InternalURLs:
"http://<span class="userinput">keep0.uuid_prefix.your.domain</span>:25107/": {}
API:
- MaxKeepBlockBuffers: 128
+ MaxKeepBlobBuffers: 128
</code></pre>
</notextile>
# Maximum number of 64MiB memory buffers per keepstore server
# process, or 0 for no limit.
- MaxKeepBlockBuffers: 128
+ MaxKeepBlobBuffers: 128
# API methods to disable. Disabled methods are not listed in the
# discovery document, and respond 404 to all requests.
if v := oc.LogFormat; v != nil && *v != cluster.SystemLogs.Format {
cluster.SystemLogs.Format = *v
}
- if v := oc.MaxBuffers; v != nil && *v != cluster.API.MaxKeepBlockBuffers {
- cluster.API.MaxKeepBlockBuffers = *v
+ if v := oc.MaxBuffers; v != nil && *v != cluster.API.MaxKeepBlobBuffers {
+ cluster.API.MaxKeepBlobBuffers = *v
}
if v := oc.MaxRequests; v != nil && *v != cluster.API.MaxConcurrentRequests {
cluster.API.MaxConcurrentRequests = *v
Format: text
LogLevel: debug
API:
- MaxKeepBlockBuffers: 1234
+ MaxKeepBlobBuffers: 1234
MaxConcurrentRequests: 2345
Collections:
BlobSigningTTL: 123m
"API.MaxConcurrentRequests": false,
"API.MaxIndexDatabaseRead": false,
"API.MaxItemsPerResponse": true,
- "API.MaxKeepBlockBuffers": false,
+ "API.MaxKeepBlobBuffers": false,
"API.MaxRequestAmplification": false,
"API.MaxRequestSize": true,
"API.RailsSessionSecretToken": false,
# Maximum number of 64MiB memory buffers per keepstore server
# process, or 0 for no limit.
- MaxKeepBlockBuffers: 128
+ MaxKeepBlobBuffers: 128
# API methods to disable. Disabled methods are not listed in the
# discovery document, and respond 404 to all requests.
MaxIndexDatabaseRead int
MaxItemsPerResponse int
MaxConcurrentRequests int
- MaxKeepBlockBuffers int
+ MaxKeepBlobBuffers int
MaxRequestAmplification int
MaxRequestSize int
RailsSessionSecretToken string
func convertKeepstoreFlagsToServiceFlags(args []string, lgr logrus.FieldLogger) ([]string, bool) {
flags := flag.NewFlagSet("", flag.ContinueOnError)
flags.String("listen", "", "Services.Keepstore.InternalURLs")
- flags.Int("max-buffers", 0, "API.MaxKeepBlockBuffers")
+ flags.Int("max-buffers", 0, "API.MaxKeepBlobBuffers")
flags.Int("max-requests", 0, "API.MaxConcurrentRequests")
flags.Bool("never-delete", false, "Collections.BlobTrash")
flags.Bool("enforce-permissions", false, "Collections.BlobSigning")
func (h *handler) setup(ctx context.Context, cluster *arvados.Cluster, token string, reg *prometheus.Registry, serviceURL arvados.URL) error {
h.Cluster = cluster
h.Logger = ctxlog.FromContext(ctx)
- if h.Cluster.API.MaxKeepBlockBuffers <= 0 {
+ if h.Cluster.API.MaxKeepBlobBuffers <= 0 {
return fmt.Errorf("MaxBuffers must be greater than zero")
}
- bufs = newBufferPool(h.Logger, h.Cluster.API.MaxKeepBlockBuffers, BlockSize)
+ bufs = newBufferPool(h.Logger, h.Cluster.API.MaxKeepBlobBuffers, BlockSize)
if h.Cluster.API.MaxConcurrentRequests < 1 {
- h.Cluster.API.MaxConcurrentRequests = h.Cluster.API.MaxKeepBlockBuffers * 2
- h.Logger.Warnf("MaxRequests <1 or not specified; defaulting to MaxKeepBlockBuffers * 2 == %d", h.Cluster.API.MaxConcurrentRequests)
+ h.Cluster.API.MaxConcurrentRequests = h.Cluster.API.MaxKeepBlobBuffers * 2
+ h.Logger.Warnf("MaxRequests <1 or not specified; defaulting to MaxKeepBlobBuffers * 2 == %d", h.Cluster.API.MaxConcurrentRequests)
}
if h.Cluster.Collections.BlobSigningKey != "" {
ok := make(chan bool)
go func() {
- for i := 0; i < s.cluster.API.MaxKeepBlockBuffers+1; i++ {
+ for i := 0; i < s.cluster.API.MaxKeepBlobBuffers+1; i++ {
// Unauthenticated request, no server key
// => OK (unsigned response)
unsignedLocator := "/" + TestHash
ok := make(chan bool)
go func() {
- for i := 0; i < s.cluster.API.MaxKeepBlockBuffers+1; i++ {
+ for i := 0; i < s.cluster.API.MaxKeepBlobBuffers+1; i++ {
// Unauthenticated request, unsigned locator
// => OK
unsignedLocator := "/" + TestHash