Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 165A8200D2B for ; Thu, 2 Nov 2017 18:31:45 +0100 (CET) Received: by cust-asf.ponee.io (Postfix) id 14CB7160BE5; Thu, 2 Nov 2017 17:31:45 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 33EDE1609EB for ; Thu, 2 Nov 2017 18:31:44 +0100 (CET) Received: (qmail 33476 invoked by uid 500); 2 Nov 2017 17:31:43 -0000 Mailing-List: contact dev-help@hbase.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@hbase.apache.org Delivered-To: mailing list dev@hbase.apache.org Received: (qmail 33449 invoked by uid 99); 2 Nov 2017 17:31:42 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd3-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 02 Nov 2017 17:31:42 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd3-us-west.apache.org (ASF Mail Server at spamd3-us-west.apache.org) with ESMTP id 055AC1830EA for ; Thu, 2 Nov 2017 17:31:42 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd3-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 2.379 X-Spam-Level: ** X-Spam-Status: No, score=2.379 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=2, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RCVD_IN_SORBS_SPAM=0.5, SPF_PASS=-0.001] autolearn=disabled Authentication-Results: spamd3-us-west.apache.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mx1-lw-us.apache.org ([10.40.0.8]) by localhost (spamd3-us-west.apache.org [10.40.0.10]) (amavisd-new, port 10024) with ESMTP id N2m8WATmcXsR for ; Thu, 2 Nov 2017 17:31:40 +0000 (UTC) Received: from mail-qt0-f174.google.com (mail-qt0-f174.google.com [209.85.216.174]) by mx1-lw-us.apache.org (ASF Mail Server at mx1-lw-us.apache.org) with ESMTPS id C7CDA5F36D for ; Thu, 2 Nov 2017 17:31:39 +0000 (UTC) Received: by mail-qt0-f174.google.com with SMTP id p1so351399qtg.2 for ; Thu, 02 Nov 2017 10:31:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=AF0obWnJ4+/vSbcua2KhETXUhyzvBkwOlLmN21R6/UY=; b=GCpnhLVSx84mtFJBi/MIRuU3Weme5jWrB6hkg6qqUjxcqwJItU/psOxfmnoTUri+mT pY5GpvKFuFCnBSh7UK8/A26sds6Uhv1o83YGvCkVQqsGkwJCDmPudMJb3Bjf1y4YRaO7 vG0mwtKP0QLGpTXd1zJqMo0cp/04FHprpKY0N9vjS8OKiTWiVUMJ0qTEvs46OwYwOoTk xO0/i5qlIPOupNkDNgwc3bZ2eOkkf17D0aipxiL/8JWJCQcZXSAXeEk04UyBPFGaZObl Me/x5bcie9skN5J/q/R30rGTc17RU8hJYsoHanYW82MxkcsaSM+12DFTWceAAJdb/BTR xj+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=AF0obWnJ4+/vSbcua2KhETXUhyzvBkwOlLmN21R6/UY=; b=Wx+HC2N1eVaefMWNFGZSsb5zrsVL8hDyGWSrxMuMtyTZhA0tn4u20xCdGHDUKr+5VK DUEe/840t1FBDrwH1Rvl/dtcf2xICrXBkg1i6Ra1y5naOInMnQ1rcCbWrtchnpxw04pE rVYYr3/YzLUMjxomcKXJUaXIkoa1Nc2x92VFwsE57J76+nlNHflXKWEL/OWrItLgA+5I P9mfu+aFx5qa3kragOW/ktogGH3iHNsGAt844pvuTW7X05YxQZtnU+1DCBFqbgyKntXe 0/0EdSf1h98myyXtpKZ/B3w7ly0LkTo1PmXO4QndgKQVjVMc57NC+mgIr4syljqw+dkb FbeA== X-Gm-Message-State: AMCzsaXx/xnRWCeckQvfHDo+BAduPMEABGPyQZQ3bSv57suT5cB0VB/x cLjyFFbNsZs2e+74BMZhT8yh51mbxLDXX53RqoPIqq7o X-Google-Smtp-Source: ABhQp+TaiwgRvYb/7jUo/8h7JdUzeqHIVwiC7IoakJxmj/fDZwgeMxLp3wxhSqrKKwywi9gQxogjxTiz4kYXmyBj1Ig= X-Received: by 10.200.4.169 with SMTP id s41mr6271180qtg.212.1509643899256; Thu, 02 Nov 2017 10:31:39 -0700 (PDT) MIME-Version: 1.0 Received: by 10.12.178.216 with HTTP; Thu, 2 Nov 2017 10:31:38 -0700 (PDT) In-Reply-To: References: <855dbd28-bafe-4880-9f0d-22b208ef0bd4@apache.org> <6da8f37f-2f7a-186a-0216-b55d71f71d9b@apache.org> <7eb0abd3-e544-4242-3561-52ba582f99c4@apache.org> From: Vladimir Rodionov Date: Thu, 2 Nov 2017 10:31:38 -0700 Message-ID: Subject: Re: [DISCUSSION] Items to purge from branch-2 before we cut hbase-2.0.0-beta1. To: "dev@hbase.apache.org" Content-Type: multipart/alternative; boundary="f4030435ad345a4404055d035c85" archived-at: Thu, 02 Nov 2017 17:31:45 -0000 --f4030435ad345a4404055d035c85 Content-Type: text/plain; charset="UTF-8" >>To be clear, I wasn't listing requirements. I was having trouble with the >>absolute "There is no way to validate correctness of backup in a general >>case." I am waiting for response from feature requester on what they expect from verification. Until then, I would rephrase my statement: "I do not see how we can perform correct verification ..." On Thu, Nov 2, 2017 at 9:20 AM, Stack wrote: > On Thu, Nov 2, 2017 at 5:51 AM, Josh Elser wrote: > > > On 11/1/17 11:33 PM, Stack wrote: > > > >> On Wed, Nov 1, 2017 at 5:08 PM, Vladimir Rodionov com> > >> wrote: > >> > >> There is no way to validate correctness of backup in a general case. > >>> > >>> You can restore backup into temp table, but then what? Read rows > >>> one-by-one > >>> from temp table and look them up > >>> > >> > >> > >> in a primary table? Won't work, because rows can be deleted or modified > >>> since the last backup was done. > >>> > >>> > >>> Replication has a verity table tool. > >> > >> You can ask a cluster not delete rows. > >> > >> You can read at a specific timestamp. > >> > >> Or you could create backups during an extended ITBLL. When ITBLL > >> completes, > >> verify it on src cluster. Create a table from the increment backups. > >> Verify > >> in the restore. > >> > >> Etc. > >> > >> St.Ack > >> > > > > I can definitely see a benefit of a tool which verifies the data > collected > > for a backup which: > > > > 1. Is batch in nature > > 2. Is ad-hoc (not intrinsically run for every backup session) > > 3. Relies/is-built on existing tooling (snapshots or other > > verification-like code) > > > > Thanks Stack. I think this is some good teasing of requirements from an > > otherwise very broad and untenable problem statement that we started with > > (which lead to the knee-jerk). > > > > To be clear, I wasn't listing requirements. I was having trouble with the > absolute "There is no way to validate correctness of backup in a general > case." which is then seemingly being used to beat down any request for > verification tooling/testing that shows backup/restore works properly. > Good on you Josh, > S > --f4030435ad345a4404055d035c85--