Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[8.x](backport #3143) cnvm: Delete old snapshots on startup #3151

Merged
merged 1 commit into from
Mar 28, 2025

Conversation

mergify[bot]
Copy link

@mergify mergify bot commented Mar 28, 2025

Summary of your changes

Change CNVM to add a background job cleaning up old snapshots.

The logic here is:

  1. Background routine is started. Since the amount of leftover snapshots can be quite high (e.g. 40k in our account), 3 cleanup workers are used
  2. IterOwnedSnapshots() is called which goes over all snapshots, returning an iterator. Snapshots are selected if:
    1. They are more than 48 hours old
    2. They have a tag with key "Name" and value starting with "elastic-vulnerability"
    3. They are "self-owned"
  3. Cleanup returns. On context cancelled, no extra grace period is added so the process doesn't block restarts/shutdown.

Screenshot/Data

Deleted 1178 snapshots from 2025-03-25T16:17:08.384Z to 2025-03-25T16:20:19.504Z

Related Issues

Closes #3105
Closes https://github.com/elastic/sdh-security-team/issues/1168

Checklist

  • I have added tests that prove my fix is effective or that my feature works
  • I have added the necessary README/documentation (if appropriate)

Introducing a new rule?

No


This is an automatic backport of pull request #3143 done by Mergify.

### Summary of your changes

Change CNVM to add a background job cleaning up old snapshots.

The logic here is:
1. Background routine is started. Since the amount of leftover snapshots can be quite high (e.g. 40k in our account),  3 cleanup workers are used
2. `IterOwnedSnapshots()` is called which goes over all snapshots, returning an iterator. Snapshots are selected if:
    1. They are more than 48 hours old
    2. They have a tag with key "Name" and value starting with "elastic-vulnerability"
    3. They are "self-owned"
3. Cleanup returns. On context cancelled, no extra grace period is added so the process doesn't block restarts/shutdown.

### Screenshot/Data

Deleted 1178 snapshots from `2025-03-25T16:17:08.384Z` to `2025-03-25T16:20:19.504Z`

### Related Issues

Closes #3105
Closes https://github.com/elastic/sdh-security-team/issues/1168

### Checklist
- [x] I have added tests that prove my fix is effective or that my feature works
- [x] I have added the necessary README/documentation (if appropriate)

#### Introducing a new rule?
No

(cherry picked from commit 8860b9d)
@mergify mergify bot requested a review from a team as a code owner March 28, 2025 14:01
@mergify mergify bot added the backport label Mar 28, 2025
@orestisfl orestisfl merged commit 8cffd34 into 8.x Mar 28, 2025
9 checks passed
@orestisfl orestisfl deleted the mergify/bp/8.x/pr-3143 branch March 28, 2025 14:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant