Dynamic Timestamp Allocation for Reducing Transaction Aborts

Total Page:16

File Type:pdf, Size:1020Kb

Dynamic Timestamp Allocation for Reducing Transaction Aborts 1 Dynamic Timestamp Allocation for Reducing Transaction Aborts Vaibhav Arora, Ravi Kumar Suresh Babu, Sujaya Maiyya, Divyakant Agrawal, Amr El Abbadi vaibhavarora, ravikumar, sujaya maiyya, agrawal, [email protected] Department of Computer Science, University of California, Santa Barbara Xun Xue, Zhiyanan, Zhujianfeng xun.xue, zhiyanan, [email protected] Huawei 300 Abstract—CockroachDB is an open-source database, providing 1,500 Throughput transactional access to data in a distributed setting. CockroachDB Aborts employs a multi-version timestamp ordering protocol to provide 200 1,000 serializability. This provides a simple mechanism to enforce serializability, but the static timestamp allocation scheme can lead to a high number of aborts under contention. We aim to 500 100 reduce the aborts for transactional workloads by integrating a dynamic timestamp ordering based concurrency control scheme Throughput (Txns/sec) 0 0 Number of Aborts/1000 txns in CockroachDB. Dynamic timestamp ordering scheme tries to 50:50 60:40 70:30 80:20 90:10 99:01 reduce the number of aborts by allocating timestamps dynami- Contention Ratio cally based on the conflicts of accessed data items. This gives a Fig. 1: Performance of Fixed Timestamp Ordering Scheme transaction higher chance to fit on a logically serializable timeline, under Contention. Contention ratio x:y specifies that x percent especially in workloads with high contention. of the transactions access y percent of the items. I. INTRODUCTION logical serializable timeline. We integrate CockroachDB with CockroachDB [2] is an open-source distributed SQL the dynamic timestamp allocation technique we designed in database built on a transactional and strongly-consistent key- our previous work MaaT (Multiaccess as a Transaction) [17]. value store. The transactional guarantees are provided over MaaT changes the validation phase of the optimistic con- data, which is synchronously replicated using a distributed currency control mechanism to allocate a commit timestamp consensus protocol, Raft [18]. dynamically by keeping track of the items accessed and CockroachDB provides two transaction isolation levels: SI conflicting transactions accessing the items using read and (Snapshot Isolation) [9] and Serializable [10]. Snapshot Iso- write markers. By performing dynamic timestamp allocation lation can detect write-write conflicts among transactions and during validation and commit, MaaT is able to reduce aborts provides efficient performance, but does not guarantee serializ- under contention. ability [15]. Applications needing stricter correctness guaran- Adapting the dynamic timestamp allocation technique de- tees than snapshot isolation can use the Serializable isolation signed in MaaT with the SSI implementation in CockroachDB level, which is provided using a Serializable Snapshot Isolation can eliminate unnecessary aborts. Our technique targets cases (SSI) [23] based technique. To implement SSI, CockroachDB where transactions are aborted due to being non-serializable employs a lock-free multi-version timestamp ordering scheme. because of a fixed timestamp ordering, rather than being The timestamp ordering scheme in CockroachDB uses a fixed aborted because of actual conflicting order of access of items timestamp allocation scheme, and assigns timestamps at the (in other words an ordering that would lead to cycle in a start of each transaction. These timestamps are used as commit conflict graph). Some of these cases are serializable when timestamp for the transaction. This commit timestamp is used timestamps are dynamically allocated to fit them on a logicial to order the transactions in logical timestamp order, and hence timeline, based on the order of access of data items. enforce serializability. SSI, unlike SI, detects and handles read- CockroachDB is modified to integrate the dynamic times- write conflicts but the restrictive fixed timestamp ordering tamp ordering based concurrency-control mechanism. As the leads to higher number of aborts under contention. Figure 1 concurrency-control layer interacts with the lower layers of illustrates that with increasing contention in the workload, the the database for ensuring strong consistency of data, multiple number of aborts increases, leading to a drop in throughput components had to be modified to integrate the technique. with timestamp ordering concurrency-control employed in Past techniques proposed to reduce aborts in lock-free CockroachDB. concurrency control techniques [26], [17], [25] have been To reduce the number of aborts at high contention, a implemented and evaluated in standalone prototypes. Imple- possible strategy is to use dynamic timestamps for allocating menting the dynamic timestamp ordering technique in a full- the commit timestamp to a transaction. In this technique, the featured database system like CockroachDB gives an insight system tries to dynamically allocate a timestamp range to into the performance characteristics of the dynamic timestamp each transaction, based on the conflicts of data items accessed ordering like optimizations, and how to integrate such opti- by the transaction. At commit, a timestamp is allocated to mizations in existing systems. the transaction from that range, to fit that transaction on a A benchmark is also developed to extensively evalu- ate the performance of dynamic timestamp ordering based patterns which occur in non-serializable patterns in Optimistic concurrency-control in CockroachDB. The benchmark eval- concurrency control (OCC) algorithms. Rather than aborting a uates the performance while varying contention, the degree transaction on detecting an anti-dependency, as in OCC, BCC of concurrent access and the ratio of read-only and read- tracks dependencies to abort transactions only when these write transactions. The source-code changes as well as the non-serializable patterns are detected. Although a BCC like benchmark are available on Github [4], [1]. technique would reduce the number of aborts, it adds extra The rest of the paper is organized as follows. Related overhead to track dependencies. work is discussed in Section II. In Section III, we describe Deterministic transaction scheduling [22] has also been pro- CockroachDB’s architecture. Section IV describes the dynamic posed to eliminate transaction aborts and improve performance timestamping technique employed by MaaT. An abstract under high contention. However, such techniques need a priori overview of the integration of dynamic timestamp allocation knowledge of read-write sets and do not work in an ad-hoc in CockroachDB is presented in Section V. The details of the transaction access setting, like in CockroachDB. integration and the implementation are provided in Section VI. CockroachDB’s [2] SSI technique employs timestamp allo- Evaluation results are presented in Section VII. Section VIII cation, is lock-free and can support distributed transactions. concludes the paper. Hence, dynamic timestamping proposed in MaaT is a good fit for CockroachDB, since it is timestamp based and lock-free. II. BACKGROUND The SI implementation in CockroachDB also provides a mech- Snapshot Isolation (SI) has been implemented in major anism to push commit timestamps for distributed transactions. database systems, like Oracle and PostgreSQL. Fekete et However, this technique cannot be applied to SSI [3]. al. [15] illustrated that SI does not provide serializability and III. COCKROACHDB OVERVIEW then subsequently Fekete et al. [14] studied the transaction patterns occurring in SI violations. Various techniques have CockroachDB [2] is an open-source distributed cloud been proposed to make Snapshot Isolation serializable. Some database built on top of a transactional and consistent key- of the techniques [14], [16] perform static analysis of ap- value store. Its primary design goals are scalability and strong plication code and detect SI violation patterns. The potential consistency. CockroachDB aims to tolerate disk, machine, violations are translated into write-write conflicts, which are rack, and datacenter failures with minimal disruption and no then detected by snapshot isolation. However, these techniques manual intervention, thus being survivable (hence the name). are limited in scope and cannot be applied to systems dy- CockroachDB achieves strong consistency by synchronous namically generating transactions. Cahill et al. [12] develop replication of data. It replicates data over multiple nodes a SSI (Serializable Snapshot Isolation) methodology to detect and guarantees consistency between replicas using Raft [18] SI violations at run-time and implement the technique over consensus protocol. Cockroach provides transactional access existing snapshot isolation providing database, BerkleyDB. to data. It supports two isolation levels: Snapshot Isolation (SI) CockroachDB’s technique for providing serializable snapshot and Serializable Snapshot Isolation (SSI). While both provide isolation is inspired by a multi-version timestamp order- lock-free reads and writes, SI allows write-skew [9], and does ing [19] variant proposed by Yabandeh et al. [23]. not guarantee a serializable history. SSI eliminates write-skew Various mechanisms have been proposed to reduce aborts but introduces a performance hit in cases of high contention. in pessimistic as well as optimistic concurrency control (CC) A. Architecture algorithms. For locking algorithms, variants of 2PL such as CockroachDB implements a layered architecture as shown Order-shared [6] locking, Altruistic Locking [20]
