-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[KEP-1979] COSI: mirror the Retain policy of PVCs/PVs for BucketClaims/Buckets #4204
Comments
/sig storage |
With PVs this is solved as follows AFAIK: They can only be reclaimed after an admin removed the claimRef from the PV. Though there doesn't seem to be any fine-grain access control, i.e., after an admin removed the claimRef from the PV, it can be claimed in any namespace by any PVC (with the correct volumeName set). |
It seems to me that the improvement to the spec is to the workflow available to the admin persona. While the improvement is minor, I think it is still an impactful improvement to make to allow the admin to not have to do manual Bucket creation for re-claiming a bucket/blob. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Enhancement Description
k/enhancements
) update PR(s):k/k
) update PR(s):k/website
) update PR(s):Please keep this description up to date. This will help the Enhancement Team to track the evolution of the enhancement efficiently.
Discussion prompt
The first v1alpha1 spec defines Bucket deletion policy behavior as below:
A Rook user pointed out today that this behavior (which is mirrored by lib-bucket-provisioner) does not follow in the same trend as Kubernetes PVCs/PVs. When a Kubernetes PVC is deleted and its retention policy is "Retain", the PV remains after deletion. An admin is then responsible for cleaning it up. Ref: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#retain
The CSI spec, being independent of Kubernetes itself, does not seem to have the concept of retention built-in, unless I am looking in the wrong places. Ref: https://github.com/container-storage-interface/spec/blob/master/spec.md#deletevolume
This behavior defined by COSI is not wrong, but I believe it may be worth revisiting and discussing in more detail. I think COSI's intent is largely to mirror usage patterns that are familiar to users/consumers (i.e., PVC/PV) while also mirroring familiar patterns to developers/implementers (i.e., CSI). The COSI design mirrors both PVC/PV and CSI interfaces.
Should COSI mirror the PVC/PV user-facing usage here, or should it continue with the current behavior?
Arguments for mirroring PVC/PV behavior:
Arguments for keeping the current behavior:
There are middle-ground options that also exist. It could be useful to specify different types of retention policies for COSI. For example "RetainData" represent the current behavior while "Retain" (or "RetainResources") could represent PVC/PV-mirroring behavior.
@wlan0 @xing-yang
The text was updated successfully, but these errors were encountered: