Wednesday, 2017-10-11

*** mat128 has quit IRC00:12
tdasilvakota_, timburke: hello, what's the update on swift3?00:29
*** wes_dillingham has joined #openstack-swift00:33
claygUPDATE: swift3 is awesome (but not as awesome as kota_ or timburke)00:33
timburketdasilva: i landed the last outstanding patch kota_ wanted before cutting a release earlier today. i left some comments on the authors/changelog patch he has up. i also proposed https://review.openstack.org/#/c/509321/ (which soft-deps on https://review.openstack.org/#/c/510715/ -- it doesn't really *work* until you have a swift that supports it, but it doesn't break any worse, either) because i've got internal pressures for support f00:43
timburkeor long-running uploads and patches-against-swift3 seem as good a way as any to make sure that we *eventually* get patches-against-s3api-in-swift00:43
patchbotpatch 509321 - swift3 - Support long-running multipart uploads00:43
patchbotpatch 510715 - swift - Fix bulk heartbeating when emitting XML00:43
timburkeer, no, not that swift patch...00:45
timburkehttps://review.openstack.org/#/c/509306/00:46
patchbotpatch 509306 - swift - Let clients request heartbeats during SLO PUTs00:46
timburkeyeah, that's the one :-)00:46
*** tovin07_ has joined #openstack-swift00:53
*** mingyu has joined #openstack-swift00:53
*** mingyu has quit IRC00:59
*** gyee has quit IRC01:08
*** mat128 has joined #openstack-swift01:11
*** abhitechie has quit IRC01:24
*** mat128 has quit IRC01:42
*** abhitechie has joined #openstack-swift01:47
*** psachin has joined #openstack-swift01:51
kota_thx timburke! I'll address the comments on the change log.02:10
kota_soon02:10
kota_tdasilva: btw, would you attend tomorrow meeting? I'd like to get updates (or collect past discussion) for symlinks.02:12
*** Shatadru|Gone is now known as Shatadru02:13
*** Shatadru is now known as Shatadru|coffee|02:13
*** catintheroof has joined #openstack-swift02:20
*** jlvillal has quit IRC02:21
*** jlvillal has joined #openstack-swift02:21
*** catintheroof has quit IRC02:22
*** Shatadru|coffee| is now known as Shatadru02:23
*** mat128 has joined #openstack-swift02:42
*** Shatadru is now known as Shatadru|afk02:47
*** tovin07_ has quit IRC02:48
kota_timburke: I pushed the new version for swift3 changelog!02:53
kota_timburke: https://review.openstack.org/50447902:53
patchbotpatch 504479 - swift3 - Change log updates for version 1.1202:53
*** mingyu has joined #openstack-swift02:56
*** mingyu has quit IRC02:56
*** links has joined #openstack-swift02:57
*** mingyu has joined #openstack-swift02:59
*** mingyu has quit IRC02:59
*** mingyu has joined #openstack-swift03:04
*** mingyu has quit IRC03:10
*** mingyu has joined #openstack-swift03:13
*** mat128 has quit IRC03:13
*** mingyu has quit IRC03:14
*** mingyu has joined #openstack-swift03:14
*** kei_yama has quit IRC03:38
*** abhitechie has quit IRC03:43
*** guimaluf has quit IRC03:46
*** guimaluf has joined #openstack-swift03:49
*** kei_yama has joined #openstack-swift04:01
*** tovin07_ has joined #openstack-swift04:07
*** mingyu has quit IRC04:09
*** mat128 has joined #openstack-swift04:12
*** guimaluf has quit IRC04:13
*** mingyu has joined #openstack-swift04:15
*** guimaluf has joined #openstack-swift04:19
*** Shatadru|afk is now known as Shatadru04:23
*** abhitechie has joined #openstack-swift04:24
*** mingyu has quit IRC04:32
*** mingyu has joined #openstack-swift04:32
*** gyee has joined #openstack-swift04:34
*** mat128 has quit IRC04:44
*** SkyRocknRoll has joined #openstack-swift04:49
*** wes_dillingham has quit IRC04:58
*** torgomatic has quit IRC05:07
*** gyee has quit IRC05:10
*** mingyu has quit IRC05:11
*** mingyu has joined #openstack-swift05:12
*** tone_zrt has joined #openstack-swift05:13
*** tone_z has quit IRC05:14
*** gkadam has joined #openstack-swift05:15
*** ChubYann has quit IRC05:18
*** HCLTech-SSW has joined #openstack-swift05:19
*** mingyu has quit IRC05:25
*** mingyu has joined #openstack-swift05:32
*** abhitechie has quit IRC05:34
*** mingyu has quit IRC05:36
*** abhitechie has joined #openstack-swift05:38
*** mat128 has joined #openstack-swift05:43
*** cshastri has joined #openstack-swift05:49
*** cbartz has joined #openstack-swift06:12
*** mat128 has quit IRC06:14
*** hoonetorg has quit IRC06:17
*** abhitechie has quit IRC06:18
*** abhinavtechie has joined #openstack-swift06:18
*** spectr has quit IRC06:27
*** klrmn has quit IRC06:28
*** spectr has joined #openstack-swift06:28
*** hoonetorg has joined #openstack-swift06:30
*** abhitechie has joined #openstack-swift06:32
*** mingyu has joined #openstack-swift06:33
*** abhinavtechie has quit IRC06:35
*** mingyu has quit IRC06:38
*** HCLTech-SSW has quit IRC06:39
*** hseipp has joined #openstack-swift06:55
*** openstackgerrit has quit IRC07:03
*** rcernin has joined #openstack-swift07:05
*** geaaru has joined #openstack-swift07:10
*** oshritf has joined #openstack-swift07:11
*** mat128 has joined #openstack-swift07:12
*** pcaruana has joined #openstack-swift07:13
*** oshritf has quit IRC07:17
*** tesseract has joined #openstack-swift07:19
*** abhitechie has quit IRC07:28
*** openstackgerrit has joined #openstack-swift07:41
openstackgerritOpenStack Proposal Bot proposed openstack/swift master: Imported Translations from Zanata  https://review.openstack.org/51000007:41
*** mat128 has quit IRC07:44
*** openstackgerrit has quit IRC07:48
*** itlinux has joined #openstack-swift07:52
acolesclayg: torgomatic: hits all the right buttons for me ;)07:58
acolesgood morning07:59
acolestimburke: mattoliverau thanks for your comments on shrinking idea07:59
*** itlinux has quit IRC08:04
*** pcaruana has quit IRC08:27
*** abhitechie has joined #openstack-swift08:28
*** oshritf has joined #openstack-swift08:29
*** pcaruana has joined #openstack-swift08:31
*** m_kazuhiro has joined #openstack-swift08:35
*** kei_yama has quit IRC08:36
*** spectr has quit IRC08:40
*** ianychoi has quit IRC08:42
*** mat128 has joined #openstack-swift08:43
*** spectr has joined #openstack-swift08:50
*** oshritf has quit IRC08:58
*** oshritf has joined #openstack-swift09:00
*** ianychoi has joined #openstack-swift09:06
*** mat128 has quit IRC09:15
*** dr_gogeta86 has joined #openstack-swift09:16
*** dr_gogeta86 has quit IRC09:16
*** dr_gogeta86 has joined #openstack-swift09:16
*** abhitechie has quit IRC09:33
mattoliverauacoles: np, I like the idea. I am thinking of another potential edge case.. but haven't finished thinking it through. But what happens if 1 primary shard is way off, so the sharder on the node it lives, finds it, sends a stats update for that shard range.. which is small enough (or somehow massively small, if that could happen) which could trigger a shrink.09:38
mattoliverauI guess it'll just mean the merged shards would cleave again.. which is fine09:39
mattoliverauSo not really a show stopper.. but trying to think it through. I mean I expect it to happen but would assume containers are only out of sync a bit.. but is there a case when there way out, a failed cleave maybe.09:40
acolesmattoliverau: we could put back in some of the quorum stuff you had i.e. root fires off HEADs to all candidate shrink replicas before committing to shrink09:40
mattoliverauYeah09:40
mattoliverauBut maybe it doesn't matter09:40
*** mvk has quit IRC09:40
acolesmattoliverau: the quorum thing could be a sanity check after the root makes its decision based on local info09:41
mattoliverauI mean yeah we'll have some extra movement that maybe shouldn't have happened.. but is that so bad09:41
mattoliverauYeah that's true, let the shards confirm maybe09:41
mattoliverauAnd delete the range if required09:42
acolesit's a valid concern. maybe for first cut we can ignore and accept a shrink/cleave might occur, then optimise09:42
mattoliverauWould the accepter be able to back out09:42
mattoliverauYeah09:43
mattoliverauI think trying to back out and rollback add too much complexity, when in reality, how likely is it09:43
acolesbacking out decisions at the root is something I'd like to ponder more09:43
acolesthink I had some comments in the patch about *not* updating the shard timestamps but maybe having just a 'window' of time during which usage updates are frozen assuming a shrink is occurring , rather then permanently ignoring all updates from replicas that have not yet shrunk/merged...just in case the shrink/merge never happens09:45
acolesmattoliverau: the two win I was hoping for are 1. to be able to reason over the process more easily since it is driven from root rather than autonomous neighbour negotiations (imagine debugging multiple neighbour pairs shrinking concurrently) - timburke comment re probe test is also very pertinent and 2. to make shrinking actually be a cleave event -> less code09:48
*** abhitechie has joined #openstack-swift09:48
mattoliverauYeah, I love both those reasons. Especially the cleave only.. shards can only do one thing, cleave. Smart and awesome idea. Much better then what I had!09:49
acolesmattoliverau: new ideas always benefit from the wealth of thinking that has gone before!09:52
-openstackstatus- NOTICE: The CI system will be offline starting at 11:00 UTC (in just under an hour) for Zuul v3 rollout: http://lists.openstack.org/pipermail/openstack-dev/2017-October/123337.html10:09
*** mat128 has joined #openstack-swift10:14
*** tovin07_ has quit IRC10:14
*** MeltedLux has quit IRC10:16
*** m_kazuhiro has quit IRC10:18
*** oshritf has quit IRC10:19
*** oshritf has joined #openstack-swift10:21
*** MeltedLux has joined #openstack-swift10:21
*** oshritf has quit IRC10:22
*** early has quit IRC10:29
*** abhitechie has quit IRC10:31
*** early has joined #openstack-swift10:32
*** abhitechie has joined #openstack-swift10:32
*** openstackgerrit has joined #openstack-swift10:43
openstackgerritKota Tsuyuzaki proposed openstack/swift master: WIP: Move swift-drive-audit code to swift/cli/drive_audit  https://review.openstack.org/51120510:43
openstackgerritHCLTech-SSW proposed openstack/swift master: Add ability to undelete an account.  https://review.openstack.org/50780810:43
kota_I spent today as bug triage work but I did write tests and cleanup to reach out A BUG :/10:43
kota_and the work is still WIP at patch 511205 :/10:44
patchbothttps://review.openstack.org/#/c/511205/ - swift - WIP: Move swift-drive-audit code to swift/cli/driv...10:44
*** mat128 has quit IRC10:45
*** abhitechie has quit IRC10:48
acoleskota_: nice10:54
*** oshritf has joined #openstack-swift10:58
*** skudlik has joined #openstack-swift10:59
cbartzHello, anybody here to take a look on bug 1712507 ?11:03
openstackbug 1712507 in python-swiftclient "add tempurl auth for object operations" [Undecided,New] https://launchpad.net/bugs/171250711:03
*** itlinux has joined #openstack-swift11:05
*** mvk has joined #openstack-swift11:12
*** hoonetorg has quit IRC11:21
*** hoonetorg has joined #openstack-swift11:34
*** Shatadru is now known as Shatadru|Gone11:38
*** spectr has quit IRC11:44
*** spectr has joined #openstack-swift11:46
*** mat128 has joined #openstack-swift11:50
*** spectr-RH has joined #openstack-swift11:54
*** m_kazuhiro has joined #openstack-swift11:56
*** spectr has quit IRC11:57
m_kazuhirotdasilva: acoles: Are you here now? (If this message is duplicated, I'm sorry. I had trouble in my irc client.)11:58
*** dancn has joined #openstack-swift12:08
*** itlinux has quit IRC12:10
*** spectr-RH has quit IRC12:13
dancnhi, I here just to ping on https://review.openstack.org/#/c/473862/ because I saw remix_tj request of recheck.  It was meant to be a really simple patch to review, every step (apart of users creation) require only a cut and paste without changing anything.  The test should take no more than 3 minutes on a working OS installation.   Feel free to suggest me a better aproach in patch submission. Tnx12:13
patchbotpatch 473862 - swift - Add full working example of sharing a container wi...12:13
*** spectr has joined #openstack-swift12:13
*** itlinux has joined #openstack-swift12:14
*** spectr-RH has joined #openstack-swift12:14
remix_tjdancn: hi i've a fresh swift setup here, i'll try today12:15
remix_tjwas a recheck only to trigger again jenkins jobs that seems to be failing without any apparent issue12:15
dancnremix_tj: tnx, feel free to ping if required!12:16
remix_tjsure12:16
*** mat128_ has joined #openstack-swift12:17
*** spectr has quit IRC12:18
*** wes_dillingham has joined #openstack-swift12:18
*** openstackgerrit has quit IRC12:18
*** mat128 has quit IRC12:19
kota_acoles: thx12:33
acolesm_kazuhiro: hi12:34
*** itlinux has quit IRC12:35
m_kazuhiroacoles: hi12:35
*** itlinux has joined #openstack-swift12:35
m_kazuhiroacoles: I want to discuss about symlink behavior in container listing in tomorrow meeting. And I saw you discussed about that with kota in last week.12:36
acolesm_kazuhiro: ok, yes I remember discussing that with kota_12:36
kota_m_kazuhiro: hi12:36
kota_and acoles ;)12:37
m_kazuhirokota_: hi12:37
acolesm_kazuhiro: did you add it to the meeting agenda?12:37
m_kazuhiroacoles: yes. And I made etherpad page for it. I want you to read it and I want get your opinion.12:38
m_kazuhiroacoles: The etherpad page is https://etherpad.openstack.org/p/swift_symlink_remaining_discussion_points12:38
acolesm_kazuhiro: item 1 on that etherpad?12:39
m_kazuhiroacoles: Yes.12:40
*** oshritf has quit IRC12:41
acolesm_kazuhiro: is one of the strategies implemented in the current patch?12:41
acolesis it 'etag; symlink_path' ?12:41
m_kazuhiroacoles: Yes. In current implementation. symlink_path info is included in etag.12:42
acolesok. yes I will try to read that before the meeting. thanks for writing it up.12:42
remix_tjdancn: ok, works! the only issue i'm experiencing is that openrc file generated by horizon has an incomplete OS_AUTH_URL (missing version)12:43
remix_tjdancn: but is not a swift issue :-)12:43
*** catintheroof has joined #openstack-swift12:43
m_kazuhiroacoles: Thank you! If you have questions, please write them on the etherpad. I will try to answer them.12:45
acolesm_kazuhiro: ok12:45
kota_m_kazuhiro: thx for preparing the etherpad, I'll also read it.12:49
m_kazuhirokota_: Thank you!12:49
* kota_ is now at home so no time constraint to do anything12:49
m_kazuhiroacoles: kota_: Now, I have to go home. See you next meeting.12:51
kota_good night m_kazuhiro12:52
m_kazuhirokota_: good night!12:52
*** m_kazuhiro has quit IRC12:54
-openstackstatus- NOTICE: Due to unrelated emergencies, the Zuul v3 rollout has not started yet; stay tuned for further updates13:06
*** mat128_ has quit IRC13:14
tdasilvagood morning13:17
acolestdasilva: good morning13:17
kota_good morning tdasilva13:17
tdasilvaacoles, kota_: hello! :)13:18
tdasilvalooks like there was a good discussion on symlinks....catching up....13:19
kota_tdasilva: i also am catching up too, though :P13:21
*** zhurong has joined #openstack-swift13:21
kota_tdasilva: will you attend the meeting today? m_kazuhiro will bring the symlink topic there.13:23
tdasilvakota_: yes, i'm planning to be there13:23
kota_tdasilva: good to hear!13:24
dancnremix_tj: nice! thanks again13:27
dancnas571213:28
dancnsorry wrong focus :(13:28
*** itlinux has quit IRC13:36
*** jistr is now known as jistr|mtg13:38
*** peluse has joined #openstack-swift13:45
pelusehey swifters, anyone got their ears on?13:45
tdasilvapeluse!!!13:46
pelusewhat up man??13:46
tdasilvagood to see you around here!13:46
*** mat128 has joined #openstack-swift13:46
pelusehope things are kicking ass there... I am working on http://spdk.io for the last few months and someone just proposed a Swift interaction!13:46
acolespeluse !?!13:46
peluseHere's their proposal: https://trello.com/c/6eCUC0zC/69-blobkv-uses-swift-as-a-target-system13:46
peluseacoles, howdy!!13:46
kota_hey peluse!13:47
peluseHi kota_ !13:47
* peluse missed these swift people :)13:47
*** mat128 has quit IRC13:48
peluseI can sum up SPDK pretty quick, it's a whole bunch of user mode stuff meant to be used in a single storage node to basically make storage go faster by using userpsace polled mode drivers, mainly NVMe (there's a bunch of other misc stuff too but that's the main thing for this proposal)13:48
acolespeluse: that's interesting. it's likely that diskfile API may get some more attention/abstraction to support the lots-of-small-file work that's going on13:49
*** mat128 has joined #openstack-swift13:49
pelusehmmm...13:49
pelusealso, here's a talk I did at SDC last month that's more about a different module in SPDK but has some high level pics and a few perf claims.. https://www.snia.org/sites/default/files/SDC/2017/presentations/Solid_State_Stor_NVM_PM_NVDIMM/Luse_Paul_Verma_Vishal_SPDK_Blobstore_A_Look_Inside_the_NVM_Optimized_Allocator.pdf13:50
pelusehow much has diskfile evolved in the last few eyars?13:50
acolespeluse: since EC, not a huge amount IIRC13:52
acolesbut we talked at last face to face about breaking out a better abstraction of the lower level read/write operations (to filesystem or to something else...) from the semantics of what is latest valid data, metadata etc13:53
peluseacoles, OK cool thanks.  hard to dust off the cobwebs and get a feel for myself as to how feasible or attractive this might be to Swift.  I'll go look at some code and see if that helps.  In the meantime if you guys could think about that's be great.  I'll check back in tonight or you can find me or a few others on #spdk here in freenode13:53
acolespeluse: oh, we did away with separate durable files to save inodes but that's not a huge change13:54
peluseyeah, that's what I can't picture off the top of my head, how low level the abstraction is/was and what kind of effort, beyond the py wrappers for this stuff, this would13:54
acolespeluse: you know the best way to blow away those cobwebs is to do some reviews :P13:54
peluseinteresting.... that's cool13:55
peluseLOL!13:55
peluseI've been in C for the last 6 months and am still forgetting to free memory that I allocated ;)13:55
*** links has quit IRC13:56
acolesbut you *want* people to buy more memory right? ;)13:57
pelusewe want people to but the latest/greatest/fastest CPUs and SSDs for sure13:57
peluseoh, I get it now...13:58
peluseits still early in Phoenix :)13:58
acoleshehe13:58
acolespeluse: are you hosting the 1st spdk hackathon?13:59
peluseyup13:59
peluseSwift-style too!13:59
*** cbartz has left #openstack-swift14:00
peluse(minus the beer bus, no budget for that this year)14:00
acolesare you going to have a crazy bus with rocking horses ?14:00
pelusehaha14:00
acolesoh, no beer bus :(14:00
*** jistr|mtg is now known as jistr14:00
acolesI was just about to check flights, no point now14:00
pelusethat was fun for sure.... ahh, the good ole days14:00
kota_yeah, that was funtastic14:02
*** spectr-RH has quit IRC14:04
*** chlong has joined #openstack-swift14:04
*** spectr has joined #openstack-swift14:04
*** SkyRocknRoll has quit IRC14:06
peluseand actually there are a few potential avenues for SPDK+Swift.  One, the trello proposal above, is 100% relevant to the SDC preso link I pasted in as it would use blobstore in place of XFS along with poled mode NVMe14:16
jrichlisounds like I missed out on the rocking horses!  Hey peluse!14:16
pelusea second, not mentioned in the proposal, would be just to use the polled mode NVMe driver14:16
peluseHi jrichli!14:16
pelusewas that a rocking horse or a saddle? I dunno, clayg would remember....14:16
jrichlihaha14:17
pelusehey, I gotta bolt.  Will check in w/you guys later this week!!14:17
jrichlio/14:17
*** zhurong has quit IRC14:29
*** mvk has quit IRC14:39
*** spectr has quit IRC14:43
*** mweshi has joined #openstack-swift14:50
* kota_ is done to read the new symlink etherpad and added some comments and questions14:52
kota_and is heading for my bed to get good sleep for tomorrow morning meeting.14:53
tdasilvathanks kota_ !14:55
claygIt was just saddles. There was no rockin horse on a bus...14:55
*** spectr has joined #openstack-swift14:57
jrichliawe ...14:57
*** acoles has left #openstack-swift14:58
*** acoles has joined #openstack-swift14:58
*** ChanServ sets mode: +v acoles14:58
acolesok saddle it was14:59
kota_https://photos.app.goo.gl/PrD8iKn7eNJswmg5314:59
kota_not sure, it was saddle or horse (looking at my photo album at google)14:59
*** mat128 has quit IRC14:59
acoleskota_: nice!15:00
jrichliomg, that ceiling is great!  Thanks for sharing kota_ !15:00
acolespeluse: ^^15:00
acoleswhat needs to be pointed out is the lack of windows which is fun at 20mph and hair-raising at 60mph15:00
*** cshastri has quit IRC15:01
kota_good night15:01
jrichligood night15:02
*** psachin has quit IRC15:02
tdasilvadefinitely a fun ride.15:02
acoleskota_: good night15:03
*** chlong has quit IRC15:06
*** links has joined #openstack-swift15:11
tdasilvaacoles, kota_ I'm not sure I understand the concerns regarding adding symlink path to container listings15:13
tdasilvawe did something that was very similar to what crypto did, because it had already been proven and simple to implement15:13
tdasilvawe did discuss making bigger modification that would require a database change in the containers, but we opted for a simpler change for now15:14
*** SkyRocknRoll has joined #openstack-swift15:15
tdasilvagoing over kota_ comments on review now see if I can understand things better15:15
*** klrmn has joined #openstack-swift15:18
*** gyee has joined #openstack-swift15:33
*** chlong has joined #openstack-swift15:37
*** mweshi has quit IRC15:39
acolestdasilva: I think kota_ is concerned about etags being returned to the client with the symlink path if symlink middleware is removed15:40
acoleswhereas if it were in content-type it might be considered less of a problem for that to leak out ? IDK?15:41
*** gkadam has quit IRC15:44
*** chlong has quit IRC15:51
*** pcaruana has quit IRC15:59
*** rcernin has quit IRC15:59
acolestdasilva: I think I prefer using etag if the problem of the symlink info leaking can be fixed15:59
acolesunless symlink target might ever change on a POST in which case it's messy wherever it goes16:01
*** wes_dillingham has quit IRC16:06
*** klrmn has quit IRC16:07
*** openstackgerrit has joined #openstack-swift16:09
openstackgerritAlistair Coles proposed openstack/swift feature/deep: Replicate deleted shard ranges  https://review.openstack.org/51128216:09
acolestimburke: mattoliverau ^^ might help with shrinking16:10
*** chlong has joined #openstack-swift16:10
*** itlinux has joined #openstack-swift16:11
timburkegood morning16:17
tdasilvaacoles: changing target with a POST is not allowed, user must issue a new PUT16:25
acolestdasilva: yes, that's what I thought. I was just thinking out loud the implications of that ever changing.16:26
* acoles afk16:27
*** hseipp has quit IRC16:28
timburkedo we generally think of it as a problem when SLOs turn into small(ish) JSON data when you take SLO out of the pipeline? it seems like trying to disable features after you've started using them is just generally a Bad Ideaâ„¢16:29
*** dja has quit IRC16:32
*** d0ugal has quit IRC16:35
*** wes_dillingham has joined #openstack-swift16:37
tdasilvatimburke: agree16:37
*** SkyRocknRoll has quit IRC16:38
tdasilvatdasilva: same for crypto...the idea that we should protect ourselves from users adding and removing middleware at will is a bit of news to me...16:39
* tdasilva is getting lunch, brb...16:40
*** SkyRocknRoll has joined #openstack-swift16:44
*** dja has joined #openstack-swift16:44
*** chlong has quit IRC16:48
*** links has quit IRC16:54
*** SkyRocknRoll has quit IRC16:57
*** d0ugal has joined #openstack-swift16:57
timburketdasilva: crypto's a bit of a special case though -- it's like adding a storage policy, we really *really* expect that you're never taking it out completely. you can disable encryption of *new* objects, but we have an assumption that you still want to read existing data17:01