Recommended publications
  • ACID Compliant Distributed Key-Value Store
    ACID Compliant Distributed Key-Value Store #1 #2 #3 Lakshmi Narasimhan Seshan ,​ Rajesh Jalisatgi ,​ Vijaeendra Simha G A # ​ ​ ​ ​1l​ [email protected] # ​2r​ [email protected] #3v​ [email protected] Abstract thought that would be easier to implement. All Built a fault-tolerant and strongly-consistent key/value storage components run http and grpc endpoints. Http endpoints service using the existing RAFT implementation. Add ACID are for debugging/configuration. Grpc Endpoints are transaction capability to the service using a 2PC variant. Build used for communication between components. on the raftexample[1] (available as part of etcd) to add atomic Replica Manager (RM): RM is the service discovery transactions. This supports sharding of keys and concurrent transactions on sharded KV Store. By Implementing a part of the system. RM is initiated with each of the transactional distributed KV store, we gain working knowledge Replica Servers available in the system. Users have to of different protocols and complexities to make it work together. instantiate the RM with the number of shards that the user wants the key to be split into. Currently we cannot Keywords— ACID, Key-Value, 2PC, sharding, 2PL Transaction dynamically change while RM is running. New Replica ​ ​ Servers cannot be added or removed from once RM is I. INTRODUCTION ​ up and running. However Replica Servers can go down Distributed KV stores have become a norm with the and come back and RM can detect this. Each Shard advent of microservices architecture and the NoSql Leader updates the information to RM, while the DTM revolution. Initially KV Store discarded ACID properties leader updates its information to the RM.
    [Show full text]
  • Grpc - a Solution for Rpcs by Google Distributed Systems Seminar at Charles University in Prague, Nov 2016 Jan Tattermusch - Grpc Software Engineer
    gRPC - A solution for RPCs by Google Distributed Systems Seminar at Charles University in Prague, Nov 2016 Jan Tattermusch - gRPC Software Engineer About me ● Software Engineer at Google (since 2013) ● Working on gRPC since Q4 2014 ● Graduated from Charles University (2010) Contacts ● jtattermusch on GitHub ● Feedback to [email protected] @grpcio Motivation: gRPC Google has an internal RPC system, called Stubby ● All production applications use RPCs ● Over 1010 RPCs per second in total ● 4 generations over 13 years (since 2003) ● APIs for C++, Java, Python, Go What's missing ● Not suitable for external use (tight coupling with internal tools & infrastructure) ● Limited language & platform support ● Proprietary protocol and security ● No mobile support @grpcio What's gRPC ● HTTP/2 based RPC framework ● Secure, Performant, Multiplatform, Open Multiplatform ● Idiomatic APIs in popular languages (C++, Go, Java, C#, Node.js, Ruby, PHP, Python) ● Supports mobile devices (Android Java, iOS Obj-C) ● Linux, Windows, Mac OS X ● (web browser support in development) OpenSource ● developed fully in open on GitHub: https://github.com/grpc/ @grpcio Use Cases Build distributed services (microservices) Service 1 Service 3 ● In public/private cloud ● Google's own services Service 2 Service 4 Client-server communication ● Mobile ● Web ● Also: Desktop, embedded devices, IoT Access APIs (Google, OSS) @grpcio Key Features ● Streaming, Bidirectional streaming ● Built-in security and authentication ○ SSL/TLS, OAuth, JWT access ● Layering on top of HTTP/2
    [Show full text]
  • Database Software Market: Billy Fitzsimmons +1 312 364 5112
