Friday, 2020-04-24

openstackgerritTim Burke proposed openstack/swift master: WIP: s3api: Check whether versioning is enabled more  https://review.opendev.org/72255200:21
timburkelol! forgot about needing to address https://review.opendev.org/#/c/571021/ ...00:28
patchbotpatch 571021 - swift - fix s3api functional tests - 1 patch set00:28
*** gyee has quit IRC01:40
*** psachin has joined #openstack-swift03:21
openstackgerritMatthew Oliver proposed openstack/swift master: WIP: PLaying around with a basic shard-cleanup tool  https://review.opendev.org/72257003:42
mattoliverau^ that's just a POC and very much WIP. But kinda works.03:43
mattoliverautimburke: ^^03:43
mattoliveraunow I've been distracted enough, I need to go do some work :)03:43
openstackgerritTim Burke proposed openstack/swift master: Add stable/ussuri upgrade job  https://review.opendev.org/72257104:14
*** evrardjp has quit IRC04:35
*** evrardjp has joined #openstack-swift04:35
openstackgerritMerged openstack/swift stable/ussuri: func tests: Allow test_etag_quoter to be run multiple times  https://review.opendev.org/72251104:39
mattoliverauNow that's I've done the BIG HAMMER approach, next I'll try the misplaced objects gentle approach ;)04:40
timburkei thought you'd been distracted enough already :P04:48
openstackgerritMatthew Oliver proposed openstack/swift master: WIP: PLaying around with a basic shard-cleanup tool  https://review.opendev.org/72257005:14
mattoliverauI have been :S but this is more interesting :)05:15
mattoliverautimburke: ^^ there is a the next version. Much smaller and less hammer like.05:15
mattoliveraujust uses the root_container.05:15
mattoliverauBesides having a solution to clean up the shards in a root table will obviously be handy when we move to auto-sharding.05:19
*** rcernin has quit IRC06:27
*** rcernin has joined #openstack-swift06:29
*** ccamacho has joined #openstack-swift06:37
openstackgerritMerged openstack/swift master: Add experimental job to upgrade from master  https://review.opendev.org/72216006:51
*** rpittau|afk is now known as rpittau07:17
*** rcernin has quit IRC07:35
*** ccamacho has quit IRC07:47
*** ccamacho has joined #openstack-swift07:48
*** dtantsur|afk is now known as dtantsur08:17
*** tkajinam has quit IRC08:24
*** dtantsur is now known as dtantsur|brb09:15
openstackgerritIvan Kolodyazhny proposed openstack/python-swiftclient master: Fixed capability discovery endpoint hardcode  https://review.opendev.org/72239509:51
*** rpittau is now known as rpittau|bbl10:12
*** psachin has quit IRC10:14
*** dtantsur|brb is now known as dtantsur11:14
*** rpittau|bbl is now known as rpittau12:13
viks____hi, does account/container ratelimiting work with s3api? anyone has any idea?13:43
zaitcevI don't see a connection. Ratelimit literally puts the request into sleep with eventlet.sleep(). The only potential issue is it ratelimits subrequests.15:49
timburkethere's a bit of conflict with wanting to have ratelimit ahead of auth (so you don't burn resources figuring out whether the user is authorized just to find that they're ratelimited) but also after s3api (so you know what account/container you're rate-limiting)15:58
timburkefollowing https://review.opendev.org/#/c/697535/ s3api should emit sane responses if ratelimit is right of s3api16:00
patchbotpatch 697535 - swift - s3api: Better handle 498/429 responses (MERGED) - 1 patch set16:00
timburkeso... maybe? i wouldn't say it's been widely tested16:06
openstackgerritTim Burke proposed openstack/swift master: Add stable/ussuri upgrade job  https://review.opendev.org/72257116:17
zaitcevSo, suggestions in etc/proxy-server.conf-sample are correct and up-to-date.16:26
*** dtantsur is now known as dtantsur|afk16:29
*** evrardjp has quit IRC16:35
*** evrardjp has joined #openstack-swift16:35
*** rpittau is now known as rpittau|afk16:41
timburkeidk -- i'm not entirely convinced that `... s3api ratelimit auth ...` will work correctly :-/16:48
