-
Notifications
You must be signed in to change notification settings - Fork 429
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix!: Change export service account permission for external backups - roles/storage.objectAdmin #656
fix!: Change export service account permission for external backups - roles/storage.objectAdmin #656
Conversation
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
…ermissions are required for exporting dumps
0094240
to
27f56b4
Compare
@DeLoWaN This will be a breaking change. Can you plz add a doc in docs folder for v23 upgrade will change IAM permission. |
/gcbrun |
Done. |
/gcbrun |
@DeLoWaN -- any updates from GCP? Are you replacing backups? Why would it need |
The case is closed on GCP support. They didn't tell any specifics about why it needed that additional permission. Only detail you can find in the documentation is that you need that delete permission when using parallel MySQL exports (which I was not doing since I'm running SQL Server). They probably made a mistake internally by requiring more permissions that initially required, but the module still has to be aligned to work properly.
|
/gcbrun |
My GCP SQL Server exports stopped working a few days ago. The workflow fails with a missing permission
storage.objects.delete
on the Cloud SQL service account. After an exchange with the GCP support, they confirmed internal changes has been made and required new permissions for the Cloud SQL service account onto the bucket:The documentation is not fully updated, but suggest to use the
objectAdmin
role.This PR changes the role accordingly.