While Testing Augmented search feature in AWS R3 M18 Pre-ship environment - not able to get the expected results.
Following these steps to test Augmented search feature
- Make sure that the schema of kind "osdu:wks:reference-data--IndexPropertyPathConfiguration:1.0.0" is deployed. It should be as it is part of M18 schema. (Executed sucessfully)
- Make sure the feature flag "index-augmenter-enabled" is turned in the tested data partition (Do not have access to execute this step)
- Select a few kinds of data that users want to create extended properties from related objects (Selected Well, Wellbore, WellLog, WellboreTrajectory,WellboreMarkerSet)
- Define the property extension configuration in the data block of the records with kind "osdu:wks:reference-data--IndexPropertyPathConfiguration:1.0.0".
- Deploy the configuration records to the storage via storage API
Configuration records created
{ "recordCount": 5, "recordIds": [ "osdu:reference-data--IndexPropertyPathConfiguration:work-product-component--WellLog:1.", "osdu:reference-data--IndexPropertyPathConfiguration:work-product-component--WellboreTrajectory:1.", "osdu:reference-data--IndexPropertyPathConfiguration:work-product-component--WellboreMarkerSet:1.", "osdu:reference-data--IndexPropertyPathConfiguration:wks:master-data--Well:1.", "osdu:reference-data--IndexPropertyPathConfiguration:wks:master-data--Wellbore:1." ], "skippedRecordIds": [], "recordIdVersions": [ "osdu:reference-data--IndexPropertyPathConfiguration:work-product-component--WellLog:1.:1687552840965025", "osdu:reference-data--IndexPropertyPathConfiguration:work-product-component--WellboreTrajectory:1.:1687552840965025", "osdu:reference-data--IndexPropertyPathConfiguration:work-product-component--WellboreMarkerSet:1.:1687552840965025", "osdu:reference-data--IndexPropertyPathConfiguration:wks:master-data--Well:1.:1687552840965025", "osdu:reference-data--IndexPropertyPathConfiguration:wks:master-data--Wellbore:1.:1687552840965025" ] }Retrieved Well configuration record for verification
{ "data": { "Name": "Well-IndexPropertyPathConfiguration", "Description": "The index property list for master-data--Well:1., valid for all master-data--Well kinds for major version 1.", "Code": "osdu:wks:master-data--Well:1.", "AttributionAuthority": "OSDU", "Configurations": [ { "Name": "CountryNamesKTJun23", "Policy": "ExtractAllMatches", "Paths": [ { "RelatedObjectsSpec": { "RelationshipDirection": "ChildToParent", "RelatedObjectID": "data.GeoContexts[].GeoPoliticalEntityID", "RelatedObjectKind": "osdu:wks:master-data--GeoPoliticalEntity:1.", "RelatedConditionMatches": [ "osdu:reference-data--GeoPoliticalEntityType:Country:" ], "RelatedConditionProperty": "data.GeoContexts[].GeoTypeID" }, "ValueExtraction": { "ValuePath": "data.GeoPoliticalEntityName" } } ], "UseCase": "As a user I want to find objects by a country name, with the understanding that an object may extend over country boundaries." }, { "Name": "WellUWIKTJun23", "Policy": "ExtractFirstMatch", "Paths": [ { "ValueExtraction": { "RelatedConditionMatches": [ "osdu:reference-data--AliasNameType:UniqueIdentifier:", "osdu:reference-data--AliasNameType:RegulatoryName:", "osdu:reference-data--AliasNameType:PreferredName:", "osdu:reference-data--AliasNameType:CommonName:", "osdu:reference-data--AliasNameType:ShortName:" ], "RelatedConditionProperty": "data.NameAliases[].AliasNameTypeID", "ValuePath": "data.NameAliases[].AliasName" } } ], "UseCase": "As a user I want to discover and match Wells by their UWI. I am aware that this is not globally reliable, however, I am able to specify a prioritized AliasNameType list to look up value in the NameAliases array." } ] }, "meta": [], "modifyUser": "admin-main@testing.com", "modifyTime": "2023-06-23T20:40:41.335Z", "id": "osdu:reference-data--IndexPropertyPathConfiguration:wks:master-data--Well:1.", "version": 1687552840965025, "kind": "osdu:wks:reference-data--IndexPropertyPathConfiguration:1.0.0", "acl": { "viewers": [ "data.default.viewers@osdu.example.com" ], "owners": [ "data.default.owners@osdu.example.com" ] }, "legal": { "legaltags": [ "osdu-AugmIdxExt-Legal-Tag-Test" ], "otherRelevantDataCountries": [ "US" ], "status": "compliant" }, "createUser": "admin-main@testing.com", "createTime": "2023-06-15T17:35:37.889Z" }re-index --Well:1.0.0, --Well:1.1.0, --Well:1.2.0
curl --location 'https://osdu.r3m18.preshiptesting.osdu.aws/api/indexer/v2/reindex?force_clean=true' \ --header 'Content-Type: application/json' \ --header 'data-partition-id: osdu' \ --header 'Authorization: Bearer eyJraWQiOi...truncated...CG4HUDHg' \ --data '{ "kind": "osdu:wks:master-data--Well:1.0.0" }'Response 200 OK
Search and it's results
curl --location 'https://osdu.r3m18.preshiptesting.osdu.aws/api/search/v2/query' \ --header 'Authorization: Bearer eyJraWQiOi...Truncated...BAy-bDbtQ' \ --header 'data-partition-id: osdu' \ --header 'Content-Type: application/json' \ --data '{ "kind": "osdu:wks:master-data--Well:1.*", "query": "_exists_:data.WellUWIKTJun23", "returnedFields": ["id", "kind", "data.WellUWIKTJun23"] }'Response 200 OK { "results": [], "aggregations": [], "totalCount": 0 }
Also tried similar steps in GC where we have access to look at whether the feature is available or not. We found that feature is not enabled and do not have permissions/access to enable the feature.
In GC R3 M18 Pre-ship environment
curl --location 'https://preship.gcp.gnrg-osdu.projects.epam.com/api/partition/v1/partitions/odesprod' \ --header 'Content-Type: application/json' \ --header 'data-partition-id: odesprod' \ --header 'Authorization: Bearer ya29.a0AWY7Ckmj...truncated...fpwHiQ0167' \ --data ''Response 200 OK { "kubernetes-secret-name": { "sensitive": false, "value": "eds-odesprod" }, "elasticsearch.password": { "sensitive": true, "value": "ELASTIC_PASS_ODESPROD" }, "serviceAccount": { "sensitive": false, "value": "datafier@osdu-service-prod.iam.gserviceaccount.com" }, "dataPartitionId": { "sensitive": false, "value": "odesprod" }, "bucket": { "sensitive": false, "value": "osdu-data-prod-odesprod-records" }, "index-augmenter-enabled": { "sensitive": false, "value": "false" }, ...Truncated... { "indexer.service.account": { "sensitive": false, "value": "workload-indexer-gcp@osdu-service-prod.iam.gserviceaccount.com" }, "projectId": { "sensitive": false, "value": "osdu-data-prod" } } When I try to enable the index-augmenter, I get the response of 403 Forbidden - RBAC: access denied.