From: Christian Ebner <c.ebner@proxmox.com>
To: "Proxmox Backup Server development discussion"
<pbs-devel@lists.proxmox.com>,
"Fabian Grünbichler" <f.gruenbichler@proxmox.com>
Subject: Re: [pbs-devel] [PATCH v5 proxmox-backup 31/31] server: sync job: use delete stats provided by the api
Date: Wed, 30 Oct 2024 14:44:34 +0100 [thread overview]
Message-ID: <0aad0af8-6533-4e4b-81aa-ff9bbc59d762@proxmox.com> (raw)
In-Reply-To: <1729851453.pzm55i1ley.astroid@yuna.none>
On 10/25/24 12:17, Fabian Grünbichler wrote:
> On October 18, 2024 10:42 am, Christian Ebner wrote:
>> Use the API exposed additional delete statistics to generate the
>> task log output for sync jobs in push direction instead of fetching the
>> contents before and after deleting.
>>
>> Detect older api versions of the target server for fallback.
>>
>> Signed-off-by: Christian Ebner <c.ebner@proxmox.com>
>> ---
>> changes since version 4:
>> - no changes
>>
>> changes since version 3:
>> - fetch target api version to remain backwards compatible
>>
>> src/server/push.rs | 126 +++++++++++++++++++++++++++++----------------
>> 1 file changed, 82 insertions(+), 44 deletions(-)
>>
>> diff --git a/src/server/push.rs b/src/server/push.rs
>> index bf6045214..a915b6964 100644
>> --- a/src/server/push.rs
>> +++ b/src/server/push.rs
>> @@ -8,11 +8,12 @@ use anyhow::{bail, format_err, Error};
>> use futures::stream::{self, StreamExt, TryStreamExt};
>> use tokio::sync::mpsc;
>> use tokio_stream::wrappers::ReceiverStream;
>> -use tracing::info;
>> +use tracing::{info, warn};
>>
>> use pbs_api_types::{
>> - print_store_and_ns, Authid, BackupDir, BackupGroup, BackupNamespace, CryptMode, GroupFilter,
>> - GroupListItem, NamespaceListItem, Operation, RateLimitConfig, Remote, SnapshotListItem,
>> + print_store_and_ns, ApiVersion, ApiVersionInfo, Authid, BackupDir, BackupGroup,
>> + BackupGroupDeleteStats, BackupNamespace, CryptMode, GroupFilter, GroupListItem,
>> + NamespaceListItem, Operation, RateLimitConfig, Remote, SnapshotListItem,
>> PRIV_REMOTE_DATASTORE_BACKUP, PRIV_REMOTE_DATASTORE_MODIFY, PRIV_REMOTE_DATASTORE_PRUNE,
>> };
>> use pbs_client::{BackupRepository, BackupWriter, HttpClient, MergedChunkInfo, UploadOptions};
>> @@ -41,6 +42,8 @@ pub(crate) struct PushTarget {
>> ns: BackupNamespace,
>> // Http client to connect to remote
>> client: HttpClient,
>> + // Api version reported by the target
>> + api_version: Option<ApiVersion>,
>> }
>>
>> /// Parameters for a push operation
>> @@ -106,6 +109,7 @@ impl PushParameters {
>> repo,
>> ns: remote_ns,
>> client,
>> + api_version: None,
>> };
>> let group_filter = group_filter.unwrap_or_default();
>>
>> @@ -124,6 +128,17 @@ impl PushParameters {
>> fn map_to_target(&self, namespace: &BackupNamespace) -> Result<BackupNamespace, Error> {
>> namespace.map_prefix(&self.source.ns, &self.target.ns)
>> }
>> +
>> + // Fetch and set the api version info for the target
>> + pub(crate) async fn fetch_target_api_version_info(&mut self) -> Result<(), Error> {
>> + let api_path = "api2/json/version";
>> + let mut result = self.target.client.get(api_path, None).await?;
>> + let data = result["data"].take();
>> + let version_info: ApiVersionInfo = serde_json::from_value(data)?;
>> + self.target.api_version = Some(ApiVersion::try_from(version_info)?);
>
> if the expectation is that this always works, should we do it when
> initializing the PushParameters and not wrap it in an Option?
