当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

《大规模数据处理——云计算 Mass Data Processing Cloud Computing》课程教学资源(阅读材料)The Google File System(GFS)

资源类别:文库,文档格式:PDF,文档页数:15,文件大小:269.47KB,团购合买
点击下载完整版文档(PDF)

The Google File System Sanjay Ghemawat,Howard Gobioff,and Shun-Tak Leung Google ABSTRACT 1.INTRODUCTION We have designed and implemented the Google File Sys- We have designed and implemented the Google File Sys- tem,a scalable distributed file system for large distributed tem(GFS)to meet the rapidly growing demands of Google's data-intensive applications.It provides fault tolerance while data processing needs.GFS shares many of the same goals running on inexpensive commodity hardware,and it delivers as previous distributed file systems such as performance, high aggregate performance to a large number of clients. scalability,reliability,and availability.However,its design While sharing many of the same goals as previous dis- has been driven by key observations of our application work- tributed file systems,our design has been driven by obser- loads and technological environment,both current and an- vations of our application workloads and technological envi- ticipated,that reflect a marked departure from some earlier ronment,both current and anticipated,that refect a marked file system design assumptions.We have reexamined tradi- departure from some earlier file system assumptions.This tional choices and explored radically different points in the has led us to reexamine traditional choices and explore rad- design space. ically different design points. First,component failures are the norm rather than the The file system has successfully met our storage needs. exception.The file system consists of hundreds or even It is widely deployed within Google as the storage platform thousands of storage machines built from inexpensive com- for the generation and processing of data used by our ser- modity parts and is accessed by a comparable number of vice as well as research and development efforts that require client machines.The quantity and quality of the compo- large data sets.The largest cluster to date provides hun- nents virtually guarantee that some are not functional at dreds of terabytes of storage across thousands of disks on any given time and some will not recover from their cur- over a thousand machines,and it is concurrently accessed rent failures.We have seen problems caused by application by hundreds of clients. bugs,operating system bugs,human errors,and the failures In this paper,we present file system interface extensions of disks,memory,connectors,networking,and power sup- designed to support distributed applications,discuss many plies.Therefore,constant monitoring,error detection,fault aspects of our design,and report measurements from both tolerance,and automatic recovery must be integral to the micro-benchmarks and real world use. system. Second,files are huge by traditional standards.Multi-GB Categories and Subject Descriptors files are common.Each file typically contains many applica- tion objects such as web documents.When we are regularly D [4:3-Distributed file systems working with fast growing data sets of many TBs comprising billions of objects,it is unwieldy to manage billions of ap General Terms proximately KB-sized files even when the file system could support it.As a result,design assumptions and parameters Design,reliability,performance,measurement such as I/O operation and block sizes have to be revisited. Third,most files are mutated by appending new data Keywords rather than overwriting existing data.Random writes within Fault tolerance,scalability,data storage,clustered storage a file are practically non-existent.Once written,the files are only read,and often only sequentially.A variety of *The authors can be reached at the following addresses: data share these characteristics.Some may constitute large sanjay,hgobioff.shuntak.@google.com. repositories that data analysis programs scan through.Some may be data streams continuously generated by running ap- plications.Some may be archival data.Some may be in- termediate results produced on one machine and processed Permission to make digital or hard copies of all or part of this work for on another,whether simultaneously or later in time.Given personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies this access pattern on huge files,appending becomes the fo- cus of performance optimization and atomicity guarantees. bear this notice and the full citation on the first page.To copy otherwise,to republish,to post on servers or to redistribute to lists,requires prior specific while caching data blocks in the client loses its appeal. permission and/or a fee. Fourth,co-designing the applications and the file system SOSP'03.October 19-22,2003,Bolton Landing.New York,USA. API benefits the overall system by increasing our flexibility Copyright2003ACM1-58113-757-5/03/0010.$5.00

The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung Google∗ ABSTRACT We have designed and implemented the Google File Sys￾tem, a scalable distributed file system for large distributed data-intensive applications. It provides fault tolerance while running on inexpensive commodity hardware, and it delivers high aggregate performance to a large number of clients. While sharing many of the same goals as previous dis￾tributed file systems, our design has been driven by obser￾vations of our application workloads and technological envi￾ronment, both current and anticipated, that reflect a marked departure from some earlier file system assumptions. This has led us to reexamine traditional choices and explore rad￾ically different design points. The file system has successfully met our storage needs. It is widely deployed within Google as the storage platform for the generation and processing of data used by our ser￾vice as well as research and development efforts that require large data sets. The largest cluster to date provides hun￾dreds of terabytes of storage across thousands of disks on over a thousand machines, and it is concurrently accessed by hundreds of clients. In this paper, we present file system interface extensions designed to support distributed applications, discuss many aspects of our design, and report measurements from both micro-benchmarks and real world use. Categories and Subject Descriptors D [4]: 3—Distributed file systems General Terms Design, reliability, performance, measurement Keywords Fault tolerance, scalability, data storage, clustered storage ∗The authors can be reached at the following addresses: {sanjay,hgobioff,shuntak}@google.com. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SOSP’03, October 19–22, 2003, Bolton Landing, New York, USA. Copyright 2003 ACM 1-58113-757-5/03/0010 ...$5.00. 1. INTRODUCTION We have designed and implemented the Google File Sys￾tem (GFS) to meet the rapidly growing demands of Google’s data processing needs. GFS shares many of the same goals as previous distributed file systems such as performance, scalability, reliability, and availability. However, its design has been driven by key observations of our application work￾loads and technological environment, both current and an￾ticipated, that reflect a marked departure from some earlier file system design assumptions. We have reexamined tradi￾tional choices and explored radically different points in the design space. First, component failures are the norm rather than the exception. The file system consists of hundreds or even thousands of storage machines built from inexpensive com￾modity parts and is accessed by a comparable number of client machines. The quantity and quality of the compo￾nents virtually guarantee that some are not functional at any given time and some will not recover from their cur￾rent failures. We have seen problems caused by application bugs, operating system bugs, human errors, and the failures of disks, memory, connectors, networking, and power sup￾plies. Therefore, constant monitoring, error detection, fault tolerance, and automatic recovery must be integral to the system. Second, files are huge by traditional standards. Multi-GB files are common. Each file typically contains many applica￾tion objects such as web documents. When we are regularly working with fast growing data sets of many TBs comprising billions of objects, it is unwieldy to manage billions of ap￾proximately KB-sized files even when the file system could support it. As a result, design assumptions and parameters such as I/O operation and blocksizes have to be revisited. Third, most files are mutated by appending new data rather than overwriting existing data. Random writes within a file are practically non-existent. Once written, the files are only read, and often only sequentially. A variety of data share these characteristics. Some may constitute large repositories that data analysis programs scan through. Some may be data streams continuously generated by running ap￾plications. Some may be archival data. Some may be in￾termediate results produced on one machine and processed on another, whether simultaneously or later in time. Given this access pattern on huge files, appending becomes the fo￾cus of performance optimization and atomicity guarantees, while caching data blocks in the client loses its appeal. Fourth, co-designing the applications and the file system API benefits the overall system by increasing our flexibility

For example,we have relaxed GFS's consistency model to 2.2 Interface vastly simplify the file system without imposing an onerous GFS provides a familiar file system interface,though it burden on the applications.We have also introduced an does not implement a standard API such as POSIX.Files are atomic append operation so that multiple clients can append organized hierarchically in directories and identified by path- concurrently to a file without extra synchronization between names.We support the usual operations to create,delete, them.These will be discussed in more details later in the open,close,read,and write files. paper Moreover,GFS has snapshot and record append opera- Multiple GFS clusters are currently deployed for different tions.Snapshot creates a copy of a file or a directory tree purposes.The largest ones have over 1000 storage nodes, at low cost.Record append allows multiple clients to ap- over 300 TB of disk storage,and are heavily accessed by pend data to the same file concurrently while guaranteeing hundreds of clients on distinct machines on a continuous the atomicity of each individual client's append.It is use- basis ful for implementing multi-way merge results and producer- consumer queues that many clients can simultaneously ap- 2. DESIGN OVERVIEW pend to without additional locking.We have found these types of files to be invaluable in building large distributed 2.1 Assumptions applications.Snapshot and record append are discussed fur- In designing a file system for our needs,we have been ther in Sections 3.4 and 3.3 respectively. guided by assumptions that offer both challenges and op- portunities.We alluded to some key observations earlier 2.3 Architecture and now lay out our assumptions in more details. A GFS cluster consists of a single master and multiple chunkservers and is accessed by multiple clients,as shown The system is built from many inexpensive commodity in Figure 1.Each of these is typically a commodity Linux components that often fail.It must constantly monitor machine running a user-level server process.It is easy to run itself and detect,tolerate,and recover promptly from both a chunkserver and a client on the same machine,as long component failures on a routine basis. as machine resources permit and the lower reliability caused by running possibly flaky application code is acceptable. The system stores a modest number of large files.We Files are divided into fixed-size chunks.Each chunk is expect a few million files,each typically 100 MB or identified by an immutable and globally unique 64 bit chunk larger in size.Multi-GB files are the common case and should be managed efficiently.Small files must be handle assigned by the master at the time of chunk creation supported,but we need not optimize for them. Chunkservers store chunks on local disks as Linux files and read or write chunk data specified by a chunk handle and The workloads primarily consist of two kinds of reads: byte range.For reliability,each chunk is replicated on multi- large streaming reads and small random reads.In ple chunkservers.By default,we store three replicas,though large streaming reads,individual operations typically users can designate different replication levels for different read hundreds of KBs.more commonly 1 MB or more. regions of the file namespace. Successive operations from the same client often read The master maintains all file system metadata.This in- through a contiguous region of a file.A small ran- cludes the namespace,access control information,the map- dom read typically reads a few KBs at some arbitrary ping from files to chunks,and the current locations of chunks. offset.Performance-conscious applications often batch It also controls system-wide activities such as chunk lease and sort their small reads to advance steadily through management,garbage collection of orphaned chunks,and the file rather than go back and forth. chunk migration between chunkservers.The master peri- odically communicates with each chunkserver in HeartBeat The workloads also have many large,sequential writes messages to give it instructions and collect its state. that append data to files.Typical operation sizes are GFS client code linked into each application implements similar to those for reads.Once written,files are sel- the file system API and communicates with the master and dom modified again.Small writes at arbitrary posi- chunkservers to read or write data on behalf of the applica- tions in a file are supported but do not have to be tion.Clients interact with the master for metadata opera- efficient. tions,but all data-bearing communication goes directly to The system must efficiently implement well-defined se- the chunkservers.We do not provide the POSIX API and therefore need not hook into the Linux vnode layer. mantics for multiple clients that concurrently append Neither the client nor the chunkserver caches file data. to the same file.Our files are often used as producer- consumer queues or for many-way merging.Hundreds Client caches offer little benefit because most applications of producers,running one per machine,will concur- stream through huge files or have working sets too large to be cached.Not having them simplifies the client and rently append to a file.Atomicity with minimal syn- chronization overhead is essential.The file may be the overall system by eliminating cache coherence issues. (Clients do cache metadata,however.)Chunkservers need read later,or a consumer may be reading through the file simultaneously. not cache file data because chunks are stored as local files and so Linux's buffer cache already keeps frequently accessed High sustained bandwidth is more important than low data in memory. latency.Most of our target applications place a pre- mium on processing data in bulk at a high rate,while 2.4 Single Master few have stringent response time requirements for an Having a single master vastly simplifies our design and individual read or write. enables the master to make sophisticated chunk placement

