GitHub user shroman opened a pull request:
https://github.com/apache/ignite/pull/3701
IGNITE-8052: Clear error message when using a non-existing column namâ¦
â¦e for CREATE TABLE primary key.
You can merge this pull request into a Git repository by running:
$ git pull
Roman Shtykh created IGNITE-8052:
Summary: Clear error message when using a non-existing column name
for CREATE TABLE primary key
Key: IGNITE-8052
URL: https://issues.apache.org/jira/browse/IGNITE-8052
Good, hope that everyone interested has enough time to share an opinion.
As a summary of this discussion, the community decided to release Ignite
2.5 on April 30. Most of the changes and features are already in the master.
Who is ready to become a release manager of 2.5? We need to prepare a
Thanks, Alex.
GridGain automatically compresses all the internal types. Somehow it looks
like the GridLongList may have been mixed. Can you please file a ticket for
2.5 release?
D.
On Mon, Mar 26, 2018 at 4:55 AM, Александр Меньшиков
wrote:
> I investigated network
AG,
I would also ask about the compression itself. How and where do we store
the compression meta information? We cannot be compressing every page
separately, it will not be effective. However, if we try to store the
compression metadata, how do we make other nodes aware of it? Has this been
Taras,
Please document the authentication part on a 2.5 version of the binary
protocol page on readme.io. We need to share it with the guys who are
developing Node.JS client right now.
--
Denis
On Mon, Mar 26, 2018 at 2:55 AM, Taras Ledkov wrote:
> I had implement user
Ivan,
It's all good then :) Thanks!
-Val
On Mon, Mar 26, 2018 at 1:50 AM, Ivan Rakov wrote:
> Val,
>
> There's no any sense to use WalMode.NONE in production environment, it's
> kept for testing and debugging purposes (including possible user activities
> like capacity
Hell, ray.
> Please advise is this behavior expected?
I think this behavior is expected.
Because it's more efficient to query specific affinity key value.
Anyway, I'm not an expert in SQL engine, so I send your question to the
dev-list.
Igniters,
I think this user question is related to the
Hi!
> As far as I remember to be PCI-DSS compliant it is sufficient to use
> encryption at file system level. But it needs to be double-checked. It
> requires encrypt transmission of cardholder data across open, public
> networks. Could you point me where does it require DB data to be
encrypted?
>> It is impossible to disable WAL only for certain partitions without
>> completely overhauling design of Ignite storage mechanism. Right now we
can
>> afford only to change WAL mode per cache group.
Cache group rebalancing is a one cache rebalancing, and then this cache
("cache group") can be
Folks,
I've checked presentation.
1) It's a bad idea to allow automatic node join (sending decripted cache's
keys on join).
Each node join should be allowed by administrator.
We have to use two-step verification in that case.
- admitistrator set keystore password for each node
- another
Vova, thanks for comments.
Anyway, page compression at rebalancing is a good idea even is we have
problems with storing on disc.
2018-03-26 19:51 GMT+03:00 Vyacheslav Daradur :
> Since PDS is strongly depending on memory page's size I'd like to
> compress serialized data
Since PDS is strongly depending on memory page's size I'd like to
compress serialized data inside page exclude page header.
On Mon, Mar 26, 2018 at 7:49 PM, Vladimir Ozerov wrote:
> Alex,
>
> In fact there are many approaches to this. Some vendors decided stick to
> page -
Alex,
In fact there are many approaches to this. Some vendors decided stick to
page - page is filled with data and then compressed when certain threshold
is reached (e.g. page is full or filled up to X%). Another approach is to
store data in memory in *larger blocks* than on the disk, and when it
Hi Anton,
Do you have suggestions for this approach?
Sincerely,
Dmitriy Pavlov
пн, 26 мар. 2018 г. в 19:46, Anton Vinogradov :
> Can we use another approach to store compressed pages?
>
> 2018-03-26 19:06 GMT+03:00 Dmitry Pavlov :
>
> > +1 to Alexey's
Can we use another approach to store compressed pages?
2018-03-26 19:06 GMT+03:00 Dmitry Pavlov :
> +1 to Alexey's concern. No reason to compress if we use previous offset as
> pageIdx*pageSize.
>
> пн, 26 мар. 2018 г. в 18:59, Alexey Goncharuk
Pavel Pereslegin created IGNITE-8051:
Summary: Put operation may hang on LOCAL TRANSACTIONAL cache if it
was stopped asynchronously.
Key: IGNITE-8051
URL: https://issues.apache.org/jira/browse/IGNITE-8051
Alexander Paschenko created IGNITE-8050:
---
Summary: Throw a meaningful exception when user issues TX SQL
keyword with MVCC turned off
Key: IGNITE-8050
URL: https://issues.apache.org/jira/browse/IGNITE-8050
+1 to Alexey's concern. No reason to compress if we use previous offset as
pageIdx*pageSize.
пн, 26 мар. 2018 г. в 18:59, Alexey Goncharuk :
> Guys,
>
> How does this fit the PageMemory concept? Currently it assumes that the
> size of the page in memory and the size
Guys,
How does this fit the PageMemory concept? Currently it assumes that the
size of the page in memory and the size of the page on disk is the same, so
only per-entry level compression within a page makes sense.
If you compress a whole page, how do you calculate the page offset in the
target
Alexey Goncharuk created IGNITE-8049:
Summary: Limit the number of operation cycles in B+Tree
Key: IGNITE-8049
URL: https://issues.apache.org/jira/browse/IGNITE-8049
Project: Ignite
Alexey Goncharuk created IGNITE-8048:
Summary: Dynamic indexes are not stored to cache data on node join
Key: IGNITE-8048
URL: https://issues.apache.org/jira/browse/IGNITE-8048
Project: Ignite
Gents,
If I understood the idea correctly, the proposal is to compress pages on
eviction and decompress them on read from disk. Is it correct?
On Mon, Mar 26, 2018 at 5:13 PM, Anton Vinogradov wrote:
> + 1 to Taras's vision.
>
> Compression on eviction is a good case to store
Andrew Mashenkov created IGNITE-8047:
Summary: SQL: optimize simple COUNT with DISTINCT query.
Key: IGNITE-8047
URL: https://issues.apache.org/jira/browse/IGNITE-8047
Project: Ignite
Dmitriy Pavlov created IGNITE-8046:
--
Summary: New flaky tests added in
JettyRestProcessorAuthenticationSelfTest
Key: IGNITE-8046
URL: https://issues.apache.org/jira/browse/IGNITE-8046
Project:
Dmitry,
It is impossible to disable WAL only for certain partitions without
completely overhauling design of Ignite storage mechanism. Right now we can
afford only to change WAL mode per cache group.
The idea is to disable WAL when node doesn't have any partition in OWNING
state, which means it
Vyacheslav Koptilin created IGNITE-8045:
---
Summary: Direct-IO component is not published into maven
repository.
Key: IGNITE-8045
URL: https://issues.apache.org/jira/browse/IGNITE-8045
Project:
+1 for IEP creation
2018-03-23 22:40 GMT+03:00 Dmitry Pavlov :
> Denis, as I understood, there is and idea to exclude only rebalanced
> partition(s) data. All other data will go to the WAL.
>
> Ilya, please correct me if I'm wrong.
>
> пт, 23 мар. 2018 г. в 22:15, Denis
Github user Mmuzaf closed the pull request at:
https://github.com/apache/ignite/pull/3699
---
+ 1 to Taras's vision.
Compression on eviction is a good case to store more.
Pages at memory always hot a real system, so complession in memory will
definetely slowdown the system, I think.
Anyway, we can split issue to "on eviction compression" and to "in-memory
compression".
2018-03-06 12:14
Github user asfgit closed the pull request at:
https://github.com/apache/ignite/pull/3690
---
Github user asfgit closed the pull request at:
https://github.com/apache/ignite/pull/3693
---
GitHub user daradurvs opened a pull request:
https://github.com/apache/ignite/pull/3700
IGNITE-6839 Ignite Compatibility: flaky test
testFoldersReuseCompatibility_2_1 & 2_2 & 2_3
â¦.util.IgniteUtils.classLoaderUrls(Ljava/lang/ClassLoader;)[Ljava/net/URL;"
was fixed; code cleanup
Hi Team,
Could you review this PR https://github.com/apache/ignite/pull/3697 please?