    Equity Research Technology, Media, & Communications | Enterprise and Cloud Infrastructure March 22, 2019 Industry Report Jason Ader +1 617 235 7519 [email protected] Database Software Market: Billy Fitzsimmons +1 312 364 5112 The Long-Awaited Shake-up [email protected] Naji +1 212 245 6508 [email protected] Please refer to important disclosures on pages 70 and 71. Analyst certification is on page 70. William Blair or an affiliate does and seeks to do business with companies covered in its research reports. As a result, investors should be aware that the firm may have a conflict of interest that could affect the objectivity of this report. This report is not intended to provide personal investment advice. The opinions and recommendations here- in do not take into account individual client circumstances, objectives, or needs and are not intended as recommen- dations of particular securities, financial instruments, or strategies to particular clients. The recipient of this report must make its own independent decisions regarding any securities or financial instruments mentioned herein. William Blair Contents Key Findings ......................................................................................................................3 Introduction .......................................................................................................................5 Database Market History ...................................................................................................7 Market Definitions
    [Show full text]
  • Implementing and Testing Cockroachdb on Kubernetes
    Implementing and testing CockroachDB on Kubernetes Albert Kasperi Iho Supervisors: Ignacio Coterillo Coz, Ricardo Brito Da Rocha Abstract This report will describe implementing CockroachDB on Kubernetes, a sum- mer student project done in 2019. The report addresses the implementation, monitoring, testing and results of the project. In the implementation and mon- itoring parts, a closer look to the full pipeline will be provided, with the intro- duction of all the frameworks used and the biggest problems that were faced during the project. After that, the report describes the testing process of Cock- roachDB, what tools were used in the testing and why. The results of testing will be presented after testing with the conclusion of results. Keywords CockroachDB; Kubernetes; benchmark. Contents 1 Project specification . 2 2 Implementation . 2 2.1 Kubernetes . 2 2.2 CockroachDB . 3 2.3 Setting up Kubernetes in CERN environment . 3 3 Monitoring . 3 3.1 Prometheus . 4 3.2 Prometheus Operator . 4 3.3 InfluxDB . 4 3.4 Grafana . 4 3.5 Scraping and forwarding metrics from the Kubernetes cluster . 4 4 Testing CockroachDB on Kubernetes . 5 4.1 SQLAlchemy . 5 4.2 Pgbench . 5 4.3 CockroachDB workload . 6 4.4 Benchmarking CockroachDB . 6 5 Test results . 6 5.1 SQLAlchemy . 6 5.2 Pgbench . 6 5.3 CockroachDB workload . 7 5.4 Conclusion . 7 6 Acknowledgements . 7 1 Project specification The core goal of the project was taking a look into implementing a database framework on top of Kuber- netes, the challenges in implementation and automation possibilities. Final project pipeline included a CockroachDB cluster running in Kubernetes with Prometheus monitoring both of them.
    [Show full text]
  • How Financial Service Companies Can Successfully Migrate Critical
    How Financial Service Companies Can Successfully Migrate Critical Applications to the Cloud Chapter 1: Why every bank should aspire to be the Google of FinServe PAGE 3 Chapter 2: Reducing latency and other delays that are detrimental to FSIs PAGE 6 Chapter 3: A look to the future of transaction services in the face of modernization PAGE 9 Copyright © 2021 RTInsights. All rights reserved. All other trademarks are the property of their respective companies. The information contained in this publication has been obtained from sources believed to be reliable. NACG LLC and RTInsights disclaim all warranties as to the accuracy, completeness, or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. The information expressed herein is subject to change without notice. Copyright (©) 2021 RTInsights How Financial Service Companies Can Successfully Migrate Critical Applications to the Cloud 2 Chapter 1: Why every bank should aspire to be the Google of FinServe Introduction Fintech companies are disrupting the staid world of traditional banking. Financial services institutions (FSIs) are trying to keep pace, be competitive, and become relevant by modernizing operations by leveraging the same technologies as the aggressive fintech startups. Such efforts include a move to cloud and the increased use of data to derive real-time insights for decision-making and automation. While businesses across most industries are making similar moves, FSIs have different requirements than most companies and thus must address special challenges. For example, keeping pace with changing customer desires and market conditions is driving the need for more flexible and highly scalable options when it comes to developing, deploying, maintaining, and updating applications.
