bitrot detection in glusterfs
play

BitRot detection in GlusterFS Venky Shankar Gaurav Garg We are, - PowerPoint PPT Presentation

BitRot detection in GlusterFS Venky Shankar Gaurav Garg We are, Gluster developers at Red Hat ... participate in meetups, open source events ... hang out on #freenode: gluster, gluster-dev nick: overclk, ggarg ... interact with community:


  1. BitRot detection in GlusterFS Venky Shankar Gaurav Garg

  2. We are, Gluster developers at Red Hat ... participate in meetups, open source events ... hang out on #freenode: gluster, gluster-dev nick: overclk, ggarg ... interact with community: gluster-devel@gluster.org gluster-users@gluster.org

  3. OK, enough. Let’s get started...

  4. GlusterFS Quick Tour

  5. ● Distributed ● Local filesystem ( brick ) XFS ○ Where’s my data? EXT3, EXT4 ○ ○ BTRFS ● Prerequisite POSIX compatible ○ Xattr support ○

  6. Understanding data corruption

  7. ● Direct “brick” manipulation ○ Script bug Corruption? ○ Admin Malicious ○ How ?

  8. ● Silent corruption Corruption? Disk itself ○ ■ Firmware bug ■ Mechanical wear How ? ■ Ageing (cont..)

  9. Illustration

  10. Solution: Integrity checks

  11. ● Track data modifications Checksum (signature) ○ ○ Persistent Integrity Check ● Verify during access Recompute and check ○ ● Repair if corrupted Consistency

  12. Enough of theory, show me how it’s done.

  13. ● Big fat-file story Implementation ● Deployments Distribute + Replicate ○ ○ Stripe, now [3.7+] sharding Constraints on choices Erasure coded ○

  14. ● In-band data signing Costly ○ Implementation RMW cycle ○ ○ Degraded I/O performance ● Verification Constraints on choices (cotd..) “ Ditto ” ○

  15. ● Out-of-band data signing ○ Daemon ○ Asynchronous Implementation ■ Policy ■ Strong hash (reason ?) ● Verification Details ○ Daemon (scrubber) On-demand ○ ○ Pre-scrubbed

  16. ● Object versioning ○ Versioned upon modification Implementation Versioning xattr (64 bit) ○ ○ Reflect “object state” ● Signature Details (cotd..) ○ xattr Attached to a “version” ○

  17. ● Integrity checking Periodic ○ ■ daily, weekly, etc.. ○ Filesystem scan ■ Signature mismates Implementation ■ Matching version ○ QoS ■ Controlled crunching Details (cotd..) ● Corrupted objects Denies access (EIO) ○ ○ Repairable ■ Replica, Codes

  18. Use cases

  19. ● Small files Use Cases ● Long lived data Archival storage ○ WORM workload ○

  20. ● Replica consistency ● Metadata checksumming ● Offloading BTRFS ○ Future ● Sharding adaption ● GlusterFS 4.0 [Interesting!] ○ In-band ( weaker hash ) Checksum everything ○ Default ○ ○ Lost (phantom) writes

  21. ● Bitrot detection ● Bug fixes ● Hell of a change ● No recovery ● Scrub status ● Sharding by default ● In comes sharding ● Checksum everything 3.7 3.7.2 3.7.4 3.8 4.0 ● Recovery support ● Sharding ready ● Bitrot adaption

  22. Q & A

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend