Amshuman K R

Results 38 comments of Amshuman K R

The long duration part is to be addressed via https://github.com/gardener/etcd-druid/issues/88.

The following part of the issue is already solved in #259 released in [v0.11.1](https://github.com/gardener/etcd-backup-restore/releases/tag/v0.11.1). ``` etcd-main-0 backup-restore time="2020-11-24T09:56:24Z" level=info msg="Removing directory(/var/etcd/data/new.etcd.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.pa rt.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.par t.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part.part)." etcd-main-0 backup-restore time="2020-11-24T09:56:24Z" level=error msg="Failed initialization: error...

@Gerrit91 Regarding the second part of the error `mismatched event revision while applying delta snapshot, expected 69263102 but applied 69263103`, the related #283 was closed because the _right thing_ was...

@swapnilgm An alternative to avoid 3 times db size, could be if we encrypt on the fly while writing the snapshot to the disk in the first place. Then we...

Let me clarify terminology, because I myself am confused by the above discussion. * Chunking 1. Multi-part chunking to manage networking issues while uploading large snapshot files to the blobstore....

@swapnilgm From [above](https://github.com/gardener/etcd-backup-restore/issues/83#issuecomment-479755427), I would prefer not to couple the chunk size in upload to the chunk size. This means that the upload chunk size would be independent of the...

Now to actual the on-the-fly encryption part. I think there are at least 3 ways to do this. I found [this](https://www.reddit.com/r/golang/comments/87wcik/how_do_you_encrypt_large_ioreader_streams/) helpful. 1. https://golang.org/pkg/crypto/cipher/#example_StreamWriter. Checksum would have to be implemented....

> Now regarding on-the-fly encryption, please don't misunderstand me that i'm completely against it. I was putting my concerns regarding performance aspect we might have to consider. If majority feel...

According to quick measurements from @shreyas-s-rao it looks like the overhead on encryption (in-flight) is minimal, especially on CPU utilisation and I am confident we can get the memory overhead...

> In decryption, we don't need it, because there is no parallel ETCD or am I wrong. At present, we do not delete the old `etcd` folder during restoration and...