For example, we have relaxed GFS’s consistency model to vastly simplify the file system without imposing an onerous burden on the applications. We have also introduced an atomic append operation so that multiple clients can append concurrently to a file without extra synchronization between them. These will be discussed in more details later in the paper. Multiple GFS clusters are currently deployed for different purposes. The largest ones have over 1000 storage nodes, over 300 TB of diskstorage, and are heavily accessed by hundreds of clients on distinct machines on a continuous basis. 2. DESIGN OVERVIEW 2.1 Assumptions In designing a file system for our needs, we have been guided by assumptions that offer both challenges and op￾portunities. We alluded to some key observations earlier and now lay out our assumptions in more details. • The system is built from many inexpensive commodity components that often fail. It must constantly monitor itself and detect, tolerate, and recover promptly from component failures on a routine basis. • The system stores a modest number of large files. We expect a few million files, each typically 100 MB or larger in size. Multi-GB files are the common case and should be managed efficiently. Small files must be supported, but we need not optimize for them. • The workloads primarily consist of two kinds of reads: large streaming reads and small random reads. In large streaming reads, individual operations typically read hundreds of KBs, more commonly 1 MB or more. Successive operations from the same client often read through a contiguous region of a file. A small ran￾dom read typically reads a few KBs at some arbitrary offset. Performance-conscious applications often batch and sort their small reads to advance steadily through the file rather than go backand forth. • The workloads also have many large, sequential writes that append data to files. Typical operation sizes are similar to those for reads. Once written, files are sel￾dom modified again. Small writes at arbitrary posi￾tions in a file are supported but do not have to be efficient. • The system must efficiently implement well-defined se￾mantics for multiple clients that concurrently append to the same file. Our files are often used as producer￾consumer queues or for many-way merging. Hundreds of producers, running one per machine, will concur￾rently append to a file. Atomicity with minimal syn￾chronization overhead is essential. The file may be read later, or a consumer may be reading through the file simultaneously. • High sustained bandwidth is more important than low latency. Most of our target applications place a pre￾mium on processing data in bulkat a high rate, while few have stringent response time requirements for an individual read or write. 2.2 Interface GFS provides a familiar file system interface, though it does not implement a standard API such as POSIX. Files are organized hierarchically in directories and identified by path￾names. We support the usual operations to create, delete, open, close, read, and write files. Moreover, GFS has snapshot and record append opera￾tions. Snapshot creates a copy of a file or a directory tree at low cost. Record append allows multiple clients to ap￾pend data to the same file concurrently while guaranteeing the atomicity of each individual client’s append. It is use￾ful for implementing multi-way merge results and producer￾consumer queues that many clients can simultaneously ap￾pend to without additional locking. We have found these types of files to be invaluable in building large distributed applications. Snapshot and record append are discussed fur￾ther in Sections 3.4 and 3.3 respectively. 2.3 Architecture A GFS cluster consists of a single master and multiple chunkservers and is accessed by multiple clients, as shown in Figure 1. Each of these is typically a commodity Linux machine running a user-level server process. It is easy to run both a chunkserver and a client on the same machine, as long as machine resources permit and the lower reliability caused by running possibly flaky application code is acceptable. Files are divided into fixed-size chunks. Each chunkis identified by an immutable and globally unique 64 bit chunk handle assigned by the master at the time of chunkcreation. Chunkservers store chunks on local disks as Linux files and read or write chunkdata specified by a chunkhandle and byte range. For reliability, each chunkis replicated on multi￾ple chunkservers. By default, we store three replicas, though users can designate different replication levels for different regions of the file namespace. The master maintains all file system metadata. This in￾cludes the namespace, access control information, the map￾ping from files to chunks, and the current locations of chunks. It also controls system-wide activities such as chunklease management, garbage collection of orphaned chunks, and chunkmigration between chunkservers. The master peri￾odically communicates with each chunkserver in HeartBeat messages to give it instructions and collect its state. GFS client code linked into each application implements the file system API and communicates with the master and chunkservers to read or write data on behalf of the applica￾tion. Clients interact with the master for metadata opera￾tions, but all data-bearing communication goes directly to the chunkservers. We do not provide the POSIX API and therefore need not hookinto the Linux vnode layer. Neither the client nor the chunkserver caches file data. Client caches offer little benefit because most applications stream through huge files or have working sets too large to be cached. Not having them simplifies the client and the overall system by eliminating cache coherence issues. (Clients do cache metadata, however.) Chunkservers need not cache file data because chunks are stored as local files and so Linux’s buffer cache already keeps frequently accessed data in memory. 2.4 Single Master Having a single master vastly simplifies our design and enables the master to make sophisticated chunk placement

Application (file name,chunk index) GFS master /foo/bar GFS client File namespace chunk 2efo (chunk handle, chunk locations) Legend: → Data messages Instructions to chunkserver Control messages Chunkserver state (chunk handle,byte range) GFS chunkserver GFS chunkserver chunk data 0044 Linux file system Linux file system Figure 1:GFS Architecture and replication decisions using global knowledge.However, tent TCP connection to the chunkserver over an extended we must minimize its involvement in reads and writes so period of time.Third,it reduces the size of the metadata that it does not become a bottleneck.Clients never read stored on the master.This allows us to keep the metadata and write file data through the master.Instead,a client asks in memory,which in turn brings other advantages that we the master which chunkservers it should contact.It caches will discuss in Section 2.6.1. this information for a limited time and interacts with the On the other hand,a large chunk size,even with lazy space chunkservers directly for many subsequent operations. allocation,has its disadvantages.A small file consists of a Let us explain the interactions for a simple read with refer- small number of chunks,perhaps just one.The chunkservers ence to Figure 1.First,using the fixed chunk size,the client storing those chunks may become hot spots if many clients translates the file name and byte offset specified by the ap- are accessing the same file.In practice,hot spots have not plication into a chunk index within the file.Then,it sends been a major issue because our applications mostly read the master a request containing the file name and chunk large multi-chunk files sequentially. index.The master replies with the corresponding chunk However,hot spots did develop when GFS was first used handle and locations of the replicas.The client caches this by a batch-queue system:an executable was written to GFS information using the file name and chunk index as the key as a single-chunk file and then started on hundreds of ma- The client then sends a request to one of the replicas, chines at the same time.The few chunkservers storing this most likely the closest one.The request specifies the chunk executable were overloaded by hundreds of simultaneous re- handle and a byte range within that chunk.Further reads quests.We fixed this problem by storing such executables of the same chunk require no more client-master interaction with a higher replication factor and by making the batch- until the cached information expires or the file is reopened. queue system stagger application start times.A potential In fact,the client typically asks for multiple chunks in the long-term solution is to allow clients to read data from other same request and the master can also include the informa- clients in such situations. tion for chunks immediately following those requested.This extra information sidesteps several future client-master in- 2.6 Metadata teractions at practically no extra cost. The master stores three major types of metadata:the file 2.5 Chunk Size and chunk namespaces,the mapping from files to chunks and the locations of each chunk's replicas.All metadata is Chunk size is one of the key design parameters.We have kept in the master's memory.The first two types (names- chosen 64 MB,which is much larger than typical file sys- paces and file-to-chunk mapping)are also kept persistent by tem block sizes.Each chunk replica is stored as a plain logging mutations to an operation log stored on the mas- Linux file on a chunkserver and is extended only as needed. ter's local disk and replicated on remote machines.Using Lazy space allocation avoids wasting space due to internal a log allows us to update the master state simply,reliably, fragmentation,perhaps the greatest objection against such and without risking inconsistencies in the event of a master a large chunk size. crash.The master does not store chunk location informa- A large chunk size offers several important advantages. tion persistently.Instead.it asks each chunkserver about its First,it reduces clients'need to interact with the master chunks at master startup and whenever a chunkserver joins because reads and writes on the same chunk require only the cluster. one initial request to the master for chunk location informa- tion.The reduction is especially significant for our work- 2.6.1 In-Memory Data Structures loads because applications mostly read and write large files Since metadata is stored in memory,master operations are sequentially.Even for small random reads,the client can fast.Furthermore.it is easy and efficient for the master to comfortably cache all the chunk location information for a periodically scan through its entire state in the background. multi-TB working set.Second,since on a large chunk,a This periodic scanning is used to implement chunk garbage client is more likely to perform many operations on a given collection,re-replication in the presence of chunkserver fail- chunk,it can reduce network overhead by keeping a persis- ures,and chunk migration to balance load and disk space

Legend: Data messages Control messages Application (file name, chunk index) (chunk handle, chunk locations) GFS master File namespace /foo/bar Instructions to chunkserver Chunkserver state GFS chunkserver GFS chunkserver (chunk handle, byte range) chunk data chunk 2ef0 Linux file system Linux file system GFS client Figure 1: GFS Architecture and replication decisions using global knowledge. However, we must minimize its involvement in reads and writes so that it does not become a bottleneck. Clients never read and write file data through the master. Instead, a client asks the master which chunkservers it should contact. It caches this information for a limited time and interacts with the chunkservers directly for many subsequent operations. Let us explain the interactions for a simple read with refer￾ence to Figure 1. First, using the fixed chunksize, the client translates the file name and byte offset specified by the ap￾plication into a chunkindex within the file. Then, it sends the master a request containing the file name and chunk index. The master replies with the corresponding chunk handle and locations of the replicas. The client caches this information using the file name and chunkindex as the key. The client then sends a request to one of the replicas, most likely the closest one. The request specifies the chunk handle and a byte range within that chunk. Further reads of the same chunkrequire no more client-master interaction until the cached information expires or the file is reopened. In fact, the client typically asks for multiple chunks in the same request and the master can also include the informa￾tion for chunks immediately following those requested. This extra information sidesteps several future client-master in￾teractions at practically no extra cost. 2.5 Chunk Size Chunksize is one of the key design parameters. We have chosen 64 MB, which is much larger than typical file sys￾tem blocksizes. Each chunkreplica is stored as a plain Linux file on a chunkserver and is extended only as needed. Lazy space allocation avoids wasting space due to internal fragmentation, perhaps the greatest objection against such a large chunksize. A large chunksize offers several important advantages. First, it reduces clients’ need to interact with the master because reads and writes on the same chunkrequire only one initial request to the master for chunklocation informa￾tion. The reduction is especially significant for our work￾loads because applications mostly read and write large files sequentially. Even for small random reads, the client can comfortably cache all the chunklocation information for a multi-TB working set. Second, since on a large chunk, a client is more likely to perform many operations on a given chunk, it can reduce network overhead by keeping a persis￾tent TCP connection to the chunkserver over an extended period of time. Third, it reduces the size of the metadata stored on the master. This allows us to keep the metadata in memory, which in turn brings other advantages that we will discuss in Section 2.6.1. On the other hand, a large chunksize, even with lazy space allocation, has its disadvantages. A small file consists of a small number of chunks, perhaps just one. The chunkservers storing those chunks may become hot spots if many clients are accessing the same file. In practice, hot spots have not been a major issue because our applications mostly read large multi-chunkfiles sequentially. However, hot spots did develop when GFS was first used by a batch-queue system: an executable was written to GFS as a single-chunkfile and then started on hundreds of ma￾chines at the same time. The few chunkservers storing this executable were overloaded by hundreds of simultaneous re￾quests. We fixed this problem by storing such executables with a higher replication factor and by making the batch￾queue system stagger application start times. A potential long-term solution is to allow clients to read data from other clients in such situations. 2.6 Metadata The master stores three major types of metadata: the file and chunknamespaces, the mapping from files to chunks, and the locations of each chunk’s replicas. All metadata is kept in the master’s memory. The first two types (names￾paces and file-to-chunkmapping) are also kept persistent by logging mutations to an operation log stored on the mas￾ter’s local diskand replicated on remote machines. Using a log allows us to update the master state simply, reliably, and without risking inconsistencies in the event of a master crash. The master does not store chunklocation informa￾tion persistently. Instead, it asks each chunkserver about its chunks at master startup and whenever a chunkserver joins the cluster. 2.6.1 In-Memory Data Structures Since metadata is stored in memory, master operations are fast. Furthermore, it is easy and efficient for the master to periodically scan through its entire state in the background. This periodic scanning is used to implement chunkgarbage collection, re-replication in the presence of chunkserver fail￾ures, and chunkmigration to balance load and diskspace