Okay, dropped the Option wrapper here and adapted the
PushParameters::new() method accordingly to always async fetch the
version. This extra API call even when `remove_vanished` is not set and
therefore the remote api version is not required does not hurt.
>
>> +
>> + Ok(())
>> + }
>> }
>>
>> // Check if the job user given in the push parameters has the provided privs on the remote
>> @@ -167,7 +182,7 @@ async fn fetch_target_namespaces(params: &PushParameters) -> Result<Vec<BackupNa
>> async fn remove_target_namespace(
>> params: &PushParameters,
>> namespace: &BackupNamespace,
>> -) -> Result<(), Error> {
>> +) -> Result<BackupGroupDeleteStats, Error> {
>> if namespace.is_root() {
>> bail!("cannot remove root namespace from target");
>> }
>> @@ -181,14 +196,23 @@ async fn remove_target_namespace(
>> );
>>
>> let target_ns = params.map_to_target(namespace)?;
>> - let args = serde_json::json!({
>> + let mut args = serde_json::json!({
>> "ns": target_ns.name(),
>> "delete-groups": true,
>> });
>>
>> - params.target.client.delete(&api_path, Some(args)).await?;
>> + if let Some(version) = ¶ms.target.api_version {
>> + if version.is_min_required(ApiVersion::new(3, 2, 8)) {
>
> missed a version already ;) might make sense to either move this up as a
> constant, or even add a sort of supports_feature(..) to ApiVersion ?
Yes, I did follow your suggestion and added a `supports_feature` instead
of the `is_min_required` method. That is way more ergonomic and allows
to append new feature strings without issues at certain commits.
>
> in any case, something like this should be called out somewhere
> prominently so that it can be adapted/bumped if need be when applying
>
>> + args["ignore-protected"] = serde_json::to_value(true)?;
>> + }
>> + }
>>
>> - Ok(())
>> + let mut result = params.target.client.delete(&api_path, Some(args)).await?;
>> + let data = result["data"].take();
>> + let delete_stats: BackupGroupDeleteStats =
>> + serde_json::from_value(data).unwrap_or_else(|_| BackupGroupDeleteStats::default());
>
> and this here should only be done if the ApiVersion is too old, else it
> masks deserialization problems..
True, made the unwrap_or_default conditionally here and the other
mentions below.
>
>> +
>> + Ok(delete_stats)
>> }
>>
>> // Fetch the list of groups found on target in given namespace
>> @@ -229,7 +253,7 @@ async fn remove_target_group(
>> params: &PushParameters,
>> namespace: &BackupNamespace,
>> backup_group: &BackupGroup,
>> -) -> Result<(), Error> {
>> +) -> Result<BackupGroupDeleteStats, Error> {
>> check_ns_remote_datastore_privs(params, namespace, PRIV_REMOTE_DATASTORE_PRUNE)
>> .map_err(|err| format_err!("Pruning remote datastore contents not allowed - {err}"))?;
>>
>> @@ -242,14 +266,23 @@ async fn remove_target_group(
>> "backup-id": backup_group.id,
>> "backup-type": backup_group.ty,
>> });
>> +
>> + if let Some(version) = ¶ms.target.api_version {
>> + if version.is_min_required(ApiVersion::new(3, 2, 8)) {
>
> same here
>
>> + args["ignore-protected"] = serde_json::to_value(true)?;
>> + }
>> + }
>> if !namespace.is_root() {
>> let target_ns = params.map_to_target(namespace)?;
>> args["ns"] = serde_json::to_value(target_ns.name())?;
>> }
>>
>> - params.target.client.delete(&api_path, Some(args)).await?;
>> + let mut result = params.target.client.delete(&api_path, Some(args)).await?;
>> + let data = result["data"].take();
>> + let delete_stats: BackupGroupDeleteStats =
>> + serde_json::from_value(data).unwrap_or_else(|_| BackupGroupDeleteStats::default());
>
> and here
>
>>
>> - Ok(())
>> + Ok(delete_stats)
>> }
>>
>> // Check if the namespace is already present on the target, create it otherwise
>> @@ -298,6 +331,7 @@ async fn check_or_create_target_namespace(
>> /// Push contents of source datastore matched by given push parameters to target.
>> pub(crate) async fn push_store(mut params: PushParameters) -> Result<SyncStats, Error> {
>> let mut errors = false;
>> + params.fetch_target_api_version_info().await?;
>>
>> // Generate list of source namespaces to push to target, limited by max-depth
>> let mut namespaces = params.source.list_namespaces(&mut params.max_depth).await?;
>> @@ -365,9 +399,25 @@ pub(crate) async fn push_store(mut params: PushParameters) -> Result<SyncStats,
>> if synced_namespaces.contains(&target_namespace) {
>> continue;
>> }
>> - if let Err(err) = remove_target_namespace(¶ms, &target_namespace).await {
>> - info!("failed to remove vanished namespace {target_namespace} - {err}");
>> - continue;
>> + match remove_target_namespace(¶ms, &target_namespace).await {
>> + Ok(delete_stats) => {
>> + stats.add(SyncStats::from(RemovedVanishedStats {
>> + snapshots: delete_stats.removed_snapshots(),
>> + groups: delete_stats.removed_groups(),
>> + namespaces: 1,
>> + }));
>
> should we maybe print a warning once at the start of sync if the
> ApiVersion is too old, so that users know that these stats are
> incomplete?
Yes, added the warning in case of unsupported feature and
remove_vanished flag set.
>
> because in that case if no snapshots/groups were protected, we'll get a
> default BackupGroupDeleteStats here, so we actually lack the information
> about removed snapshots and groups..
>
>> + if delete_stats.protected_snapshots() > 0 {
>> + warn!(
>> + "kept {protected_count} protected snapshots of namespace '{target_namespace}'",
>> + protected_count = delete_stats.protected_snapshots(),
>> + );
>> + continue;
>> + }
>> + }
>> + Err(err) => {
>> + warn!("failed to remove vanished namespace {target_namespace} - {err}");
>> + continue;
>> + }
>> }
>> info!("removed vanished namespace {target_namespace}");
>> }
>> @@ -449,38 +499,26 @@ pub(crate) async fn push_namespace(
>>
>> info!("delete vanished group '{target_group}'");
>>
>> - let count_before = match fetch_target_groups(params, namespace).await {
>> - Ok(snapshots) => snapshots.len(),
>> - Err(_err) => 0, // ignore errors
>> - };
>> -
>> - if let Err(err) = remove_target_group(params, namespace, &target_group).await {
>> - info!("{err}");
>> - errors = true;
>> - continue;
>> - }
>> -
>> - let mut count_after = match fetch_target_groups(params, namespace).await {
>> - Ok(snapshots) => snapshots.len(),
>> - Err(_err) => 0, // ignore errors
>> - };
>> -
>> - let deleted_groups = if count_after > 0 {
>> - info!("kept some protected snapshots of group '{target_group}'");
>> - 0
>> - } else {
>> - 1
>> - };
>> -
>> - if count_after > count_before {
>> - count_after = count_before;
>> + match remove_target_group(params, namespace, &target_group).await {
>> + Ok(delete_stats) => {
>> + if delete_stats.protected_snapshots() > 0 {
>> + warn!(
>> + "kept {protected_count} protected snapshots of group '{target_group}'",
>> + protected_count = delete_stats.protected_snapshots(),
>> + );
>> + }
>> + stats.add(SyncStats::from(RemovedVanishedStats {
>> + snapshots: delete_stats.removed_snapshots(),
>> + groups: delete_stats.removed_groups(),
>> + namespaces: 0,
>> + }));
>
> same here
>
>> + }
>> + Err(err) => {
>> + info!("failed to delete vanished group - {err}");
>> + errors = true;
>> + continue;
>> + }
>> }
>> -
>> - stats.add(SyncStats::from(RemovedVanishedStats {
>> - snapshots: count_before - count_after,
>> - groups: deleted_groups,
>> - namespaces: 0,
>> - }));
>> }
>> }
>>
>> --
>> 2.39.5
>>
>>
>>
>> _______________________________________________
>> pbs-devel mailing list
>> pbs-devel@lists.proxmox.com
>> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
>>
>>
>>
>
>
> _______________________________________________
> pbs-devel mailing list
> pbs-devel@lists.proxmox.com
> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
>
>
_______________________________________________
pbs-devel mailing list
pbs-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
next prev parent reply other threads:[~2024-10-30 13:45 UTC|newest]
Thread overview: 68+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-10-18 8:42 [pbs-devel] [PATCH v5 proxmox-backup 00/31] fix #3044: push datastore to remote target Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 01/31] client: backup writer: refactor backup and upload stats counters Christian Ebner
2024-10-25 10:20 ` Fabian Grünbichler
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 02/31] client: backup writer: factor out merged chunk stream upload Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 03/31] client: backup writer: allow push uploading index and chunks Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 04/31] config: acl: refactor acl path component check for datastore Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 05/31] config: acl: allow namespace components for remote datastores Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 06/31] api types: implement remote acl path method for sync job Christian Ebner
