Re: Snapshots of consistency groups

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Understood. Thank you, Jason.

On Mon, Sep 12, 2016 at 6:18 AM, Jason Dillaman <jdillama@xxxxxxxxxx> wrote:
> On Sat, Sep 10, 2016 at 9:46 PM, Victor Denisov <vdenisov@xxxxxxxxxxxx> wrote:
>> Another question. Maybe not really a question, but I would like to
>> verify if I understood what you wrote in the ether pad.
>>
>> You suggest to create image snapshots simultaneously.
>> If everything shuts down when we are making those individual
>> snapshots, then we end up with a SnapshotRecord in incomplete state
>> and images either with snapshots or without them.
>> Do I understand correctly that if the user wants to remove this
>> unfinished group snapshot then we have to:
>>  - list all images in this group
>>  - look for snapshots in those images with the guid as their name.
>>  - delete those individual snapshots and ignore errors if those
>> snapshots don't exist.
>>  - delete then entry.
>
> It would be the standard remove state machine, which is basically the
> steps you have above. Note that you would always need to handle the
> "-ENOENT" case since I could always associate an image to a group
> after a group snap was created (i.e. so the new image doesn't have a
> matching image snapshot for a group snapshot).
>
>> One thing that I don't understand in this case is, what if the user
>> decides to delete one of the images when there are dangling group
>> snapshots. Let's call this image A.
>> This dangling group snapshot could have successfully created a
>> snapshot of this image A. Let's call this snapshot A_snap.
>> Now if we remove image A from this group then once we try to cleanup
>> dangling group snapshot then A_snap shapshot will be overlooked,
>> because image A is not a member of the group any more.
>> And I don't understand how we can prevent this from happening in this
>> approach, except by disallowing to remove images if there are dandling
>> group snapshots.
>
> How is the snapshot dangling for image A? If it successfully created
> the snapshot on image A, it has a snapshot record that associates it
> to the group. Therefore, when the image is removed from the group, I
> would think you would automatically delete the the group snapshots
> contained within the image.
>
>> You mentioned that we should call image's individual snapshots after
>> the groups guid. I assume we should name them something like
>> <guid>_<group_snap_id>.
>> If we named them only using guid, then we would be able to create only
>> one group snapshot.
>
> Yup -- that should be fine.
>
>> Thanks,
>> V.
>>
>>
>> On Sat, Sep 10, 2016 at 11:37 AM, Jason Dillaman <jdillama@xxxxxxxxxx> wrote:
>>> Those are all internal classes -- the cls types are already
>>> dependencies within the librbd internals. Feel free to add the
>>> necessary include and use it directly from within librbd.
>>>
>>> On Fri, Sep 9, 2016 at 6:41 PM, Victor Denisov <vdenisov@xxxxxxxxxxxx> wrote:
>>>> I have a question about where SnapshotNamespace type should be placed.
>>>> I placed it in cls/rbd/cls_rbd_types.h because cls client and cls
>>>> backend components should have access to this type.
>>>> Also this type is required in librbd/Operations.cc - because we want
>>>> to specify in what namespace Operations::snap_create should create
>>>> snapshots.
>>>> However Operations.cc doesn't import cls_rbd_types.h right now. If the
>>>> question was about public interface of librbd/librbd.cc, then I would
>>>> create a duplicate of SnapshotNamespace type in librbd layer without
>>>> hesitation.
>>>> But these functions are internal, so, my question is whether it's
>>>> really feasible to create another type for SnapshotNamespace in librbd
>>>> layer.
>>>>
>>>>
>>>> On Mon, Aug 29, 2016 at 2:10 PM, Victor Denisov <vdenisov@xxxxxxxxxxxx> wrote:
>>>>> Right, I forgot about snaphot "namespaces". I'll add this part.
>>>>> I guess it makes sense to discuss the whole thing on the next CDM.
>>>>>
>>>>> On Sun, Aug 28, 2016 at 5:37 PM, Jason Dillaman <jdillama@xxxxxxxxxx> wrote:
>>>>>> I think the first step is to implement the concept of snapshot "namespaces".
>>>>>>
>>>>>> This could be implemented as an optional variant structure associated
>>>>>> with each snapshot at creation (see the ImageWatcher RPC messages or
>>>>>> journaling event type encoding for examples of this). For consistency
>>>>>> group snapshots, this structure would identify the snapshot as
>>>>>> belonging to the consistency group and have a unique id back to the
>>>>>> specific group snapshot.
