-
Notifications
You must be signed in to change notification settings - Fork 912
Closed
Labels
bughancementIt's kind of a bug, but mostly an enhancement.It's kind of a bug, but mostly an enhancement.needs investigationIt looks as though have all the information needed but investigation is requiredIt looks as though have all the information needed but investigation is required
Description
Hi,
I've been testing Redpanda for while now. I'm currently running a Redpanda Cloud managed cluster, serverless, on AWS us-east-1. When managing Connect secrets, I realized that deleted secrets are actually marked for deletion. Corresponding names cannot be reused short term. I suspect that AWS Secrets Manager is used behind the scene and that some recovery window is set. If that is indeed the case, can some of the options below be considered:
- Change the default recovery window or give the ability to set it? If I'm right, said window is currently 7 days at least.
- Not set any recovery window.
- Allow for manual purge of secrets or permanently deletion of Connect secrets, either through the UI, some CLI, or both.
Makes sense? I guess that by hosting Redpanda myself I would have more flexibility on hand but, for testing purposes and POC, Redpanda Cloud remains my preferred option.
Thanks,
Metadata
Metadata
Assignees
Labels
bughancementIt's kind of a bug, but mostly an enhancement.It's kind of a bug, but mostly an enhancement.needs investigationIt looks as though have all the information needed but investigation is requiredIt looks as though have all the information needed but investigation is required