usage across chunkservers.Sections 4.3 and 4.4 will discuss Write Record Append these activities further. Serial defined defined One potential concern for this memory-only approach is success interspersed with that the number of chunks and hence the capacity of the Concurrent consistent inconsistent successes but undefined whole system is limited by how much memory the master Failure inconsistent has.This is not a serious limitation in practice.The mas- ter maintains less than 64 bytes of metadata for each 64 MB chunk.Most chunks are full because most files contain many Table 1:File Region State After Mutation chunks,only the last of which may be partially filled.Sim- ilarly,the file namespace data typically requires less then 64 bytes per file because it stores file names compactly us- limited number of log records after that.The checkpoint is ing prefix compression. If necessary to support even larger file systems,the cost in a compact B-tree like form that can be directly mapped into memory and used for namespace lookup without ex- of adding extra memory to the master is a small price to pay tra parsing.This further speeds up recovery and improves for the simplicity,reliability,performance,and flexibility we availability. gain by storing the metadata in memory. Because building a checkpoint can take a while,the mas- 2.6.2 Chunk Locations ter's internal state is structured in such a way that a new checkpoint can be created without delaying incoming muta- The master does not keep a persistent record of which tions.The master switches to a new log file and creates the chunkservers have a replica of a given chunk.It simply polls new checkpoint in a separate thread.The new checkpoint chunkservers for that information at startup.The master includes all mutations before the switch.It can be created can keep itself up-to-date thereafter because it controls all in a minute or so for a cluster with a few million files.When chunk placement and monitors chunkserver status with reg- completed,it is written to disk both locally and remotely. ular HeartBeat messages. Recovery needs only the latest complete checkpoint and We initially attempted to keep chunk location information subsequent log files.Older checkpoints and log files can persistently at the master,but we decided that it was much be freely deleted.though we keep a few around to guard simpler to request the data from chunkservers at startup, against catastrophes.A failure during checkpointing does and periodically thereafter.This eliminated the problem of not affect correctness because the recovery code detects and keeping the master and chunkservers in sync as chunkservers skips incomplete checkpoints join and leave the cluster,change names,fail,restart,and so on.In a cluster with hundreds of servers,these events 2.7 Consistency Model happen all too often. Another way to understand this design decision is to real- GFS has a relaxed consistency model that supports our ize that a chunkserver has the final word over what chunks highly distributed applications well but remains relatively it does or does not have on its own disks.There is no point simple and efficient to implement.We now discuss GFS's in trying to maintain a consistent view of this information guarantees and what they mean to applications.We also on the master because errors on a chunkserver may cause highlight how GFS maintains these guarantees but leave the chunks to vanish spontaneously (e.g.,a disk may go bad details to other parts of the paper. and be disabled)or an operator may rename a chunkserver. 2.7.1 Guarantees by GFS 2.6.3 Operation Log File namespace mutations (e.g.,file creation)are atomic. The operation log contains a historical record of critical They are handled exclusively by the master:namespace metadata changes.It is central to GFS.Not only is it the locking guarantees atomicity and correctness (Section 4.1); only persistent record of metadata,but it also serves as a the master's operation log defines a global total order of logical time line that defines the order of concurrent op- these operations (Section 2.6.3). erations.Files and chunks,as well as their versions (see The state of a file region after a data mutation depends Section 4.5),are all uniquely and eternally identified by the on the type of mutation,whether it succeeds or fails,and logical times at which they were created. whether there are concurrent mutations.Table 1 summa- Since the operation log is critical,we must store it reli- rizes the result.A file region is consistent if all clients will ably and not make changes visible to clients until metadata always see the same data,regardless of which replicas they changes are made persistent.Otherwise,we effectively lose read from.A region is defined after a file data mutation if it the whole file system or recent client operations even if the is consistent and clients will see what the mutation writes in chunks themselves survive.Therefore,we replicate it on its entirety.When a mutation succeeds without interference multiple remote machines and respond to a client opera- from concurrent writers,the affected region is defined (and tion only after flushing the corresponding log record to disk by implication consistent):all clients will always see what both locally and remotely.The master batches several log the mutation has written.Concurrent successful mutations records together before flushing thereby reducing the impact leave the region undefined but consistent:all clients see the of flushing and replication on overall system throughput. same data,but it may not reflect what any one mutation The master recovers its file system state by replaying the has written.Typically,it consists of mingled fragments from operation log.To minimize startup time,we must keep the multiple mutations.A failed mutation makes the region in- log small.The master checkpoints its state whenever the log consistent (hence also undefined):different clients may see grows beyond a certain size so that it can recover by loading different data at different times.We describe below how our the latest checkpoint from local disk and replaying only the applications can distinguish defined regions from undefined

usage across chunkservers. Sections 4.3 and 4.4 will discuss these activities further. One potential concern for this memory-only approach is that the number of chunks and hence the capacity of the whole system is limited by how much memory the master has. This is not a serious limitation in practice. The mas￾ter maintains less than 64 bytes of metadata for each 64 MB chunk. Most chunks are full because most files contain many chunks, only the last of which may be partially filled. Sim￾ilarly, the file namespace data typically requires less then 64 bytes per file because it stores file names compactly us￾ing prefix compression. If necessary to support even larger file systems, the cost of adding extra memory to the master is a small price to pay for the simplicity, reliability, performance, and flexibility we gain by storing the metadata in memory. 2.6.2 Chunk Locations The master does not keep a persistent record of which chunkservers have a replica of a given chunk. It simply polls chunkservers for that information at startup. The master can keep itself up-to-date thereafter because it controls all chunkplacement and monitors chunkserver status with reg￾ular HeartBeat messages. We initially attempted to keep chunk location information persistently at the master, but we decided that it was much simpler to request the data from chunkservers at startup, and periodically thereafter. This eliminated the problem of keeping the master and chunkservers in sync as chunkservers join and leave the cluster, change names, fail, restart, and so on. In a cluster with hundreds of servers, these events happen all too often. Another way to understand this design decision is to real￾ize that a chunkserver has the final word over what chunks it does or does not have on its own disks. There is no point in trying to maintain a consistent view of this information on the master because errors on a chunkserver may cause chunks to vanish spontaneously (e.g., a disk may go bad and be disabled) or an operator may rename a chunkserver. 2.6.3 Operation Log The operation log contains a historical record of critical metadata changes. It is central to GFS. Not only is it the only persistent record of metadata, but it also serves as a logical time line that defines the order of concurrent op￾erations. Files and chunks, as well as their versions (see Section 4.5), are all uniquely and eternally identified by the logical times at which they were created. Since the operation log is critical, we must store it reli￾ably and not make changes visible to clients until metadata changes are made persistent. Otherwise, we effectively lose the whole file system or recent client operations even if the chunks themselves survive. Therefore, we replicate it on multiple remote machines and respond to a client opera￾tion only after flushing the corresponding log record to disk both locally and remotely. The master batches several log records together before flushing thereby reducing the impact of flushing and replication on overall system throughput. The master recovers its file system state by replaying the operation log. To minimize startup time, we must keep the log small. The master checkpoints its state whenever the log grows beyond a certain size so that it can recover by loading the latest checkpoint from local disk and replaying only the Write Record Append Serial defined defined success interspersed with Concurrent consistent inconsistent successes but undefined Failure inconsistent Table 1: File Region State After Mutation limited number of log records after that. The checkpoint is in a compact B-tree like form that can be directly mapped into memory and used for namespace lookup without ex￾tra parsing. This further speeds up recovery and improves availability. Because building a checkpoint can take a while, the mas￾ter’s internal state is structured in such a way that a new checkpoint can be created without delaying incoming muta￾tions. The master switches to a new log file and creates the new checkpoint in a separate thread. The new checkpoint includes all mutations before the switch. It can be created in a minute or so for a cluster with a few million files. When completed, it is written to diskboth locally and remotely. Recovery needs only the latest complete checkpoint and subsequent log files. Older checkpoints and log files can be freely deleted, though we keep a few around to guard against catastrophes. A failure during checkpointing does not affect correctness because the recovery code detects and skips incomplete checkpoints. 2.7 Consistency Model GFS has a relaxed consistency model that supports our highly distributed applications well but remains relatively simple and efficient to implement. We now discuss GFS’s guarantees and what they mean to applications. We also highlight how GFS maintains these guarantees but leave the details to other parts of the paper. 2.7.1 Guarantees by GFS File namespace mutations (e.g., file creation) are atomic. They are handled exclusively by the master: namespace locking guarantees atomicity and correctness (Section 4.1); the master’s operation log defines a global total order of these operations (Section 2.6.3). The state of a file region after a data mutation depends on the type of mutation, whether it succeeds or fails, and whether there are concurrent mutations. Table 1 summa￾rizes the result. A file region is consistent if all clients will always see the same data, regardless of which replicas they read from. A region is defined after a file data mutation if it is consistent and clients will see what the mutation writes in its entirety. When a mutation succeeds without interference from concurrent writers, the affected region is defined (and by implication consistent): all clients will always see what the mutation has written. Concurrent successful mutations leave the region undefined but consistent: all clients see the same data, but it may not reflect what any one mutation has written. Typically, it consists of mingled fragments from multiple mutations. A failed mutation makes the region in￾consistent (hence also undefined): different clients may see different data at different times. We describe below how our applications can distinguish defined regions from undefined

