Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

StorageBucket crd support for customTime conditions #309

Closed
Muni10 opened this issue Nov 20, 2020 · 5 comments
Closed

StorageBucket crd support for customTime conditions #309

Muni10 opened this issue Nov 20, 2020 · 5 comments
Labels
enhancement New feature or request

Comments

@Muni10
Copy link

Muni10 commented Nov 20, 2020

Describe the feature or the resource that you want.
I can see from the crd that there is currently no support for customTimeBefore and daysSinceCustomTime in the lifecycleRules for storage buckets created with cnrm. Are there any plans to make this available?

@Muni10 Muni10 added the enhancement New feature or request label Nov 20, 2020
@ramrock93
Copy link

+1

@toumorokoshi
Copy link
Contributor

Hi! Thanks for filing the request.

I've added an issue in our internal tracker. Regarding timeline, would you mind elaborating on what this is blocking for you?

If you have a ballpark as to whether this is a blocker, and if so what type of scenarios it's blocking, that would be great.

@Muni10
Copy link
Author

Muni10 commented Nov 27, 2020

We would like to control documents in the storage bucket by setting the custom time so when we have finished processing a document we can delete it using the custom time marker. This is to ease handling and maintenance of the bucket. As for blocking, there are workarounds as handling all deletion specifically in the application. As cnrm is controlling the bucket, there is no simple way to override cnrms settings for the bucket in the application, which means we would have to delete documents one by one for all applications using buckets. With custom time implemented we could make this available for all buckets in our deployment mechanism. So this is not blocking, but rather a very useful feature.

@maqiuyujoyce
Copy link
Collaborator

Hi @Muni10 , thank you for elaborating your scenario. We will take it into consideration when we prioritize the work. Will let you know if there is any update.

@jcanseco
Copy link
Member

jcanseco commented Jan 6, 2021

Hi all, these are now supported in KCC v1.34.0.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

5 participants