CHORE(velero): disable BSL validation

- Set storeValidationFrequency to 0 (disabled)
- Prevents ArgoCD refresh every 24 seconds
- Manual backups still work normally
This commit is contained in:
2026-01-03 13:41:07 +09:00
parent bc8d0dd521
commit ad0be20dd9
2 changed files with 18 additions and 0 deletions

View File

@@ -7,6 +7,12 @@ metadata:
- resources-finalizer.argocd.argoproj.io - resources-finalizer.argocd.argoproj.io
spec: spec:
project: default project: default
# Ignore BackupStorageLocation status changes (updated every 24s by velero)
ignoreDifferences:
- group: velero.io
kind: BackupStorageLocation
jsonPointers:
- /status
sources: sources:
- repoURL: https://vmware-tanzu.github.io/helm-charts - repoURL: https://vmware-tanzu.github.io/helm-charts
chart: velero chart: velero
@@ -33,6 +39,7 @@ spec:
- CreateNamespace=true - CreateNamespace=true
- PrunePropagationPolicy=foreground - PrunePropagationPolicy=foreground
- PruneLast=true - PruneLast=true
- RespectIgnoreDifferences=true
retry: retry:
limit: 5 limit: 5
backoff: backoff:

View File

@@ -1,6 +1,9 @@
# Velero Helm Values # Velero Helm Values
# Chart: https://github.com/vmware-tanzu/helm-charts/tree/main/charts/velero # Chart: https://github.com/vmware-tanzu/helm-charts/tree/main/charts/velero
# Skip CRD upgrade job (avoids kubectl image dependency)
upgradeCRDs: false
# Image configuration # Image configuration
image: image:
repository: velero/velero repository: velero/velero
@@ -68,6 +71,14 @@ configuration:
# Restore only mode (for disaster recovery) # Restore only mode (for disaster recovery)
restoreOnlyMode: false restoreOnlyMode: false
# Disable BackupStorageLocation validation (user only uses manual backups)
# This prevents status updates that trigger ArgoCD refreshes
storeValidationFrequency: 0s
# Disable backup-sync controller (user only uses manual backups)
# This prevents lastSyncedTime updates that trigger ArgoCD refreshes
disableControllers: backup-sync
# Credentials for S3 access (from Vault via External Secrets) # Credentials for S3 access (from Vault via External Secrets)
credentials: credentials:
useSecret: true useSecret: true