Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning Ceph

You're reading from   Learning Ceph Unifed, scalable, and reliable open source storage solution

Arrow left icon
Product type Paperback
Published in Oct 2017
Publisher
ISBN-13 9781787127913
Length 340 pages
Edition 2nd Edition
Languages
Tools
Arrow right icon
Authors (4):
Arrow left icon
Karan Singh Karan Singh
Author Profile Icon Karan Singh
Karan Singh
Bryan Stillwell Bryan Stillwell
Author Profile Icon Bryan Stillwell
Bryan Stillwell
Anthony D'Atri Anthony D'Atri
Author Profile Icon Anthony D'Atri
Anthony D'Atri
Vaibhav Bhembre Vaibhav Bhembre
Author Profile Icon Vaibhav Bhembre
Vaibhav Bhembre
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Introducing Ceph Storage FREE CHAPTER 2. Ceph Components and Services 3. Hardware and Network Selection 4. Planning Your Deployment 5. Deploying a Virtual Sandbox Cluster 6. Operations and Maintenance 7. Monitoring Ceph 8. Ceph Architecture: Under the Hood 9. Storage Provisioning with Ceph 10. Integrating Ceph with OpenStack 11. Performance and Stability Tuning

Placement groups


In the previous section, we described what objects in Ceph are and how we can access them. Ceph distributes objects pseudo-randomly to storage devices based on predefined data assignment policies. The assignment policy uses a novel placement algorithm called CRUSH to choose a probabilistically balanced distribution of objects throughout the cluster. This ensures that devices are presented with a nearly uniform storage and workload distribution for most use-cases. When a cluster is expanded by adding new storage or old/failed devices are removed, it is necessary to restore balance by migrating data to restore the configured replication policies. Since this data movement is kept a minimum, augmenting an existing cluster is significantly less cumbersome compared to the use of other, less-sophisticated placement algorithms. CRUSH will be explored in detail in the next section.

When Ceph receives requests to store data, it needs to determine the set designated objects the requests...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime