-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open discussion on Auto-Purge Policies design #1
Comments
This goes way beyond what I had anticipated for feature set and fully meets all of the scenario needs I had considered for our systems. So my comments are both "bravo", and "make it so!". |
Looks brilliant. Interested to know how exactly images would be marked under each policy (e.g. released). Possible API calls for this? PowerShell? 😁 |
Looks awesome guys, great work ! |
we haven't finalized the cli, but it would look something like: |
Would that be possible to define the policy as what is done in Preview for storage (https://docs.microsoft.com/en-us/azure/storage/common/storage-lifecycle-managment-concepts) e.g. with a JSON payload? Would be great. |
Is there any kind of potential release roadmap to this feature? This also meets all of my scenarios for registry maintenance, so if it is a "coming very soon" vs. a coming 2020, then it would save me from rolling my own. |
Hi Lampei, we are actively working on Auto purge. We’ll have some of the basics for a recycle bin and purging un-tagged images. We hope to have the full spec done by Q1 of 2019. |
Hi there, this looks great. Any plans to include helm charts for automated cleanup, since ACR supports those too? Thanks! |
Hi @brobichaud |
I'm heavily using the Azure UIs, the CLI not so much—setting the policies via a UI in Azure would be much appreciated |
Thanks Phil, |
Hi @SteveLasker, Not sure how in-depth AKS can get but I believe Helm info is stored as ConfigMaps inside of Kubernetes. So there would probably be a way to check that and figure out whether a chart is still in use. |
We use an auto incrementing build ID generated from Azure Pipelines, so we needed a quick way just to purge older images based on the tag ID. I wrote this quick shell script to purge images older than the 10th image. Could easily be modified just to require a "delete before x date" reference. https://github.com/jeffbeagley/azure_cr_purge/blob/master/retention.sh I believe an ideal retention policy would follow a behavior similiar to |
That's similar to the policy approach taken by https://github.com/fraunhoferfokus/deckschrubber and I think it works really well for common usecases. |
Is there any update to when this would be available in preview? |
@SteveLasker Is this still planned to be released in Q1 of 2019 ? |
We will have some more concrete updates for you in the next few days as we are currently going through a detailed analysis of our Feature asks and potential deliverables. |
Thanks, will be looking forward for an update. |
Here is a Powershell script to delete old images by some limit (count or create date) until this policy is released. |
Will there be an endpoint we can hit to mark an image as in-use outside of Azure? |
Yes. All the APIs will be available on ACR. We'll simply provide some experiences that automate these. |
I also am very anxious for this feature! |
It's almost end of Q2 now. Any updates on the preview / roadmap? |
Indeed, it's been so long I'd almost forgotten about this. Until I had to do my monthly manual purge, which is so very cumbersome and tedious... |
Any news on the progress of this? |
Awesome thanks! Do we report bugs here as well? The filter parameter doesn't seem to work |
Can I delete only the last n tags? I don't want a time window but a number of tags window. Like AWS has. Also, will this eventually make it into the portal UI like AWS has had for ages? |
Hi folks, |
@SteveLasker we do CI and tag our release images as e.g. build241, build242, etc. We want to keep the last e.g. 5 builds on the registry to roll back a version or two if necessary. So for us, it's sort by tag name descending and keep the top 5, delete everything else. This is the AWS UI, which I use for another project. It's not explicit, but it does exactly what I describe above. Maybe they do it by date. That would also work. To be honest, I'd even settle for doing it manually through the portal UI once a month if I could just select multiple images to be deleted. The one by one delete is insanely painful. |
ok, so you want to delete all but the most recent n. That makes much more sense. Please add a request at https://aka.ms/acr/uservoice for tracking. |
I've got auto-purge hooked up now through the tasks feature and it's working well for us so far. Totally saves me a bunch of manual effort! I'm pretty happy with this simple feature set for now, I'd just love to see it exposed more in the Azure Portal. Such as being able to view the scheduled tasks, all of their details, be able to add/update/delete them, and toggle them on/off. So far, well done! |
It seems right now auto-purge can only target a specific repository? Could we use wildcard for it?
|
Thanks @oysterkwok The concern is a wildcard would need the identity running the delete to have multi-repo permissions. Not a bad thing, but a concerning thing. If the identity doesn't have permissions, do we just report the failure? The other is accidental deletes. What if you accidentally delete something with too much scope permissions. We actually spend a lot of time answering requests to restore deleted images, repos and registries. We have a backlog item for a recycle bin so customers can do this themselves. But, you're point is valid, that you'd want broader control to delete things, without having to specify each repo. We're just taking a slower pace to this, to be more deliberate. We did just release a new untagged manifest policy, that isn't repo specific. |
Please provide any feedback to the Auto-Purge design: here
The text was updated successfully, but these errors were encountered: