-
Notifications
You must be signed in to change notification settings - Fork 3.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
storageccl: remove non-ReturnSST ExportRequest #69044
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What happens during upgrades if caller is unaware? It would fail until it is upgraded and then it would not retry with ReturnSST = true?
Reviewable status: complete! 1 of 0 LGTMs obtained (waiting on @nihalpednekar)
During upgrade we typically plan the sql procs that send export requests on the same nodes as the leaseholders so they send to themselves. Only if we somehow get a leaseholder move mid backup across versions so we expect a mismatch. In that case if they have set the old always proxy writes setting their old nodes will ask for ReturnSST and should be fine. If they haven’t, their backup might fail and they would need to enable that setting to try again (or finish rolling out the new binary) |
I just realized i never backported #66540. Hm. |
Release note: none.
Fixing a (potential) bug while I'm here and adding an extra check that the caller didn't ask for/expect the file to be encrypted, which is a potential if an older tenant pod asked mid-upgrade. Think I'll land this and get a 66540 backport going. |
TFTR! bors r+ |
Build succeeded: |
Release justification: bug fix in new functionality.
Release note: none.