regions.The applications do not need to further distinguish file data that is still incomplete from the application's per- between different kinds of undefined regions. spective. Data mutations may be writes or record appends.A write In the other typical use,many writers concurrently ap- causes data to be written at an application-specified file pend to a file for merged results or as a producer-consumer offset.A record append causes data (the "record")to be queue.Record append's append-at-least-once semantics pre- appended atomically at least once even in the presence of serves each writer's output.Readers deal with the occa- concurrent mutations,but at an offset of GFS's choosing sional padding and duplicates as follows.Each record pre (Section 3.3).(In contrast,a "regular"append is merely a pared by the writer contains extra information like check- write at an offset that the client believes to be the current sums so that its validity can be verified.A reader can end of file.The offset is returned to the client and marks identify and discard extra padding and record fragments the beginning of a defined region that contains the record. using the checksums.If it cannot tolerate the occasional In addition,GFS may insert padding or record duplicates in duplicates (e.g.,if they would trigger non-idempotent op- between.They occupy regions considered to be inconsistent erations),it can filter them out using unique identifiers in and are typically dwarfed by the amount of user data. the records,which are often needed anyway to name corre- After a sequence of successful mutations,the mutated file sponding application entities such as web documents.These region is guaranteed to be defined and contain the data writ- functionalities for record I/O (except duplicate removal)are ten by the last mutation.GFS achieves this by (a)applying in library code shared by our applications and applicable to mutations to a chunk in the same order on all its replicas other file interface implementations at Google.With that, (Section 3.1),and (b)using chunk version numbers to detect the same sequence of records,plus rare duplicates,is always any replica that has become stale because it has missed mu- delivered to the record reader. tations while its chunkserver was down (Section 4.5).Stale replicas will never be involved in a mutation or given to 3.SYSTEM INTERACTIONS clients asking the master for chunk locations.They are garbage collected at the earliest opportunity. We designed the system to minimize the master's involve- Since clients cache chunk locations,they may read from a ment in all operations.With that background,we now de- stale replica before that information is refreshed.This win- scribe how the client,master,and chunkservers interact to dow is limited by the cache entry's timeout and the next implement data mutations,atomic record append,and snap- open of the file,which purges from the cache all chunk in- shot. formation for that file.Moreover,as most of our files are 3.1 Leases and Mutation Order append-only,a stale replica usually returns a premature end of chunk rather than outdated data.When a reader A mutation is an operation that changes the contents or retries and contacts the master,it will immediately get cur- metadata of a chunk such as a write or an append opera- rent chunk locations. tion.Each mutation is performed at all the chunk's replicas. Long after a successful mutation,component failures can We use leases to maintain a consistent mutation order across of course still corrupt or destroy data.GFS identifies failed replicas.The master grants a chunk lease to one of the repli- chunkservers by regular handshakes between master and all cas,which we call the primary.The primary picks a serial chunkservers and detects data corruption by checksumming order for all mutations to the chunk.All replicas follow this (Section 5.2).Once a problem surfaces,the data is restored order when applying mutations.Thus,the global mutation from valid replicas as soon as possible(Section 4.3).A chunk order is defined first by the lease grant order chosen by the is lost irreversibly only if all its replicas are lost before GFS master,and within a lease by the serial numbers assigned can react,typically within minutes.Even in this case.it be- by the primary. comes unavailable,not corrupted:applications receive clear The lease mechanism is designed to minimize manage- errors rather than corrupt data. ment overhead at the master.A lease has an initial timeout of 60 seconds.However,as long as the chunk is being mu- 2.7.2 Implications for Applications tated,the primary can request and typically receive exten- sions from the master indefinitely.These extension requests GFS applications can accommodate the relaxed consis- and grants are piggybacked on the HeartBeat messages reg- tency model with a few simple techniques already needed for ularly exchanged between the master and all chunkservers other purposes:relying on appends rather than overwrites. The master may sometimes try to revoke a lease before it checkpointing,and writing self-validating,self-identifying expires (e.g.,when the master wants to disable mutations records. on a file that is being renamed).Even if the master loses Practically all our applications mutate files by appending communication with a primary,it can safely grant a new rather than overwriting.In one typical use,a writer gener- lease to another replica after the old lease expires. ates a file from beginning to end.It atomically renames the In Figure 2,we illustrate this process by following the file to a permanent name after writing all the data,or pe- control flow of a write through these numbered steps. riodically checkpoints how much has been successfully writ- ten.Checkpoints may also include application-level check- 1.The client asks the master which chunkserver holds sums.Readers verify and process only the file region up the current lease for the chunk and the locations of to the last checkpoint,which is known to be in the defined the other replicas.If no one has a lease,the master state.Regardless of consistency and concurrency issues.this grants one to a replica it chooses (not shown). approach has served us well.Appending is far more effi- 2.The master replies with the identity of the primary and cient and more resilient to application failures than random the locations of the other (secondary)replicas.The writes.Checkpointing allows writers to restart incremen- client caches this data for future mutations.It needs tally and keeps readers from processing successfully written to contact the master again only when the primary

regions. The applications do not need to further distinguish between different kinds of undefined regions. Data mutations may be writes or record appends. A write causes data to be written at an application-specified file offset. A record append causes data (the “record”) to be appended atomically at least once even in the presence of concurrent mutations, but at an offset of GFS’s choosing (Section 3.3). (In contrast, a “regular” append is merely a write at an offset that the client believes to be the current end of file.) The offset is returned to the client and marks the beginning of a defined region that contains the record. In addition, GFS may insert padding or record duplicates in between. They occupy regions considered to be inconsistent and are typically dwarfed by the amount of user data. After a sequence of successful mutations, the mutated file region is guaranteed to be defined and contain the data writ￾ten by the last mutation. GFS achieves this by (a) applying mutations to a chunkin the same order on all its replicas (Section 3.1), and (b) using chunkversion numbers to detect any replica that has become stale because it has missed mu￾tations while its chunkserver was down (Section 4.5). Stale replicas will never be involved in a mutation or given to clients asking the master for chunk locations. They are garbage collected at the earliest opportunity. Since clients cache chunklocations, they may read from a stale replica before that information is refreshed. This win￾dow is limited by the cache entry’s timeout and the next open of the file, which purges from the cache all chunkin￾formation for that file. Moreover, as most of our files are append-only, a stale replica usually returns a premature end of chunkrather than outdated data. When a reader retries and contacts the master, it will immediately get cur￾rent chunklocations. Long after a successful mutation, component failures can of course still corrupt or destroy data. GFS identifies failed chunkservers by regular handshakes between master and all chunkservers and detects data corruption by checksumming (Section 5.2). Once a problem surfaces, the data is restored from valid replicas as soon as possible (Section 4.3). A chunk is lost irreversibly only if all its replicas are lost before GFS can react, typically within minutes. Even in this case, it be￾comes unavailable, not corrupted: applications receive clear errors rather than corrupt data. 2.7.2 Implications for Applications GFS applications can accommodate the relaxed consis￾tency model with a few simple techniques already needed for other purposes: relying on appends rather than overwrites, checkpointing, and writing self-validating, self-identifying records. Practically all our applications mutate files by appending rather than overwriting. In one typical use, a writer gener￾ates a file from beginning to end. It atomically renames the file to a permanent name after writing all the data, or pe￾riodically checkpoints how much has been successfully writ￾ten. Checkpoints may also include application-level check￾sums. Readers verify and process only the file region up to the last checkpoint, which is known to be in the defined state. Regardless of consistency and concurrency issues, this approach has served us well. Appending is far more effi- cient and more resilient to application failures than random writes. Checkpointing allows writers to restart incremen￾tally and keeps readers from processing successfully written file data that is still incomplete from the application’s per￾spective. In the other typical use, many writers concurrently ap￾pend to a file for merged results or as a producer-consumer queue. Record append’s append-at-least-once semantics pre￾serves each writer’s output. Readers deal with the occa￾sional padding and duplicates as follows. Each record pre￾pared by the writer contains extra information like check￾sums so that its validity can be verified. A reader can identify and discard extra padding and record fragments using the checksums. If it cannot tolerate the occasional duplicates (e.g., if they would trigger non-idempotent op￾erations), it can filter them out using unique identifiers in the records, which are often needed anyway to name corre￾sponding application entities such as web documents. These functionalities for record I/O (except duplicate removal) are in library code shared by our applications and applicable to other file interface implementations at Google. With that, the same sequence of records, plus rare duplicates, is always delivered to the record reader. 3. SYSTEM INTERACTIONS We designed the system to minimize the master’s involve￾ment in all operations. With that background, we now de￾scribe how the client, master, and chunkservers interact to implement data mutations, atomic record append, and snap￾shot. 3.1 Leases and Mutation Order A mutation is an operation that changes the contents or metadata of a chunksuch as a write or an append opera￾tion. Each mutation is performed at all the chunk’s replicas. We use leases to maintain a consistent mutation order across replicas. The master grants a chunklease to one of the repli￾cas, which we call the primary. The primary picks a serial order for all mutations to the chunk. All replicas follow this order when applying mutations. Thus, the global mutation order is defined first by the lease grant order chosen by the master, and within a lease by the serial numbers assigned by the primary. The lease mechanism is designed to minimize manage￾ment overhead at the master. A lease has an initial timeout of 60 seconds. However, as long as the chunkis being mu￾tated, the primary can request and typically receive exten￾sions from the master indefinitely. These extension requests and grants are piggybacked on the HeartBeat messages reg￾ularly exchanged between the master and all chunkservers. The master may sometimes try to revoke a lease before it expires (e.g., when the master wants to disable mutations on a file that is being renamed). Even if the master loses communication with a primary, it can safely grant a new lease to another replica after the old lease expires. In Figure 2, we illustrate this process by following the control flow of a write through these numbered steps. 1. The client asks the master which chunkserver holds the current lease for the chunkand the locations of the other replicas. If no one has a lease, the master grants one to a replica it chooses (not shown). 2. The master replies with the identity of the primary and the locations of the other (secondary) replicas. The client caches this data for future mutations. It needs to contact the master again only when the primary

step I Master file region may end up containing fragments from different Client clients,although the replicas will be identical because the in- dividual operations are completed successfully in the same order on all replicas.This leaves the file region in consistent but undefined state as noted in Section 2.7. Secondary Replica A 3.2 Data Flow We decouple the flow of data from the flow of control to Primary use the network efficiently.While control flows from the Replica client to the primary and then to all secondaries,data is Legend: pushed linearly along a carefully picked chain of chunkservers in a pipelined fashion.Our goals are to fully utilize each Control machine's network bandwidth,avoid network bottlenecks Secondary Data and high-latency links,and minimize the latency to push Replica B through all the data To fully utilize each machine's network bandwidth,the Figure 2:Write Control and Data Flow data is pushed linearly along a chain of chunkservers rather than distributed in some other topology (e.g.,tree).Thus, each machine's full outbound bandwidth is used to trans- fer the data as fast as possible rather than divided among becomes unreachable or replies that it no longer holds multiple recipients. a lease. To avoid network bottlenecks and high-latency links(e.g., 3.The client pushes the data to all the replicas.A client inter-switch links are often both)as much as possible,each machine forwards the data to the "closest"machine in the can do so in any order.Each chunkserver will store the data in an internal LRU buffer cache until the network topology that has not received it.Suppose the data is used or aged out.By decoupling the data flow client is pushing data to chunkservers S1 through S4.It from the control flow,we can improve performance by sends the data to the closest chunkserver,say S1.S1 for- wards it to the closest chunkserver S2 through S4 closest to scheduling the expensive data flow based on the net- work topology regardless of which chunkserver is the S1,say S2.Similarly,S2 forwards it to S3 or S4,whichever primary.Section 3.2 discusses this further. is closer to S2,and so on.Our network topology is simple enough that "distances"can be accurately estimated from 4.Once all the replicas have acknowledged receiving the IP addresses. data.the client sends a write request to the primary. Finally,we minimize latency by pipelining the data trans- The request identifies the data pushed earlier to all of fer over TCP connections.Once a chunkserver receives some the replicas.The primary assigns consecutive serial data,it starts forwarding immediately.Pipelining is espe numbers to all the mutations it receives,possibly from cially helpful to us because we use a switched network with multiple clients,which provides the necessary serial- full-duplex links.Sending the data immediately does not ization.It applies the mutation to its own local state reduce the receive rate.Without network congestion,the in serial number order. ideal elapsed time for transferring B bytes to R replicas is 5.The primary forwards the write request to all sec- B/T+RL where T is the network throughput and L is la- ondary replicas.Each secondary replica applies mu- tency to transfer bytes between two machines.Our network tations in the same serial number order assigned by links are typically 100 Mbps (T),and L is far below 1 ms. the primary. Therefore,1 MB can ideally be distributed in about 80 ms. 6.The secondaries all reply to the primary indicating that they have completed the operation. 7.The primary replies to the client.Any errors encoun- 3.3 Atomic Record Appends tered at any of the replicas are reported to the client. GFS provides an atomic append operation called record In case of errors,the write may have succeeded at the append.In a traditional write,the client specifies the off- primary and an arbitrary subset of the secondary repli- set at which data is to be written.Concurrent writes to cas.(If it had failed at the primary,it would not the same region are not serializable:the region may end up have been assigned a serial number and forwarded. containing data fragments from multiple clients.In a record The client request is considered to have failed,and the append,however,the client specifies only the data.GFS modified region is left in an inconsistent state.Our appends it to the file at least once atomically (i.e.,as one client code handles such errors by retrying the failed continuous sequence of bytes)at an offset of GFS's choosing mutation.It will make a few attempts at steps (3) and returns that offset to the client.This is similar to writ- through(7)before falling back to a retry from the be- ing to a file opened in 0APPEND mode in Unix without the ginning of the write. race conditions when multiple writers do so concurrently. Record append is heavily used by our distributed applica- If a write by the application is large or straddles a chunk tions in which many clients on different machines append boundary.GFS client code breaks it down into multiple to the same file concurrently.Clients would need addi- write operations.They all follow the control flow described tional complicated and expensive synchronization,for ex- above but may be interleaved with and overwritten by con- ample through a distributed lock manager,if they do so current operations from other clients.Therefore,the shared with traditional writes.In our workloads,such files often

