Skip to main content

Implementation of Delete Operations

TODO: File a subtask under HDDS-9862 and complete this page or section.

Deleting Metadata

Deleting Data

Trace every part of a delete request from beginning to end. This includes:

  • Client getting encryption keys
  • Client calling OM to delete the key
  • OM validating client's Kerberos principal
  • OM checking permissions (Ranger or Native ACLs)
  • OM marking the key for deletion and removing it from the namespace.
  • OM acking to the client
  • OM sending blocks to delete to SCM
  • SCM sending blocks to delete to the Datanode
  • Datanode removes data

Note that delete works the same regardless of replication type. Also document timing of background services and their batch size to estimate the rate of deletion.