-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] AzureBlobXmlRepository #21987
Comments
Thank you for your feedback. Tagging and routing to the team member best able to assist. |
FileSystemXmlRepository and AzureBlobXmlRepository were not designed to allow key migration. The larger difference is that in file system keys are stored with a single key per file while in blob all keys are in the same blob. Supporting this kind of migration would require a tool that would merge keys into a single blob. |
As I understood we can transform keys structure on our own then upload to storage account container. Thank you very much. |
However I am just curious. Why you designed that to store all keys in one file? Could not pass SAS token to container with READ,WRITE permissions and files could be created? |
It's cheaper and faster to download a single blob during the app startup than to scan the container and download many tiny blobs. |
Ok thank you for explanation. I am closing the ticket. |
[Hub Generated] Publish private branch 'containerservice/official/v20221218' (Azure#21987) * [AutoSync] 6a6ad0e3336 Merged PR 7353698: [API Release] Sync swagger changes in GitHub PR Azure#21069 * [AutoSync] c7b8955aefd Merged PR 7359461: [API Release] Fix Swagger LintDiff errors * [AutoSync] 76fc4392c08 Merged PR 7379598: [Swagger][2022-11 APIs] azure auth-provider kubeconfig is fully removed in v1.26 instead of v1.25 Co-authored-by: swagger-automation <swagger@microsoft.com>
Hello
I found bug (or inconsistency) when 2 types of Data Protection Xml Repository is used.
FileSystemXmlRepository and AzureBlobXmlRepository
Steps:
4, Data protector could not find any key and that is why we could not authorize request.
This is how they read keys differently:
When I changed key file structure (like below) everythink is working fine.
< keys >
< key >< /key >
< /keys >
Instead of
< key >
< /key >
I think this is the root cause.
Best regards
The text was updated successfully, but these errors were encountered: