The Tablestore SDK for Python supports operations on wide table models and time series models.
Get started
Integrate the Tablestore SDK for Python by preparing your environment, installing the SDK, and initializing a client.
Prerequisites
Download and install the Python runtime environment. Run the python3 --version command to check your Python version.
Starting from version 6.0.0, the Python SDK supports only Python 3 and no longer supports Python 2. To use Python 2, you must use version 5.4.4 or earlier.
Install the SDK
Select an installation method based on your development environment. Use the latest version of the SDK to ensure that the code examples run correctly.
Install by using pip (recommended)
Run the following command to install the Tablestore SDK for Python.
pip3 install tablestoreInstall from GitHub
Download the Tablestore SDK from GitHub using the git command and install it.
Run the following command to download the SDK.
git clone https://github.com/aliyun/aliyun-tablestore-python-sdk.gitRun the following command to navigate to the SDK installation package folder.
cd aliyun-tablestore-python-sdkRun the following command to install the SDK.
python3 setup.py install
Install from source code
Download and install the SDK source code.
Download and decompress the Python SDK.
Navigate to the folder where you decompressed the SDK package.
Run the following command to install the SDK.
python3 setup.py install
Configure access credentials
Create an AccessKey for your Alibaba Cloud account or a RAM user. Then, configure the AccessKey in the environment variables as shown below. Configuring the AccessKey in environment variables improves security because it prevents you from hard-coding sensitive information in your code.
After the configuration is complete, you must restart or refresh your development environment. This includes your IDE, command-line interface, other desktop applications, and background services. This ensures that the latest system environment variables are loaded. For more information about other types of access credentials, see Configure access credentials.
Linux
-
Run the following commands to append the environment variable settings to the
~/.bashrcfile.echo "export TABLESTORE_ACCESS_KEY_ID='YOUR_ACCESS_KEY_ID'" >> ~/.bashrc echo "export TABLESTORE_ACCESS_KEY_SECRET='YOUR_ACCESS_KEY_SECRET'" >> ~/.bashrc -
Run the following command to apply the changes.
source ~/.bashrc -
Run the following commands to verify that the environment variables are effective.
echo $TABLESTORE_ACCESS_KEY_ID echo $TABLESTORE_ACCESS_KEY_SECRET
macOS
-
Run the following command in the terminal to view your default shell type.
echo $SHELL -
Perform the following operations based on your default shell type.
Zsh
-
Run the following commands to append the environment variable settings to the
~/.zshrcfile.echo "export TABLESTORE_ACCESS_KEY_ID='YOUR_ACCESS_KEY_ID'" >> ~/.zshrc echo "export TABLESTORE_ACCESS_KEY_SECRET='YOUR_ACCESS_KEY_SECRET'" >> ~/.zshrc -
Run the following command to apply the changes.
source ~/.zshrc -
Run the following commands to verify that the environment variables are effective.
echo $TABLESTORE_ACCESS_KEY_ID echo $TABLESTORE_ACCESS_KEY_SECRET
Bash
-
Run the following commands to append the environment variable settings to the
~/.bash_profilefile.echo "export TABLESTORE_ACCESS_KEY_ID='YOUR_ACCESS_KEY_ID'" >> ~/.bash_profile echo "export TABLESTORE_ACCESS_KEY_SECRET='YOUR_ACCESS_KEY_SECRET'" >> ~/.bash_profile -
Run the following command to apply the changes.
source ~/.bash_profile -
Run the following commands to verify that the environment variables are effective.
echo $TABLESTORE_ACCESS_KEY_ID echo $TABLESTORE_ACCESS_KEY_SECRET
-
Windows
CMD
-
Run the following commands in Command Prompt (CMD) to set the environment variables.
setx TABLESTORE_ACCESS_KEY_ID "YOUR_ACCESS_KEY_ID" setx TABLESTORE_ACCESS_KEY_SECRET "YOUR_ACCESS_KEY_SECRET" -
Restart CMD and run the following commands to verify that the environment variables are effective.
echo %TABLESTORE_ACCESS_KEY_ID% echo %TABLESTORE_ACCESS_KEY_SECRET%
PowerShell
-
Run the following commands in PowerShell.
[Environment]::SetEnvironmentVariable("TABLESTORE_ACCESS_KEY_ID", "YOUR_ACCESS_KEY_ID", [EnvironmentVariableTarget]::User) [Environment]::SetEnvironmentVariable("TABLESTORE_ACCESS_KEY_SECRET", "YOUR_ACCESS_KEY_SECRET", [EnvironmentVariableTarget]::User) -
Run the following commands to verify that the environment variables are effective.
[Environment]::GetEnvironmentVariable("TABLESTORE_ACCESS_KEY_ID", [EnvironmentVariableTarget]::User) [Environment]::GetEnvironmentVariable("TABLESTORE_ACCESS_KEY_SECRET", [EnvironmentVariableTarget]::User)
Initialize the client
The following code initializes a Tablestore client and lists all data tables and time series tables in a specified instance to verify the connection.
Public network access is disabled by default for new instances. To access resources on an instance over the public network, you can enable public network access in the Network Management settings for the instance.
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
import os
import sys
from tablestore import OTSClient
def main():
try:
# Get access credentials from environment variables. Ensure TABLESTORE_ACCESS_KEY_ID and TABLESTORE_ACCESS_KEY_SECRET are set.
access_key_id = os.getenv("TABLESTORE_ACCESS_KEY_ID")
access_key_secret = os.getenv("TABLESTORE_ACCESS_KEY_SECRET")
# TODO: Replace the following values with your instance details.
instance_name = "n01k********" # Instance name
endpoint = "https://n01k********.cn-hangzhou.ots.aliyuncs.com" # Instance endpoint
# Create a client instance.
client = OTSClient(endpoint, access_key_id, access_key_secret, instance_name)
# List the data tables.
resp = client.list_table()
print(f"Found {len(resp)} data tables in instance '{instance_name}':")
for table_name in resp:
print(f"{table_name}")
# List the time series tables.
resp = client.list_timeseries_table()
print(f"\nFound {len(resp)} time series tables in instance '{instance_name}':")
for tableMeta in resp:
print(f"{tableMeta.timeseries_table_name}")
except Exception as e:
print(f"Operation failed: {str(e)}")
sys.exit(1)
if __name__ == "__main__":
main()Version compatibility
The current version is 6.x.x. The following list describes its compatibility with earlier versions:
Compatible with the 5.x.x series of the SDK.
Versions 5.4.x, 5.3.x, and 5.2.x are compatible. Versions 5.2.1 and 5.1.0 are incompatible in the following cases:
The type of the return value for the
Searchmethod.In versions 5.1.0 and earlier, the method returns a
Tupleobject by default. Starting from version 5.2.0, the method returns aSearchResponseobject by default. TheSearchResponseobject implements the__iter__method and supports traversal. To return aTupleobject, use theSearchResponse.v1_response()method.The new
ParallelScanmethod.By default, the method returns a
ParallelScanResponseobject. To return aTupleobject, use theParallelScanResponse.v1_response()method.
Compatible with the 4.x.x series of the SDK.
Not compatible with the 2.x.x series of the SDK. Versions in the 2.x.x series support out-of-order primary keys, whereas versions 4.0.0 and later do not. The incompatibilities include the following:
The package name changed from
ots2totablestore.The
TableOptionsparameter was added to theClient.create_tablemethod.For methods such as
put_row,get_row, andupdate_row, the type of theprimary_keyparameter changed fromdicttolistto ensure the order of primary keys.For methods such as
put_rowandupdate_row, the type of theattribute_columnsparameter changed fromdicttolist.A
timestampwas added to theattribute_columnsparameter for methods such asput_rowandupdate_row.Methods such as
get_rowandget_rangenow include themax_version and time_rangeparameters. You must specify at least one of these two parameters.Operations such as
put_row,update_row, anddelete_rownow support thereturn_typeparameter. The only supported value for this parameter isRT_PK, which specifies that the return value includes the primary key (PK) of the row.Operations such as
put_row,update_row, anddelete_rownow include thereturn_rowfield in their return value. If you set thereturn_typeparameter toRT_PKin a request, thereturn_rowfield contains thePKvalue of the row.
