Distributed Lock Management with RDMA

Total Page:16

File Type:pdf, Size:1020Kb

Distributed Lock Management with RDMA Distributed Lock Management with RDMA: Decentralization without Starvation Dong Young Yoon Mosharaf Chowdhury Barzan Mozafari University of Michigan, Ann Arbor University of Michigan, Ann Arbor University of Michigan, Ann Arbor [email protected] [email protected] [email protected] ABSTRACT ACM Reference Format: Lock managers are a crucial component of modern distributed Dong Young Yoon, Mosharaf Chowdhury, and Barzan Mozafari. 2018. Dis- tributed Lock Management with RDMA: Decentralization without Starva- systems. However, with the increasing availability of fast RDMA- tion. In SIGMOD’18: 2018 International Conference on Management of Data, enabled networks, traditional lock managers can no longer keep June 10–15, 2018, Houston, TX, USA. ACM, New York, NY, USA, 16 pages. up with the latency and throughput requirements of modern sys- https://doi.org/10.1145/3183713.3196890 tems. Centralized lock managers can ensure fairness and prevent starvation using global knowledge of the system, but are them- selves single points of contention and failure. Consequently, they 1 INTRODUCTION fall short in leveraging the full potential of RDMA networks. On With the advent of high-speed RDMA networks and affordable the other hand, decentralized (RDMA-based) lock managers either memory prices, distributed in-memory systems have become in- completely sacrifice global knowledge to achieve higher through- creasingly more common [39, 57, 65]. The reason for this rising put at the risk of starvation and higher tail latencies, or they resort popularity is simple: many of today’s workloads can fit within the to costly communications in order to maintain global knowledge, memory of a handful of machines, and they can be processed and which can result in significantly lower throughput. served over RDMA-enabled networks at a significantly faster rate In this paper, we show that it is possible for a lock manager to than with traditional architectures. be fully decentralized and yet exchange the partial knowledge nec- A primary challenge in distributed computing is lock manage- essary for preventing starvation and thereby reducing tail latencies. ment, which forms the backbone of many distributed systems ac- Our main observation is that we can design a lock manager pri- cessing shared resources over the network. Examples include OLTP marily using RDMA’s fetch-and-add (FA) operations, which always databases [53, 59], distributed file systems [22, 56], in-memory stor- succeed, rather than compare-and-swap (CAS) operations, which age systems [39, 51], and any system that requires synchronization, only succeed if a given condition is satisfied. While this requires us consensus, or leader election [14, 28, 37]. In a transactional setting, to rethink the locking mechanism from the ground up, it enables us the key responsibility of a lock manager (LM) is ensuring both to sidestep the performance drawbacks of the previous CAS-based serializability—or other forms of isolation—and starvation-free be- proposals that relied solely on blind retries upon lock conflicts. havior of competing transactions [49]. Specifically, we present DSLR (Decentralized and Starvation-free Centralized Lock Managers (CLM) Lock management with RDMA), a decentralized lock manager — In traditional distributed that targets distributed systems running on RDMA-enabled net- databases, each node is in charge of managing the locks for its own works. We demonstrate that, despite being fully decentralized, DSLR objects (i.e., tuples hosted on that node) [3, 8, 25, 34]. In other words, prevents starvation and blind retries by guaranteeing first-come- before remote nodes or transactions can read or update a particular first-serve (FCFS) scheduling without maintaining explicit queues. object, they must communicate with the LM daemon running on We adapt Lamport’s bakery algorithm [36] to an RDMA-enabled en- the node hosting that object. Only after the local LM grants the vironment with multiple bakers, utilizing only one-sided READ and lock can the remote node or transaction proceed to read or modify centralized atomic FA operations. Our experiments show that, on average, DSLR the object. Although distributed, these LMs are still , as central delivers 1:8× (and up to 2:8×) higher throughput than all existing each LM instance represents a point of decision for granting RDMA-based lock managers, while reducing their mean and 99.9% locks on the set of objects assigned to it. global knowledge latencies by 2:0× and 18:3× (and up to 2:5× and 47×), respectively. Because each CLM instance has and full visi- bility into the operations performed on its objects, it can guarantee many strong and desirable properties. For example, it can queue all lock requests and take holistic actions [61, 63], prevent star- vation [25, 30, 34], and even employ sophisticated scheduling of Permission to make digital or hard copies of all or part of this work for personal or incoming requests to bound tail latencies [26, 33, 40, 66]. classroom use is granted without fee provided that copies are not made or distributed Unfortunately, the operational simplicity of having global knowl- for profit or commercial advantage and that copies bear this notice and the full citation edge is not free [23], even with low-latency RDMA networks. First, on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, the CLM itself—specifically, its CPU—becomes a performance bot- to post on servers or to redistribute to lists, requires prior specific permission and/or a tleneck for applications that require high-throughput locking/un- fee. Request permissions from [email protected]. locking operations and as transactional workloads scale up or out. SIGMOD’18, June 10–15, 2018, Houston, TX, USA © 2018 Association for Computing Machinery. Second, the CLM becomes a single point of failure [23]. Conse- ACM ISBN 978-1-4503-4703-7/18/06...$15.00 quently, many modern distributed systems do not use CLMs in https://doi.org/10.1145/3183713.3196890 practice; instead, they rely on decentralized lock managers, which SIGMOD’18, June 10–15, 2018, Houston, TX, USA Dong Young Yoon, Mosharaf Chowdhury, and Barzan Mozafari offer better scalability and reliability by avoiding a single point of (2) To compete with existing RDMA-based DLMs, our algorithm contention and failure [23]. must be able to acquire locks on uncontented objects using a single RDMA atomic operation. However, the original bakery Decentralized Lock Managers (DLM)— To avoid the drawbacks algorithm requires setting a semaphore, reading the existing of centralization and to exploit fast RDMA networks, decentralized tickets, and assigning the requester the maximum ticket value. lock managers are becoming more popular [15, 18, 47, 62]. This is because RDMA operations enable transactions to acquire and DSLR overcomes all of these challenges (see §4) and, to the best release locks on remote machines at extremely low latencies, with- of our knowledge, is the first DLM to extend Lamport’s bakery out involving any remote CPUs. In contrast to CLMs, RDMA-based algorithm to an RDMA context. decentralized approaches offer better CPU usage, scalability, and fault tolerance. Contributions— We make the following contributions: Unfortunately, existing RDMA-based DLMs take an extremist (1) We propose a fully decentralized and distributed locking al- approach, where they either completely forgo the benefits of main- gorithm, DSLR, that extends Lamport’s bakery algorithm and taining global knowledge and rely on blind fail-and-retry strate- combines it with novel RDMA protocols. Not only does DSLR gies to achieve higher throughput [15, 62], or they emulate global prevent lock starvation, but it also delivers higher throughput knowledge using distributed queues and additional network round- and significantly lower tail latencies than previous proposals. trips [47]. The former can cause starvation and thereby higher tail latencies, while the latter significantly lowers throughput, under- (2) DSLR provides fault tolerance for transactions that fail to release mining the performance benefits of decentralization. their acquired locks or fall into a deadlock. DSLR achieves this goal by utilizing leases and determining lease expirations using Challenges— There are two key challenges in designing an effi- a locally calculated elapsed time. cient DLM. First, to avoid data races, RDMA-based DLMs [15, 62] must only rely on RDMA atomic operations: fetch-and-add (FA) (3) Through extensive experiments on TPC-C and micro-benchmarks, and compare-and-swap (CAS). FA atomically adds a constant to a we show that DSLR outperforms existing RDMA-based LMs; on remote variable and returns the previous value of the variable. CAS average, it delivers 1:8× (and up to 2:8×) higher throughput, atomically compares a constant to the remote variable and updates and 2:0× and 18:3× (and up to 2:5× and 47×) lower average the variable only if the constant matches the previous value. Al- and 99.9% percentile latencies, respectively. though CAS does not always guarantee successful completion, it is easy to reason about, which is why all previous RDMA-based DLMs The rest of this paper is organized as follows. Section 2 provides have relied on CAS for implementing exclusive locks [15, 18, 47, 62]. background material and the motivation behind DSLR. Section 3 Consequently, when there is high contention in the system, proto- discusses the design challenges involved in distributed and decen- cols relying on CAS require multiple retries to acquire a lock. These tralized locking. Section 4 explains DSLR’s algorithm and design blind and unbounded retries cause starvation, which increases tail decisions for overcoming these challenges. Section 5 describes how latency. Second, the lack of global knowledge complicates other DSLR offers additional features often used by modern database sys- run-time issues, such as deadlock detection and mitigation. tems. Section 6 presents our experimental results, and Section 7 discusses related work.
