected by the user at backup creation time.
- Velero's backups are split into 2 pieces - the metadata stored in object storage, and snapshots/backups of the persistent volume data. Right now, Velero *itself* does not encrypt either of them, instead it relies on the native mechanisms in the object and snapshot systems. A special case is restic, which backs up the persistent volume data at the filesystem level and send it to Velero's object storage.
## Examples
Let's look at some examples of how you can use this configuration mechanism to address some common use cases:

View File

@@ -31,6 +31,8 @@ This configuration design enables a number of different use cases, including:
- Restic data is stored under a prefix/subdirectory of the main Velero bucket, and will go into the bucket corresponding to the `BackupStorageLocation` selected by the user at backup creation time.
- Velero's backups are split into 2 pieces - the metadata stored in object storage, and snapshots/backups of the persistent volume data. Right now, Velero *itself* does not encrypt either of them, instead it relies on the native mechanisms in the object and snapshot systems. A special case is restic, which backs up the persistent volume data at the filesystem level and send it to Velero's object storage.
## Examples
Let's look at some examples of how you can use this configuration mechanism to address some common use cases: