BlackHole. BlackHole is a storage solution. It does data-deduplication, mirroring (sync and async), snapshots, in-line compression and encryption.



Similar documents
13.1 Backup virtual machines running on VMware ESXi / ESX Server

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Funambol Exchange Connector v6.5 Installation Guide

ADAM 5.5. System Requirements

New Features in MySQL 5.0, 5.1, and Beyond

Secure Web. Hardware Sizing Guide

Assignment # 1 (Cloud Computing Security)

Avamar Backup and Data De-duplication Exam

Drobo How-To Guide. Use a Drobo iscsi Array as a Target for Veeam Backups

How to Backup and Restore a VM using Veeam

Ahsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department

The safer, easier way to help you pass any IT exams. Exam : E Backup Recovery - Avamar Expert Exam for Implementation Engineers.

How To Backup A Virtualized Environment

Automatic Configuration of Slave Nameservers (BIND only)

HP + Veeam: Fast VMware Recovery from SAN Snapshots

Implementing Microsoft SQL Server 2008 Exercise Guide. Database by Design

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

SnapManager 7.1 for Microsoft SharePoint Platform Backup and Restore User s Guide

QUANTIFY INSTALLATION GUIDE

Configuring and Monitoring Hitachi SAN Servers

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

StarWind iscsi SAN Software Hands- On Review

Microsoft SQL Database Administrator Certification

EMC VNX2 Deduplication and Compression

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2

Database Administration

Redefining Microsoft SQL Server Data Management. PAS Specification

SQL Anywhere New Features Summary

2. Boot using the Debian Net Install cd and when prompted to continue type "linux26", this will load the 2.6 kernel

RemoteTM LAN Server User Guide

Setting Up Specify to use a Shared Workstation as a Database Server

Formation NetApp Accelerated NCDA

Large Scale Storage. Orlando Richards, Information Services LCFG Users Day, University of Edinburgh 18 th January 2013

TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage

Nasuni Filer Administration Guide

Securing SQL Server. Protecting Your Database from. Second Edition. Attackers. Denny Cherry. Michael Cross. Technical Editor ELSEVIER

Using ZeBeDee with Firebird to Encrypt and Compress Network Traffic

JAMF Software Server Installation Guide for Linux. Version 8.6

SAN Implementation Course SANIW; 3 Days, Instructor-led

SOFTNIX LOGGER Centralized Logs Management

Using DOTS as Apache Derby System Test

Apache JMeter HTTP(S) Test Script Recorder

escan SBS 2008 Installation Guide

Using Delphix Server with Microsoft SQL Server (BETA)

Backup and Archiving Explained. White Paper

Filr 2.0 Administration Guide. April 2016

FreeRADIUS server. Defining clients Access Points and RADIUS servers

Magento Security and Vulnerabilities. Roman Stepanov

On Benchmarking Popular File Systems

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Managing and Maintaining a Windows Server 2003 Network Environment

MSc Computer Security and Forensics. Examinations for / Semester 1

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35

NexentaConnect for VMware Virtual SAN

How To Protect Your Data From Being Damaged On Vsphere Vdp Vdpa Vdpo Vdprod (Vmware) Vsphera Vdpower Vdpl (Vmos) Vdper (Vmom

Backup and Recovery Best Practices With CommVault Simpana Software

CYAN SECURE WEB HOWTO. NTLM Authentication

Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server

Web Security Log Server Error Reference

Introduction to Mobile Access Gateway Installation

Owner of the content within this article is Written by Marc Grote

Online Backup Client User Manual

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

Installing The Kairos Software On The Server

VMware vsphere: Install, Configure, Manage [V5.0]

K-Backup: Automatic Network Backup solution

BACKITUP Online. Error Codes & Fixes

Enterprise Manager. Version 6.2. Administrator s Guide

MySQL Cluster Deployment Best Practices

Online Backup Plus Frequently Asked Questions

Encryption Security Recommendations

Table of Contents. Online backup Manager User s Guide

SQL Backup and Restore using CDP

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Automated Process Center Installation and Configuration Guide for UNIX

Security. TestOut Modules

50238: Introduction to SQL Server 2008 Administration

Granular recovery from SAN Snapshots

Release Notes. Cloud Attached Storage

Troubleshooting Citrix MetaFrame Procedures

Linux Powered Storage:

Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0

1 of 10 1/31/2014 4:08 PM

Database Assessment. Vulnerability Assessment Course

New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...

es T tpassport Q&A * K I J G T 3 W C N K V [ $ G V V G T 5 G T X K E G =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX *VVR YYY VGUVRCUURQTV EQO

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

Installation and Setup: Setup Wizard Account Information

Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014

Certificate technology on Pulse Secure Access

GoGrid Implement.com Configuring a SQL Server 2012 AlwaysOn Cluster

Linux Filesystem Comparisons

VERSION 9.02 INSTALLATION GUIDE.

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Drobo How-To Guide. Use a Drobo iscsi Array as a Target for Veeam Backups

ARCSERVE UNIFIED DATA PROTECTION SUPPORT FOR EMC CLOUDARRAY

Certificate technology on Junos Pulse Secure Access

Quality of Service (bandwidth limitation): Default is 2 megabits per second.

Transcription:

BlackHole BlackHole is a storage solution. It does data-deduplication, mirroring (sync and async), snapshots, in-line compression and encryption. Written by Folkert van Heusden. http://www.vanheusden.com/java/coffeesaint/ Released with GPLv2 license.