Recommended publications
  • Understanding Lustre Filesystem Internals
    ORNL/TM-2009/117 Understanding Lustre Filesystem Internals April 2009 Prepared by Feiyi Wang Sarp Oral Galen Shipman National Center for Computational Sciences Oleg Drokin Tom Wang Isaac Huang Sun Microsystems Inc. DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge. Web site http://www.osti.gov/bridge Reports produced before January 1, 1996, may be purchased by members of the public from the following source. National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 Telephone 703-605-6000 (1-800-553-6847) TDD 703-487-4639 Fax 703-605-6900 E-mail [email protected] Web site http://www.ntis.gov/support/ordernowabout.htm Reports are available to DOE employees, DOE contractors, Energy Technology Data Exchange (ETDE) representatives, and International Nuclear Information System (INIS) representatives from the following source. Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN 37831 Telephone 865-576-8401 Fax 865-576-5728 E-mail [email protected] Web site http://www.osti.gov/contact.html This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof.
    [Show full text]
  • High Availability for RHEL on System Z
    High Availability for RHEL on System z David Boyes Sine Nomine Associates Agenda • Clustering • High Availability • Cluster Management • Failover • Fencing • Lock Management • GFS2 Clustering • Four types – Storage – High Availability – Load Balancing – High Performance High Availability • Eliminate Single Points of Failure • Failover • Simultaneous Read/Write • Node failures invisible outside the cluster • rgmanager is the core software High Availability • Major Components – Cluster infrastructure — Provides fundamental functions for nodes to work together as a cluster • Configuration-file management, membership management, lock management, and fencing – High availability Service Management — Provides failover of services from one cluster node to another in case a node becomes inoperative – Cluster administration tools — Configuration and management tools for setting up, configuring, and managing the High Availability Implementation High Availability • Other Components – Red Hat GFS2 (Global File System 2) — Provides a cluster file system for use with the High Availability Add-On. GFS2 allows multiple nodes to share storage at a block level as if the storage were connected locally to each cluster node – Cluster Logical Volume Manager (CLVM) — Provides volume management of cluster storage – Load Balancer — Routing software that provides IP-Load-balancing Cluster Infrastructure • Cluster management • Lock management • Fencing • Cluster configuration management Cluster Management • CMAN – Manages quorum and cluster membership – Distributed
    [Show full text]
  • Comparative Analysis of Distributed and Parallel File Systems' Internal Techniques
    Comparative Analysis of Distributed and Parallel File Systems’ Internal Techniques Viacheslav Dubeyko Content 1 TERMINOLOGY AND ABBREVIATIONS ................................................................................ 4 2 INTRODUCTION......................................................................................................................... 5 3 COMPARATIVE ANALYSIS METHODOLOGY ....................................................................... 5 4 FILE SYSTEM FEATURES CLASSIFICATION ........................................................................ 5 4.1 Distributed File Systems ............................................................................................................................ 6 4.1.1 HDFS ..................................................................................................................................................... 6 4.1.2 GFS (Google File System) ....................................................................................................................... 7 4.1.3 InterMezzo ............................................................................................................................................ 9 4.1.4 CodA .................................................................................................................................................... 10 4.1.5 Ceph.................................................................................................................................................... 12 4.1.6 DDFS ..................................................................................................................................................
    [Show full text]
  • The Chubby Lock Service for Loosely-Coupled Distributed Systems
    The Chubby lock service for loosely-coupled distributed systems Mike Burrows, Google Inc. Abstract example, the Google File System [7] uses a Chubby lock to appoint a GFS master server, and Bigtable [3] uses We describe our experiences with the Chubby lock ser- Chubby in several ways: to elect a master, to allow the vice, which is intended to provide coarse-grained lock- master to discover the servers it controls, and to permit ing as well as reliable (though low-volume) storage for clients to find the master. In addition, both GFS and a loosely-coupled distributed system. Chubby provides Bigtable use Chubby as a well-known and available loca- an interface much like a distributed file system with ad- tion to store a small amount of meta-data; in effect they visory locks, but the design emphasis is on availability use Chubby as the root of their distributed data struc- and reliability, as opposed to high performance. Many tures. Some services use locks to partition work (at a instances of the service have been used for over a year, coarse grain) between several servers. with several of them each handling a few tens of thou- Before Chubby was deployed, most distributed sys- sands of clients concurrently. The paper describes the tems at Google used ad hoc methods for primary elec- initial design and expected use, compares it with actual tion (when work could be duplicated without harm), or use, and explains how the design had to be modified to required operator intervention (when correctness was es- accommodate the differences.
    [Show full text]
  • Scaling HDFS with a Strongly Consistent Relational Model for Metadata Kamal Hakimzadeh, Hooman Peiro Sajjad, Jim Dowling
    Scaling HDFS with a Strongly Consistent Relational Model for Metadata Kamal Hakimzadeh, Hooman Peiro Sajjad, Jim Dowling To cite this version: Kamal Hakimzadeh, Hooman Peiro Sajjad, Jim Dowling. Scaling HDFS with a Strongly Consistent Relational Model for Metadata. 4th International Conference on Distributed Applications and In- teroperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.38-51, 10.1007/978-3-662-43352-2_4. hal-01287731 HAL Id: hal-01287731 https://hal.inria.fr/hal-01287731 Submitted on 14 Mar 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Scaling HDFS with a Strongly Consistent Relational Model for Metadata Kamal Hakimzadeh, Hooman Peiro Sajjad, Jim Dowling KTH - Royal Institute of Technology Swedish Institute of Computer Science (SICS) {mahh, shps, jdowling}@kth.se Abstract. The Hadoop Distributed File System (HDFS) scales to store tens of petabytes of data despite the fact that the entire le system's metadata must t on the heap of a single Java virtual machine. The size of HDFS' metadata is limited to under 100 GB in production, as garbage collection events in bigger clusters result in heartbeats timing out to the metadata server (NameNode).
    [Show full text]
  • Clustering of Openvms Installations for High Availability
    Clustering of OpenVMS installations for high availability Norman Kluge norman.kluge [at] student.hpi.uni-potsdam.de Hasso-Plattner-Institut, Potsdam Lecture: Dependable Systems Summer term 2010 Key words: OpenVMS, Cluster, Availabilty, Dependable Systems 1 Introduction Nowadays services have to be high available. Datacenters are often fault tolerant. That means they are for instance tolerant against hardware failures, software fail- ures or electricity failures. But what happened if a hole datacenter is destroyed. High availabilty means that the service still has to be online. OpenVMSCluster oers concepts of so called disaster tolerance, means even if a datacenter fails, the service never stops the beat. That is ensured by dierent approaches covered in this paper. In the rst section, some terminology of OpenVMSCluser are introduced. In the second one, some concepts, how OpenVMSCluser ensures high availabilty, are covered. In the las section, some practical experience is mentioned. 2 OpenVMSCluster Basics In this section some basic terminology of OpenVMSCluster is described. 2.1 Benets There are some benets resulting from clustering of OpenVMS installations. First point is, that the dierent Workstations can share resources (e.g. disks, network connections, ...) among them. The sharing concept is very important for another important benet: the promise of high availability. With this and nonstop processing an OpenVMSCluster guarantees that the services running on it are always available and responding the user. That correlates with the benets of scalability, performance and load balancing, which means that the load is spread into the cluster and all available workstations are working on the task. There are also some security features oered by OpenVMSCluster.
    [Show full text]
  • Linux Clustering & Storage Management
    Linux Clustering & Storage Management Peter J. Braam CMU, Stelias Computing, Red Hat Disclaimer Several people are involved: Stephen Tweedie (Red Hat) Michael Callahan (Stelias) Larry McVoy (BitMover) Much of it is not new – Digital had it all and documented it! IBM/SGI ... have similar stuff (no docs) Content What is this cluster fuzz about? Linux cluster design Distributed lock manager Linux cluster file systems Lustre: the OBSD cluster file system Cluster Fuz Clusters - purpose Assume: Have a limited number of systems On a secure System Area Network Require: A scalable almost single system image Fail-over capability Load-balanced redundant services Smooth administration Precursors – ad hoc solutions WWW: Piranha, TurboCluster, Eddie, Understudy: 2 node group membership Fail-over http services Database: Oracle Parallel Server File service Coda, InterMezzo, IntelliMirror Ultimate Goal Do this with generic components OPEN SOURCE Inspiration: VMS VAX Clusters New: Scalable (100,000’s nodes) Modular The Linux “Cluster Cabal”: Peter J. Braam – CMU, Stelias Computing, Red Hat (?) Michael Callahan – Stelias Computing, PolyServe Larry McVoy – BitMover Stephen Tweedie – Red Hat Who is doing what? Tweedie McVoy Project leader Cluster computing Core cluster services SMP clusters Callahan Braam Varia DLM Red Hat InterMezzo FS Cluster apps & admin Lustre Cluster FS UMN GFS: Shared block FS Technology Overview Modularized VAX cluster architecture (Tweedie) Core Support Clients Transition Cluster db Distr. Computing Integrity Quorum Cluster Admin/Apps Link Layer Barrier Svc Cluster FS & LVM Channel Layer Event system DLM Components Channel layer - comms: eth, infiniband Link layer - state of the channels Integration layer - forms cluster topology CDB - persistent cluster internal state (e.g.
    [Show full text]
  • Inside the Lustre File System
    Inside The Lustre File System Technology Paper An introduction to the inner workings of the world’s most scalable and popular open source HPC file system Torben Kling Petersen, PhD Inside The Lustre File System The Lustre High Performance Parallel File System Introduction Ever since the precursor to Lustre® (known as the Object- Based Filesystem, or ODBFS) was developed at Carnegie Mellon University in 1999, Lustre has been at the heart of high performance computing, providing the necessary throughput and scalability to many of the fastest supercomputers in the world. Lustre has experienced a number of changes and, despite the code being open source, the ownership has changed hands a number of times. From the original company started by Dr. Peter Braam (Cluster File Systems, or CFS), which was acquired by Sun Microsystems in 2008—which was in turn acquired by Oracle in 2010—to the acquisition of the Lustre assets by Xyratex in 2013, the open source community has supported the proliferation and acceptance of Lustre. In 2011, industry trade groups like OpenSFS1, together with its European sister organization, EOFS2, took a leading role in the continued development of Lustre, using member fees and donations to drive the evolution of specific projects, along with those sponsored by users3 such as Oak Ridge National Laboratory, Lawrence Livermore National Laboratory and the French Atomic Energy Commission (CEA), to mention a few. Today, in 2014, the Lustre community is stronger than ever, and seven of the top 10 high performance computing (HPC) systems on the international Top 5004 list (as well as 75+ of the top 100) are running the Lustre high performance parallel file system.
    [Show full text]
  • Digital Technical Journal, Number 5, September 1987: Vaxcluster Systems
    VAX clusterSystems Digital Technical Journal Digital Equipment Corporation Number 5 September 1987 Editorial Staff Ediwr- Richard W. Beane Production Staff Production Editor- Jane C. 131ake Designer- Charlotte Bell Interactive Page Makeup- Te rry Reed Advisory Board Samuel H. Fuller, Chairman Robert M. Glorioso John W. McCredie Mahendra R. Patel F. Grant Saviers William D. Strecker The Digital Te chnical journal is published by Digital Equipment Corporation, 77 Reed Road, Hudson, MassachusettS 01749. Changes of address should be sent to Digital Equipment Corporation, attention: Media Response Manager, 444 Whitney Street, NR02-1/J5, Northboro, M.A 01532-2599 Comments on the content of any paper are welcomed. Write to the editor at Mail Stop HL02-3/K11 at the published-by address. Comments can also be sent on the ENET to RDVAX::BEANE or on the ARPANET to BEANE%RDVAX.DEC@DECWRL. Copyright© 1987 Digital Equipment Corporation. Copying without fee is permiued provided that such copies are made for use in educational institutions by facuhy members and are not distributed for commercial advantage. Abstracting with credit of Digital Equipment Corporation's authorship is permitted Requests for other copies for a fee may be made to the Digital Press of Digital Equipment Corporation. All rights reserved. The information in this journal is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document.
    [Show full text]
  • GFS Common Goals of GFS and Most Distributed File Systems
    !e Google File System GFS Common Goals of GFS and most Distributed File Systems • Performance • Reliability • Scalability • Availability Other GFS Concepts • Component failures are the norm rather than the exception. o File System consists of hundreds or even thousands of storage machines built from inexpensive commodity parts. • Files are Huge. Multi-GB Files are common. o Each "le typically contains many application objects such as web documents. • Append, Append, Append. o Most "les are mutated by appending new data rather than overwriting existing data. o Co-Designing o Co-designing applications and "le system API bene"ts overall system by increasing #exibility o Slide from Michael Raines GFS • Why assume hardware failure is the norm? o It is cheaper to assume common failure on poor hardware and account for it, rather than invest in expensive hardware and still experience occasional failure. • !e amount of layers in a distributed system (network, disk, memory, physical connections, power, OS, application) mean failure on any could contribute to data corruption. Slide from Michael Raines Assumptions • System built from inexpensive commodity components that fail • Modest number of "les – expect few million and > 100MB size. Did not optimize for smaller "les • 2 kinds of reads – large streaming read (1MB), small random reads (batch and sort) • Well-de"ned semantics of producer/ consumer and many-way merge. 1 producer per machine append to "le. Atomicity • High sustained bandwidth chosen over low latency Interface • GFS – familiar "le
    [Show full text]
  • GPFS General Parallel File System
    Fachhochschule Bonn-Rhein-Sieg University of Applied Sciences Fachbereich Informatik Department of Computer Science GPFS General Parallel File System im Studiengang Master of Science in Computer Science SS 2005 Von Numiel Ghebre und Felix Rommel Betreuer: Prof. Dr. Berrendorf Inhaltsverzeichnis 1 Einleitung...........................................................................................................................3 2 Übersicht...........................................................................................................................4 2.1 Herkunft GPFS...........................................................................................................4 2.2 Was ist ein paralleles Dateisystem............................................................................4 2.3 Besondere Anforderungen an ein PFS......................................................................4 2.4 Wichtige Eigenschaften des GPFS............................................................................4 2.5 GPFS Cluster und Knoten..........................................................................................5 2.6 GPFS-Shared-Disk-Architektur..................................................................................5 3 Technische Eigenschaften................................................................................................8 3.1 Arbeitsweise von GPFS.............................................................................................8 3.2 Der Konfigurations-Manager......................................................................................8
    [Show full text]
  • Using Sas® 9 and Red Hat's Global File System2 (Gfs2)
    USING SAS® 9 AND RED HAT’S GLOBAL FILE SYSTEM2 (GFS2) SAS Institute August 2013 With the growing number of SAS GRID usage, our Red Hat (RHEL) users are looking for a clustered file system for the RHEL grid nodes. This short paper will discuss what is available, starting with Red Hat’s cluster file system is called Global File System 2 (GFS2) that is part of the Red Hat Resilient Storage Add- On. Note that Red Hat requires an architecture review be conducted by Red Hat prior to the implementation of a RHEL Cluster. Please work with your Red Hat account team to make this happen. This clustered file systems works very nicely with SAS, however to get the performance enhancements that Red Hat has made to GFS2, you need to run with RHEL 6.4 + errata patches through mid-May 2013. This errata provide fixes to the tuned service as well as address a concern with irqbalance. You should not use GFS2 with any versions of RHEL prior to RHEL 6.4 and the mid-May errata due to various performance issues. Using GFS2 with a version of RHEL5 will result in severe functional problems, and these problems may exist with early versions of RHEL 6. In addition to using the above release of RHEL, there are some other tuning requirements that should be done when setting up the clustered file system for your SAS GRID environment. The penalty for not applying these tuning guidelines is very costly down time due to unacceptable performance. It is strongly recommended that SAS WORK directories be place on a separate GFS2 file system from the permanent SAS data file space to avoid fragmentation in the permanent SAS data file space.
    [Show full text]