Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id E14D5200BC1 for ; Wed, 16 Nov 2016 08:07:06 +0100 (CET) Received: by cust-asf.ponee.io (Postfix) id DFD05160B08; Wed, 16 Nov 2016 07:07:06 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 34D8A160B03 for ; Wed, 16 Nov 2016 08:07:06 +0100 (CET) Received: (qmail 60436 invoked by uid 500); 16 Nov 2016 07:07:05 -0000 Mailing-List: contact dev-help@tephra.incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@tephra.incubator.apache.org Delivered-To: mailing list dev@tephra.incubator.apache.org Received: (qmail 60421 invoked by uid 99); 16 Nov 2016 07:07:05 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd1-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 16 Nov 2016 07:07:05 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd1-us-west.apache.org (ASF Mail Server at spamd1-us-west.apache.org) with ESMTP id 0244DC1D8D for ; Wed, 16 Nov 2016 07:07:05 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd1-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -7.019 X-Spam-Level: X-Spam-Status: No, score=-7.019 tagged_above=-999 required=6.31 tests=[KAM_LAZY_DOMAIN_SECURITY=1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.999] autolearn=disabled Received: from mx1-lw-us.apache.org ([10.40.0.8]) by localhost (spamd1-us-west.apache.org [10.40.0.7]) (amavisd-new, port 10024) with ESMTP id 5n7R6KaoQCqV for ; Wed, 16 Nov 2016 07:07:04 +0000 (UTC) Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by mx1-lw-us.apache.org (ASF Mail Server at mx1-lw-us.apache.org) with SMTP id 1DC8F5FC5F for ; Wed, 16 Nov 2016 07:06:59 +0000 (UTC) Received: (qmail 60372 invoked by uid 99); 16 Nov 2016 07:06:58 -0000 Received: from arcas.apache.org (HELO arcas) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 16 Nov 2016 07:06:58 +0000 Received: from arcas.apache.org (localhost [127.0.0.1]) by arcas (Postfix) with ESMTP id 75BE92C0059 for ; Wed, 16 Nov 2016 07:06:58 +0000 (UTC) Date: Wed, 16 Nov 2016 07:06:58 +0000 (UTC) From: "Poorna Chandra (JIRA)" To: dev@tephra.incubator.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Commented] (TEPHRA-195) Store transaction state in HBase MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 archived-at: Wed, 16 Nov 2016 07:07:07 -0000 [ https://issues.apache.org/jira/browse/TEPHRA-195?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15669669#comment-15669669 ] Poorna Chandra commented on TEPHRA-195: --------------------------------------- Storing transaction state in HBase can be done by implementing an HBase table backed storage for {{TransactionStateStorage}} and {{TransactionLogWriter}} interfaces. To ensure data consistency, in addition to replicating transaction state we would have to make sure that a committed transaction is only visible in the destination cluster after all the tables that contain a write from that transaction have been replicated. Another approach for replication would be to build a replication mechanism into Tephra to replicate the transaction logs that transaction manager writes for every operation. We may have more control on determining the replicated state on the destination cluster in this case. Once we come up with the conditions that need to be met for the replicated data to be consistent, we can make a choice on which approach would satisfy the conditions. > Store transaction state in HBase > -------------------------------- > > Key: TEPHRA-195 > URL: https://issues.apache.org/jira/browse/TEPHRA-195 > Project: Tephra > Issue Type: Improvement > Reporter: James Taylor > Assignee: Poorna Chandra > > The transactional state (inflight and invalid transaction info) is stored in HDFS for Tephra making it difficult to provide the same disaster recovery guarantees that can be provided if the data was stored in HBase. Instead of writing directly to HDFS we should have an option to write to HBase instead. -- This message was sent by Atlassian JIRA (v6.3.4#6332)