2024-10-25 11:44 ` Fabian Grünbichler
2024-10-25 12:46 ` Christian Ebner
2024-10-28 11:04 ` Fabian Grünbichler
2024-10-28 15:13 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 07/31] api types: define remote permissions and roles for push sync Christian Ebner
2024-10-25 10:15 ` Fabian Grünbichler
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 08/31] fix #3044: server: implement push support for sync operations Christian Ebner
2024-10-25 10:10 ` Fabian Grünbichler
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 09/31] api types/config: add `sync-push` config type for push sync jobs Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 10/31] api: push: implement endpoint for sync in push direction Christian Ebner
2024-10-25 11:45 ` Fabian Grünbichler
2024-10-30 13:48 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 11/31] api: sync: move sync job invocation to server sync module Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 12/31] api: sync jobs: expose optional `sync-direction` parameter Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 13/31] api: admin: avoid duplicate name for list sync jobs api method Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 14/31] api: config: Require PRIV_DATASTORE_AUDIT to modify sync job Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 15/31] api: config: factor out sync job owner check Christian Ebner
2024-10-25 10:16 ` Fabian Grünbichler
2024-10-28 15:17 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 16/31] api: config: extend read access check by sync direction Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 17/31] api: config: extend modify " Christian Ebner
2024-10-25 10:17 ` Fabian Grünbichler
2024-10-25 13:24 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 18/31] bin: manager: add datastore push cli command Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 19/31] ui: group filter: allow to set namespace for local datastore Christian Ebner
2024-10-25 10:32 ` Dominik Csapak
2024-10-28 15:37 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 20/31] ui: sync edit: source group filters based on sync direction Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 21/31] ui: add view with separate grids for pull and push sync jobs Christian Ebner
2024-10-25 10:39 ` Dominik Csapak
2024-10-28 15:52 ` Christian Ebner
2024-10-29 6:22 ` Dominik Csapak
2024-10-29 7:26 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 22/31] ui: sync job: adapt edit window to be used for pull and push Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 23/31] ui: sync: pass sync-direction to allow removing push jobs Christian Ebner
2024-10-25 10:42 ` Dominik Csapak
2024-10-30 13:23 ` Christian Ebner
2024-10-30 13:33 ` Fabian Grünbichler
2024-10-30 13:50 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 24/31] ui: sync view: do not use data model proxy for store Christian Ebner
2024-10-25 10:44 ` Dominik Csapak
2024-10-30 13:29 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 25/31] ui: sync view: set sync direction when invoking run task via api Christian Ebner
2024-10-25 10:44 ` Dominik Csapak
2024-10-30 13:30 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 26/31] datastore: move `BackupGroupDeleteStats` to api types Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 27/31] api types: implement api type for `BackupGroupDeleteStats` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 28/31] api/api-types: refactor api endpoint version, add api types Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 29/31] datastore: increment deleted group counter when removing group Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 30/31] api: datastore/namespace: return backup groups delete stats on remove Christian Ebner
2024-10-25 10:10 ` Fabian Grünbichler
2024-10-30 13:37 ` Christian Ebner
2024-10-30 13:42 ` Fabian Grünbichler
2024-10-31 9:43 ` Christian Ebner
2024-10-31 12:12 ` Fabian Grünbichler
2024-10-31 12:26 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 31/31] server: sync job: use delete stats provided by the api Christian Ebner
2024-10-25 10:17 ` Fabian Grünbichler
2024-10-30 13:44 ` Christian Ebner [this message]
2024-10-31 12:20 ` [pbs-devel] [PATCH v5 proxmox-backup 00/31] fix #3044: push datastore to remote target Christian Ebner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=0aad0af8-6533-4e4b-81aa-ff9bbc59d762@proxmox.com \
--to=c.ebner@proxmox.com \
--cc=f.gruenbichler@proxmox.com \
--cc=pbs-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.