*** klrmn has joined #openstack-swift17:03
*** tesseract has quit IRC17:15
*** links has joined #openstack-swift17:27
openstackgerritTim Burke proposed openstack/swift feature/deep: Replicate deleted shard ranges  https://review.openstack.org/51128217:35
openstackgerritTim Burke proposed openstack/swift feature/deep: Shard ranges don't need storage policies  https://review.openstack.org/51131017:35
*** torgomatic has joined #openstack-swift17:38
*** ChanServ sets mode: +v torgomatic17:38
*** itlinux has quit IRC17:40
*** geaaru has quit IRC17:44
acolestimburke: thanks for that fixup17:50
timburkeacoles: i *think* it's fair? not really sure why it wasn't inheriting from the main broker class... and also not sure how/whether test_db_replicator should handle other_items...17:51
*** links has quit IRC17:53
tdasilvanotmyname: just fyi, i've updated the launchpad bug trends graph...17:58
notmynamethanks17:59
notmyname... where did I host that ....17:59
tdasilvaheh17:59
acolestimburke: I promise I ran tox before I pushed that test. it seems I ignored the negative result though :/18:01
acoless/test/patch/18:01
timburkeheh. no worries18:02
notmynametdasilva: since I've already got it running, what's the docker command to restart with the updated code?18:05
tdasilvanotmyname: I believe you will need to rebuild your docker container, right?18:05
tdasilvai mean, i guess I could throw a container up on Docker registry and that would make things easier for you18:06
notmynamelooks like I need to restart the box anyway18:06
tdasilvaok, i think you really just need to run this: docker build --rm -t lp_report:dev .18:07
notmynametdasilva: I did that. and the run command. and `docker ps` shows nothing at all18:12
tdasilvadocker ps --all18:13
notmynameah. ImportError: No module named dateutil.relativedelta18:14
tdasilvaooops..sorry18:15
tdasilvaone sec18:16
notmynamenp18:16
notmynamehttps://pypi.python.org/pypi/python-dateutil/18:16
notmynameinstall that one?18:16
tdasilvanotmyname: yeah, need to add that to requirements.txt18:18
tdasilvajust pushed the change to github18:18
notmynamenice!18:20
notmynameit looks good. and the very recent trend is down :-)18:20
*** d0ugal has quit IRC18:24
*** gyee has quit IRC18:27
*** gyee has joined #openstack-swift18:29
timburkei'm not sure it's calculating correctly... try switching to the six-month view, then just look at new bugs -- i really expected to see some dips :-/18:36
tdasilvanotmyname: after updating that I noticed that the number really apply to the time range.18:37
tdasilvatimburke: maybe that's what you are seeing too ??18:37
*** gyee has quit IRC18:37
tdasilvaso for the 6 months, it will count new bugs that were opened in these 6 months18:38
*** gyee has joined #openstack-swift18:38
tdasilvawe closed or confirmed a bunch of 'New' bugs that were older than 6 months, so the dip doesn't show up in the 6 months graph18:38
*** gyee has quit IRC18:39
timburkebut even looking at all time, just New is (or seems to be) non-decreasing18:39
timburkeas is just Incomplete18:40
tdasilvayou can see that clearly in the graph below too...outoing for the week of 9/24 (6months graph) shows 1118:40
timburkeOpen goes up and down...18:40
tdasilvabut for all time it is 2118:41
tdasilvatimburke: oh i see what you are saying...18:42
timburkei wonder if it's looking at the *current* status only, not the historical statuses?18:42
timburkebut then i don't know why open and in-progress go up & down18:43
tdasilvatimburke: at least it does match the number here: https://snag.gy/cSX2MG.jpg18:44
*** gyee has joined #openstack-swift18:45
tdasilvatimburke: ahh...I think you might have hinted at the right problem. I remember that I added New to the graph because it was not there before, so maybe the calculation is wrong for New (i.e., just lloking at 'current' value)18:45
tdasilvatimburke: will look further18:45
notmynametdasilva: tim and I were just saying that it would be really cool to put up this graph on the tv on the wall in the office18:49
*** ChubYann has joined #openstack-swift18:50
tdasilvaheh, cool18:50
notmynamehowever, since that's a ... what's the opposite of a "headless" system? ... kiosk! ... since that's a kiosk, I can't do much with the display since they don't have linkable URLs18:50
*** wes_dillingham has quit IRC18:53
*** wes_dillingham has joined #openstack-swift18:57
pelusekota_, just checked out the photos, nice!!19:14
*** mvk has joined #openstack-swift19:18
*** oshritf has joined #openstack-swift19:19
*** mat128 has joined #openstack-swift19:31
*** gyee has quit IRC19:31
*** gyee has joined #openstack-swift19:51
*** gyee has quit IRC19:57
*** itlinux has joined #openstack-swift20:03
*** wes_dillingham has quit IRC20:06
notmynameanyone having issues setting up an all in one today?20:14
notmynameclarkb: do you know anything about any dependency changes that may have been upgraded in the last 24 hours that break things? I'm thinkin setuptools, pbr, disutils, etc20:20
*** m_kazuhiro has joined #openstack-swift20:21
clarkbI dont know of those changing recently20:22
notmynameok20:22
tdasilvanotmyname: testing ansible-saio to see if I run into any issues...20:26
notmyname"pkg_resources.RequirementParseError: Invalid requirement, parse error at "'; python'""20:28
notmynamesome requirements somewhere has "cffi (>=1.7); python_implementation != 'PyPy'"20:31
notmynamein a requirements file20:31
notmynamebut not swift20:31
notmynamesome dependency somewhere20:31
notmynameupgrading setuptools "fixes" it20:34
notmynamebut20:34
notmynameit doesn't answer what's broken20:34
notmynamesomething somewhere added the "; ..." into a requirements file so it doesn't work with distro version of setuptools20:42
notmynameah. looks like something related to cryptography20:45
timburkeidk... they seem to do a pretty sane thing: https://github.com/pyca/cryptography/blob/2.1/setup.py#L38-L4520:53
kota_good morning20:57
