Bassam Tabbara <Bassam.Tabbara@...>
Camille, yes! :-)toggle quoted message Show quoted text
The premise of Rook is to provide a cloud-native alternative to Amazon S3, EBS and EFS. These storage services can run directly inside the cloud native environment vs. vendor specific implementations outside it. By running them inside the cluster it enables us to to integrate them more deeply (scheduling, security, management, etc.) and enables multi-cloud and federation.
This is similar to the relationship between Istio/Envoy and Amazon ELB, Prometheus and Amazon CloudWatch, etc.
Alexis, I know you were having audio issues, I’d be happy to repeat the talk this morning if you’d like.
On Jun 6, 2017, at 3:01 PM, Camille Fournier <skamille@...> wrote:
Presumably providing an abstraction layer that can front Amazon, Google, and internal cloud offerings. For those of us who need such a thing.
On Jun 6, 2017 5:55 PM, "Alexis Richardson via cncf-toc" <cncf-toc@...> wrote:
I don't understand what you are doing which is better than what Amazon can do alone.
On Tue, 6 Jun 2017, 22:50 Bassam Tabbara, <Bassam.Tabbara@...> wrote:
Do you mean EBS? For S3 which has 11 9’s (over a year) of durability you’d need 10s of Rook storage nodes spread across three availability zones.
For block storage, i.e. the use case in the original thread, you can make do with a smaller number of nodes. You can run with two, but I would recommend you deploy more.
On Jun 6, 2017, at 2:43 PM, Alexis Richardson <alexis@...> wrote:
So you need a pair of rook nodes to be more reliable than S3?
On Tue, 6 Jun 2017, 22:27 Bassam Tabbara, <Bassam.Tabbara@...> wrote:
Definitely. You would need to have a sizable cluster before you can reach high availability and durability numbers like S3.
However, EBS volumes supposedly have an annual failure rate of 0.1-0.2%, and are rumored to run on a pair of servers for each volume.
On Jun 6, 2017, at 2:22 PM, Alexis Richardson <alexis@...> wrote:
Ok so in the single node case you are less reliable than S3?
On Tue, 6 Jun 2017, 22:15 Bassam Tabbara, <Bassam.Tabbara@...> wrote:
No. There are no writes to S3 at all, and that would slow down write significantly.
If you’re concerned about DR then you can take a crash-consistent snapshot of the volume(s) and send that off to S3, just as with EBS snapshots.
On Jun 6, 2017, at 2:13 PM, Alexis Richardson <alexis@...> wrote:
Does the first storage node write to S3 before or after pushing updates to the other nodes
On Tue, 6 Jun 2017, 22:10 Bassam Tabbara, <Bassam.Tabbara@...> wrote:
Sure. Assuming a pod running in K8S has already mounted a Rook volume the main flow is:
- writes to the volume (say /dev/rbd0) go through the kernel module and then out on the network- one of the storage nodes receives the data and replicates it to 2-3 other storage nodes (in parallel) in the same pool backing the volume- once the other replicas acknowledge the write the primary storage node completes the write operation.
Note there is no distinction between local and remote writes in this flow, they all result in network traffic due to replication. Its possible that one of the storage nodes is colocated with the client initiating the write, but thats inconsequential.
On Jun 6, 2017, at 1:58 PM, Alexis Richardson <alexis@...> wrote:
Please can you talk through the interaction flow for a local plus remote disk write on AWS, assuming the write is initiated by a process associated with a container cluster (eg k8s).
On Tue, 6 Jun 2017, 21:39 Bassam Tabbara, <Bassam.Tabbara@...> wrote:
The most severe failure cases are ones that could lead to permanent data loss. There are a few, but first some background:
- Volumes are backed by virtual storage pools.
- Virtual pools are made up of a number of storage nodes that work together to ensure that data is stored reliably
- A pool can be configured to store replicas of data (typically 3x) or erasure coded chunks (different algorithms and factors are supported).
- when a storage node is lost the others help re-replicate the data (i.e. data maintenance).
Now the failure cases:
- if too many nodes in the same pool are lost within a short window of time you’ll suffer data loss, for example, all three nodes in a 3x replica are lost at the same time.
- if there are not enough resources to replicate/regenerate the data before more losses occur.
To guard against such failures, most systems (including Rook) do the following:
- storage nodes are spread across failure domains (different hosts, racks, zones etc.)
- prioritize resources for “data maintenance” over resources used for “normal" data operations.
In the context of running Rook in AWS, this means ensuring that the Rook storage pods are spread across the nodes in the cluster and across availability zones. Also ensuring that you’ve sized the machines and network to support data maintenance. Prioritization schemes also help, for example, SRV-IO is a popular way to do so without massive changes to the network.
Finally, this is a good example of why building a control plane that can automate such decisions/tradeoffs helps ensure success with storage.
> On Jun 6, 2017, at 1:06 PM, Alexis Richardson <alexis@...> wrote:
> What are the failure cases for this ?
> On Tue, Jun 6, 2017 at 5:41 PM, Bassam Tabbara
> <Bassam.Tabbara@...> wrote:
>> Thanks! We joined the Storage WG and will work with Ben on CSI and future
>> The use case was running Rook Block storage on-top of ephemeral/instance
>> storage on EC2 instances vs. using EBS storage. Rook would handle the
>> replication of data across instances and stripe across them for performance.
>> Pods in the cluster would see this like any other volume.
>> For Pod failover, the detach / detach cycle is much faster than EBS. One of
>> our users compared EBS to Rook  and showed that Rook volume failover
>> happened in less than minutes vs. up to an hour with EBS.
>> Also EBS volumes only support a single writer (ReadWriteOnce in K8S) which
>> makes them a poor candidate for hot failover scenarios underneath, say,
>> Postgres or MySql. With the work we’re doing on the Rook Volume Plugin 
>> we plan to support ReadWriteMany to support a hotter failover where the
>> app/service ontop can handle the fencing.
>> Finally, there are cost and performance tradeoffs for running on-top of
>> ephemeral/instance storage vs. EBS. For example, a lot of the instance
>> storage is unused in most deployments and has a high performance.
>> Happy to discuss in more detail.
>>  https://na01.safelinks.
protection.outlook.com/?url= https%3A%2F%2Fgitter.im% 2Frook%2Frook%3Fat% 3D58baff6f872fc8ce62b6ee26& data=02%7C01%7CBassam.Tabbara% 40quantum.com% 7Cac58cc3d749e453fda4e08d4ad17 8f30% 7C322a135f14fb4d72aede12227213 4ae0%7C1%7C0% 7C636323764076275976&sdata= 8dSWMXRMqtmPH5goZx4O% 2BpVTesQEuS4cb21qgJmmTw0%3D& reserved=0
>>  https://na01.safelinks.
protection.outlook.com/?url= https%3A%2F%2Fgithub.com% 2Fkubernetes%2Fkubernetes% 2Fpull%2F46843&data=02%7C01% 7CBassam.Tabbara%40quantum. com% 7Cac58cc3d749e453fda4e08d4ad17 8f30% 7C322a135f14fb4d72aede12227213 4ae0%7C1%7C0% 7C636323764076275976&sdata= UGWvqRpP8P0sanBnGygcfwIYiU7tvK obJ7s8JtiWlFw%3D&reserved=0
>> On Jun 6, 2017, at 9:03 AM, Alexis Richardson <alexis@...> wrote:
>> It would be good for Rook team to join Storage WG, if you haven't done so
>> QQ: you said that k8s use cases that run on EBS have high failover
>> times & that you can improve this. I missed the details of that. Can
>> you say more please?
cncf-toc mailing list