>>>>>>
>>>>>> When creating a snapshot, the state machine would (1) create the group
>>>>>> snapshot record, (2) set the state of the group to "creating snapshot"
>>>>>> (to prevent new images from being added/removed from the group while
>>>>>> the op is in-progress), (3) acquire the lock for all images in the
>>>>>> group, (4) create the individual image snapshots with the linkage back
>>>>>> to the group snapshot record (can be performed in parallel up to max
>>>>>> concurrent ops), (5) release the exclusive locks, and (6) reset the
>>>>>> group status to "ready".
>>>>>>
>>>>>> If you have a hard crash/failure anywhere, a "snap remove" operation
>>>>>> should be designed to get the group back into consistent state (i.e.
>>>>>> remove any snapshots linked to the group and reset the group state
>>>>>> back to ready).
>>>>>>
>>>>>> On Fri, Aug 26, 2016 at 5:05 PM, Victor Denisov <vdenisov@xxxxxxxxxxxx> wrote:
>>>>>>> Guys,
>>>>>>>
>>>>>>> I updated Snapshots section of this document:
>>>>>>> http://pad.ceph.com/p/consistency_groups, in accordance with my
>>>>>>> improved understanding of how it should be implemented.
>>>>>>> Please take a look and provide your comments. Some of my concerns
>>>>>>> regarding the implementation I highlighted in bold.
>>>>>>>
>>>>>>> Looking forward to your valuable remarks.
>>>>>>> Thanks in advance.
>>>>>>> V.
>>>>>>>
>>>>>>>
>>>>>>> On Sat, Aug 20, 2016 at 9:27 AM, Mykola Golub <mgolub@xxxxxxxxxxxx> wrote:
>>>>>>>> On Fri, Aug 19, 2016 at 05:36:56PM -0700, Victor Denisov wrote:
>>>>>>>>> What if I'm holding this lock and somebody else is trying to reacquire the lock.
>>>>>>>>> How do I get notified about it?
>>>>>>>>
>>>>>>>> The image watcher is notified, which triggers its handler:
>>>>>>>>
>>>>>>>>  ImageWatcher<I>::handle_payload(const RequestLockPayload, *ack_ctx)
>>>>>>>>
>>>>>>>> The handler calls the current lock policy method `lock_requested()`,
>>>>>>>> which will define what to do with the lock request. The StandartPolicy
>>>>>>>> is to release the lock, so it may ping-ponging between the
>>>>>>>> clients. You may define a different policy -- rbd-mirror is an example
>>>>>>>> where it is used.
>>>>>>>>
>>>>>>>> Everywhere where an operation needs the exclusive lock, it is always
>>>>>>>> checked if we currently are a lock owner, i.e:
>>>>>>>>
>>>>>>>>  ictx->exclusive_lock->is_lock_owner()
>>>>>>>>
>>>>>>>> and if it is false, the exlusive lock is requested. Before this check
>>>>>>>> you need to aquire ctx->owner_lock, and until you release owner_lock
>>>>>>>> you can be sure your exclusive lock will not leak to another
>>>>>>>> client. After releasing owner_lock, you will need to repeate the check
>>>>>>>> again when you need it.
>>>>>>>>
>>>>>>>> --
>>>>>>>> Mykola Golub
>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Fri, Aug 19, 2016 at 5:48 AM, Mykola Golub <mgolub@xxxxxxxxxxxx> wrote:
>>>>>>>>> > On Thu, Aug 18, 2016 at 09:20:02PM -0700, Victor Denisov wrote:
>>>>>>>>> >> Could you please point me to the place in source code where writer
>>>>>>>>> >> acquires an exclusive lock on the image.
>>>>>>>>> >
>>>>>>>>> > Grep for 'exclusive_lock->request_lock'. Basically, what you need
>>>>>>>>> > (after opening the image) is:
>>>>>>>>> >
>>>>>>>>> > ```
>>>>>>>>> >   C_SaferCond lock_ctx;
>>>>>>>>> >   {
>>>>>>>>> >     RWLock::WLocker l(ictx->owner_lock);
>>>>>>>>> >
>>>>>>>>> >     if (ictx->exclusive_lock == nullptr) {
>>>>>>>>> >       // exclusive-lock feature is not enabled
>>>>>>>>> >       return -EINVAL;
>>>>>>>>> >     }
>>>>>>>>> >
>>>>>>>>> >     // Request the lock. If it is currently owned by another client,
>>>>>>>>> >     // RPC message will be sent to the client to release the lock.
