From some old May 2017 email. I asked the following:
"From the docs, I see you can identify the shards by the GFID
# getfattr -d -m. -e hex/path_to_file/
# ls /bricks/*/.shard -lh | grep /GFID
Is there a gluster tool/script that will recreate the file?
or can you just sort them sort them properly and then simply cat/copy+
them back together?
cat shardGFID.1 .. shardGFID.X > thefile "
/
The response from RedHat was:
"Yes, this should work, but you would need to include the base file (the
0th shard, if you will) first in the list of files that you're stitching
up. In the happy case, you can test it by comparing the md5sum of the
file from the mount to that of your stitched file."
We tested it with some VM files and it indeed worked fine. That was
probably on 3.10.1 at the time.
-wk
On 4/20/2018 12:44 PM, Jamie Lawrence wrote:
Hello,
So I have a volume on a gluster install (3.12.5) on which sharding was enabled
at some point recently. (Don't know how it happened, it may have been an
accidental run of an old script.) So it has been happily sharding behind our
backs and it shouldn't have.
I'd like to turn sharding off and reverse the files back to normal. Some of
these are sparse files, so I need to account for holes. There are more than
enough that I need to write a tool to do it.
I saw notes ca. 3.7 saying the only way to do it was to read-off on the
client-side, blow away the volume and start over. This would be extremely
disruptive for us, and language I've seen reading tickets and old messages to
this list make me think that isn't needed anymore, but confirmation of that
would be good.
The only discussion I can find are these videos[1]:
http://opensource-storage.blogspot.com/2016/07/de-mystifying-gluster-shards.html
, and some hints[2] that are old enough that I don't trust them without
confirmation that nothing's changed. The video things don't acknowledge the
existence of file holes. Also, the hint in [2] mentions using
trusted.glusterfs.shard.file-size to get the size of a partly filled hole; that
value looks like base64, but when I attempt to decode it, base64 complains
about invalid input.
In short, I can't find sufficient information to reconstruct these. Has anyone
written a current, step-by-step guide on reconstructing sharded files? Or has
someone has written a tool so I don't have to?
Thanks,
-j
[1] Why one would choose to annoy the crap out of their fellow gluster users by
using video to convey about 80 bytes of ASCII-encoded information, I have no
idea.
[2] http://lists.gluster.org/pipermail/gluster-devel/2017-March/052212.html
_______________________________________________
Gluster-users mailing list
[email protected]
http://lists.gluster.org/mailman/listinfo/gluster-users
_______________________________________________
Gluster-users mailing list
[email protected]
http://lists.gluster.org/mailman/listinfo/gluster-users