Let’s do it. We can use the new branch to stabilize for release.

 I am back from vacation in two weeks and can then lend time and AWS resources 
for testing (and presumably fixing).

> On Aug 18, 2023, at 10:53 AM, 张铎 <palomino...@gmail.com> wrote:
> 
> HBASE-27947 has been resolved.
> 
> So I think now we are good to cut branch-2.6?
> 
> Another good news is we are also close to fix the WAL value
> compression issue in HBASE-28028.
> 
> Thanks.
> 
> Bryan Beaudreault <bbeaudrea...@apache.org> 于2023年6月23日周五 02:47写道:
>> 
>> Thanks!
>> 
>> We're looking into one other emergent issue that we uncovered during the
>> rollout of server side TLS on RegionServers. It seems nettyDirectMemory has
>> increased substantially when under load with it enabled. Details in
>> https://issues.apache.org/jira/browse/HBASE-27947.
>> 
>> 
>>> On Thu, Jun 22, 2023 at 12:02 PM 张铎(Duo Zhang) <palomino...@gmail.com>
>>> wrote:
>>> 
>>> PR is ready
>>> 
>>> https://github.com/apache/hbase/pull/5305
>>> 
>>> PTAL.
>>> 
>>> Thanks.
>>> 
>>> 张铎(Duo Zhang) <palomino...@gmail.com> 于2023年6月22日周四 21:40写道:
>>>> 
>>>> Ah, missed your last comment on HBASE-27782.
>>>> 
>>>> Let me take a look.
>>>> 
>>>> Netty has some rules about how the exceptions are passed through the
>>>> pipeline(especially the order, forward or backward...) but honestly I
>>>> always forget it just a day later after I finished the code...
>>>> 
>>>> Bryan Beaudreault <bbeaudrea...@apache.org> 于2023年6月17日周六 00:43写道:
>>>>> 
>>>>> In terms of TLS:
>>>>> 
>>>>> - All of our clients (many thousands) in production are using the
>>>>> NettyRpcConnection with TLS enabled. However, these clients are
>>> currently
>>>>> connecting to the RegionServer/HMaster through an haproxy process
>>> local to
>>>>> each server which handles SSL termination. So not quite end-to-end yet.
>>>>> - On the server side, most of our QA environment (a thousand
>>> regionservers
>>>>> and ~200 hmasters) are running it. So these are accepting TLS from
>>> clients
>>>>> and using TLS for intra-cluster communication.
>>>>> 
>>>>> The migration is tricky for us due to the scale and the fact that we
>>> need
>>>>> to migrate off haproxy at the same time. Hopefully we should have some
>>> of
>>>>> production running end-to-end TLS within the next month or so.
>>>>> 
>>>>> From what we've seen in QA so far, there have not been any major
>>> issues. We
>>>>> also couldn't discern any performance issues in testing, though we were
>>>>> comparing against our legacy haproxy setup and can't really compare
>>> against
>>>>> kerberos.
>>>>> 
>>>>> One outstanding issue is
>>> https://issues.apache.org/jira/browse/HBASE-27782,
>>>>> which we still see periodically. It doesn't seem to cause actual
>>> issues,
>>>>> since the RpcClient still handles it gracefully, but it does cause
>>> noise
>>>>> and may have implications.
>>>>> 
>>>>> On Fri, Jun 16, 2023 at 11:41 AM 张铎(Duo Zhang) <palomino...@gmail.com>
>>>>> wrote:
>>>>> 
>>>>>> So any updates here?
>>>>>> 
>>>>>> Do we have any good news about the TLS usage in production so we can
>>>>>> move forward on release 2.6.x?
>>>>>> 
>>>>>> Thanks.
>>>>>> 
>>>>>> Andrew Purtell <apurt...@apache.org> 于2023年4月7日周五 09:37写道:
>>>>>>> 
>>>>>>> Agreed, that sounds like a good plan.
>>>>>>> 
>>>>>>> On Wed, Mar 29, 2023 at 7:31 AM 张铎(Duo Zhang) <
>>> palomino...@gmail.com>
>>>>>> wrote:
>>>>>>> 
>>>>>>>> I think we could follow the old pattern when we cut a new release
>>>>>> branch.
>>>>>>>> That is, after the new release branch is cut and the new minor
>>> release
>>>>>> is
>>>>>>>> out, we will do a final release of the oldest release line and
>>> then
>>>>>> mark it
>>>>>>>> as EOL.
>>>>>>>> 
>>>>>>>> So here, I think once we cut branch-2.6 and release 2.6.0, we
>>> can do a
>>>>>>>> final release for 2.4.x and mark 2.4.x as EOL.
>>>>>>>> 
>>>>>>>> Thanks.
>>>>>>>> 
>>>>>>>> Bryan Beaudreault <bbeaudrea...@apache.org> 于2023年3月27日周一
>>> 09:57写道:
>>>>>>>> 
>>>>>>>>> Primary development on hbase-backup and TLS is complete. There
>>> are a
>>>>>>>> couple
>>>>>>>>> minor things I may want to add to TLS in the future, such as
>>>>>> pluggable
>>>>>>>> cert
>>>>>>>>> verification. But those are not needed for initial release IMO.
>>>>>>>>> 
>>>>>>>>> We are almost ready integrating hbase-backup in production.
>>> We’ve
>>>>>> fixed a
>>>>>>>>> few minor things (all committed) but otherwise it’s worked
>>> well so
>>>>>> far in
