Timeout when accessing a key in a strongly consistent bucket. Please help.

Zsolt Laky zsolt.laky at lamardan.com
Tue Jul 15 17:34:19 EDT 2014


Hello there,

 

The problem was caused by a wrong erlang installation. Most probable cause is the SSL part on OSX.

 

Fetched the dmg file from erlang solutions’ webpage and installed it. Riak then compiled perfectly from source.

 

Zsolt

 

Feladó: Zsolt Laky [mailto:zsolt.laky at lamardan.com] 
Küldve: Saturday, June 28, 2014 1:13 PM
Címzett: 'Riak Users Mailing List'
Tárgy: Timeout when accessing a key in a strongly consistent bucket. Please help.

 

Hello there,

 

Installed new 2.0beta, fired up 1 node. Config and status is attached. Strongly consistent bucket type seems to have timeouts.

 

Host is Mac OSX. Also tried on ubuntu with virtualbox. Same behavior.

 

Commands are bold, important replies are underlined for readability.

 

Please help.

 

Thanks and kind regards

Zsolt

 

bash-3.2$ ./riak-admin member-status

================================= Membership ==================================

Status     Ring    Pending    Node

-------------------------------------------------------------------------------

valid     100.0%      --      'riak at 127.0.0.1'

-------------------------------------------------------------------------------

Valid:1 / Leaving:0 / Exiting:0 / Joining:0 / Down:0

bash-3.2$ ./riak-admin bucket-type list

default (active)

strong (active)

bash-3.2$ ./riak-admin bucket-type status strong

strong is active

 

young_vclock: 20

w: quorum

small_vclock: 50

rw: quorum

r: quorum

pw: 0

precommit: []

pr: 0

postcommit: []

old_vclock: 86400

notfound_ok: true

n_val: 3

linkfun: {modfun,riak_kv_wm_link_walker,mapreduce_linkfun}

last_write_wins: false

dw: quorum

dvv_enabled: true

chash_keyfun: {riak_core_util,chash_std_keyfun}

big_vclock: 50

basic_quorum: false

allow_mult: true

consistent: true

active: true

claimant: 'riak at 127.0.0.1'

bash-3.2$ curl -v -XPOST -H 'Content-Type: text/plain' -d 'haho' http://127.0.0.1:8098/types/default/buckets/test1/keys/user1?returnbody=true

* About to connect() to 127.0.0.1 port 8098 (#0)

*   Trying 127.0.0.1...

* Adding handle: conn: 0x7f95d3004400

* Adding handle: send: 0

* Adding handle: recv: 0

* Curl_addHandleToPipeline: length: 1

* - Conn 0 (0x7f95d3004400) send_pipe: 1, recv_pipe: 0

* Connected to 127.0.0.1 (127.0.0.1) port 8098 (#0)

> POST /types/default/buckets/test1/keys/user1?returnbody=true HTTP/1.1

> User-Agent: curl/7.30.0

> Host: 127.0.0.1:8098

> Accept: */*

> Content-Type: text/plain

> Content-Length: 4

> 

* upload completely sent off: 4 out of 4 bytes

< HTTP/1.1 200 OK

< X-Riak-Vclock: a85hYGBgzGDKBVIcypz/fgavmz0/gymRKY+VYaak8lm+LAA=

< Vary: Accept-Encoding

* Server MochiWeb/1.1 WebMachine/1.10.5 (jokes are better explained) is not blacklisted

< Server: MochiWeb/1.1 WebMachine/1.10.5 (jokes are better explained)

< Link: </buckets/test1>; rel="up"

< Last-Modified: Sat, 28 Jun 2014 10:48:57 GMT

< ETag: "4Cd4ejclOJPXjES2m3nxPi"

< Date: Sat, 28 Jun 2014 10:48:57 GMT

< Content-Type: text/plain

< Content-Length: 4

< 

* Connection #0 to host 127.0.0.1 left intact

hahobash-3.2$ 

bash-3.2$ curl -v -XPOST -H 'Content-Type: text/plain' -d 'haho' http://127.0.0.1:8098/types/strong/buckets/test1/keys/user1

* About to connect() to 127.0.0.1 port 8098 (#0)

*   Trying 127.0.0.1...

* Adding handle: conn: 0x7fbee3804400

* Adding handle: send: 0

* Adding handle: recv: 0

* Curl_addHandleToPipeline: length: 1

* - Conn 0 (0x7fbee3804400) send_pipe: 1, recv_pipe: 0

* Connected to 127.0.0.1 (127.0.0.1) port 8098 (#0)

> POST /types/strong/buckets/test1/keys/user1 HTTP/1.1

> User-Agent: curl/7.30.0

> Host: 127.0.0.1:8098

> Accept: */*

> Content-Type: text/plain

> Content-Length: 4

> 

* upload completely sent off: 4 out of 4 bytes

< HTTP/1.1 503 Service Unavailable

< Vary: Accept-Encoding

* Server MochiWeb/1.1 WebMachine/1.10.5 (jokes are better explained) is not blacklisted

< Server: MochiWeb/1.1 WebMachine/1.10.5 (jokes are better explained)

< Date: Sat, 28 Jun 2014 10:49:25 GMT

< Content-Type: text/plain

< Content-Length: 18

< 

request timed out

* Connection #0 to host 127.0.0.1 left intact

bash-3.2$ curl -v http://127.0.0.1:8098/types/default/buckets/test1/keys/?keys=true

* About to connect() to 127.0.0.1 port 8098 (#0)

*   Trying 127.0.0.1...

* Adding handle: conn: 0x7f8df1801800

* Adding handle: send: 0

* Adding handle: recv: 0

* Curl_addHandleToPipeline: length: 1

* - Conn 0 (0x7f8df1801800) send_pipe: 1, recv_pipe: 0

* Connected to 127.0.0.1 (127.0.0.1) port 8098 (#0)

> GET /types/default/buckets/test1/keys/?keys=true HTTP/1.1

> User-Agent: curl/7.30.0

> Host: 127.0.0.1:8098

> Accept: */*

> 

< HTTP/1.1 200 OK

< Vary: Accept-Encoding

* Server MochiWeb/1.1 WebMachine/1.10.5 (jokes are better explained) is not blacklisted

< Server: MochiWeb/1.1 WebMachine/1.10.5 (jokes are better explained)

< Date: Sat, 28 Jun 2014 11:03:44 GMT

< Content-Type: application/json

< Content-Length: 18

< 

* Connection #0 to host 127.0.0.1 left intact

{"keys":["user1"]}bash-3.2$ curl -v http://127.0.0.1:8098/types/strong/buckets/test1/keys/?keys=true

* About to connect() to 127.0.0.1 port 8098 (#0)

*   Trying 127.0.0.1...

* Adding handle: conn: 0x7fa1b0819400

* Adding handle: send: 0

* Adding handle: recv: 0

* Curl_addHandleToPipeline: length: 1

* - Conn 0 (0x7fa1b0819400) send_pipe: 1, recv_pipe: 0

* Connected to 127.0.0.1 (127.0.0.1) port 8098 (#0)

> GET /types/strong/buckets/test1/keys/?keys=true HTTP/1.1

> User-Agent: curl/7.30.0

> Host: 127.0.0.1:8098

> Accept: */*

> 

< HTTP/1.1 200 OK

< Vary: Accept-Encoding

* Server MochiWeb/1.1 WebMachine/1.10.5 (jokes are better explained) is not blacklisted

< Server: MochiWeb/1.1 WebMachine/1.10.5 (jokes are better explained)

< Date: Sat, 28 Jun 2014 11:03:58 GMT

< Content-Type: application/json

< Content-Length: 11

< 

* Connection #0 to host 127.0.0.1 left intact

{"keys":[]}bash-3.2$

bash-3.2$



---
This email is free from viruses and malware because avast! Antivirus protection is active.
http://www.avast.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.basho.com/pipermail/riak-users_lists.basho.com/attachments/20140715/5ee1ec19/attachment.html>


More information about the riak-users mailing list