Table of Contents What can it do...3 Using it...4 Configuration file...5 MySQL storage backend...6 Do's and don'ts...8

What can it do BlackHole does: data deduplication configurable hash configurable block size it supports multiple storage backends binairy tree MySQL database Kyoto Cabinet (NoSQL database) this one gives the best performance in-line compression: when using the MySQL or Kyoto Cabinet storage backend, BlackHole can compress the de-duplicate blocks before storing them in the datastore, improving the disk usage even more encryption: all data can be stored encrypted with the algorithms supported by the Java JVM snapshots (in sparse files) async and sync mirrors it exports the NBD protocol: Network Block Device. Linux has a client build in in the kernel for mapping these to a local block device. It is filesystem agnostic. Tested with ext2/3/4, ntfs, reiserfs, etc. NBD is comparable to iscsi. it also supports IMDisk protocol so that microsoft windows users can mount it as well multiple LUNs which share the same datastore

Using it After configuring the program, it can be invoked as follows: java -jar BlackHole.jar --config myconfig.conf Then connect to it via telnet and configure the luns: folkert@belle:~/$ telnet localhost 8090 Connected to localhost. Escape character is '^]'. BlackHole v1.9, (C) 2010-2011 by folkert@vanheusden.com BH> addnbdlun 0.0.0.0 12341 10 lun1 Sep.04 13:02:12 [LOG_INFO] Starting NBD protocol listener for lun lun1 with number 0 at 0.0.0.0:12341 Created and started new lun with number: 0 Enter 'help' to get a list of commands it supports. IMDisk support: addimdisklun 0.0.0.0 12341 10 lun1 and then in windows: c:\windows\system32\imdisk.exe -a -t proxy -o ip -f 192.168.64.100:12341 -m e:

Configuration file Please note that BlackHole needs write access to the configuration file: some changes (e.g. changing the datastore size) cause it to rewrite the configuration file. The following settings (with example values) define the storage. Block-size and hash-type cannot be changed afterwards. block-size=4096 size=34359738368 hash-type=md5 These settings configure the read- and delayed write cache. The cache-elements setting tells BlackHole how many blocks to cache for read access. cache-elements=262144 cache-delayed-write=true cache-type=mru cache-full-flush-n=16 cache-dirty-blocks=false dwc-force-flush-threshold=131072 dwc-flush-trigger-threshold=110000 dwc-sort-before-write=true dwc-flush-interval=2500 dwc-flush-min-n-blocks=1024 These settings are storage settings. Storage-type can be 'files', 'kc' and 'sql'. 'kc' (kyoto cabinet) is preferred as it gives the greatest performance. It also supports compression (which files does not). sql-... settings are only for 'SQL'. See below for what schema must be in the database. path=./data2 storage-type=kc sql-url=jdbc:mysql://localhost:3306/bh sql-user=bh sql-password=bh The following settings configure the configuration access methods. Currently only telnet allows you to change settings http-listen-adapter=0.0.0.0 http-listen-port=8089

telnet-listen-adapter=0.0.0.0 telnet-listen-port=8090 When BlackHole reads a block from its datastore, it can verify that it did not change due to e.g. disk-corruption. It does this by verifying the data with the stored hash. verify=false What encryption to use. encryption-cipher=blowfish/cfb8/nopadding encryption-password=... Compression settings. First parameter must be 'zlib', the next (the value) must be 1 upto 9 (=best compression). compression=zlib 3 Logging settings. debug=info logfile=log.txt logfile-debug=info async/sync iscsi/nbd host port disconnect_block storage_iqn blackhole_iqn For nbd the iqn-settings must be omitted. disconnect_block indicates if BlackHole should completely halt if the connection with the mirror is broken (until the connection is restored). mirror=async iscsi 192.168.64.201 3260 true iqn.2001-04.com.example:storage.disk2.sys1.xyz iqn.2011-04.com.vanheusden Telnet LDAP authentication: ldap-base-dn=ou=users,dc=intranet,dc=vanheusden,dc=com ldap-url=ldap://172.29.0.1:389 MySQL storage backend This requires a MySQL user capable of select,insert,update and delete. Also the following tables must be created: CREATE TABLE `bm` ( `sectornr` int(9) NOT NULL, `blocknr` int(9) NOT NULL default '-1', PRIMARY KEY (`sectornr`),

KEY `bm_bn` (`blocknr`) ); CREATE TABLE `ds` ( `blocknr` int(9) NOT NULL auto_increment, `hash` varchar(128) NOT NULL, `data` blob NOT NULL, PRIMARY KEY (`blocknr`), KEY `ds_hash` (`hash`), KEY `ds_data` (`data`(16)) );

Do's and don'ts BlackHole is a heavy seeker : due to the nature of data deduplication, data is not lineair laid out on disk. Because of that it is better to put the datastore on an SSD devic You'll see that when you run a benchmark on an empty datastore that reading is extremly fast (e.g. 3GB/s). Also writing can give strange results. This again is due to the nature of data deduplication. When benchmarking make sure there's data in the datastore, with +/- 40% deduplicated. Furthermore: when using iozone, use the -+w x setting where x is either 40. 40% space gain is regular value for e.g. an office file server. When you set disk-flush to false, make sure you use a raid adapter with a cache-battery.