FAQ
What do I do if a "Signature mismatch" error occurs?
The following exception occurs:
Error Code: OTSAuthFailed, Message: Signature mismatch., RequestId: 0005f55a-xxxx-xxxx-xxxx-xxxxxxxxxxxx, TraceId: 10b0f0e0-xxxx-xxxx-xxxx-xxxxxxxxxxxx, HttpStatus: 403
-
Cause: The AccessKey ID or AccessKey secret specified during client initialization is incorrect.
-
Solution: Provide the correct AccessKey, which includes the AccessKey ID and AccessKey secret.
What do I do if a "Request denied by instance ACL policies" error occurs?
The following Request denied by instance ACL policies exception occurs when you use the SDK to access resources in a Tablestore instance. An example error is shown below:
[ErrorCode]:OTSAuthFailed, [Message]:Request denied by instance ACL policies., [RequestId]:XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX, [TraceId]:XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX, [HttpStatus:]403
-
Cause: The network type used by the client does not meet the network access requirements of the instance. For example, the client uses the Internet, but the instance is not configured to allow access over the Internet.
-
Solution: By default, public network access is disabled for new instances. To access resources in an instance over the Internet, enable public network access as follows:
-
Go to the Tablestore console and click the instance alias.
-
Click Network Management. For Allowed Network Type, select Internet, and then click Settings.
-
What do I do if a "Request denied because this instance can only be accessed from the binded VPC" error occurs?
The following Request denied because this instance can only be accessed from the bound VPC exception occurs when you use the SDK to access resources in a Tablestore instance. An example error is shown below:
[ErrorCode]:OTSAuthFailed, [Message]:Request denied because this instance can only be accessed from the binded VPC., [RequestId]:XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX, [TraceId]:XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX, [HttpStatus:]403
-
Cause: If the access type of the Tablestore instance is set to Bound VPCs Only or Tablestore Console or Bound VPCs, you must attach a VPC to the instance. You must also ensure that the client is in the same VPC as the instance and accesses Tablestore using a VPC endpoint.
-
Solution: Change the instance access type to allow Internet access, or attach a VPC to the Tablestore instance and ensure that the client is within that VPC network. To attach a VPC:
-
Go to the Tablestore console and click the instance alias.
-
Click . Select a VPC ID and a VSwitch, enter a VPC Name, and then click OK.
-
How do I access Tablestore resources over HTTPS?
Use the latest version of the Python SDK. Ensure that your OpenSSL version is 0.9.8j or later. OpenSSL 1.0.2d is recommended.
What do I do if protobuf versions are incompatible?
Some protobuf versions are not compatible with the *pb2.py files in the current installation package. To resolve this issue, regenerate the *pb2.py files manually:
Use your current version of protoc to generate the code for the corresponding proto files in sequence.
protoc --python_out=. tablestore/protobuf/search.proto protoc --python_out=. tablestore/protobuf/table_store.proto protoc --python_out=. tablestore/protobuf/table_store_filter.protoRename the three generated files with the
pb2.pyextension. Then, copy the files to thetablestore/protobuf/folder in the installation directory to replace the original*pb2.pyfiles.
Use the Credentials tool to read access credentials
Run the following command to install the alibabacloud_credentials package.
pip3 install alibabacloud_credentialsConfigure environment variables.
Set the
ALIBABA_CLOUD_ACCESS_KEY_IDandALIBABA_CLOUD_ACCESS_KEY_SECRETenvironment variables to the AccessKey ID and AccessKey secret of your Alibaba Cloud account.Read the access credentials.
The following code uses the Credentials tool to read access credentials from environment variables.
# -*- coding: utf-8 -*- from alibabacloud_credentials.client import Client as CredClient # Use CredClient to get the AccessKey ID and AccessKey secret from the environment variables. cred = CredClient() access_key_id = cred.get_credential().access_key_id access_key_secret = cred.get_credential().access_key_secret