Primary Replica Secondary Replica B Secondary Replica A Master Legend: Control Data 3 Client 2 4 step 1 5 6 6 7 Figure 2: Write Control and Data Flow becomes unreachable or replies that it no longer holds a lease. 3. The client pushes the data to all the replicas. A client can do so in any order. Each chunkserver will store the data in an internal LRU buffer cache until the data is used or aged out. By decoupling the data flow from the control flow, we can improve performance by scheduling the expensive data flow based on the net￾worktopology regardless of which chunkserver is the primary. Section 3.2 discusses this further. 4. Once all the replicas have acknowledged receiving the data, the client sends a write request to the primary. The request identifies the data pushed earlier to all of the replicas. The primary assigns consecutive serial numbers to all the mutations it receives, possibly from multiple clients, which provides the necessary serial￾ization. It applies the mutation to its own local state in serial number order. 5. The primary forwards the write request to all sec￾ondary replicas. Each secondary replica applies mu￾tations in the same serial number order assigned by the primary. 6. The secondaries all reply to the primary indicating that they have completed the operation. 7. The primary replies to the client. Any errors encoun￾tered at any of the replicas are reported to the client. In case of errors, the write may have succeeded at the primary and an arbitrary subset of the secondary repli￾cas. (If it had failed at the primary, it would not have been assigned a serial number and forwarded.) The client request is considered to have failed, and the modified region is left in an inconsistent state. Our client code handles such errors by retrying the failed mutation. It will make a few attempts at steps (3) through (7) before falling backto a retry from the be￾ginning of the write. If a write by the application is large or straddles a chunk boundary, GFS client code breaks it down into multiple write operations. They all follow the control flow described above but may be interleaved with and overwritten by con￾current operations from other clients. Therefore, the shared file region may end up containing fragments from different clients, although the replicas will be identical because the in￾dividual operations are completed successfully in the same order on all replicas. This leaves the file region in consistent but undefined state as noted in Section 2.7. 3.2 Data Flow We decouple the flow of data from the flow of control to use the networkefficiently. While control flows from the client to the primary and then to all secondaries, data is pushed linearly along a carefully picked chain of chunkservers in a pipelined fashion. Our goals are to fully utilize each machine’s networkbandwidth, avoid networkbottlenecks and high-latency links, and minimize the latency to push through all the data. To fully utilize each machine’s networkbandwidth, the data is pushed linearly along a chain of chunkservers rather than distributed in some other topology (e.g., tree). Thus, each machine’s full outbound bandwidth is used to trans￾fer the data as fast as possible rather than divided among multiple recipients. To avoid network bottlenecks and high-latency links (e.g., inter-switch links are often both) as much as possible, each machine forwards the data to the “closest” machine in the networktopology that has not received it. Suppose the client is pushing data to chunkservers S1 through S4. It sends the data to the closest chunkserver, say S1. S1 for￾wards it to the closest chunkserver S2 through S4 closest to S1, say S2. Similarly, S2 forwards it to S3 or S4, whichever is closer to S2, and so on. Our networktopology is simple enough that “distances” can be accurately estimated from IP addresses. Finally, we minimize latency by pipelining the data trans￾fer over TCP connections. Once a chunkserver receives some data, it starts forwarding immediately. Pipelining is espe￾cially helpful to us because we use a switched networkwith full-duplex links. Sending the data immediately does not reduce the receive rate. Without networkcongestion, the ideal elapsed time for transferring B bytes to R replicas is B/T + RL where T is the networkthroughput and L is la￾tency to transfer bytes between two machines. Our network links are typically 100 Mbps (T), and L is far below 1 ms. Therefore, 1 MB can ideally be distributed in about 80 ms. 3.3 Atomic Record Appends GFS provides an atomic append operation called record append. In a traditional write, the client specifies the off- set at which data is to be written. Concurrent writes to the same region are not serializable: the region may end up containing data fragments from multiple clients. In a record append, however, the client specifies only the data. GFS appends it to the file at least once atomically (i.e., as one continuous sequence of bytes) at an offset of GFS’s choosing and returns that offset to the client. This is similar to writ￾ing to a file opened in O APPEND mode in Unix without the race conditions when multiple writers do so concurrently. Record append is heavily used by our distributed applica￾tions in which many clients on different machines append to the same file concurrently. Clients would need addi￾tional complicated and expensive synchronization, for ex￾ample through a distributed lockmanager, if they do so with traditional writes. In our workloads, such files often

serve as multiple-producer/single-consumer queues or con- handle C'.It then asks each chunkserver that has a current tain merged results from many different clients. replica of C to create a new chunk called C'.By creating Record append is a kind of mutation and follows the con- the new chunk on the same chunkservers as the original.we trol flow in Section 3.1 with only a little extra logic at the ensure that the data can be copied locally.not over the net- primary.The client pushes the data to all replicas of the work (our disks are about three times as fast as our 100 Mb last chunk of the file Then,it sends its request to the pri- Ethernet links).From this point,request handling is no dif- mary.The primary checks to see if appending the record ferent from that for any chunk:the master grants one of the to the current chunk would cause the chunk to exceed the replicas a lease on the new chunk C'and replies to the client, maximum size (64 MB).If so,it pads the chunk to the max- which can write the chunk normally,not knowing that it has imum size,tells secondaries to do the same,and replies to just been created from an existing chunk. the client indicating that the operation should be retried on the next chunk.(Record append is restricted to be at most one-fourth of the maximum chunk size to keep worst- 4. MASTER OPERATION case fragmentation at an acceptable level.If the record The master executes all namespace operations.In addi- fits within the maximum size,which is the common case, tion,it manages chunk replicas throughout the system:it the primary appends the data to its replica,tells the secon- makes placement decisions,creates new chunks and hence daries to write the data at the exact offset where it has,and replicas,and coordinates various system-wide activities to finally replies success to the client. keep chunks fully replicated,to balance load across all the If a record append fails at any replica,the client retries the chunkservers,and to reclaim unused storage.We now dis- operation.As a result,replicas of the same chunk may con- cuss each of these topics. tain different data possibly including duplicates of the same record in whole or in part.GFS does not guarantee that all 4.1 Namespace Management and Locking replicas are bytewise identical.It only guarantees that the data is written at least once as an atomic unit.This prop- Many master operations can take a long time:for exam- ple,a snapshot operation has to revoke chunkserver leases on erty follows readily from the simple observation that for the all chunks covered by the snapshot.We do not want to delay operation to report success,the data must have been written at the same offset on all replicas of some chunk.Further- other master operations while they are running.Therefore more,after this,all replicas are at least as long as the end we allow multiple operations to be active and use locks over of record and therefore any future record will be assigned a regions of the namespace to ensure proper serialization. higher offset or a different chunk even if a different replica Unlike many traditional file systems,GFS does not have a per-directory data structure that lists all the files in that later becomes the primary.In terms of our consistency guar- directory.Nor does it support aliases for the same file or antees,the regions in which successful record append opera- directory (i.e,hard or symbolic links in Unix terms).GFS tions have written their data are defined (hence consistent). whereas intervening regions are inconsistent (hence unde- logically represents its namespace as a lookup table mapping fined).Our applications can deal with inconsistent regions full pathnames to metadata.With prefix compression,this as we discussed in Section 2.7.2. table can be efficiently represented in memory.Each node in the namespace tree (either an absolute file name or an absolute directory name)has an associated read-write lock. 3.4 Snapshot Each master operation acquires a set of locks before it The snapshot operation makes a copy of a file or a direc- runs.Typically,if it involves /d1/d2/.../dn/leaf,it will tory tree (the "source")almost instantaneously,while min- acquire read-locks on the directory names /d1,/d1/d2,..., imizing any interruptions of ongoing mutations.Our users /d1/d2/.../dn,and either a read lock or a write lock on the use it to quickly create branch copies of huge data sets (and full pathname/d1/d2/.../dn/leaf.Note that leaf may be often copies of those copies,recursively),or to checkpoint a file or directory depending on the operation. the current state before experimenting with changes that We now illustrate how this locking mechanism can prevent can later be committed or rolled back easily. a file /home/user/foo from being created while /home/user Like AFS [5],we use standard copy-on-write techniques to is being snapshotted to /save/user.The snapshot oper- implement snapshots.When the master receives a snapshot ation acquires read locks on /home and /save,and write request,it first revokes any outstanding leases on the chunks locks on /home/user and /save/user.The file creation ac- in the files it is about to snapshot.This ensures that any quires read locks on /home and /home/user,and a write subsequent writes to these chunks will require an interaction lock on /home/user/foo.The two operations will be seri- with the master to find the lease holder.This will give the alized properly because they try to obtain conflicting locks master an opportunity to create a new copy of the chunk on /home/user.File creation does not require a write lock first. on the parent directory because there is no "directory",or After the leases have been revoked or have expired,the inode-like,data structure to be protected from modification. master logs the operation to disk.It then applies this log The read lock on the name is sufficient to protect the parent record to its in-memory state by duplicating the metadata directory from deletion. for the source file or directory tree.The newly created snap- One nice property of this locking scheme is that it allows shot files point to the same chunks as the source files. concurrent mutations in the same directory.For example, The first time a client wants to write to a chunk C after multiple file creations can be executed concurrently in the the snapshot operation,it sends a request to the master to same directory:each acquires a read lock on the directory find the current lease holder.The master notices that the name and a write lock on the file name.The read lock on reference count for chunk C is greater than one.It defers the directory name suffices to prevent the directory from replying to the client request and instead picks a new chunk being deleted,renamed,or snapshotted.The write locks on