mattoliverauMorning20:58
notmynamemeeting time21:00
notmynamewooo21:00
*** catintheroof has quit IRC21:02
kota_oops? I missed coloring at symlink etherpad?21:03
clarkbnotmyname: ya the environment marker support is newer but not that new, couple years maybe21:08
notmynameclarkb: right, but in the last 24 hours some transitive dependency has broken stuff. the distro version of setuptools doesn't support the env marker21:09
*** joeljwright has joined #openstack-swift21:15
*** ChanServ sets mode: +v joeljwright21:15
*** mat128 has quit IRC21:28
*** oshritf has quit IRC21:32
acoleskota_: m_kazuhiro export/import of the etherpad loses the author colours :(21:35
kota_acoles: yeah, i also tried that and sigh :/21:36
*** wes_dillingham has joined #openstack-swift21:45
tdasilvaacoles: maybe authors can add their name to the beginning where they commented21:50
acolestdasilva: yes, I'll try to annotate my comments that way21:50
tdasilvakota_, m_kazuhiro if you have time, can you summarize the issue 1? Container listing with symlinks?21:51
m_kazuhirotdasilva: OK21:51
m_kazuhiroIn current symlink implementation, if clients GET container and the container contains symlinks, the container listing will include symlink_path information.21:53
m_kazuhiroAbout that, I think there are 2 discussion points.21:53
m_kazuhiroDiscussion points 1 is "Is this function is needed or not?". I think we need to discuss use case for the function.21:54
* kota_ is still here to join this discussion21:54
m_kazuhiroDiscussion point 2 is "If we implement the function, how to contain the symlink_path information in container DB?".21:55
tdasilvam_kazuhiro: I think you listed one use case which was auto-tiering. But I think another use case is that users that are doing container listing would like to know how to differentiate between a regular object and a symlink object21:55
tdasilvasymlink objects are 'special' in that they are not regular objects, so it would be nice to be able to differentiate them in a container listing21:56
kota_I think, the key issue is where we should save the symlink path info (we cannot find the design decision anywhare). For my eyes, the hash space in the object table looked painful because we won't be able to remove in the future forever.21:56
kota_and back to the question "why we need this functionality (i.e. symlink path in the object listing)"21:57
* acoles is hanging around for a while21:57
kota_the point 1 from m_kazuhiro is from the history.21:57
tdasilvakota_: I think the decision was really made over IRC, which I agree is not good. But I remember we discussed several options and ended up on that one for it's simplicity, since that's what we already do for crypto21:58
tdasilvaso we know how it works21:58
kota_in particular, a bunch of code is written for only for the object listing (e.g. SymlinkConatinerContext) ...21:58
timburkethe converse to "we won't be able to remove in the future forever" is that if we don't do it now, we probably never will, because we'd never be able to rely on it being there21:59
acolestimburke: +121:59
tdasilvaI don't understand 'won't be able to remove in the future forever?21:59
kota_timburke: yup, that's why we're bringing to get consensus for the design (and future functionality) goal22:00
kota_bringing the issue to here.22:00
acoleskota_: what is your concern with using the etag/hash field? is it the possibility of symlink middleware being removed and the etag returned to clients being invalid?22:01
acolesor other concern?22:01
kota_acoles: a couple of things22:01
kota_acoles: the first may be easy to solve, downgrade compatibility.22:02
kota_as well as, removing symlink middleware, it will break any object listing once symlink deployed, create symlink, then downgraded.22:02
kota_perhaps, just set "Upgrade Impact" tag in the commit message might be ok, though.22:03
acoles'break object listing' because there is a weird hash value?22:04
kota_yes22:04
torgomaticIs it necessary to know a symlink's target in the container listing, or is it enough to know that an object is a symlink but without knowing its target?22:05
tdasilvatorgomatic: the decision to add the target was just a 'if we need to add a flag, let's add information that can be useful'22:06
kota_torgomatic: idk, as m_kazuhiro said above, for now, we don't have special use case for now.22:07
tdasilvainstead of just adding 'symlink=yes'22:07
*** joeljwright has quit IRC22:07
tdasilvaI like the analogy of doing a file listing on my terminal22:08
tdasilvasymlinks are treated special22:08
torgomatictdasilva: fair enough. I'm questioning that first "if". Swift setting the content-type to "swift/symlink" (or something like that) would tell the user which objects are symlinks without also telling their targets, but I think (and I could be wrong) that it's possible to set the Content-Type without any changes to container listing code22:08
timburkekota_: what was our approach for slo? if you try to downgrade and remove slo from your pipeline, bad/weird things are going to happen if you created some SLOs in the meantime...22:08
torgomatictdasilva: heh, I'm using that same analogy in my head... with Content-Type only, that gives us the equivalent of NFS's ReadDirPlus operation22:09
timburketorgomatic: content-type will change on POST22:09
torgomaticto determine a symlink's target, you lstat() it, and that's analogous in my mind to an object HEAD22:09
acolesbut on POST the object stops being a symlink correct?22:09
kota_timburke: it could be weird. perhaps, just fair reason enough to go the current way :/22:10
tdasilvaacoles: what do you mean?22:10
acoleswhat happens to the symlink target sysmeta when you POST to a symlink?22:11
tdasilvaacoles: it remains, because it is a sysmeta22:11
kota_acoles: the idaa is strategy 2 on the etherpad (about Line 59)22:11
tdasilvatorgomatic: I was thinking more like a `ls -l`22:11