    [Show full text]
  • Degree Project: Bachelor of Science in Computing Science
    UMEÅ UNIVERSITY June 3, 2021 Department of computing science Bachelor Thesis, 15hp 5DV199 Degree Project: Bachelor of Science in Computing Science A scalability evaluation on CockroachDB Tobias Lifhjelm Teacher Jerry Eriksson Tutor Anna Jonsson A scalability evaluation on CockroachDB Contents Contents 1 Introduction 1 2 Database Theory 3 2.1 Transaction . .3 2.2 Load Balancing . .4 2.3 ACID . .4 2.4 CockroachDB Architecture . .4 2.4.1 SQL Layer . .4 2.4.2 Replication Layer . .5 2.4.3 Transaction Layer . .5 2.4.3.1 Concurrency . .6 2.4.4 Distribution Layer . .7 2.4.5 Storage Layer . .7 3 Research Questions 7 4 Related Work 8 5 Method 9 5.1 Data Collection . 10 5.2 Delimitations . 11 6 Results 12 7 Discussion 15 7.1 Conclusion . 16 7.2 Limitations and Future Work . 16 8 Acknowledgment 17 June 3, 2021 Abstract Databases are a cornerstone in data storage since they store and organize large amounts of data while allowing users to access specific parts of data eas- ily. Databases must however adapt to an increasing amount of users without negatively affect the end-users. CochroachDB (CRDB) is a distributed SQL database that combines consistency related to relational database manage- ment systems, with scalability to handle more user requests simultaneously while still being consistent. This paper presents a study that evaluates the scalability properties of CRDB by measuring how latency is affected by the addition of more nodes to a CRDB cluster. The findings show that the la- tency can decrease with the addition of nodes to a cluster.
    [Show full text]
  • Scalable but Wasteful: Current State of Replication in the Cloud
    Scalable but Wasteful: Current State of Replication in the Cloud Venkata Swaroop Matte Aleksey Charapko Abutalib Aghayev The Pennsylvania State University University of New Hampshire The Pennsylvania State University Strongly Consistent Replication - Used in Cloud datastores and Configuration management - Rely on Consensus protocols ( replication protocols ) - Achieve High-throughput 2 How to optimize for Throughput? Leader Multi-Paxos 3 One way to optimize: Shift the load Leader Multi-Paxos EPaxos - Many protocols shift work from the bottleneck to the under-utilized node - Examples: EPaxos, SDPaxos and PigPaxos 4 Resource utilization of replication protocols Core 1 Core 1 Core 1 Core 2 Core 2 Core 2 3 nodes with 2 cores each 5 Resource utilization of replication protocols Core 1 Core 1 Core 1 Utilized core Core 2 Core 2 Core 2 Idle core Leader Followers Multi-Paxos 6 Resource utilization of replication protocols Core 1 Core 1 Core 1 Core 1 Core 1 Core 1 Core 2 Core 2 Core 2 Core 2 Core 2 Core 2 Multi-Paxos EPaxos EPaxos also utilizes the idle cores to achieve high throughput 7 Confirming performance gains • Single Instance • 5 AWS EC2 m5a.large nodes • Each 2 vCPU, 8GB RAM • 50% write workload Throughput of Multi-Paxos and EPaxos EPaxos achieves 20% higher throughput compared to Multi-Paxos 8 Missing piece: Resource efficiency EPaxos Multi-Paxos 500% Utilization 200% Utilization 18 kops/s 14 kops/s Multi-Paxos shows better resource efficiency compared9 to EPaxos Metric to analyze Resource efficiency Throughput-per-unit-of-constraining-resource-utilization
    [Show full text]
  • Cockroachdb: the Resilient Geo-Distributed SQL Database
    Industry 3: Cloud and Distributed Databases SIGMOD ’20, June 14–19, 2020, Portland, OR, USA CockroachDB: The Resilient Geo-Distributed SQL Database Rebecca Taft, Irfan Sharif, Andrei Matei, Nathan VanBenschoten, Jordan Lewis, Tobias Grieger, Kai Niemi, Andy Woods, Anne Birzin, Raphael Poss, Paul Bardea, Amruta Ranade, Ben Darnell, Bram Gruneir, Justin Jaffray, Lucy Zhang, and Peter Mattis [email protected] Cockroach Labs, Inc. ABSTRACT We live in an increasingly interconnected world, with many organizations operating across countries or even con- tinents. To serve their global user base, organizations are replacing their legacy DBMSs with cloud-based systems ca- pable of scaling OLTP workloads to millions of users. CockroachDB is a scalable SQL DBMS that was built from the ground up to support these global OLTP workloads while maintaining high availability and strong consistency. Just like its namesake, CockroachDB is resilient to disasters through replication and automatic recovery mechanisms. This paper presents the design of CockroachDB and its novel transaction model that supports consistent geo-distrib- Figure 1: A global CockroachDB cluster uted transactions on commodity hardware. We describe how CockroachDB replicates and distributes data to achieve fault ACM, New York, NY, USA, 17 pages. https://doi.org/10.1145/3318464. tolerance and high performance, as well as how its distributed 3386134 SQL layer automatically scales with the size of the database cluster while providing the standard SQL interface that users 1 INTRODUCTION expect. Finally, we present a comprehensive performance Modern transaction processing workloads are increasingly evaluation and share a couple of case studies of CockroachDB geo-distributed. This trend is fueled by the desire of global users.
