Skip to content

Commit 6374ee6

Browse files
Add blog improving-credential-management-for-seed-backups (gardener#670)
* Add blog improving-credential-management-for-seed-backups * Add dimityrmirchev as co-author --------- Co-authored-by: vpnachev <[email protected]>
1 parent 67ceecd commit 6374ee6

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: "Improving Credential Management for Seed Backups"
3+
linkTitle: "Improving Credential Management for Seed Backups"
4+
newsSubtitle: June 25, 2025
5+
publishdate: 2025-06-25
6+
authors:
7+
- avatar: https://avatars.githubusercontent.com/dimityrmirchev
8+
9+
login: dimityrmirchev
10+
name: Dimitar Mirchev
11+
- avatar: https://avatars.githubusercontent.com/vpnachev
12+
13+
login: vpnachev
14+
name: Vladimir Nachev
15+
aliases: ["/blog/2025/06/25/improving-credential-management-for-seed-backups"]
16+
---
17+
18+
Gardener has introduced a new feature gate, `DoNotCopyBackupCredentials`, to enhance the security and clarity of how backup credentials for managed seeds are handled. This change moves away from an implicit credential-copying mechanism to a more explicit and secure configuration practice.
19+
20+
### The Old Behavior and Its Drawbacks
21+
22+
Previously, when setting up a managed seed, the controller would automatically copy the shoot's infrastructure credentials to serve as the seed's backup credentials if a backup secret was not explicitly provided. While this offered some convenience, it had several disadvantages:
23+
24+
* **Promoted Poor Security Practices:** It encouraged the use of the same credentials for both shoot infrastructure and seed backups, violating the principle of least privilege and credential segregation.
25+
* **Caused Confusion:** The implicit copying of secrets could be confusing for operators, as the source of the backup credential was not immediately obvious from the configuration.
26+
* **Inconsistent with Modern Credentials:** The mechanism worked for `Secret`-based credentials but was not compatible with `WorkloadIdentity`, which cannot be simply copied.
27+
28+
### The New Approach: Explicit Credential Management
29+
30+
The new `DoNotCopyBackupCredentials` feature gate, when enabled in `gardenlet`, disables this automatic copying behavior. With the gate active, operators are now required to explicitly create and reference a secret for the seed backup.
31+
32+
If `seed.spec.backup.credentialsRef` points to a secret that does not exist, the reconciliation process will fail with an error, ensuring that operators consciously provide a dedicated credential for backups. This change promotes the best practice of using separate, segregated credentials for infrastructure and backups, significantly improving the security posture of the landscape.
33+
34+
### For Operators: What You Need to Do
35+
36+
When you enable the `DoNotCopyBackupCredentials` feature gate, you must ensure that any `Seed` you configure has a pre-existing secret for its backup.
37+
38+
For setups where credentials were previously copied, Gardener helps with the transition. The controller will stop managing the lifecycle of these copied secrets. To help operators identify them for cleanup, these secrets will be labeled with `secret.backup.gardener.cloud/status=previously-managed`. You can then review these secrets and manage them accordingly.
39+
40+
This enhancement is a step towards more robust, secure, and transparent operations in Gardener, giving operators clearer control over credential management.
41+
42+
### Further Reading
43+
44+
* **[GitHub Pull Request #12168](https://github.com/gardener/gardener/pull/12168)**
45+
* **[Recording of the talk](https://youtu.be/kcXSyloteSs)**

0 commit comments

Comments
 (0)