timburkeacoles: my understanding was that on POST we apply whatever metadata we got (because we have to; we don't know whether there may have been another PUT we haven't heard about), but the symlink is still a symlink22:11
tdasilvatimburke: correct22:12
kota_use Content-Type and accept user updates Content-Type via POST, and it changes symlink to a normal object22:12
acolestdasilva: timburke yep, got it, just catching up.22:12
tdasilvakota_: we wanted to avoid allowing user to change symlink with POST. if user wants to change to a normal object, then a new PUT is required22:13
torgomatictdasilva: which calls getdents() and then lstat() on each entry :)22:13
tdasilvaif they want to change target, a new PUT is required22:13
tdasilvatorgomatic: oic22:14
timburkeand everyone *loves* the behavior of `swift list --lh` :P22:14
timburkean extra request for each of 10k items is gonna suck22:15
tdasilvayep22:15
acoleskota_: updating content-type via post won't change symlink to normal object it would just lose the target info from container listing (without new code to fix it up like swift_bytes)22:16
m_kazuhiroacoles: correct.22:17
kota_and strategy 3 is for the problem, m_kazuhiro?22:17
timburkei'm 99% sure we can lose swift_bytes. i should go write that probe test...22:18
m_kazuhirokota_: Yes.22:18
acoleswhich seems undesirable - imagine writing the documentation for that22:18
kota_anyway, we need to hack container db/replicator to do this.22:18
mattoliverauI kinda like the idea of having the target in the listing because like tdasilva reminds me of ls -l. But it seems the problem is we now have more and more middleware wanting to add more special metadata to the object lines in a container database. And being middleware, there optional, at can be removed.22:18
kota_i know it's also impacted.22:18
kota_ok, we shouldn't follow the swift_bytes impl.22:18
timburkeone more reason to support https://review.openstack.org/#/c/504472/ :-)22:19
patchbotpatch 504472 - swift - Shorten typical proxy pipeline.22:19
kota_being back to my second concern, I was not sure *we can assume etag column for extra space to synchronized info with sysmeta". The question if from...22:19
mattoliverauSo 1, we'd need a way for core swift to ignore anything after the hash or content_type that starts with a ; like its treated as a comment.22:19
kota_can i add more info (outside from symlink) for future development?22:19
kota_e.g. some object acl/owner info for s3api compatibility22:19
mattoliveraumaybe we finally just need to try and add a metadata field (TEXT) per object row, that can simply store json, that middleware can utilise. Then it's up to them to use22:20
acolesideally I would think of container server removing everything after ';' in a hash and parsing for key value pairs that it drops into the json listing22:20
mattoliverauwith timburke's listing middleware, we can assume everything is json, so middlewares can append what they want themselves to the listing22:20
acolesor what mattoliverau says22:21
kota_mattoliverau: yeah, the extra filed may be better idea except we need more code change, rolling schema upgrading, etc...22:21
mattoliverauI know22:21
mattoliverauit kinda sucks and adds more work22:21
timburkeand the listing middleware would be a sensible place to drop22:22
timburke';...' strings from hashes...22:22
mattoliveraubut we've also have this discussion for what.. SLO, encryption and now symlinks.. we will need to do it again soon I'm sure22:22
tdasilvatimburke: i was thinking that too22:22
mattoliverauso when do we bite the bullet?22:22
acolestimburke: wfm too22:22
acolesmattoliverau: never :)22:22
mattoliveraulol22:23
kota_hehe22:23
timburkemattoliverau: we probably will have to eventually, but not for this. for the metedata lifecycle. we've got etag for object data/sysmeta lifecycle, content-type for its own particular lifecycle, but nothing for the rest of POST22:24
timburkeand god help us if we ever make sticky object metadata22:25
mattoliveraulol22:25
acolesI am nervous about attaching data-related state (symlink target) to content-type. swift_bytes did that and it was a pain to handle for fast-POST container updates. So I prefer using the hash field, if we can find a way prevent it ever leaking to clients.22:25
acolesbut that does not allow for kota_ 's downgrade scenario22:25
tdasilvaacoles: for the downgrade scneario, we could have the code in listing middleware to remove whatever comes after ';...' no?22:27
acolesand if we add a field for this, then that field is associated with *data* timestamp not metadata22:27
tdasilvai guess it would need to be there today??22:28
acolestdasilva: I understood kota_  to mean rolling back swift version - did I misunderstand? dropping symlink middleware is not hard to handle - yeah, do it in listing mware.22:28
kota_correct acoles22:28
timburkei'm not sure how a reasonable concern that is, though. again, just after slo was released, there was no sane way to downgrade if you already created slos22:29
kota_but i know we had have some non-downgrad-able changes in the past development-cycle so that perhaps, what we should do may be to describe the note somewhere.22:29
acoleswe also changed hashes.pkl in a non-downgradeable manner IIRC22:29
timburkei guess you could upgrade without enabling the new feature, then be able to roll back and be fine. but that's true here, too22:30
mattoliverauWell so long as something drops ;.. "today" or soon (maybe a point release). Then rollbacks should be ok if things are stored on the hash. I mean there could be symlinks objects in the cluster that don't work, but like timburke said, same with if you remove SLO middleware etc.22:31
mattoliverauand listing middleware sounds like the right place to append and strip to the listings. So cool? Unless we want a field, that sounds like the best approach.22:33
kota_mattoliverau, notmyname: fortunately, we will have new release soon (queen-1 milestone)? not sure :P22:33
timburke:-/ worse, you won't be able to *tell* that it was a symlink22:33
timburke(as compared with slo, that is)22:33
mattoliverautimburke: unless you used a symlink content type, but yeah22:34
timburkeeven if you did, you won't know where it pointed. maybe stuffing it in the container listing *is* helping...22:34
acolesfixing up hash in the listing mware also avoid upgrade ordering problem I think - vs doing it in container server22:35
timburke(whereas with slo, it falls back to some strange format of json, but when you pick it apart you can start to figure out what requests you need to make client-side)22:35
kota_so...22:40
kota_it seems like we're feeling "we want symlink info for object listing" for the m_kazuhiro's first question?22:41
mattoliverauyup, well I do :P22:41
kota_and then, using hash space to save it.22:41
kota_then, the current issue, where we should extract the info, A) symlink middleware, B) another middleware (listing format, gate keeper, or whatever), C) container-server22:42
tdasilvai think we will keep symlink mw extracting the symlink info, but then listing format should just do a cleanup of whatever is lleft after ;...22:43
timburkei'm really leaning toward keeping it all in symlink, without even a generic stripping mechanism in listings_format. we can call out the awkwardness if you later disable symlink, but i don't know that we should prevent it -- i'm pretty sure that'll be the only client-accessible way to get that info at that point22:45
mattoliverauyeah, mw's probably need to ability to make decisions on how to use there data (ie grab the real hash in crypto) or append.22:45
tdasilvakota_, m_kazuhiro: I am sorry, but I need to leave as I have family waiting for me...I will try to log-in as early as I can tomorrow so we can continue22:45
kota_tdasilva: np, thanks!22:46
m_kazuhirotdasilva: OK. Thank you!22:46
acolesI'm out too. good night everyone.22:46
m_kazuhiroFor downgrade issue, I think (C) container-server will be nice. Because, we can make etag cleanup patch for past releases (i.e. Pike, Ocata, Newton...).22:47
mattoliverauacoles, tdasilva: o/22:47
kota_acoles, tdasilva: good night!22:47
m_kazuhiroacoles: good night!22:48
mattoliveraubut how does the container server know what to do with the data? or do you mean anything appended to hash gets appending to the listing json format?22:48
m_kazuhiroI mean that extra values in etag will be removed.22:50
m_kazuhiroIn patch for past releases.22:50
m_kazuhiroSo, after ';' in etags of container listing will be removed in my idea.22:52
mattoliveraubut don't you need to know the target to append as the request comes back from the container-server, unless its all placed into a header as it comes back.22:53
timburkeidk, if i'm worried about going from X.0 -> Y.0, i don't think my rollback choice will be Y.0 -> X.122:54
kota_timburke: lol, it doesn't look rollback22:55
timburkeexactly22:55
m_kazuhiroOK. I see. Please forget my idea.22:55
mattoliverauI'm leaning toward symlink with potentially stripping in listing middleware (can't use gate keeper cause then it'll need to know how to potenually strip ;.. from xml as well if symlinks are removed).22:57
timburkei mean, you could still reasonably do something like X.0 -> X.1 -> Y.0 with an option at any point of rolling back to the previous known-good state. but you've doubled the validations you'll need to do22:57
kota_exatcly, backporting seems worse idea.22:58
mattoliveraumaybe do things in symlink and then we can add stripping ;.. anytime in the future (though maybe decided before next release?)22:58
mattoliveraubecause I feel the current road block is what to do. stripping of ;.. is something we can continue to discuss, but this at least moves forward.22:59
kota_k, so it seems accepting to give up the downgrade scenario and note it <- this seems reasonable to move forward.22:59
mattoliverauyup23:00
kota_and keeping the strip/translation of hash field in symlink mw23:00
kota_ok, sounds fine.23:00
mattoliverauI mean we can add stripping (if we decide) and we end up with weird objects that are only slightly worse then if you remove SLOs :)23:01
mattoliverau*SLO middleware.23:01
mattoliverauor we don't strip, but at least people know where things pointed (in the hash).23:01
kota_*and also Encryption middleware23:01
mattoliverau+123:01
m_kazuhiro+123:02
kota_m_kazuhiro: anyting else for now here?23:02
mattoliverauso stripping or not can be a continued discussion, whereas I think we want the target in listing, so do it, and append in symlink.23:03
kota_my family is now waiting breakfast :P23:03
m_kazuhiroUmm. There are 3 remaining topics in the etherpad page. But we can discuss them in the etherpad.23:03
m_kazuhiroSo I think there are no thing for now. If you have time, please read etherpad and add your opinions.23:04
mattoliverauwill do.23:04
kota_m_kazuhiro: could you explain briefly for the remaining topic?23:05
mattoliverauthanks m_kazuhiro for all the hard work23:05
kota_ah, ok you want to keep the discussion on the etherpad.23:05
m_kazuhirokota_: yes. because these topics are small. I think we can discuss them on etherpad.23:06
kota_kk23:06
m_kazuhiroeveryone: Thank you for your long discussion.23:07
* kota_ noticed it was about 1 hour.23:08
*** vint_bra has quit IRC23:11
kota_poke timburke to head up for https://review.openstack.org/#/c/504479/23:11
patchbotpatch 504479 - swift3 - Change log updates for version 1.1223:11
kota_will be back a few hours later at my office23:12
kota_see you23:12
*** kei_yama has joined #openstack-swift23:33
*** m_kazuhiro has quit IRC23:38
timburkekota_: when you get back, mind taking a look at my comments on https://review.openstack.org/#/c/345739/ ? S3 behaved the way i expected, at least in the us-west-2 bucket i usually use for testing such things...23:43
patchbotpatch 345739 - swift3 - Add support for more characters in header keys23:43
*** itlinux has quit IRC23:57

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!