    [Show full text]
  • Solution Deploying Cockroachdb Using Openebs
    Solution Guide Deploying CockroachDB using OpenEBS. Contents Part 1 - Before starting Part 2 - Preconfiguration Part 3 - Getting Started with OpenEBS Part 4 - Installing CockroachDB Operator Part 5 - Accessing CockroachDB Part 6 - Monitoring CockroachDB Part 8 - Conclusion 01 www.mayadata.io Overview CockroachDB is a cloud-native SQL database for building global, scalable cloud services that survive disasters. It is a distributed SQL database built on a transactional and strongly-consistent key-value store. It scales horizontally; survives disk, machine, rack, and even datacenter failures with minimal latency disruption and no manual intervention; supports strongly-consistent ACID transactions; and provides a familiar SQL API for structuring, manipulating, and querying data.[1][2]. This guide explains the basic installation for CockroachDB operators on OpenEBS Local PV devices. The guide will also provide a way to monitor the health of cockroachDB using Prometheus and Grafana tools. Before starting You require an existing Kubernetes cluster. Kubernetes provides platform abstraction, cloud-native software runs, and behaves the same way on a managed Kubernetes service like AWS EKS, Google Cloud GKE, Microsoft AKS, DigitalOcean Kubernetes Service, or self-managed based on Red Hat OpenShift and Rancher. You can also use kubeadm, kubespray, minikube. Since you made it here, we assume you already have one configured. MayaData team has proudly over 50 CKAs, years of experience building for enterprises, and running Kubernetes in production. If you need professional help to decide, we can connect you with one of our trusted partners. In case you want to learn more, just schedule a call [schedule a call] with us and we will send you a best-selling “Kubernetes - A Complete DevOps Cookbook,” also written by one of our own experts.
    [Show full text]
  • Automatically Detecting and Fixing Concurrency Bugs in Go Software Systems Extended Abstract
    Automatically Detecting and Fixing Concurrency Bugs in Go Software Systems Extended Abstract Ziheng Liu1, Shuofei Zhu1, Boqin Qin2, Hao Chen3, Linhai Song1 1Pennsylvania State University, 2BUPT, 3University of California, Davis 1. Motivation the Go team [6, 7, 13] cover only limited buggy code patterns and cannot identify the majority of Go concurrency bugs in the Go is a statically typed programming language designed by real world [49]. Third, although recent techniques can identify Google in 2009 [9]. In recent years, Go has gained increasing blocking bugs in Go using model checking [21, 31, 32, 41, popularity in building software in production environments. 46], those techniques analyze each input program and all its These Go programs range from libraries [3] and command- synchronization primitives as a whole. Due to the exponential line tools [1, 4] to systems software, including container sys- complexity of model checking, those techniques can handle tems [8, 15], databases [2,5], and blockchain systems [11]. only small programs with a few primitives, and cannot scale The major design goal of Go is to provide an efficient and to large systems software containing millions of lines of code safe way for developers to write concurrent programs [10]. To and hundreds of primitives (e.g., Docker, Kubernetes). achieve this purpose, it provides lightweight threads (called Effective techniques have been proposed to fix concurrency goroutines) that can be easily created, and advocates the use bugs due to misuse of shared-memory concurrency [25, 26, 34, of channels to explicitly pass messages across goroutines, 35] and prevent lock-related deadlocks at runtime [27, 51, 52, on the assumption that message-passing concurrency is less 53].
