Return-Path: X-Original-To: apmail-activemq-users-archive@www.apache.org Delivered-To: apmail-activemq-users-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id DA65E10DC3 for ; Thu, 20 Feb 2014 01:57:49 +0000 (UTC) Received: (qmail 68157 invoked by uid 500); 20 Feb 2014 01:57:49 -0000 Delivered-To: apmail-activemq-users-archive@activemq.apache.org Received: (qmail 68119 invoked by uid 500); 20 Feb 2014 01:57:48 -0000 Mailing-List: contact users-help@activemq.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: users@activemq.apache.org Delivered-To: mailing list users@activemq.apache.org Received: (qmail 68066 invoked by uid 99); 20 Feb 2014 01:57:48 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 20 Feb 2014 01:57:48 +0000 X-ASF-Spam-Status: No, hits=-0.7 required=5.0 tests=RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of chirino@gmail.com designates 209.85.216.50 as permitted sender) Received: from [209.85.216.50] (HELO mail-qa0-f50.google.com) (209.85.216.50) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 20 Feb 2014 01:57:44 +0000 Received: by mail-qa0-f50.google.com with SMTP id cm18so2014853qab.9 for ; Wed, 19 Feb 2014 17:57:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:content-type; bh=COM4DgoFNDAEwk+fUWRsRFl6HH+8OHwIE5XBgoPuPhQ=; b=VW1S9wB8tPZDU915jvzHDY/Mn8Kwys6t7bQqTLv7ZqhtJsqh3rIKXqrXlforacuxvR ZP1E9qx5MxDbPlq7h0NDtaqEipvqZ4LREZunFHt/v9lGyStelfYc0J+dL800SIU2jy4Q 7pgHYRavNZZrg24FqT7baziEOuc6TwkNmakH7K8KjoEqUKDicRkNeHXe5J5RtHVXa/8T AsAjJBPUtiYxDy9O3RGjoDm0O/f2GPC9nwodyWEWD+jl4zaxgL7vE1SSDWYLkkUY6Hdc WRj4TGgaBSs9KtAYXHB0GeuzEjZqAJ36uQgPGox9rWv/CayG8Iq87y7Nwec48OTxAXqv egSw== MIME-Version: 1.0 X-Received: by 10.140.95.179 with SMTP id i48mr52354100qge.1.1392861443505; Wed, 19 Feb 2014 17:57:23 -0800 (PST) Sender: chirino@gmail.com Received: by 10.140.43.202 with HTTP; Wed, 19 Feb 2014 17:57:23 -0800 (PST) In-Reply-To: <1386605680874-4675294.post@n4.nabble.com> References: <1386605680874-4675294.post@n4.nabble.com> Date: Wed, 19 Feb 2014 20:57:23 -0500 X-Google-Sender-Auth: amkpSLVTjiRj1WxATZlTa9elrao Message-ID: Subject: Re: Any way to protect from corruption being replicated in LevelDB? From: Hiram Chirino To: users Content-Type: text/plain; charset=ISO-8859-1 X-Virus-Checked: Checked by ClamAV on apache.org On Mon, Dec 9, 2013 at 11:14 AM, pwalker wrote: > Having a quick look it doesn't seem like ReadOptions are used for this > function so no verifyChecksums flag is passed in right? > Yep.. perhaps we should. > Was hoping that on initialization of the masterLevelDBClient we would be > able to validate the datastore at that point and if it was invalid fall > over? It might be impractical to check for all corruption at startup since that might significantly delay the startup process. > Is that the expected behavior of those parameters or is it completely > distinct from the replication process as they are used in the non-replicated > leveldb adapter as well? The replication bits added to leveldb replicate files at the block level and don't really check the integrity of the files it's transferring. Perhaps if we do detect consistency problem with a master we should just stop replication and mark it's data files as being inconsistent so that it does not try to become a master in the future. That still would require that one of the slaves data files be consistent to be able to recover from the failure. -- Hiram Chirino Engineering | Red Hat, Inc. hchirino@redhat.com | fusesource.com | redhat.com skype: hiramchirino | twitter: @hiramchirino