>>>>>>>>> tests.
>>>>>>>>> 
>>>>>>>>> We are a bit delayed in integrating TLS. I’m hopeful it will
>>> happen
>>>>>> in
>>>>>>>> the
>>>>>>>>> next 2-3 months. It’s a big project for us, so not quick, but
>>>>>> definitely
>>>>>>>> on
>>>>>>>>> the roadmap.
>>>>>>>>> 
>>>>>>>>> It seems like cloudera may be closer to integrating TLS in
>>>>>> production.
>>>>>>>>> Balazs recently filed and fixed HBASE-27673 related to mTLS.
>>> Maybe
>>>>>> he can
>>>>>>>>> chime in on his status, or let me know if I am totally off
>>> base :)
>>>>>>>>> 
>>>>>>>>> On Sun, Mar 26, 2023 at 9:25 PM Andrew Purtell <
>>>>>> andrew.purt...@gmail.com
>>>>>>>>> 
>>>>>>>>> wrote:
>>>>>>>>> 
>>>>>>>>>> Before we open a new code line should we discuss EOL of 2.4?
>>> After
>>>>>> the
>>>>>>>>>> first 2.6 release? It’s not required of course but cuts down
>>> the
>>>>>> amount
>>>>>>>>> of
>>>>>>>>>> labor to have two 2.x code lines (presumably, one as stable
>>> and
>>>>>> one as
>>>>>>>>>> next) rather than three. Perhaps even before that, should we
>>> move
>>>>>> the
>>>>>>>>>> stable pointer to the latest 2.5 release?
>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>> On Mar 26, 2023, at 5:59 PM, 张铎 <palomino...@gmail.com>
>>> wrote:
>>>>>>>>>>> 
>>>>>>>>>>> Bump.
>>>>>>>>>>> 
>>>>>>>>>>> I believe the mTLS and backup related code have all been
>>>>>> finished on
>>>>>>>>>>> branch-2?
>>>>>>>>>>> 
>>>>>>>>>>> Are there any other things which block us making the
>>> branch-2.6
>>>>>>>> branch?
>>>>>>>>>>> 
>>>>>>>>>>> Thanks.
>>>>>>>>>>> 
>>>>>>>>>>> Mallikarjun <mallik.v.ar...@gmail.com> 于2022年10月17日周一
>>> 02:09写道:
>>>>>>>>>>> 
>>>>>>>>>>>> On hbase-backup, we are using in production for more then
>>> 1
>>>>>> year. I
>>>>>>>>> can
>>>>>>>>>>>> vouch for it to be stable enough to be in a release
>>> version so
>>>>>> that
>>>>>>>>> more
>>>>>>>>>>>> people can use it and polished it further.
>>>>>>>>>>>> 
>>>>>>>>>>>>> On Sun, Oct 16, 2022, 11:25 PM Andrew Purtell <
>>>>>>>>>> andrew.purt...@gmail.com>
>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>> 
>>>>>>>>>>>>> My understanding is some folks evaluating and polishing
>>> TLS for
>>>>>>>> their
>>>>>>>>>>>>> production are also considering hbase-backup in the same
>>> way,
>>>>>> which
>>>>>>>>> is
>>>>>>>>>>>> why
>>>>>>>>>>>>> I linked them together. If that is incorrect then they
>>> both are
>>>>>>>> still
>>>>>>>>>>>> worth
>>>>>>>>>>>>> considering in my opinion but would have a more tenuous
>>> link.
>>>>>>>>>>>>> 
>>>>>>>>>>>>> Where we are with hbase-backup is it should probably be
>>> ported
>>>>>> to
>>>>>>>>> where
>>>>>>>>>>>>> more people would be inclined to evaluate it, in order
>>> for it
>>>>>> to
>>>>>>>> make
>>>>>>>>>>>> more
>>>>>>>>>>>>> progress. A new minor releasing line would fit. On the
>>> other
>>>>>> hand
>>>>>>>> if
>>>>>>>>> it
>>>>>>>>>>>> is
>>>>>>>>>>>>> too unpolished then the experience would be poor.
>>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>>>> On Oct 16, 2022, at 5:35 AM, 张铎 <palomino...@gmail.com>
>>>>>> wrote:
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> I believe the second one is still ongoing?
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Andrew Purtell <apurt...@apache.org> 于2022年10月14日周五
>>> 05:37写道:
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> We will begin releasing activity for the 2.6 code line
>>> and
>>>>>> as a
>>>>>>>>>>>>>>> prerequisite to that we shall need to make a new branch
>>>>>>>> branch-2.6
>>>>>>>>>>>> from
>>>>>>>>>>>>>>> branch-2.
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> Before we do that let's make sure all commits for the
>>> key
>>>>>>>> features
>>>>>>>>> of
>>>>>>>>>>>>> 2.6
>>>>>>>>>>>>>>> are settled in branch-2 before the branching point.
>>> Those key
>>>>>>>>>> features
>>>>>>>>>>>>> are:
>>>>>>>>>>>>>>> - mTLS RPC
>>>>>>>>>>>>>>> - hbase-backup backport
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>> Best regards,
>>>>>>>>>>>>>>> Andrew
>>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>> 
>>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> --
>>>>>>> Best regards,
>>>>>>> Andrew
>>>>>>> 
>>>>>>> Unrest, ignorance distilled, nihilistic imbeciles -
>>>>>>>    It's what we’ve earned
>>>>>>> Welcome, apocalypse, what’s taken you so long?
>>>>>>> Bring us the fitting end that we’ve been counting on
>>>>>>>   - A23, Welcome, Apocalypse
>>>>>> 
>>> 

Reply via email to