Tests result: https://ci.ignite.apache.org/viewLog.html?buildId=1159660
Jira ticket: https://issues.apache.org/jira/browse/IGNITE-8021
--
Sincerely yours, Ivan Daschinskiy
Yakov,
I agree with Andrey that a separate abstraction for failure handling makes
sense.
First, using event listeners for this kind of response allows users to
install multiple listeners, which may be invoked in an unpredictable order,
this looks error-prone to me. Second, we may add an
Vyacheslav Koptilin created IGNITE-8044:
---
Summary: IgniteQueryGenerator.getOptions() method should properly
handle empty list of parameters.
Key: IGNITE-8044
URL:
I investigated network loading and found that a big part of internal data
inside messages is `GridLongList`.
It is a part of `GridDhtTxFinishRequest`,
`GridDhtAtomicDeferredUpdateResponse`, `GridDhtAtomicUpdateRequest`,
`GridNearAtomicFullUpdateRequest` and `NearCacheUpdates`.
So I think it has
Jiri Tobisek created IGNITE-8043:
Summary: Thin client fails while connecting to Ignite instance in
docker container
Key: IGNITE-8043
URL: https://issues.apache.org/jira/browse/IGNITE-8043
Project:
I had implement user credential store according with the previous
discussion about user authentication.
Now JDBC thin, and ODBC support user authentication. We haven't
implemented it for all thin client because protocols are not similar.
I see two ways to implement authentication for thin
GitHub user Mmuzaf opened a pull request:
https://github.com/apache/ignite/pull/3699
IGNITE-6842: add default behavior by stopping all instances for tests
1. Stop all grids by default in aftreTestsStop method;
2. Throw exception in case stopping process fails;
You can merge
Github user asfgit closed the pull request at:
https://github.com/apache/ignite/pull/3665
---
Github user devozerov closed the pull request at:
https://github.com/apache/ignite/pull/3698
---
Github user asfgit closed the pull request at:
https://github.com/apache/ignite/pull/3671
---
GitHub user devozerov opened a pull request:
https://github.com/apache/ignite/pull/3698
Ignite 2.4.4 .net
You can merge this pull request into a Git repository by running:
$ git pull https://github.com/gridgain/apache-ignite ignite-2.4.4-.net
Alternatively you can review and
GitHub user ivandasch opened a pull request:
https://github.com/apache/ignite/pull/3697
IGNITE-8021 Delete cache config files when destroyed
You can merge this pull request into a Git repository by running:
$ git pull https://github.com/ivandasch/ignite ignite-8021
Val,
There's no any sense to use WalMode.NONE in production environment, it's
kept for testing and debugging purposes (including possible user
activities like capacity planning).
We already print a warning at node start in case WalMode.NONE is set:
U.quietAndWarn(log,"Started write-ahead log
Vladimir Ozerov created IGNITE-8042:
---
Summary: .NET thin client: Add username/password to handshake
Key: IGNITE-8042
URL: https://issues.apache.org/jira/browse/IGNITE-8042
Project: Ignite
Taras,
Could you please chime in?
On Mon, Mar 26, 2018 at 9:56 AM, Pavel Tupitsyn
wrote:
> I've started this task, and the property name combined with lack of
> javadoc seems confusing and misleading:
>
> * Turns out this authentication is only for thin clients
> * Not
GitHub user ptupitsyn opened a pull request:
https://github.com/apache/ignite/pull/3696
IGNITE-8034 .NET: Add IgniteConfiguration.AuthenticationEnabled
You can merge this pull request into a Git repository by running:
$ git pull https://github.com/ptupitsyn/ignite ignite-8034
I've started this task, and the property name combined with lack of javadoc
seems confusing and misleading:
* Turns out this authentication is only for thin clients
* Not clear how to configure and use it, even after digging through Jira
and devlist
How do I write test to ensure it works?
50 matches
Mail list logo