Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pruning of BuildRun Objects #53

Open
gabemontero opened this issue Mar 4, 2020 · 7 comments
Open

Pruning of BuildRun Objects #53

gabemontero opened this issue Mar 4, 2020 · 7 comments
Labels
kind/feature Categorizes issue or PR as related to a new feature.

Comments

@gabemontero
Copy link
Member

openshift build v1 api today has fields that allow on a per build config basis the maximum amount of builds to keep in etcd.

Tekton has an unimplemented open features for this: tektoncd/pipeline#1334 , tektoncd/pipeline#1302 , and those also reference the upstream alpha feature around TTL for jobs/pods

build v2 tie in to the upstream tekton solution seems the long term solution

it that takes too long, do they want to build something akin to what exists in the build v1 controller for build v2?

@gabemontero gabemontero added the buildv1 Items with this label somehow pertain to getting equivalent buildv1 function in buildv2 label Mar 9, 2020
@qu1queee
Copy link
Contributor

@sbose78 so we want this? looks ideal to have from my side

@adambkaplan
Copy link
Member

Upstream Tekton supports manual pruning of TaskRun/PipelineRun via the tkn cli. Perhaps we can take a similar approach with our cli.

@adambkaplan adambkaplan added kind/feature Categorizes issue or PR as related to a new feature. and removed buildv1 Items with this label somehow pertain to getting equivalent buildv1 function in buildv2 labels Oct 29, 2020
@adambkaplan adambkaplan added this to the release-v1.0.0 milestone Oct 29, 2020
@adambkaplan adambkaplan changed the title pruning of build v2 Pruning of BuildRun Objects Oct 29, 2020
@qu1queee
Copy link
Contributor

qu1queee commented Nov 2, 2020

Another alternative is to control this per namespace. Kubernetes supports resource quotas( see https://kubernetes.io/docs/concepts/policy/resource-quotas/#object-count-quota ) for CRDs. However I dont think this approach is ideal for this issue. I think this needs to be worked on Tekton side, I will ask the Tekton community inside IBM for more information.

@gabemontero
Copy link
Member Author

Another alternative is to control this per namespace. Kubernetes supports resource quotas( see https://kubernetes.io/docs/concepts/policy/resource-quotas/#object-count-quota ) for CRDs. However I dont think this approach is ideal for this issue. I think this needs to be worked on Tekton side, I will ask the Tekton community inside IBM for more information.

I'll be curious what you hear on the Tekton/IBM side (and who precisely, as I may have interacted with some of the folks you talk to).

My high level interpretation over the last year of so:

  • they defer to manual / outside of the project efforts for this a la what @adambkaplan noted above
  • there was some hope a while back on working off of the upstream k8s efforts around Job pruning, but that has fizzled / now worked out (both upstream k8s and tekton)

@qu1queee
Copy link
Contributor

qu1queee commented Nov 3, 2020

@gabemontero yes, from Tekton ( mainly communicating with https://github.com/afrittoli ) side what they have is external ways for deleting existing resources, e.g.:

  • nightly CIs ( e.g. cronjob )
  • tkn provides that feature to delete resources ( e.g. we could reuse their go pkg for deleting )

but nothing related to a mechanism for pruning resources based on some threshold that was reached ( e.g. we exceed 100 taskruns per namespace ) .

We should continue using this issue to provide more ideas on how to achieve this for us.

@SaschaSchwarze0
Copy link
Member

Ship: shipwright-io/community#61

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Categorizes issue or PR as related to a new feature.
Projects
None yet
Development

No branches or pull requests

5 participants