-
-
Notifications
You must be signed in to change notification settings - Fork 4.4k
feat(relocation): Add GCP-backed export checkpointer #80803
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
@abstractmethod | ||
def read(self) -> bytes: | ||
pass | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All changes to this file remove an unused method.
Codecov ReportAll modified and coverable lines are covered by tests ✅ Additional details and impacted files@@ Coverage Diff @@
## master #80803 +/- ##
=======================================
Coverage 74.97% 74.97%
=======================================
Files 7207 7207
Lines 319509 319501 -8
Branches 44001 44001
=======================================
- Hits 239546 239541 -5
+ Misses 73442 73439 -3
Partials 6521 6521 |
This builds on the work of #80711 to add a GCP-backed `ExportCheckpointer` implementation. Now, when exporting, we save (always encrypted!) copies of the progress on each model kind seen so far. If the export fails halfway through, we can use these checkpoints to recover much more quickly then if we had to redo all of that work, ensuring a higher chance of success on the retry.
d9af536
to
7e75bca
Compare
if parsed_json is None: | ||
logger.info( | ||
"Export checkpointer: miss", | ||
extra=logger_data, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just wanted to sanity check: There will be no sensitive data exposed here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nope: just the name of the model, the UUID of the relocation (safe), and the size (in bytes) of the encrypted data used in the checkpoint. None of that is sensitive.
Suspect IssuesThis pull request was deployed and Sentry observed the following issues:
Did you find this useful? React with a 👍 or 👎 |
This builds on the work of #80711 to add a GCP-backed
ExportCheckpointer
implementation. Now, when exporting, we save (always encrypted!) copies of the progress on each model kind seen so far. If the export fails halfway through, we can use these checkpoints to recover much more quickly then if we had to redo all of that work, ensuring a higher chance of success on the retry.