>>>>>>>>> >     ictx->exclusive_lock->request_lock(&lock_ctx);
>>>>>>>>> >   } // release owner_lock before waiting to avoid potential deadlock
>>>>>>>>> >
>>>>>>>>> >   int r = lock_ctx.wait();
>>>>>>>>> >   if (r < 0) {
>>>>>>>>> >     return r;
>>>>>>>>> >   }
>>>>>>>>> >
>>>>>>>>> >   RWLock::RLocker l(ictx->owner_lock);
>>>>>>>>> >   if (ictx->exclusive_lock == nullptr || !ictx->exclusive_lock->is_lock_owner()) {
>>>>>>>>> >        // failed to acquire exclusive lock
>>>>>>>>> >        return -EROFS;
>>>>>>>>> >   }
>>>>>>>>> >
>>>>>>>>> >   // At this point lock is acquired
>>>>>>>>> >   ...
>>>>>>>>> >
>>>>>>>>> > ```
>>>>>>>>> >
>>>>>>>>> > You might want to look at this PR
>>>>>>>>> >
>>>>>>>>> >  https://github.com/ceph/ceph/pull/9592
>>>>>>>>> >
>>>>>>>>> > where we discuss adding API methods to directly acquire and release
>>>>>>>>> > the exclusive lock. You don't need the API, but will find examples in
>>>>>>>>> > the patch, and also useful comments from Jason.
>>>>>>>>> >
>>>>>>>>> > --
>>>>>>>>> > Mykola Golub
>>>>>>>>> >
>>>>>>>>> >> I presume you were talking about the feature:
>>>>>>>>> >> exclusive_lock, shared_lock which can be used from command line using
>>>>>>>>> >> commands lock list, lock break.
>>>>>>>>> >>
>>>>>>>>> >> On Thu, Aug 18, 2016 at 5:47 PM, Jason Dillaman <jdillama@xxxxxxxxxx> wrote:
>>>>>>>>> >> > There is already a "request lock" RPC message and this is already handled
>>>>>>>>> >> > transparently within librbd when you attempt to acquire the lock and another
>>>>>>>>> >> > client owns it.
>>>>>>>>> >> >
>>>>>>>>> >> >
>>>>>>>>> >> > On Thursday, August 18, 2016, Victor Denisov <vdenisov@xxxxxxxxxxxx> wrote:
>>>>>>>>> >> >>
>>>>>>>>> >> >> If an image already has a writer who owns the lock,
>>>>>>>>> >> >> should I implement a notification that allows to ask the writer to
>>>>>>>>> >> >> release the lock,
>>>>>>>>> >> >> is there already a standard way to intercept the exclusive lock?
>>>>>>>>> >> >>
>>>>>>>>> >> >> On Tue, Aug 16, 2016 at 6:29 AM, Jason Dillaman <jdillama@xxxxxxxxxx>
>>>>>>>>> >> >> wrote:
>>>>>>>>> >> >> > ... one more thing:
>>>>>>>>> >> >> >
>>>>>>>>> >> >> > I was also thinking that we need a new RBD feature bit to be used to
>>>>>>>>> >> >> > indicate that an image is part of a consistency group to prevent older
>>>>>>>>> >> >> > librbd clients from removing the image or group snapshots.  This could
>>>>>>>>> >> >> > be a RBD_FEATURES_RW_INCOMPATIBLE feature bit so older clients can
>>>>>>>>> >> >> > still open the image R/O while its part of a group.
>>>>>>>>> >> >> >
>>>>>>>>> >> >> > On Tue, Aug 16, 2016 at 9:26 AM, Jason Dillaman <jdillama@xxxxxxxxxx>
>>>>>>>>> >> >> > wrote:
>>>>>>>>> >> >> >> Way back in April when we had the CDM, I was originally thinking we
>>>>>>>>> >> >> >> should implement option 3. Essentially, you have a prepare group
>>>>>>>>> >> >> >> snapshot RPC message that extends a "paused IO" lease to the caller.
>>>>>>>>> >> >> >> When that lease expires, IO would automatically be resumed even if the
>>>>>>>>> >> >> >> group snapshot hasn't been created yet.  This would also require
>>>>>>>>> >> >> >> commit/abort group snapshot RPC messages.
>>>>>>>>> >> >> >>
>>>>>>>>> >> >> >> However, thinking about this last night, here is another potential
>>>>>>>>> >> >> >> option:
>>>>>>>>> >> >> >>
>>>>>>>>> >> >> >> Option 4 - require images to have the exclusive lock feature before
>>>>>>>>> >> >> >> they can be added to a consistency group (and prevent disabling of
>>>>>>>>> >> >> >> exclusive-lock while they are part of a group). Then librbd, via the
>>>>>>>>> >> >> >> rbd CLI (or client application of the rbd consistency group snap
>>>>>>>>> >> >> >> create API), can co-operatively acquire the lock from all active image
>>>>>>>>> >> >> >> clients within the group (i.e. all IO has been flushed and paused) and
>>>>>>>>> >> >> >> can proceed with snapshot creation. If the rbd CLI dies, the normal
>>>>>>>>> >> >> >> exclusive lock handling process will automatically take care of
>>>>>>>>> >> >> >> re-acquiring the lock from the dead client and resuming IO.
