-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cnvm: Delete old snapshots on startup #3143
Conversation
Pulling change out of elastic#3143 to ease reviewing. This is the result of running ```shell hermit upgrade mockery just validate-mocks ``` Reason is that old mockery complains about go 1.22's syntax ```go for i := range 10 { ... } ```
Pulling change out of #3143 to ease reviewing. This is the result of running ```shell hermit upgrade mockery just validate-mocks ``` Reason is that old mockery complains about go 1.22's syntax ```go for i := range 10 { ... } ```
Upgrade mockery (#3144) Pulling change out of #3143 to ease reviewing. This is the result of running ```shell hermit upgrade mockery just validate-mocks ``` Reason is that old mockery complains about go 1.22's syntax ```go for i := range 10 { ... } ``` (cherry picked from commit 7d838d1) Co-authored-by: Orestis Floros <orestis.floros@elastic.co>
for _, tag := range snap.Tags { | ||
if aws.ToString(tag.Key) == "Name" { | ||
return strings.HasPrefix(aws.ToString(tag.Value), snapshotPrefix) | ||
} | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Since we are already querying already the snapshots here:
Filters: []types.Filter{
{
Name: aws.String("tag:Name"),
Values: []string{fmt.Sprintf("%s-*", snapshotPrefix)},
},
},
Do we need this piece of filtering?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We need to filter for time anyway so the name check is there just as a sanity check.
type contextualChan[T any] struct { | ||
ch chan T | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[ just sharing thoughts - not suggesting to change it ]
I wonder which one of "wrapper struct vs just generic functions", is leaner in that case.
eg instead of a wrapper just having something like that
func SendToChannel[T any](ctx context.Context, ch chan<- T, t T) bool
func ReadFromChannel[T any](ctx context.Context, ch <-chan T) (T, bool)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wanted to completely avoid exposing the channel to prevent misusing it. Both can be valid approaches if direct access to the channel is needed.
### Summary of your changes Change CNVM to add a background job cleaning up old snapshots. The logic here is: 1. Background routine is started. Since the amount of leftover snapshots can be quite high (e.g. 40k in our account), 3 cleanup workers are used 2. `IterOwnedSnapshots()` is called which goes over all snapshots, returning an iterator. Snapshots are selected if: 1. They are more than 48 hours old 2. They have a tag with key "Name" and value starting with "elastic-vulnerability" 3. They are "self-owned" 3. Cleanup returns. On context cancelled, no extra grace period is added so the process doesn't block restarts/shutdown. ### Screenshot/Data Deleted 1178 snapshots from `2025-03-25T16:17:08.384Z` to `2025-03-25T16:20:19.504Z` ### Related Issues Closes #3105 Closes https://github.com/elastic/sdh-security-team/issues/1168 ### Checklist - [x] I have added tests that prove my fix is effective or that my feature works - [x] I have added the necessary README/documentation (if appropriate) #### Introducing a new rule? No (cherry picked from commit 8860b9d)
cnvm: Delete old snapshots on startup (#3143) ### Summary of your changes Change CNVM to add a background job cleaning up old snapshots. The logic here is: 1. Background routine is started. Since the amount of leftover snapshots can be quite high (e.g. 40k in our account), 3 cleanup workers are used 2. `IterOwnedSnapshots()` is called which goes over all snapshots, returning an iterator. Snapshots are selected if: 1. They are more than 48 hours old 2. They have a tag with key "Name" and value starting with "elastic-vulnerability" 3. They are "self-owned" 3. Cleanup returns. On context cancelled, no extra grace period is added so the process doesn't block restarts/shutdown. ### Screenshot/Data Deleted 1178 snapshots from `2025-03-25T16:17:08.384Z` to `2025-03-25T16:20:19.504Z` ### Related Issues Closes #3105 Closes https://github.com/elastic/sdh-security-team/issues/1168 ### Checklist - [x] I have added tests that prove my fix is effective or that my feature works - [x] I have added the necessary README/documentation (if appropriate) #### Introducing a new rule? No (cherry picked from commit 8860b9d) Co-authored-by: Orestis Floros <orestis.floros@elastic.co>
Summary of your changes
Change CNVM to add a background job cleaning up old snapshots.
The logic here is:
IterOwnedSnapshots()
is called which goes over all snapshots, returning an iterator. Snapshots are selected if:Screenshot/Data
Deleted 1178 snapshots from
2025-03-25T16:17:08.384Z
to2025-03-25T16:20:19.504Z
Related Issues
Closes #3105
Closes https://github.com/elastic/sdh-security-team/issues/1168
Checklist
Introducing a new rule?
No