    [Show full text]
  • Spanner: Google's Globally Distributed Database
    Spanner: Google's Globally Distributed Database (presented by Philipp Moritz) Why is this workload interesting? ● SQL → NoSQL → NewSQL ● Large scale transactional databases ● Eventual consistency is not good enough (?): – Managing global money/warehouses/resources – Auctions, especially Google's advertisement platform – Social networks, Twitter – MapReduce over a globally changing dataset ● We need external consistency: T(e1(commit)) < T(e2(start)) → s1 < s2 Concepts ● Main idea: – Get externally consistent view of globally distributed database – Spanner = BigTable with timestamps + Paxos + TrueTime ● Details: – Globally distributed for locality and fault-tolerance – Automatic load balancing between datacenters – Semirelational + SQL like query language (cf. Dremel) – Versioning – Full control over ● How far data is from user (read latency) ● How far replicas are from each other (write latency) ● How many replicas (durability, availability, throughput) Paxos in a Nutshell ● Algorithm for finding consensus in a distributed system TrueTime ● Goal: Provide globally synchronized time with sharp error bounds ● Do not trust synchronization via NTP ● With GPS and “commodity” atomic clocks, Google created their own time standard ● TrueTime API: – TT.now(): Interval [earliest, latest] – TT.after(t): true if t has definitely passed – TT.before(t): true if t has definitely not arrived ● Spanner implements algorithms to make sure these guarantees are respected by the machines (non-conformists are evicted) ● Time accuracy on the order of 10ms Spanservers Interplay of Paxos and TrueTime ● Guarantee externally consistent transactions Evaluation Discussion ● Tradeoff: Complexity of the System vs. Importance of Guarantees ● Is eventual consistency good enough if the operations we care about are fast enough? ● If not: Can we isolate a small subset of data for which we care about consistency and store it on a single server? ● Open Source implementation of similar ideas: https://github.com/cockroachdb/cockroach .
    [Show full text]
  • Strategy, Struggle & Success
    Open Source as a Business Strategy, Struggle & Success Philipp Krenn@xeraa @xeraa [...] allow software to be freely used, modified, and shared. https://opensource.org/licenses @xeraa Four Freedoms: Use, Study, Share, Improve https://fsfe.org/freesoftware/basics/ 4freedoms.en.html @xeraa The Debian Free Software Guidelines (DFSG) https://www.debian.org/ social_contract.1.0#guidelines (1997) @xeraa FOSS in general @xeraa Who is using OSS? @xeraa Who is opening issues? @xeraa Who is contributing back? @xeraa https://twitter.com/ geowolf/status/ 971811346823221248 Ninety-eight-point-five percent of the code ever put into the core of Puppet was put in there by somebody I paid. Luke Kaines (founder of Puppet), https://www.geekwire.com/2018/might-time-big- cloud-share-wealth-open-source-startups/ @xeraa Open Source ≠ Business Model @xeraa Open source is a distribution model that allows us to build community. It’s a force multiplier. Shay Banon, Elastic @xeraa @xeraa ! Developer @xeraa @xeraa "# Where is the! ? @xeraa Agenda Strategy Struggle Success @xeraa Strategy @xeraa ! Services Support, Consulting, Training, Certification @xeraa @xeraa @xeraa https://investors.redhat.com/~/media/Files/R/Red-Hat-IR/documents/q418-fact-sheet.pdf Support Problem Ease of Use @xeraa Support Problem Renewal Rates @xeraa Consulting & Training Problem Service-Only Competition @xeraa Red Hat has a unique business model crafted in the late 90’s/early 00’s when open source lived in a much stronger ideological environment. Sacha Labourey (Hudson / Jenkins / CloudBees), https://medium.com/ @sachalabourey/ibm-acquires-red-hat-where-is-google-b2fe186ccfe4 @xeraa https://techcrunch.com/2019/03/15/suse-is-once-again-an-independent-company/ @xeraa ! Open Core @xeraa @xeraa @xeraa Problem Competing Tools @xeraa Problem Less Open, More Commercial @xeraa Problem Cloud Providers @xeraa ☁ Cloud Service @xeraa @xeraa @xeraa Problem Cloud Providers @xeraa With the advent of the public cloud, pure open source models are very hard to defend.
    [Show full text]