timburkelike, *maybe* it will if the account's clients are all-S3 or all-Swift, but i'm not sure that bimodal access will have unified rate limiting16:49
timburkealso, with all the subrequests s3api makes, i'm not even sure that's a good idea -- i'm pretty sure ratelimit will consider the subrequests as having the same "weight" as a client request16:53
*** rdejoux has quit IRC17:01
viks____zaitcev: timburke  Thanks... To test, i had changed like this in my local cluster:17:40
viks____in proxy server conf:17:40
viks____```17:40
viks____max_sleep_time_seconds = 217:40
viks____container_ratelimit_10 = 117:40
viks____```17:40
viks____and my pipeline looks like:17:40
viks____```17:40
viks____pipeline = catch_errors gatekeeper healthcheck proxy-logging cache etag-quoter container_sync bulk formpost tempurl ratelimit crossdomain authtoken s3api s3token keystoneauth staticweb container-quotas account-quotas slo dlo versioned_writes symlink proxy-logging ceilometer proxy-server17:40
viks____```17:40
viks____I get 'HTTP/1.1 498 Rate Limited' for swift requests for some requests  when did a parallel requests but not for parallel requests using awscli. I'll do more testing and get back with more details if possible on monday17:40
timburkeyeah, with ratelimit left of s3api, it will no-op following https://review.opendev.org/#/c/540092/ (prior to that, it'd try to get account/container info and litter your logs with 404s or 400s)17:44
patchbotpatch 540092 - swift - ratelimit: ignore requests with invalid API versions (MERGED) - 2 patch sets17:44
timburkewell, no-op *for s3 requests* that is17:44
viks____timburke: oh!! so should it be placed after `s3api s3token`.. what do you suggest?17:46
viks____Also,  for a bulk delete s3api request, i.e. https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteObjects.html, will this ratelimit apply?17:53
*** mvkr has quit IRC18:49
*** mgagne has joined #openstack-swift19:52
*** mvkr has joined #openstack-swift20:16
-openstackstatus- NOTICE: The Zuul project gating service is reporting new patches in merge conflict erroneously due to a configuration error, fix in progress20:21
*** ccamacho has quit IRC20:51
timburkeviks____, i'm realizing that what i *really* want is to have ratelimit left of s3api, but install a callback in the environment that s3api can call once it actually knows what account/container the request is targetting. *maybe* that won't really be known until it hits the auth middleware though :-/21:26
timburkespeaking of s3api, i'm realizing that i want p 668064 ahead of p 72255221:26
patchbothttps://review.opendev.org/#/c/668064/ - swift - Give internal clients the option of getting contai... - 4 patch sets21:26
patchbothttps://review.opendev.org/#/c/722552/ - swift - WIP: s3api: Check whether versioning is enabled more - 1 patch set21:26
openstackgerritTim Burke proposed openstack/swift master: s3api: Check whether versioning is enabled more  https://review.opendev.org/72255222:06
openstackgerritTim Burke proposed openstack/swift master: Give internal clients the option of getting container HEADs from memcache  https://review.opendev.org/66806422:10
openstackgerritTim Burke proposed openstack/swift master: obj: _finalize_durable may succeed even when data file is missing  https://review.opendev.org/72212822:40
-openstackstatus- NOTICE: the This Zuul outage was taken as an opportunity to perform an impromptu maintenance for changing our service deployment model; any merge failures received from Zuul between 19:40 and 20:20 UTC were likely in error and those changes should be rechecked; any patches uploaded between 20:55 and 22:45 UTC were missed entirely by Zuul and should also be rechecked to get fresh test results22:58

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!