create different ssh key according the article Mac Set-Up Git
$ ssh-keygen -t rsa -C "your_email@youremail.com"
| Hostname "ubuntu-12" | |
| FQDNLookup true | |
| BaseDir "/var/lib/collectd" | |
| PIDFile "/var/run/collectd.pid" | |
| PluginDir "/usr/local/lib/collectd" | |
| TypesDB "/usr/local/share/collectd/types.db" | |
| # LoadPlugin syslog | |
| # <Plugin syslog> | |
| # LogLevel info |
| This gist captures what needs to be done to add a new field to Riak's Yokozuna | |
| search index. | |
| Sources: | |
| - https://github.com/basho/yokozuna/issues/130 | |
| - http://riak-users.197444.n3.nabble.com/How-to-update-existed-schema-td4032143.html | |
| The code below is for illustration purposes only. Use at your own risk. | |
| 1. Create/Update new schema file |
create different ssh key according the article Mac Set-Up Git
$ ssh-keygen -t rsa -C "your_email@youremail.com"
| Write a program that does what it’s supposed to do | |
| Write idiomatic code | |
| Debug a program that you wrote | |
| Debug a program someone else wrote | |
| Debug the interaction between a system you wrote and one you didn’t | |
| File a good bug report | |
| Modify a program you didn’t write | |
| Test a program you wrote | |
| Test a program you didn’t write | |
| Learn a new programming language |
| %% @doc A VERY EVIL parse_transform that allows two things: | |
| %% | |
| %% 1) The use of 'else' instead of 'true' in the final clause of an if | |
| %% expression. | |
| %% | |
| %% 2) Automatic extraction of non-guard expressions into | |
| %% anonymous variables that can then be used directly in the clause | |
| %% guards. | |
| %% | |
| %% Until Erlang actually implements the 'cond' construct, this is a |
In no particular order:
###HTTP
Entry point for all object operations: https://github.com/basho/riak_kv/blob/1.4.2/src/riak_kv_wm_object.erl
delete_resource/2 takes RequestData(Request header, ex: vclock) and Context(Record containing: Bucket, Key, Client): https://github.com/basho/riak_kv/blob/1.4.2/src/riak_kv_wm_object.erl#L888
Step 1: From you logs I have decoded the bucket/key
binary_to_term(<<131,109,0,0,0,9,85,114,108,84,111,83,99,97,110>>).
<<"UrlToScan">>
binary_to_term(<<131,109,0,0,0,61,104,116,116,112,37,51,97,37,50,102,37,50,102,119,119,119,46,97,110,104,114,105,46,110,101,116,37,50,102,37,51,102,102,101,101,100,37,51,100,114,115,115,50,37,50,54,97,109,112,37,51,98,112,37,51,100,55,51,49,49,48>>).
<<"http%3a%2f%2fwww.anhri.net%2f%3ffeed%3drss2%26amp%3bp%3d73110">>
Step 2: Please run the below snippits from riak attach to identify the owning partitions of this bucket/key