Project

General

Profile

Keep server » History » Version 2

Tom Clegg, 02/14/2014 10:09 AM

1 1 Tom Clegg
h1. Keep server
2
3
This page describes the Keep backing store server component, keepd.
4
5
{{toc}}
6
7
See also:
8
* [[Keep manifest format]]
9
* [[Keep index]]
10
* source:services/keepd (implementation: imminent)
11
12 2 Tom Clegg
h2. Responsibilities
13
14
* Read and write blobs on disk
15
* Enforce maximum blob size
16
* Enforce key=hash(value) during read and write
17
* Enforce permissions when reading data (according to permissions on Collections in the metadata DB)
18
* Enforce usage quota when writing data
19
* Delete blobs (only when requested by data manager!)
20
* Report read/write/exception events
21
* Report free space
22
23
h2. Other parties
24
25
* Client distributes data across the available Keep servers (using the content hash)
26
* Client attains initial replication level when writing blobs (by writing to multiple Keep servers)
27
* Data manager decides which blobs to delete (e.g., garbage collection, rebalancing)
28
29 1 Tom Clegg
h2. Discovering Keep server URIs
30
31
* @GET https://endpoint/arvados/v1/keep_disks@
32
* see http://doc.arvados.org/api/schema/KeepDisk.html
33
* Currently "list of Keep servers" is "list of unique {host,port} across all Keep disks". (Could surely be improved.)
34
35
h2. Supported methods
36
37
For storage clients
38
* GET /hash
39
* GET /hash?checksum=true → verify checksum before sending
40
* POST / (body=content) → hash
41
* PUT /hash (body=content) → hash
42
* HEAD /hash → does it exist here?
43
* HEAD /hash?checksum=true → read the data and verify checksum
44
45
For system (monitoring, indexing, garbage collection)
46
* DELETE /hash → delete all copies of this blob (requires privileged token!)
47
* GET /index.txt → get full list of blocks stored here, including size [and whether it was PUT recently?] (requires privileged token?)
48
* GET /state.json → get list of backing filesystems, disk fullness, IO counters, perhaps recent IO statistics (requires privileged token?)
49
50
h2. Authentication
51
52
* Client provides API token in Authorization header
53
* Config knob to ignore authentication & permissions (for fully-shared site, and help transition from Keep1)
54
55
h2. Permission
56
57
A signature token, unique to a {blob_hash, arvados_api_token, expiry_time}, establishes permission to read a block.
58
59
The controller and each Keep server has a private key. Everyone can know the public keys (but only the controller and keep servers need to know them; clients don't need to verify signatures).
60
61
Writing:
62
* If the given hash and content agree, whether or not a disk write is required, Keep server creates a +Asignature@expirytime portion to the returned blob locator.
63
* The API server @collections.create@ method verifies signatures before giving the current user can_read permission on the collection.
64
* A suitably intelligent client can notice that the expirytimes on its blob hashes are getting old, and refresh them by generating a partial manifest, calling @collections.create@ followed by @collections.get@, and optionally deleting the partial manifest(s) when the full manifest is written. If extra partial manifests are left around, garbage collection should take care of them eventually; the only odd side effect is the existence of partial manifests. *(Should there just be a separate "refresh all of these tokens for me" API call to avoid creating these intermediate manifests?)*
65
66
Reading:
67
* The API server @collections.get@ method returns two manifests. One has plain hashes (this is the one whose content hash is the collection UUID). The other has a @+Asignature@expirytime@ portion on each blob locator.
68
* Keep server verifies signatures before honoring @GET@ requests.
69
* The signature might come from either the Keep node itself, a different Keep node, or the API server.
70
* A suitably intelligent client can notice that the expirytime on its blob hashes is too old, and request a fresh set via @collections.get@.