Feature #4929
closedErasure encoded placement group
16%
Description
This is the home page of erasure coding implementation in Ceph. The description should contain links to all the background information used by the current developers and required for a new developer to jump in. The sub tasks are a complete inventory of the working currently going on and each of them contains links to the corresponding github pull requests or work in progress.
Documentation:
- http://wiki.ceph.com/01Planning/02Blueprints/Emperor/Erasure_coded_storage_backend_%28step_2%29
- Introduction of the second day, Sage explains the Big Rados Features, including erasure code
Sage : ... The big one is erasure coding which is great to have more efficient storage and for tiering. It's good for performances and overall for the cost / performance ratio. ... Erasure coding : the motivation here is that erasure coding is a different way to handle data redundancy using much less overall space but you actually get higher overall data durability so you have a lower probabily of losing data when machine dies, disk dies and so forth. Work has already started in this area by Loic and that's been great so over this next two cycles we're going to be putting Inktank resources and our efforts as well : there is a lot of code refactoring, moving around, making sure that it fits nicely into the structure of rados, so we're very excited to get started on that work. ...
- http://wiki.ceph.com/01Planning/02Blueprints/Dumpling/Erasure_encoding_as_a_storage_backend
- http://pad.ceph.com/p/Erasure_encoding_as_a_storage_backend
Discussions:
- PGBackend proposal
- Erasure code library summary
- Comments on Ceph distributed parity implementation
- Erasure coding implementation : high level description
- Erasure coding library API
- CEPH Erasure Encoding + OSD Scalability
- these conversations ceased to be listed at some point and more can be found when searching in the mailing lists.
Alpha testers:
First testing stage is by running teuthology tests independently, as soon as they include Erasure Code tests.
- Université de Nantes - Yann
- CERN - Andreas
- Rackspace - Darren
- Telekom - Michael
- Cloudapt - Mike
- HTS - Samuel
- five3genomics - Charles
Updated by Loïc Dachary almost 11 years ago
maybe use erasure encoding from rozofs
Updated by Loïc Dachary almost 11 years ago
the pad is only archived for so long, keep a pad backup
Erasure encoded placement group / pool * Factor reusable components out of PG/ReplicatedPG and have PG/ReplicatedPG and ErasureCodedPG share only those components and a common PG API. * Advantages: * We constrain the PG implementations less while still allowing reuse some of the common logic. * Individual components can be tested without needing to instantiate an entire PG. * We will realize benefits from better testing as each component is factored out independent of implementing ErasureCodedPG. * Some possible common components: * Peering State Machine: Currently, this is tightly coupled with the PG class. Instead, it becomes a seperate component responsible for orchestrating the peering process with a PG implementation via the PG interface. This would allow us to test specific behavior without creating an OSD or a PG. * ObjectContexts, object context tracking: this probably includes tracking read/write lock tracking for objects * Repop state?: not sure about this one, might be too different to generalize between ReplicatedPG and ErasureCodedPG * PG logs, PG missing: The logic for merging an authoritative PG log with another PG log while filling in the missing set would benefit massively from being testable seperately from a PG instance. It's possible that the stripes involved in ErasureCodedPG will make this impractical to generalize. * To isolates ceph from the actual library being used ( jerasure, zfec, fecpp, ... ), a wrapper is implemented. Each block is encoded into k data blocks and m parity blocks * context(k, m, reed-solomon|...) => context* c * encode(context* c, void* data) => void* chunks[k+m] * decode(context* c, void* chunk[k+m], int* indices_of_erased_chunks) => void* data // erased chunks are not used * repair(context* c, void* chunk[k+m], int* indices_of_erased_chunks) => void* chunks[k+m] // erased chunks are rebuilt * The ErasureEncodePG configuration is set to encode each object into k data objects and m parity objects. * It uses the parity ('INDEP') crush mode so that placement is intelligent. The indep placement avoids moving around a shard between ranks, because a mapping of [0,1,2,3,4] will change to [0,6,2,3,4] (or something) if osd.1 fails and the shards on 2,3,4 won't need to be copied around. * The ErasureEncodedPG uses k + m OSDs * Each object is a chunk * The rank of the chunk is stored in the object attribute * Each chunk is divided into B bytes long parts coded independantly. For instance a 1GB chunk can be divided in 4MB parts such that bytes 4BM to 8MB of each chunk can be processed independantly of the rest of the chunk. The K+M parts of each chunk that reside at the same position in the chunk are called a stripe. * ErasureEncodedPG implementation * Write a new object that does not need to be divided into parts because it is not too big ( 4MB for instance ) * encode(context* c, void* data) => void* chunks[k+m] * write chunk[i] to OSD[i] and set the "chunk_rank" attribute to i * Write offset, length on an existing chunk that is made of a number of independant parts coded separately * read the stripes containing offset, length * map the rank of each chunk with the OSD on which it is stored * for each stripe, decode(context* c, void* chunk[k+m], int* indices_of_erased_chunks) => void* data and append to a bufferlist * modify the bufferlist according to the write request, overriding the content that has been decoded with the content given in argument to the write * encode(context* c, void* data) => void* chunks[k+m] * write chunk[i] to the corresponding OSD[j] * Read offset, length * read the stripes containing [offset, offset + length] * for each stripe, decode(context* c, void* chunk[k+m], int* indices_of_erased_chunks) => void* data and append to a bufferlist * Object attributes * duplicate the object attributes on each OSD * Scrubbing * for each object, read each stripe and write back the repaired part if necessary * Repair * When an OSD is decommissioned, when another OSD replaces it, for each object contained in a ErasureEncodedPG using this OSD, read the object, repair each stripe and write back the part that resides on the new OSD * SJ - interface * Do we want to restrict the librados writes to just write full? For writes, write full can be implemented much more efficiently than partial writes (no need to read stripes). * xattr can probably be handled by simply replicating across stripes. * omap options: * disable * erasure code?? * replicate across all stripes - good enough for applications using omap only for limited metadata * How do we handle object classes? A read might require a round trip to replicas to fulfill, we probably don't want to block in the object class code during that time. Perhaps we only allow reads from xattrs and omap entries from the object class? * SJ - random stuff * PG temp mappings need to be able to specify a primary independently of the acting set order (stripe assignment, really). This is necessary to handle backfilling a new acting[0]. * An osd might have two stripes of the same PG due to a history as below. This could be handled by allowing independent PG objects representing each stripe to coexist on the same OSD. * [0,3,6] * [1,3,6] * [9,3,0] * hobject_t and associated encodings/stringifications needs a stripe field * OSD map needs to track stripe as well as pg_t * split is straightforward -- yay * changing m,n is not easy Use cases: 1. write full object 2. append to existing object? 3. pluggable algorithm 4. single-dc store (lower redundancy overhead) 5. geo-distributed store (better durability) Questions: object stripe unit size.. per-object or per-pool? => may as well be per-object, maybe with a pool (or aglorithm) default? Work items: clean up OSD -> pg interface factor out common PG pieces (obc tracking, pg log handling, etc.) ... profit!
Updated by Loïc Dachary over 10 years ago
Archive of the erasure code session PAD of the Emperor session summit.
~5 minutes * short introduction : erasure code vs replica * erasure coding is a property of a pool and as such implemented in placement groups * summary of what has happened during Dumpling * limit operations to read / write / append : enough when you have automatic tiering * high level design of the implementation : PGBackend * erasure code library abstract API * factor out some PG components common to erasure code * what's going to happen for Emperor * completing the high level design * implement the OSD core changes and PG rearchitecture to introduce the PGBackend interface * prepare up to five alpha tester platforms. Who's interested ? mikedawson, joelio * ??? ~20 minutes * high level design * walkthru : https://github.com/ceph/ceph/blob/wip-erasure-coding-doc/doc/dev/osd_internals/erasure_coding.rst * recovery using logs alone * delay deletion; version objects * question : coll_t to store chunk_id ? http://marc.info/?l=ceph-devel&m=137570617209017&w=4 * yes: osd should be able to store different shards of the pg at the same time * add new cpg_t or pgshard_t (pool, seed, shard) * one PG instance -> 1 or more pgshard_t/coll_t's * question : what about snapshots ? http://marc.info/?l=ceph-devel&m=137569854906474&w=4 * yes, could be... we can roll back * maybe not initially * question : what about watchers ? http://marc.info/?l=ceph-devel&m=137569854906474&w=4 * probably not bother, * but could be.. it's backed by the object_info_t, which is just an attr and is logged is its entirety * question : what about PGBackend + PGBackendInterface ? http://marc.info/?l=ceph-devel&m=137569854906474&w=4 * PGBackend will be abstract * question : what's the story behind INDEP crush mode ? * prevent crush changing the position of osds in the result list * need to make a small change so that it can leave holes in the result (instead of shifting left) * question : is it reasonable to have the attribute key/value in the PG logs ? * consensus: yes; they are small, and it makes roll forward/back easy! * testing * write as much unit tests as humanly possible * add to integration tests to teuthology qa-suite * make it easier to install / run teuthology and upgrade as it evolves ~5 minutes * get involved * the design document splits the problem into smaller tasks that can be worked on relatively independantly * the erasure coding plugin API is the easiest most independant task * top level URL http://tracker.ceph.com/issues/4929 Erasure encoded placement group * http://wiki.ceph.com/01Planning/02Blueprints/Emperor/Erasure_coded_storage_backend_%28step_2%29#Coding_tasks * also linked from the design document https://github.com/ceph/ceph/blob/wip-erasure-coding-doc/doc/dev/osd_internals/erasure_coding.rst * people involved * Samuel Just design and code review and refactoring * Loic Dachary development (full time) * ??? Notes: For erasure coding, rolling forward would not be necessary. "chunk" -> "shard"? Questions from IRC: roll forward instead of roll back? -> the problem is that you can only roll forward if you have M/N of the shards how efficient for small objects? -> not very? -> we pad out the stripe with 0's to do the erasure coding -> can use different stripe size for any object, but -> any write touches all OSDs in the PG, and small write -> ~13 ios is not ideal Erasure coded RBD? Mutation is not efficient in erasure coded PG. Tiering would be another approach to that problem.
Updated by Loïc Dachary over 10 years ago
- Description updated (diff)
Add links to the Firefly summit to the description
Updated by Loïc Dachary about 10 years ago
- Status changed from In Progress to Resolved