|
2 | 2 | title: Troubleshoot Azure Kubernetes Service backup
|
3 | 3 | description: Symptoms, causes, and resolutions of the Azure Kubernetes Service backup and restore operations.
|
4 | 4 | ms.topic: troubleshooting
|
5 |
| -ms.date: 02/28/2024 |
| 5 | +ms.date: 02/29/2024 |
6 | 6 | ms.service: backup
|
7 | 7 | ms.custom:
|
8 | 8 | - ignite-2023
|
@@ -63,10 +63,10 @@ The extension pods aren't exempt, and require the Microsoft Entra pod identity t
|
63 | 63 | kubectl get Azurepodidentityexceptions --all-namespaces
|
64 | 64 | ```
|
65 | 65 |
|
66 |
| -3. To assign the *Storage Account Contributor* role to the extension identity, run the following command: |
| 66 | +3. To assign the *Storage Blob Data Contributor* role to the extension identity, run the following command: |
67 | 67 |
|
68 | 68 | ```azurecli-interactive
|
69 |
| - az role assignment create --assignee-object-id $(az k8s-extension show --name azure-aks-backup --cluster-name aksclustername --resource-group aksclusterresourcegroup --cluster-type managedClusters --query aksAssignedIdentity.principalId --output tsv) --role 'Storage Account Contributor' --scope /subscriptions/subscriptionid/resourceGroups/storageaccountresourcegroup/providers/Microsoft.Storage/storageAccounts/storageaccountname |
| 69 | + az role assignment create --assignee-object-id $(az k8s-extension show --name azure-aks-backup --cluster-name aksclustername --resource-group aksclusterresourcegroup --cluster-type managedClusters --query aksAssignedIdentity.principalId --output tsv) --role 'Storage Blob Data Contributor' --scope /subscriptions/subscriptionid/resourceGroups/storageaccountresourcegroup/providers/Microsoft.Storage/storageAccounts/storageaccountname |
70 | 70 | ```
|
71 | 71 |
|
72 | 72 | ### Scenario 3
|
@@ -192,13 +192,13 @@ These error codes appear due to issues based on the Backup extension installed i
|
192 | 192 |
|
193 | 193 | ### UserErrorExtensionMSIMissingPermissionsOnBackupStorageLocation
|
194 | 194 |
|
195 |
| -**Cause**: The Backup extension should have the *Storage Account Contributor* role on the Backup Storage Location (storage account). The Extension Identity gets this role assigned. |
| 195 | +**Cause**: The Backup extension should have the *Storage Blob Data Contributor* role on the Backup Storage Location (storage account). The Extension Identity gets this role assigned. |
196 | 196 |
|
197 | 197 | **Recommended action**: If this role is missing, then use Azure portal or CLI to reassign this missing permission on the storage account.
|
198 | 198 |
|
199 | 199 | ### UserErrorBackupStorageLocationNotReady
|
200 | 200 |
|
201 |
| -**Cause**: During extension installation, a Backup Storage Location is to be provided as input that includes a storage account and blob container. The Backup extension should have *Storage Account Contributor* role on the Backup Storage Location (storage account). The Extension Identity gets this role assigned. |
| 201 | +**Cause**: During extension installation, a Backup Storage Location is to be provided as input that includes a storage account and blob container. The Backup extension should have *Storage Blob Data Contributor* role on the Backup Storage Location (storage account). The Extension Identity gets this role assigned. |
202 | 202 |
|
203 | 203 | **Recommended action**: The error appears if the Extension Identity doesn't have right permissions to access the storage account. This error appears if AKS backup extension is installed the first time when configuring protection operation. This happens for the time taken for the granted permissions to propagate to the AKS backup extension. As a workaround, wait an hour and retry the protection configuration. Otherwise, use Azure portal or CLI to reassign this missing permission on the storage account.
|
204 | 204 |
|
|
0 commit comments