serve as multiple-producer/single-consumer queues or con￾tain merged results from many different clients. Record append is a kind of mutation and follows the con￾trol flow in Section 3.1 with only a little extra logic at the primary. The client pushes the data to all replicas of the last chunkof the file Then, it sends its request to the pri￾mary. The primary checks to see if appending the record to the current chunkwould cause the chunkto exceed the maximum size (64 MB). If so, it pads the chunkto the max￾imum size, tells secondaries to do the same, and replies to the client indicating that the operation should be retried on the next chunk. (Record append is restricted to be at most one-fourth of the maximum chunksize to keep worst￾case fragmentation at an acceptable level.) If the record fits within the maximum size, which is the common case, the primary appends the data to its replica, tells the secon￾daries to write the data at the exact offset where it has, and finally replies success to the client. If a record append fails at any replica, the client retries the operation. As a result, replicas of the same chunkmay con￾tain different data possibly including duplicates of the same record in whole or in part. GFS does not guarantee that all replicas are bytewise identical. It only guarantees that the data is written at least once as an atomic unit. This prop￾erty follows readily from the simple observation that for the operation to report success, the data must have been written at the same offset on all replicas of some chunk. Further￾more, after this, all replicas are at least as long as the end of record and therefore any future record will be assigned a higher offset or a different chunkeven if a different replica later becomes the primary. In terms of our consistency guar￾antees, the regions in which successful record append opera￾tions have written their data are defined (hence consistent), whereas intervening regions are inconsistent (hence unde- fined). Our applications can deal with inconsistent regions as we discussed in Section 2.7.2. 3.4 Snapshot The snapshot operation makes a copy of a file or a direc￾tory tree (the “source”) almost instantaneously, while min￾imizing any interruptions of ongoing mutations. Our users use it to quickly create branch copies of huge data sets (and often copies of those copies, recursively), or to checkpoint the current state before experimenting with changes that can later be committed or rolled backeasily. Like AFS [5], we use standard copy-on-write techniques to implement snapshots. When the master receives a snapshot request, it first revokes any outstanding leases on the chunks in the files it is about to snapshot. This ensures that any subsequent writes to these chunks will require an interaction with the master to find the lease holder. This will give the master an opportunity to create a new copy of the chunk first. After the leases have been revoked or have expired, the master logs the operation to disk. It then applies this log record to its in-memory state by duplicating the metadata for the source file or directory tree. The newly created snap￾shot files point to the same chunks as the source files. The first time a client wants to write to a chunkC after the snapshot operation, it sends a request to the master to find the current lease holder. The master notices that the reference count for chunkC is greater than one. It defers replying to the client request and instead picks a new chunk handle C’. It then asks each chunkserver that has a current replica of C to create a new chunkcalled C’. By creating the new chunkon the same chunkservers as the original, we ensure that the data can be copied locally, not over the net￾work(our disks are about three times as fast as our 100 Mb Ethernet links). From this point, request handling is no dif￾ferent from that for any chunk: the master grants one of the replicas a lease on the new chunkC’ and replies to the client, which can write the chunknormally, not knowing that it has just been created from an existing chunk. 4. MASTER OPERATION The master executes all namespace operations. In addi￾tion, it manages chunkreplicas throughout the system: it makes placement decisions, creates new chunks and hence replicas, and coordinates various system-wide activities to keep chunks fully replicated, to balance load across all the chunkservers, and to reclaim unused storage. We now dis￾cuss each of these topics. 4.1 Namespace Management and Locking Many master operations can take a long time: for exam￾ple, a snapshot operation has to revoke chunkserver leases on all chunks covered by the snapshot. We do not want to delay other master operations while they are running. Therefore, we allow multiple operations to be active and use locks over regions of the namespace to ensure proper serialization. Unlike many traditional file systems, GFS does not have a per-directory data structure that lists all the files in that directory. Nor does it support aliases for the same file or directory (i.e, hard or symbolic links in Unix terms). GFS logically represents its namespace as a lookup table mapping full pathnames to metadata. With prefix compression, this table can be efficiently represented in memory. Each node in the namespace tree (either an absolute file name or an absolute directory name) has an associated read-write lock. Each master operation acquires a set of locks before it runs. Typically, if it involves /d1/d2/.../dn/leaf, it will acquire read-locks on the directory names /d1, /d1/d2, ..., /d1/d2/.../dn, and either a read lockor a write lockon the full pathname /d1/d2/.../dn/leaf. Note that leaf may be a file or directory depending on the operation. We now illustrate how this locking mechanism can prevent a file /home/user/foo from being created while /home/user is being snapshotted to /save/user. The snapshot oper￾ation acquires read lock s on /home and /save, and write locks on /home/user and /save/user. The file creation ac￾quires read locks on /home and /home/user, and a write lockon /home/user/foo. The two operations will be seri￾alized properly because they try to obtain conflicting locks on /home/user. File creation does not require a write lock on the parent directory because there is no “directory”, or inode-like, data structure to be protected from modification. The read lockon the name is sufficient to protect the parent directory from deletion. One nice property of this locking scheme is that it allows concurrent mutations in the same directory. For example, multiple file creations can be executed concurrently in the same directory: each acquires a read lockon the directory name and a write lockon the file name. The read lockon the directory name suffices to prevent the directory from being deleted, renamed, or snapshotted. The write locks on

file names serialize attempts to create a file with the same The master picks the highest priority chunk and "clones" name twice. it by instructing some chunkserver to copy the chunk data Since the namespace can have many nodes,read-write lock directly from an existing valid replica.The new replica is objects are allocated lazily and deleted once they are not in placed with goals similar to those for creation:equalizing use.Also.locks are acquired in a consistent total order disk space utilization,limiting active clone operations on to prevent deadlock:they are first ordered by level in the any single chunkserver,and spreading replicas across racks namespace tree and lexicographically within the same level. To keep cloning traffic from overwhelming client traffic,the master limits the numbers of active clone operations both 4.2 Replica Placement for the cluster and for each chunkserver.Additionally,each A GFS cluster is highly distributed at more levels than chunkserver limits the amount of bandwidth it spends on one.It typically has hundreds of chunkservers spread across each clone operation by throttling its read requests to the many machine racks.These chunkservers in turn may be source chunkserver accessed from hundreds of clients from the same or different Finally,the master rebalances replicas periodically:it ex- racks.Communication between two machines on different amines the current replica distribution and moves replicas racks may cross one or more network switches.Addition- for better disk space and load balancing.Also through this ally,bandwidth into or out of a rack may be less than the process,the master gradually fills up a new chunkserver aggregate bandwidth of all the machines within the rack. rather than instantly swamps it with new chunks and the Multi-level distribution presents a unique challenge to dis- heavy write traffic that comes with them.The placement tribute data for scalability,reliability,and availability. criteria for the new replica are similar to those discussed The chunk replica placement policy serves two purposes: above.In addition.the master must also choose which ex- maximize data reliability and availability.and maximize net- isting replica to remove.In general,it prefers to remove work bandwidth utilization.For both.it is not enough to those on chunkservers with below-average free space so as spread replicas across machines,which only guards against to equalize disk space usage. disk or machine failures and fully utilizes each machine's net- work bandwidth.We must also spread chunk replicas across 4.4 Garbage Collection racks.This ensures that some replicas of a chunk will sur- After a file is deleted.GFS does not immediately reclaim vive and remain available even if an entire rack is damaged the available physical storage.It does so only lazily during or offline (for example,due to failure of a shared resource regular garbage collection at both the file and chunk levels like a network switch or power circuit).It also means that We find that this approach makes the system much simpler traffic,especially reads,for a chunk can exploit the aggre- and more reliable. gate bandwidth of multiple racks.On the other hand,write traffic has to flow through multiple racks,a tradeoff we make 4.4.I Mechanism willingly. When a file is deleted by the application,the master logs 4.3 Creation,Re-replication,Rebalancing the deletion immediately just like other changes.However Chunk replicas are created for three reasons:chunk cre- instead of reclaiming resources immediately,the file is just renamed to a hidden name that includes the deletion times- ation,re-replication,and rebalancing. When the master creates a chunk,it chooses where to tamp.During the master's regular scan of the file system namespace.it removes any such hidden files if they have ex- place the initially empty replicas.It considers several fac- tors.(1)We want to place new replicas on chunkservers with isted for more than three days (the interval is configurable). below-average disk space utilization.Over time this will Until then,the file can still be read under the new,special equalize disk utilization across chunkservers.(2)We want to name and can be undeleted by renaming it back to normal. limit the number of"recent"creations on each chunkserver. When the hidden file is removed from the namespace,its in- memory metadata is erased.This effectively severs its links Although creation itself is cheap,it reliably predicts immi- to all its chunks. nent heavy write traffic because chunks are created when de- manded by writes,and in our append-once-read-many work- In a similar regular scan of the chunk namespace,the load they typically become practically read-only once they master identifies orphaned chunks(i.e.,those not reachable from any file)and erases the metadata for those chunks.In have been completely written.(3)As discussed above,we want to spread replicas of a chunk across racks a HeartBeat message regularly exchanged with the master, The master re-replicates a chunk as soon as the number each chunkserver reports a subset of the chunks it has,and of available replicas falls below a user-specified goal.This the master replies with the identity of all chunks that are no could happen for various reasons:a chunkserver becomes longer present in the master's metadata.The chunkserver unavailable,it reports that its replica may be corrupted,one is free to delete its replicas of such chunks. of its disks is disabled because of errors,or the replication goal is increased.Each chunk that needs to be re-replicated 4.4.2 Discussion is prioritized based on several factors.One is how far it is Although distributed garbage collection is a hard problem from its replication goal.For example,we give higher prior- that demands complicated solutions in the context of pro- ity to a chunk that has lost two replicas than to a chunk that gramming languages,it is quite simple in our case.We can has lost only one.In addition,we prefer to first re-replicate easily identify all references to chunks:they are in the file- chunks for live files as opposed to chunks that belong to re- to-chunk mappings maintained exclusively by the master. cently deleted files (see Section 4.4).Finally.to minimize We can also easily identify all the chunk replicas:they are the impact of failures on running applications,we boost the Linux files under designated directories on each chunkserver priority of any chunk that is blocking client progress. Any such replica not known to the master is "garbage

