Hi,
I've been testing Redpanda for while now. I'm currently running a Redpanda Cloud managed cluster, serverless, on AWS us-east-1. When managing Connect secrets, I realized that deleted secrets are actually marked for deletion. Corresponding names cannot be reused short term. I suspect that AWS Secrets Manager is used behind the scene and that some recovery window is set. If that is indeed the case, can some of the options below be considered:
- Change the default recovery window or give the ability to set it? If I'm right, said window is currently 7 days at least.
- Not set any recovery window.
- Allow for manual purge of secrets or permanently deletion of Connect secrets, either through the UI, some CLI, or both.
Makes sense? I guess that by hosting Redpanda myself I would have more flexibility on hand but, for testing purposes and POC, Redpanda Cloud remains my preferred option.
Thanks,
Hi,
I've been testing Redpanda for while now. I'm currently running a Redpanda Cloud managed cluster, serverless, on AWS
us-east-1. When managing Connect secrets, I realized that deleted secrets are actually marked for deletion. Corresponding names cannot be reused short term. I suspect that AWS Secrets Manager is used behind the scene and that some recovery window is set. If that is indeed the case, can some of the options below be considered:Makes sense? I guess that by hosting Redpanda myself I would have more flexibility on hand but, for testing purposes and POC, Redpanda Cloud remains my preferred option.
Thanks,