Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning Ceph

You're reading from   Learning Ceph Unifed, scalable, and reliable open source storage solution

Arrow left icon
Product type Paperback
Published in Oct 2017
Publisher
ISBN-13 9781787127913
Length 340 pages
Edition 2nd Edition
Languages
Tools
Arrow right icon
Authors (4):
Arrow left icon
Karan Singh Karan Singh
Author Profile Icon Karan Singh
Karan Singh
Bryan Stillwell Bryan Stillwell
Author Profile Icon Bryan Stillwell
Bryan Stillwell
Anthony D'Atri Anthony D'Atri
Author Profile Icon Anthony D'Atri
Anthony D'Atri
Vaibhav Bhembre Vaibhav Bhembre
Author Profile Icon Vaibhav Bhembre
Vaibhav Bhembre
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Introducing Ceph Storage FREE CHAPTER 2. Ceph Components and Services 3. Hardware and Network Selection 4. Planning Your Deployment 5. Deploying a Virtual Sandbox Cluster 6. Operations and Maintenance 7. Monitoring Ceph 8. Ceph Architecture: Under the Hood 9. Storage Provisioning with Ceph 10. Integrating Ceph with OpenStack 11. Performance and Stability Tuning

Scrubs


Data corruption is rare but it does happen, a phenomenon described scientifically as bit-rot. Sometimes we write to a drive, and a surface or cell failure results in reads failing or returning something other than what we wrote. HBA misconfiguration, SAS expander flakes, firmware design flaws, drive electronics errors, and medium failures can also corrupt data. Surface errors affect between 1 in 1016 to as many as 1 in 1014 bits stored on HDDs. Drives can also become unseated due to human error or even a truck rumbling by. This author has also seen literal cosmic rays flip bits.

Ceph lives for strong data integrity, and has a mechanism to alert us of these situation: scrubs. Scrubs are somewhat analogous to fsck on a filesystem and the patrol reads or surface scans that many HBAs run. The idea is to check each replicated copy of data to ensure that they're mutually consistent. Since copies of data are distributed throughout the cluster this is done at Placement Group (PG) granularity...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image