>>>>>>>>> >> >> >>
>>>>>>>>> >> >> >> This option not only re-uses existing code, it would also eliminate
>>>>>>>>> >> >> >> the need to add/update the RPC messages for prepare/commit/abort
>>>>>>>>> >> >> >> snapshot creation to support group snapshots (since it could all be
>>>>>>>>> >> >> >> handled internally).
>>>>>>>>> >> >> >>
>>>>>>>>> >> >> >> On Mon, Aug 15, 2016 at 7:46 PM, Victor Denisov <vdenisov@xxxxxxxxxxxx>
>>>>>>>>> >> >> >> wrote:
>>>>>>>>> >> >> >>> Gentlemen,
>>>>>>>>> >> >> >>>
>>>>>>>>> >> >> >>> I'm writing to you to ask for your opinion regarding quiescing writes.
>>>>>>>>> >> >> >>>
>>>>>>>>> >> >> >>> Here is the situation. In order to take snapshots of all images in a
>>>>>>>>> >> >> >>> consistency group,
>>>>>>>>> >> >> >>> we first need to quiesce all the image writers in the consistency
>>>>>>>>> >> >> >>> group.
>>>>>>>>> >> >> >>> Let me call
>>>>>>>>> >> >> >>> group client - a client which requests a consistency group to take a
>>>>>>>>> >> >> >>> snapshot.
>>>>>>>>> >> >> >>> Image client - the client that writes to an image.
>>>>>>>>> >> >> >>> Let's say group client starts sending notify_quiesce to all image
>>>>>>>>> >> >> >>> clients that write to the images in the group. After quiescing half of
>>>>>>>>> >> >> >>> the image clients the group client can die.
>>>>>>>>> >> >> >>>
>>>>>>>>> >> >> >>> It presents us with a dilemma - what should we do with those quiesced
>>>>>>>>> >> >> >>> image clients.
>>>>>>>>> >> >> >>>
>>>>>>>>> >> >> >>> Option 1 - is to wait till someone manually runs recover for that
>>>>>>>>> >> >> >>> consistency group.
>>>>>>>>> >> >> >>> We can show warning next to those unfinished groups when user runs
>>>>>>>>> >> >> >>> group list command.
>>>>>>>>> >> >> >>> There will be a command like group recover, which allows users to
>>>>>>>>> >> >> >>> rollback unsuccessful snapshots
>>>>>>>>> >> >> >>> or continue them using create snapshot command.
>>>>>>>>> >> >> >>>
>>>>>>>>> >> >> >>> Option 2 - is to establish some heart beats between group client and
>>>>>>>>> >> >> >>> image client. If group client fails to heart beat then image client
>>>>>>>>> >> >> >>> unquiesces itself and continues normal operation.
>>>>>>>>> >> >> >>>
>>>>>>>>> >> >> >>> Option 3 - is to have a timeout for each image client. If group client
>>>>>>>>> >> >> >>> fails to make a group snapshot within this timeout then we resume our
>>>>>>>>> >> >> >>> normal operation informing group client of the fact.
>>>>>>>>> >> >> >>>
>>>>>>>>> >> >> >>> Which of these options do you prefer? Probably there are other options
>>>>>>>>> >> >> >>> that I miss.
>>>>>>>>> >> >> >>>
>>>>>>>>> >> >> >>> Thanks,
>>>>>>>>> >> >> >>> Victor.
>>>>>>>>> >> >> >>
>>>>>>>>> >> >> >>
>>>>>>>>> >> >> >>
>>>>>>>>> >> >> >> --
>>>>>>>>> >> >> >> Jason
>>>>>>>>> >> >> >
>>>>>>>>> >> >> >
>>>>>>>>> >> >> >
>>>>>>>>> >> >> > --
>>>>>>>>> >> >> > Jason
>>>>>>>>> >> >
>>>>>>>>> >> >
>>>>>>>>> >> >
>>>>>>>>> >> > --
>>>>>>>>> >> > Jason
>>>>>>>>> >> >
>>>>>>>>> >> --
>>>>>>>>> >> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
>>>>>>>>> >> the body of a message to majordomo@xxxxxxxxxxxxxxx
>>>>>>>>> >> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>>>>>>>>> --
>>>>>>>>> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
>>>>>>>>> the body of a message to majordomo@xxxxxxxxxxxxxxx
>>>>>>>>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>>>>>>
>>>>>>
>>>>>>
>>>>>> --
>>>>>> Jason
>>>
>>>
>>>
>>> --
>>> Jason
>
>
>
> --
> Jason
--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux