-
-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ci.jenkins.io fails to delete stashed artifacts with Access Denied #3643
Comments
Thanks for reporting! It was already in the task list of "things to fix on ci.jenkins.io caught while working on #3535": better with an issue ❤️
|
Update:
|
Stashes deletion by the artifact-manager-s3 plugin disabled, after ci.jenkins.io controller restart buil are correctly discarded, we saw an immediate reduction of 6GB on its storage. Keeping this issue open so we can either allow the plugin to delete items on S3, or either put in place a cleanup mechanism outside ci.jenkins.io |
Not sure if I mentioned this elsewhere, but it is deliberate that stashes and artifacts are in distinct top-level folders, so that you can more easily apply distinct collection policies in S3. |
An issue has been created for the garbage collector: #3663 Closing this issue as ci.jenkins.io error is resolved. |
Service(s)
ci.jenkins.io
Summary
I see a lot of log spam on ci.jenkins.io of this form:
This seems worrisome to me, because if artifacts are not being deleted, then we are probably leaking them but still paying for them.
Reproduction steps
Run a
jenkinsci/bom
build and watch the Jenkins service log on ci.jenkins.io.The text was updated successfully, but these errors were encountered: