x-pack/libbeat/common/cloudfoundry: Use xxhash instead of SHA1#43964
x-pack/libbeat/common/cloudfoundry: Use xxhash instead of SHA1#43964shmsr merged 12 commits intoelastic:mainfrom
Conversation
|
This pull request does not have a backport label.
To fixup this pull request, you need to add the backport labels for the needed
|
|
Pinging @elastic/elastic-agent-data-plane (Team:Elastic-Agent-Data-Plane) |
AFAIK it's a complete separate offering. So, switching from one mode to another, it is not even allowed. @kruskall can confirm in case if I am wrong here. |
|
I am thinking to merge it today/ tomorrow; could I please get approval if everything looks good? |
|
@faec Could you please review this PR again? I am planning to merge it today if there are no further comments. |
|
@shmsr Fae will be out until tomorrow so she won't be able to review it once again today. |
ah, ok. Then can someone else take a look? I just want to get it reviewed before everyone leaves for EAH. |
belimawr
left a comment
There was a problem hiding this comment.
LGTM, however I'm missing a changelog entry stating that upgrading to this version will cause the cache invalidation once.
@shmsr, do you have an idea (or is it possible to measure) what would be the performance impact upon upgrade?
I don't know much about this input, but invalidating the whole cache is similar to a cold start, so my understanding is that the performance impact would not cause problems, however it would be nice to confirm that.
I will add an entry.
From the code, it looks like it's being used for an inexpensive op. I checked the usage of methods of the cache, and it was being used to get CF app info (
Yes. |
|
@elastic/ingest-docs Can I get a review on this? Added a CL entry. |
(cherry picked from commit 367b201) # Conflicts: # docs/release-notes/index.md
Proposed commit message
Drop usage of
SHA1and replace with a better algorithmxxhashfor sanitizing the filenames.Checklist
CHANGELOG.next.asciidocorCHANGELOG-developer.next.asciidoc.