-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sstabledump failed because AzureSnitch ClassNotFoundException #338
Comments
@DoronArazii FYI |
@syuu1228 can you please provide some first assessment |
Issue reproduced but it's not reproducing in all the runs. Issue description
Installation detailsKernel Version: 5.15.0-1042-azure Cluster size: 4 nodes (Standard_L8s_v3) Scylla Nodes used in this run:
OS / Image: Test: Logs and commands
Logs:
|
The issue reproduced with
Issue description
Describe your issue in detail and steps it took to produce it. ImpactDescribe the impact this issue causes to the user. How frequently does it reproduce?Describe the frequency with how this issue can be reproduced. Installation detailsKernel Version: 5.15.0-1045-azure Cluster size: 4 nodes (Standard_L8s_v3) Scylla Nodes used in this run:
OS / Image: Test: Logs and commands
Logs:
|
It will take less time for @denesb to replace sstabledump with a native tool than fix this, I reckon. |
|
so a snapshot is needed first ? to generate the can you backport the code that read the system tables ? into 5.2/2023.1 ? |
Either that or produce it manually.
I will look into backporting it. It is a well delimited change, not affecting other parts of the system, so it is not a risk to scylla itself. |
Backport PR: scylladb/scylladb#15386 |
@denesb I guess this can be closed , right ? |
The backport PR was not merged yet. |
This is unlikely to get fixed, as newer (native scylla sstable ... tool) is working well and we have no plans to fix it for the Java based tool. |
It seems like @yaronkaikov considered this good to close, as soon as scylladb/scylladb#15386 lands in 5.2, and it already did. |
@denesb - I'm not sure I understand - was this fixed? If it was, then it wasn't fixed properly (see scylladb/scylladb#17659 ) |
No, we didn't do anything with |
so it's there in 5.2, and we can backport the usage of the new tool into SCT branch-5.2 ? |
once @denesb confirm it's in place, we'll need to backport |
Well... I backported the schema auto-detect, but not the bunch of follow-up fixes we found when using SCT w.r.t. EAR (enterprise). So maybe if you enable it in SCT, you will start hitting problems. |
Skip the sstables validation after the DB nodes upgrades due to the known issue [1]. [1] scylladb/scylla-tools-java#338
Skip the sstables validation after the DB nodes upgrades due to the known issue [1]. [1] scylladb/scylla-tools-java#338
Skip the sstables validation after the DB nodes upgrades due to the known issue [1]. [1] scylladb/scylla-tools-java#338
Skip the sstables validation after the DB nodes upgrades due to the known issue [1]. [1] scylladb/scylla-tools-java#338
Issue description
Describe your issue in detail and steps it took to produce it.
Impact
since 5.2 we officially support Azure, and in this job, we are upgrading from 5.2.6 to 2023.1.0-rc8
in this test, we run the following command, to ensure it works:
but it failed:
it happened once we upgraded all the nodes
How frequently does it reproduce?
did run it once, but it is clear that it will fail on every run
Installation details
Kernel Version: 5.15.0-1042-azure
Scylla version (or git commit hash):
5.2.6-20230730.58acf071bf28
with build-id17961be569f8503b27ff284a8de1e00a9d83811e
Target Scylla version (or git commit hash):
2023.1.0~rc8-20230731.b6f7c5a6910c
with build-idf6e718548e76ccf3564ed2387b6582ba8d37793c
Cluster size: 4 nodes (Standard_L8s_v3)
Scylla Nodes used in this run:
OS / Image:
/subscriptions/6c268694-47ab-43ab-b306-3c5514bc4112/resourceGroups/SCYLLA-IMAGES/providers/Microsoft.Compute/images/scylla-5.2.6-x86_64-2023-08-01T05-27-35
(azure: eastus)Test:
rolling-upgrade-azure-image-test
Test id:
a0dba1a8-303f-46d7-8aba-0986c71db060
Test name:
enterprise-2023.1/rolling-upgrade/rolling-upgrade-azure-image-test
Test config file(s):
Logs and commands
$ hydra investigate show-monitor a0dba1a8-303f-46d7-8aba-0986c71db060
$ hydra investigate show-logs a0dba1a8-303f-46d7-8aba-0986c71db060
Logs:
Jenkins job URL
Argus
The text was updated successfully, but these errors were encountered: