Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable ETAG based validation on every block download to provide higher consistency #1608

Merged
merged 27 commits into from
Jan 30, 2025

Conversation

vibhansa-msft
Copy link
Member

@vibhansa-msft vibhansa-msft commented Jan 15, 2025

✅ What

In block-cache mode, every download is not validated for higher consistency. If a file is open or half-read and contents are modified on the container, subsequent reads will start fetching new content and provide inconsistent data to application. Adding an ETAG based validation will guard applications against such data corruption. When an 'open' file call comes ETAG from blob will be preserved by block-cache. Any subsequent block download will revalidate that ETAG is still the same. If ETAG has changed, then it means blob was modified on container after open and in such case download and read operation will fail.

🤔 Why

This will safeguard application from data corruption where blob is modified on container through other means.

👩‍🔬 How to validate if applicable

Open a file and then modify the file on container followed by a read operation on mounted path.

🔖 Related links

NA

@ashruti-msft
Copy link
Member

Later we should run some perf tests with data consistency on to inform users what % diff in performance, memory usage they can expect with this option on and off.

@vibhansa-msft vibhansa-msft merged commit c71ea55 into blobfuse/2.4.1 Jan 30, 2025
8 checks passed
@vibhansa-msft vibhansa-msft deleted the vibhansa/etagvalidation branch January 30, 2025 08:29
vibhansa-msft added a commit that referenced this pull request Feb 3, 2025
* feat: support workload identity token (#1556)

* feat: support workload identity token

* Create block pool only once in child process (#1581)

* create block pool in child only

* Update golang.org/x/crypto to v0.31.0 (#1594)

* Update golang.org/x/crypto to v0.31.0

* sync with main (#1603)

* updated year in copyright message (#1601)

* Use ListBlob for hns accounts  (#1555)

* Optimize HNS listing

* Added statfs for block-cache (#1470)

* Added statfs for block_cache

* Add strong consistency check for data on disk (#1604)

* Add strong consistency check for data on disk

* bug in block cache open call (#1580)

* current implementation of open file when opened in O_WRONLY will truncate the file to zero. This is incorrect behaviour.
We don't see it in the normal scenario as write-back cache is on by default. Hence all the open calls with O_WRONLY will be redirected O_RDWR.
To simulate this turn of the write-back cache and then open file in O_WRONLY.

* Feature: Blob filter (#1595)

* Integrating blob filter in azstorage

* Serve getAttr call for destination file after the Copy finishes from the cache

* Cleanup on start shall be set to cleanup temp cache (#1613)

* Add Tests

* Refactor the code and refresh the cache after copying the attributes

* Automate blobfuse2 setup for new VM (#1575)

added script for blobfuse setup and azsecpack setup in VM

* * Update the Unit tests.
* Refactor the Code

* Update Changelog

* do go fmt on src

* Downgrade go version to 1.22.7 due to memory issues in 1.23 (#1619)

* Enable ETAG based validation on every block download to provide higher consistency (#1608)

* Make etag validation a defualt option

* BUG#31069208:  Fixed Prefix filtering from File Path (#1618)

* Fixed the logic to filter out folder prefix from path
* Added/Updated/Removed test case

---------

Co-authored-by: weizhi <[email protected]>
Co-authored-by: Sourav Gupta <[email protected]>
Co-authored-by: Jan Jagusch <[email protected]>
Co-authored-by: ashruti-msft <[email protected]>
Co-authored-by: syeleti-msft <[email protected]>
Co-authored-by: jainakanksha-msft <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants