What steps did you take and what happened:
- Deployed Velero v1.16.1 using Helm chart 9.1.3
- Configured the values.yaml file to include the label
trust-manager.io/mount-bundle: "true" at the top-level podLabels section. This ensures the label is applied to the main Velero pod.
- Verified that the main Velero pod indeed has the
trust-manager.io/mount-bundle: "true" label.
- Observed that the resulting maintenance job pod does not inherit the
trust-manager.io/mount-bundle: "true" label from the Velero deployment, contrary to documentation.
- Verified that the node-agent also have correctly the label
What did you expect to happen:
According to Velero documentation, maintenance jobs should inherit labels from the Velero deployment. I expected the maintenance job pod to have the trust-manager.io/mount-bundle: "true" label.
The following information will help us better understand what's going on:
Anything else you would like to add:
This issue prevents proper integration with trust-manager. Trust-manager relies on the trust-manager.io/mount-bundle label to inject certificates into the maintenance job pods. The absence of this label causes the maintenance jobs to fail with the following error: tls: failed to verify certificate: x509: certificate signed by unknown authority. This is a critical issue that blocks proper functioning of Velero in environments where trust-manager is used for certificate management.
Environment:
- Velero version : 1.16.1
- Velero features (use
velero client config get features): <NOT SET>
- Kubernetes version : v1.30.8
- Kubernetes installer & version: Kubespray 2.27.0
- Cloud provider or hardware configuration: Vsphere 8.0.3
- OS (e.g. from
/etc/os-release):
PRETTY_NAME="Ubuntu 24.04.1 LTS"
NAME="Ubuntu"
VERSION_ID="24.04"
VERSION="24.04.1 LTS (Noble Numbat)"
VERSION_CODENAME=noble
ID=ubuntu
ID_LIKE=debian
HOME_URL="https://www.ubuntu.com/"
SUPPORT_URL="https://help.ubuntu.com/"
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
UBUNTU_CODENAME=noble
LOGO=ubuntu-logo
Vote on this issue!
This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.
- 👍 for "I would like to see this bug fixed as soon as possible"
- 👎 for "There are more important bugs to focus on right now"
What steps did you take and what happened:
trust-manager.io/mount-bundle: "true"at the top-level podLabels section. This ensures the label is applied to the main Velero pod.trust-manager.io/mount-bundle: "true"label.trust-manager.io/mount-bundle: "true"label from the Velero deployment, contrary to documentation.What did you expect to happen:
According to Velero documentation, maintenance jobs should inherit labels from the Velero deployment. I expected the maintenance job pod to have the
trust-manager.io/mount-bundle: "true"label.The following information will help us better understand what's going on:
Anything else you would like to add:
This issue prevents proper integration with trust-manager. Trust-manager relies on the
trust-manager.io/mount-bundlelabel to inject certificates into the maintenance job pods. The absence of this label causes the maintenance jobs to fail with the following error:tls: failed to verify certificate: x509: certificate signed by unknown authority. This is a critical issue that blocks proper functioning of Velero in environments where trust-manager is used for certificate management.Environment:
velero client config get features):<NOT SET>/etc/os-release):Vote on this issue!
This is an invitation to the Velero community to vote on issues, you can see the project's top voted issues listed here.
Use the "reaction smiley face" up to the right of this comment to vote.