file names serialize attempts to create a file with the same name twice. Since the namespace can have many nodes, read-write lock objects are allocated lazily and deleted once they are not in use. Also, locks are acquired in a consistent total order to prevent deadlock: they are first ordered by level in the namespace tree and lexicographically within the same level. 4.2 Replica Placement A GFS cluster is highly distributed at more levels than one. It typically has hundreds of chunkservers spread across many machine racks. These chunkservers in turn may be accessed from hundreds of clients from the same or different racks. Communication between two machines on different racks may cross one or more network switches. Addition￾ally, bandwidth into or out of a rackmay be less than the aggregate bandwidth of all the machines within the rack. Multi-level distribution presents a unique challenge to dis￾tribute data for scalability, reliability, and availability. The chunkreplica placement policy serves two purposes: maximize data reliability and availability, and maximize net￾workbandwidth utilization. For both, it is not enough to spread replicas across machines, which only guards against diskor machine failures and fully utilizes each machine’s net￾workbandwidth. We must also spread chunkreplicas across racks. This ensures that some replicas of a chunk will sur￾vive and remain available even if an entire rackis damaged or offline (for example, due to failure of a shared resource like a network switch or power circuit). It also means that traffic, especially reads, for a chunkcan exploit the aggre￾gate bandwidth of multiple racks. On the other hand, write traffic has to flow through multiple racks, a tradeoff we make willingly. 4.3 Creation, Re-replication, Rebalancing Chunkreplicas are created for three reasons: chunkcre￾ation, re-replication, and rebalancing. When the master creates a chunk, it chooses where to place the initially empty replicas. It considers several fac￾tors. (1) We want to place new replicas on chunkservers with below-average diskspace utilization. Over time this will equalize diskutilization across chunkservers. (2) We want to limit the number of “recent” creations on each chunkserver. Although creation itself is cheap, it reliably predicts immi￾nent heavy write traffic because chunks are created when de￾manded by writes, and in our append-once-read-many work￾load they typically become practically read-only once they have been completely written. (3) As discussed above, we want to spread replicas of a chunkacross racks. The master re-replicates a chunkas soon as the number of available replicas falls below a user-specified goal. This could happen for various reasons: a chunkserver becomes unavailable, it reports that its replica may be corrupted, one of its disks is disabled because of errors, or the replication goal is increased. Each chunkthat needs to be re-replicated is prioritized based on several factors. One is how far it is from its replication goal. For example, we give higher prior￾ity to a chunkthat has lost two replicas than to a chunkthat has lost only one. In addition, we prefer to first re-replicate chunks for live files as opposed to chunks that belong to re￾cently deleted files (see Section 4.4). Finally, to minimize the impact of failures on running applications, we boost the priority of any chunkthat is blocking client progress. The master picks the highest priority chunk and “clones” it by instructing some chunkserver to copy the chunk data directly from an existing valid replica. The new replica is placed with goals similar to those for creation: equalizing diskspace utilization, limiting active clone operations on any single chunkserver, and spreading replicas across racks. To keep cloning traffic from overwhelming client traffic, the master limits the numbers of active clone operations both for the cluster and for each chunkserver. Additionally, each chunkserver limits the amount of bandwidth it spends on each clone operation by throttling its read requests to the source chunkserver. Finally, the master rebalances replicas periodically: it ex￾amines the current replica distribution and moves replicas for better diskspace and load balancing. Also through this process, the master gradually fills up a new chunkserver rather than instantly swamps it with new chunks and the heavy write traffic that comes with them. The placement criteria for the new replica are similar to those discussed above. In addition, the master must also choose which ex￾isting replica to remove. In general, it prefers to remove those on chunkservers with below-average free space so as to equalize diskspace usage. 4.4 Garbage Collection After a file is deleted, GFS does not immediately reclaim the available physical storage. It does so only lazily during regular garbage collection at both the file and chunklevels. We find that this approach makes the system much simpler and more reliable. 4.4.1 Mechanism When a file is deleted by the application, the master logs the deletion immediately just like other changes. However instead of reclaiming resources immediately, the file is just renamed to a hidden name that includes the deletion times￾tamp. During the master’s regular scan of the file system namespace, it removes any such hidden files if they have ex￾isted for more than three days (the interval is configurable). Until then, the file can still be read under the new, special name and can be undeleted by renaming it backto normal. When the hidden file is removed from the namespace, its in￾memory metadata is erased. This effectively severs its links to all its chunks. In a similar regular scan of the chunknamespace, the master identifies orphaned chunks (i.e., those not reachable from any file) and erases the metadata for those chunks. In a HeartBeat message regularly exchanged with the master, each chunkserver reports a subset of the chunks it has, and the master replies with the identity of all chunks that are no longer present in the master’s metadata. The chunkserver is free to delete its replicas of such chunks. 4.4.2 Discussion Although distributed garbage collection is a hard problem that demands complicated solutions in the context of pro￾gramming languages, it is quite simple in our case. We can easily identify all references to chunks: they are in the file￾to-chunkmappings maintained exclusively by the master. We can also easily identify all the chunkreplicas: they are Linux files under designated directories on each chunkserver. Any such replica not known to the master is “garbage

The garbage collection approach to storage reclamation quantity of components together make these problems more offers several advantages over eager deletion.First,it is the norm than the exception:we cannot completely trust simple and reliable in a large-scale distributed system where the machines,nor can we completely trust the disks.Com- component failures are common.Chunk creation may suc- ponent failures can result in an unavailable system or,worse ceed on some chunkservers but not others,leaving replicas corrupted data.We discuss how we meet these challenges that the master does not know exist.Replica deletion mes- and the tools we have built into the system to diagnose prob- sages may be lost,and the master has to remember to resend lems when they inevitably occur. them across failures,both its own and the chunkserver's. Garbage collection provides a uniform and dependable way 5.1 High Availability to clean up any replicas not known to be useful.Second. Among hundreds of servers in a GFS cluster,some are it merges storage reclamation into the regular background bound to be unavailable at any given time.We keep the activities of the master,such as the regular scans of names- overall system highly available with two simple yet effective paces and handshakes with chunkservers.Thus,it is done strategies:fast recovery and replication. in batches and the cost is amortized.Moreover,it is done only when the master is relatively free.The master can re- spond more promptly to client requests that demand timely 5.1.1 Fast Recovery attention.Third,the delay in reclaiming storage provides a Both the master and the chunkserver are designed to re- safety net against accidental,irreversible deletion. store their state and start in seconds no matter how they In our experience,the main disadvantage is that the delay terminated.In fact,we do not distinguish between normal sometimes hinders user effort to fine tune usage when stor- and abnormal termination:servers are routinely shut down age is tight.Applications that repeatedly create and delete just by killing the process.Clients and other servers experi- temporary files may not be able to reuse the storage right ence a minor hiccup as they time out on their outstanding away.We address these issues by expediting storage recla- requests,reconnect to the restarted server,and retry.Sec- mation if a deleted file is explicitly deleted again.We also tion 6.2.2 reports observed startup times. allow users to apply different replication and reclamation policies to different parts of the namespace.For example, 5.1.2 Chunk Replication users can specify that all the chunks in the files within some As discussed earlier,each chunk is replicated on multiple directory tree are to be stored without replication,and any chunkservers on different racks.Users can specify different deleted files are immediately and irrevocably removed from replication levels for different parts of the file namespace. the file system state. The default is three.The master clones existing replicas as 4.5 Stale Replica Detection needed to keep each chunk fully replicated as chunkservers go offline or detect corrupted replicas through checksum ver- Chunk replicas may become stale if a chunkserver fails ification (see Section 5.2).Although replication has served and misses mutations to the chunk while it is down.For us well,we are exploring other forms of cross-server redun- each chunk.the master maintains a chunk version number dancy such as parity or erasure codes for our increasing read- to distinguish between up-to-date and stale replicas only storage requirements.We expect that it is challenging Whenever the master grants a new lease on a chunk,it but manageable to implement these more complicated re- increases the chunk version number and informs the up-to- dundancy schemes in our very loosely coupled system be- date replicas.The master and these replicas all record the cause our traffic is dominated by appends and reads rather new version number in their persistent state.This occurs than small random writes. before any client is notified and therefore before it can start writing to the chunk.If another replica is currently unavail- 5.1.3 Master Replication able,its chunk version number will not be advanced.The master will detect that this chunkserver has a stale replica The master state is replicated for reliability.Its operation when the chunkserver restarts and reports its set of chunks log and checkpoints are replicated on multiple machines.A mutation to the state is considered committed only after and their associated version numbers.If the master sees a its log record has been flushed to disk locally and on all version number greater than the one in its records,the mas- ter assumes that it failed when granting the lease and so master replicas.For simplicity,one master process remains takes the higher version to be up-to-date. in charge of all mutations as well as background activities such as garbage collection that change the system internally The master removes stale replicas in its regular garbage When it fails,it can restart almost instantly.If its machine collection.Before that,it effectively considers a stale replica not to exist at all when it replies to client requests for chunk or disk fails,monitoring infrastructure outside GFS starts a information. As another safeguard,the master includes new master process elsewhere with the replicated operation log.Clients use only the canonical name of the master (e.g. the chunk version number when it informs clients which chunkserver holds a lease on a chunk or when it instructs gfs-test),which is a DNS alias that can be changed if the master is relocated to another machine. a chunkserver to read the chunk from another chunkserver Moreover,"shadow"masters provide read-only access to in a cloning operation.The client or the chunkserver verifies the file system even when the primary master is down.They the version number when it performs the operation so that it is always accessing up-to-date data. are shadows,not mirrors,in that they may lag the primary slightly,typically fractions of a second.They enhance read availability for files that are not being actively mutated or 5.FAULT TOLERANCE AND DIAGNOSIS applications that do not mind getting slightly stale results One of our greatest challenges in designing the system is In fact,since file content is read from chunkservers,appli- dealing with frequent component failures.The quality and cations do not observe stale file content.What could be

The garbage collection approach to storage reclamation offers several advantages over eager deletion. First, it is simple and reliable in a large-scale distributed system where component failures are common. Chunkcreation may suc￾ceed on some chunkservers but not others, leaving replicas that the master does not know exist. Replica deletion mes￾sages may be lost, and the master has to remember to resend them across failures, both its own and the chunkserver’s. Garbage collection provides a uniform and dependable way to clean up any replicas not known to be useful. Second, it merges storage reclamation into the regular background activities of the master, such as the regular scans of names￾paces and handshakes with chunkservers. Thus, it is done in batches and the cost is amortized. Moreover, it is done only when the master is relatively free. The master can re￾spond more promptly to client requests that demand timely attention. Third, the delay in reclaiming storage provides a safety net against accidental, irreversible deletion. In our experience, the main disadvantage is that the delay sometimes hinders user effort to fine tune usage when stor￾age is tight. Applications that repeatedly create and delete temporary files may not be able to reuse the storage right away. We address these issues by expediting storage recla￾mation if a deleted file is explicitly deleted again. We also allow users to apply different replication and reclamation policies to different parts of the namespace. For example, users can specify that all the chunks in the files within some directory tree are to be stored without replication, and any deleted files are immediately and irrevocably removed from the file system state. 4.5 Stale Replica Detection Chunkreplicas may become stale if a chunkserver fails and misses mutations to the chunkwhile it is down. For each chunk, the master maintains a chunk version number to distinguish between up-to-date and stale replicas. Whenever the master grants a new lease on a chunk, it increases the chunkversion number and informs the up-to￾date replicas. The master and these replicas all record the new version number in their persistent state. This occurs before any client is notified and therefore before it can start writing to the chunk. If another replica is currently unavail￾able, its chunkversion number will not be advanced. The master will detect that this chunkserver has a stale replica when the chunkserver restarts and reports its set of chunks and their associated version numbers. If the master sees a version number greater than the one in its records, the mas￾ter assumes that it failed when granting the lease and so takes the higher version to be up-to-date. The master removes stale replicas in its regular garbage collection. Before that, it effectively considers a stale replica not to exist at all when it replies to client requests for chunk information. As another safeguard, the master includes the chunkversion number when it informs clients which chunkserver holds a lease on a chunk or when it instructs a chunkserver to read the chunk from another chunkserver in a cloning operation. The client or the chunkserver verifies the version number when it performs the operation so that it is always accessing up-to-date data. 5. FAULT TOLERANCE AND DIAGNOSIS One of our greatest challenges in designing the system is dealing with frequent component failures. The quality and quantity of components together make these problems more the norm than the exception: we cannot completely trust the machines, nor can we completely trust the disks. Com￾ponent failures can result in an unavailable system or, worse, corrupted data. We discuss how we meet these challenges and the tools we have built into the system to diagnose prob￾lems when they inevitably occur. 5.1 High Availability Among hundreds of servers in a GFS cluster, some are bound to be unavailable at any given time. We keep the overall system highly available with two simple yet effective strategies: fast recovery and replication. 5.1.1 Fast Recovery Both the master and the chunkserver are designed to re￾store their state and start in seconds no matter how they terminated. In fact, we do not distinguish between normal and abnormal termination; servers are routinely shut down just by killing the process. Clients and other servers experi￾ence a minor hiccup as they time out on their outstanding requests, reconnect to the restarted server, and retry. Sec￾tion 6.2.2 reports observed startup times. 5.1.2 Chunk Replication As discussed earlier, each chunkis replicated on multiple chunkservers on different racks. Users can specify different replication levels for different parts of the file namespace. The default is three. The master clones existing replicas as needed to keep each chunk fully replicated as chunkservers go offline or detect corrupted replicas through checksum ver￾ification (see Section 5.2). Although replication has served us well, we are exploring other forms of cross-server redun￾dancy such as parity or erasure codes for our increasing read￾only storage requirements. We expect that it is challenging but manageable to implement these more complicated re￾dundancy schemes in our very loosely coupled system be￾cause our traffic is dominated by appends and reads rather than small random writes. 5.1.3 Master Replication The master state is replicated for reliability. Its operation log and checkpoints are replicated on multiple machines. A mutation to the state is considered committed only after its log record has been flushed to disklocally and on all master replicas. For simplicity, one master process remains in charge of all mutations as well as background activities such as garbage collection that change the system internally. When it fails, it can restart almost instantly. If its machine or diskfails, monitoring infrastructure outside GFS starts a new master process elsewhere with the replicated operation log. Clients use only the canonical name of the master (e.g. gfs-test), which is a DNS alias that can be changed if the master is relocated to another machine. Moreover, “shadow” masters provide read-only access to the file system even when the primary master is down. They are shadows, not mirrors, in that they may lag the primary slightly, typically fractions of a second. They enhance read availability for files that are not being actively mutated or applications that do not mind getting slightly stale results. In fact, since file content is read from chunkservers, appli￾cations do not observe stale file content. What could be

stale within short windows is file metadata,like directory finally compute and record the new checksums.If we do contents or access control information. not verify the first and last blocks before overwriting them To keep itself informed,a shadow master reads a replica of partially,the new checksums may hide corruption that exists the growing operation log and applies the same sequence of in the regions not being overwritten. changes to its data structures exactly as the primary does. During idle periods,chunkservers can scan and verify the Like the primary,it polls chunkservers at startup(and infre- contents of inactive chunks.This allows us to detect corrup- quently thereafter)to locate chunk replicas and exchanges tion in chunks that are rarely read.Once the corruption is frequent handshake messages with them to monitor their detected,the master can create a new uncorrupted replica status.It depends on the primary master only for replica and delete the corrupted replica.This prevents an inactive location updates resulting from the primary's decisions to but corrupted chunk replica from fooling the master into create and delete replicas. thinking that it has enough valid replicas of a chunk. 5.2 Data Integrity 5.3 Diagnostic Tools Each chunkserver uses checksumming to detect corruption Extensive and detailed diagnostic logging has helped im- of stored data.Given that a GFS cluster often has thousands measurably in problem isolation,debugging,and perfor- of disks on hundreds of machines,it regularly experiences mance analysis,while incurring only a minimal cost.With- disk failures that cause data corruption or loss on both the out logs,it is hard to understand transient,non-repeatable read and write paths.(See Section 7 for one cause.)We interactions between machines.GFS servers generate di- can recover from corruption using other chunk replicas,but agnostic logs that record many significant events (such as it would be impractical to detect corruption by comparing chunkservers going up and down)and all RPC requests and replicas across chunkservers.Moreover,divergent replicas replies.These diagnostic logs can be freely deleted without may be legal:the semantics of GFS mutations,in particular affecting the correctness of the system.However,we try to atomic record append as discussed earlier,does not guar- keep these logs around as far as space permits. antee identical replicas.Therefore,each chunkserver must The RPC logs include the exact requests and responses independently verify the integrity of its own copy by main- sent on the wire,except for the file data being read or writ- taining checksums. ten.By matching requests with replies and collating RPC A chunk is broken up into 64 KB blocks.Each has a corre- records on different machines,we can reconstruct the en- sponding 32 bit checksum.Like other metadata,checksums tire interaction history to diagnose a problem.The logs also are kept in memory and stored persistently with logging. serve as traces for load testing and performance analysis. separate from user data. The performance impact of logging is minimal (and far For reads.the chunkserver verifies the checksum of data outweighed by the benefits)because these logs are written blocks that overlap the read range before returning any data sequentially and asynchronously.The most recent events to the requester,whether a client or another chunkserver are also kept in memory and available for continuous online Therefore chunkservers will not propagate corruptions to monitoring. other machines.If a block does not match the recorded checksum,the chunkserver returns an error to the requestor 6. MEASUREMENTS and reports the mismatch to the master.In response,the requestor will read from other replicas,while the master In this section we present a few micro-benchmarks to illus- will clone the chunk from another replica.After a valid new trate the bottlenecks inherent in the GFS architecture and replica is in place,the master instructs the chunkserver that implementation,and also some numbers from real clusters reported the mismatch to delete its replica. in use at Google. Checksumming has little effect on read performance for 6.1 Micro-benchmarks several reasons.Since most of our reads span at least a few blocks,we need to read and checksum only a relatively We measured performance on a GFS cluster consisting small amount of extra data for verification.GFS client code of one master,two master replicas,16 chunkservers,and further reduces this overhead by trying to align reads at 16 clients.Note that this configuration was set up for ease checksum block boundaries.Moreover,checksum lookups of testing.Typical clusters have hundreds of chunkservers and comparison on the chunkserver are done without any and hundreds of clients. I/O,and checksum calculation can often be overlapped with All the machines are configured with dual 1.4 GHz PIII I/Os. processors,2 GB of memory,two 80 GB 5400 rpm disks,and Checksum computation is heavily optimized for writes a 100 Mbps full-duplex Ethernet connection to an HP 2524 that append to the end of a chunk (as opposed to writes switch.All 19 GFS server machines are connected to one that overwrite existing data)because they are dominant in switch,and all 16 client machines to the other.The two our workloads.We just incrementally update the check- switches are connected with a 1 Gbps link sum for the last partial checksum block,and compute new checksums for any brand new checksum blocks filled by the 6.1.1 Reads append.Even if the last partial checksum block is already N clients read simultaneously from the file system.Each corrupted and we fail to detect it now,the new checksum client reads a randomly selected 4 MB region from a 320 GB value will not match the stored data.and the corruption will file set.This is repeated 256 times so that each client ends be detected as usual when the block is next read. up reading 1 GB of data.The chunkservers taken together In contrast,if a write overwrites an existing range of the have only 32 GB of memory,so we expect at most a 10%hit chunk,we must read and verify the first and last blocks of rate in the Linux buffer cache.Our results should be close the range being overwritten,then perform the write,and to cold cache results

stale within short windows is file metadata, like directory contents or access control information. To keep itself informed, a shadow master reads a replica of the growing operation log and applies the same sequence of changes to its data structures exactly as the primary does. Like the primary, it polls chunkservers at startup (and infre￾quently thereafter) to locate chunkreplicas and exchanges frequent handshake messages with them to monitor their status. It depends on the primary master only for replica location updates resulting from the primary’s decisions to create and delete replicas. 5.2 Data Integrity Each chunkserver uses checksumming to detect corruption of stored data. Given that a GFS cluster often has thousands of disks on hundreds of machines, it regularly experiences diskfailures that cause data corruption or loss on both the read and write paths. (See Section 7 for one cause.) We can recover from corruption using other chunkreplicas, but it would be impractical to detect corruption by comparing replicas across chunkservers. Moreover, divergent replicas may be legal: the semantics of GFS mutations, in particular atomic record append as discussed earlier, does not guar￾antee identical replicas. Therefore, each chunkserver must independently verify the integrity of its own copy by main￾taining checksums. A chunkis broken up into 64 KB blocks. Each has a corre￾sponding 32 bit checksum. Like other metadata, checksums are kept in memory and stored persistently with logging, separate from user data. For reads, the chunkserver verifies the checksum of data blocks that overlap the read range before returning any data to the requester, whether a client or another chunkserver. Therefore chunkservers will not propagate corruptions to other machines. If a blockdoes not match the recorded checksum, the chunkserver returns an error to the requestor and reports the mismatch to the master. In response, the requestor will read from other replicas, while the master will clone the chunkfrom another replica. After a valid new replica is in place, the master instructs the chunkserver that reported the mismatch to delete its replica. Checksumming has little effect on read performance for several reasons. Since most of our reads span at least a few blocks, we need to read and checksum only a relatively small amount of extra data for verification. GFS client code further reduces this overhead by trying to align reads at checksum block boundaries. Moreover, checksum lookups and comparison on the chunkserver are done without any I/O, and checksum calculation can often be overlapped with I/Os. Checksum computation is heavily optimized for writes that append to the end of a chunk(as opposed to writes that overwrite existing data) because they are dominant in our workloads. We just incrementally update the check￾sum for the last partial checksum block, and compute new checksums for any brand new checksum blocks filled by the append. Even if the last partial checksum block is already corrupted and we fail to detect it now, the new checksum value will not match the stored data, and the corruption will be detected as usual when the blockis next read. In contrast, if a write overwrites an existing range of the chunk, we must read and verify the first and last blocks of the range being overwritten, then perform the write, and finally compute and record the new checksums. If we do not verify the first and last blocks before overwriting them partially, the new checksums may hide corruption that exists in the regions not being overwritten. During idle periods, chunkservers can scan and verify the contents of inactive chunks. This allows us to detect corrup￾tion in chunks that are rarely read. Once the corruption is detected, the master can create a new uncorrupted replica and delete the corrupted replica. This prevents an inactive but corrupted chunkreplica from fooling the master into thinking that it has enough valid replicas of a chunk. 5.3 Diagnostic Tools Extensive and detailed diagnostic logging has helped im￾measurably in problem isolation, debugging, and perfor￾mance analysis, while incurring only a minimal cost. With￾out logs, it is hard to understand transient, non-repeatable interactions between machines. GFS servers generate di￾agnostic logs that record many significant events (such as chunkservers going up and down) and all RPC requests and replies. These diagnostic logs can be freely deleted without affecting the correctness of the system. However, we try to keep these logs around as far as space permits. The RPC logs include the exact requests and responses sent on the wire, except for the file data being read or writ￾ten. By matching requests with replies and collating RPC records on different machines, we can reconstruct the en￾tire interaction history to diagnose a problem. The logs also serve as traces for load testing and performance analysis. The performance impact of logging is minimal (and far outweighed by the benefits) because these logs are written sequentially and asynchronously. The most recent events are also kept in memory and available for continuous online monitoring. 6. MEASUREMENTS In this section we present a few micro-benchmarks to illus￾trate the bottlenecks inherent in the GFS architecture and implementation, and also some numbers from real clusters in use at Google. 6.1 Micro-benchmarks We measured performance on a GFS cluster consisting of one master, two master replicas, 16 chunkservers, and 16 clients. Note that this configuration was set up for ease of testing. Typical clusters have hundreds of chunkservers and hundreds of clients. All the machines are configured with dual 1.4 GHz PIII processors, 2 GB of memory, two 80 GB 5400 rpm disks, and a 100 Mbps full-duplex Ethernet connection to an HP 2524 switch. All 19 GFS server machines are connected to one switch, and all 16 client machines to the other. The two switches are connected with a 1 Gbps link. 6.1.1 Reads N clients read simultaneously from the file system. Each client reads a randomly selected 4 MB region from a 320 GB file set. This is repeated 256 times so that each client ends up reading 1 GB of data. The chunkservers taken together have only 32 GB of memory, so we expect at most a 10% hit rate in the Linux buffer cache. Our results should be close to cold cache results

点击下载完整版文档(PDF)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共15页,试读已结束,阅读完整版请下载
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有