Book Image

Learning Ceph

By : Karan Singh
Book Image

Learning Ceph

By: Karan Singh

Overview of this book

<p>Ceph is an open source, software-defined storage solution, which runs on commodity hardware to provide exabyte-level scalability. It is well known to be a highly reliable storage system that has no single point of failure.</p> <p>This book will give you all the skills you need to plan, deploy, and effectively manage your Ceph cluster, guiding you through an overview of Ceph's technology, architecture, and components. With a step-by-step, tutorial-style explanation of the deployment of each Ceph component, the book will take you through Ceph storage provisioning and integration with OpenStack.</p> <p>You will then discover how to deploy and set up your Ceph cluster, discovering the various components and why we need them. This book takes you from a basic level of knowledge in Ceph to an expert understanding of its most advanced features.</p>
Table of Contents (18 chapters)
Learning Ceph
Credits
Foreword
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Preface

Data—it's a simple word that stores the past, present, and future of the entire universe, and it's the most critical element of any system that exists today. We live in an era of technology that is generating enormous amount of data each second, and with time, this data growth will be unimaginable. However, how do we store this ever-growing data such that it remains secure, reliable, and future ready? This book is about one of the storage technology game-changers that will redefine the future of storage.

Ceph is an open source technology that is leading the way in providing software-defined storage. Ceph is an excellent package of reliability, unified nature, and robustness. It is more complete and economic than any other storage solution present today. Ceph has developed its own entire new way of storing data; it's distributed, massively scalable, with no single point of failure, and the best part is that it runs on commodity hardware, which makes it amazingly economic. It will give you power to break the knots of expensive vendor lock-in solutions and switch to enterprise-grade open source technology for all your storage needs.

Ceph has been enriched with enterprise-class features such as high degree of reliability, robustness, scalability, erasure coding, cache tiering, and many more. The maturity that Ceph has gained over the period of a decade makes it stand out in a crowd and lead the way to storage. It is the technology of today and the future; unified Ceph storage system is the solution for whatever requirements you have for data storage. Ceph is truly unified, that is, it has files, blocks, and objects in a single storage system; this makes Ceph extremely flexible and adaptable to all your data needs. It is the answer to all the data storage problems you have.

Cloud computing is the next paradigm shift, and a storage system such as Ceph is the most essential component of the cloud infrastructure. Ceph has its big footprint in the cloud storage area. It has been a leading open source software-defined storage choice for cloud platforms such as OpenStack and CloudStack. These cloud platforms leverage the features of Ceph and deliver robust, scalable, and exabyte-level public or private cloud infrastructures. In addition to this, virtualization platforms such as KVM and libvirt support Ceph big time, and support from proprietary virtualization solutions such as VMware and HyperV is on the way.

Ceph is surely the next big thing in the storage industry, which is backed by Inktank, now a part of Red Hat. Ceph has an amazing community presence and quick development cycles, making it more reliable a couple of times a year. Though Ceph is purely open source, one can enjoy enterprise-support subscriptions from Red Hat and their partner ecosystem, which is an advantage.

What this book covers

Chapter 1, Introducing Ceph Storage, covers the evolution, history, as well as the future of Ceph. This chapter explains common storage challenges and how Ceph deals with them and becomes the game-changer. It also covers a comparison of Ceph with other storage systems.

Chapter 2, Ceph Instant Deployment, covers instant, step-by-step practical approaches to deploy your first Ceph cluster. It includes a guided tour of creating the Ceph sandbox environment on VirtualBox as well as scaling it up.

Chapter 3, Ceph Architecture and Components, dives deep into the Ceph internal architecture, explaining each and every component in detail. Components are explained sequentially and practically for greater learning and correlation.

Chapter 4, Ceph Internals, covers how Ceph manages data; the practical content will help you understand every piece of it. It also covers CRUSH, placement groups, and pools in detail.

Chapter 5, Deploying Ceph – the Way You Should Know, covers hardware planning required for a production-grade Ceph cluster. It also includes practical approaches of building a Ceph cluster in both the manual and automated ways using ceph-deploy.

Chapter 6, Storage Provisioning with Ceph, includes practical hands-on approaches to explain files, blocks, and object type storage in Ceph and how to configure and provision each type. The chapter also covers snapshots, cloning, S3- and swift-compatible object storage, and much more.

Chapter 7, Ceph Operations and Maintenance, covers everything to manage and operate Ceph from a system admin point of view. It includes daily operations, scaling up and down, hardware replacement, and a detailed coverage on CRUSH management and its advanced concepts.

Chapter 8, Monitoring Your Ceph Cluster, makes you competent in monitoring your Ceph cluster and all of its components. It also covers open source Ceph monitoring dashboard projects such as Kraken and ceph-dash and their installation and configuration.

Chapter 9, Integrating Ceph with OpenStack, covers step-by-step practical approaches to set up your own test OpenStack environment and integrating it with Ceph. It explains how Ceph benefits OpenStack and how OpenStack components make use of Ceph.

Chapter 10, Ceph Performance Tuning and Benchmarking, covers advanced concepts of Ceph, such as performance tuning from both hardware and software points of view. It also includes hands-on approaches to erasure coding and cache tiering and discusses Ceph benchmarking tools.

What you need for this book

The various software components required to follow the instructions in the chapters are as follows:

Who this book is for

This book targets IT and storage administrators who want to enter into the world of software-defined storage using Ceph. It also targets anyone who wishes to understand how to use Ceph and its workings to start developing and contributing to Ceph open source projects.

This book also provides valuable information for IT managers and professionals trying to understand the difference between traditional and software-defined cloud storage.

Conventions

In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.

Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The disk zap subcommand will destroy the existing partition table and content from the disk."

A block of code is set as follows:

DEVICE=<correct device name of your second network interface, check ifconfig -a>
ONBOOT=yes
BOOTPROTO=static
IPADDR=192.168.57.102
NETMASK=255.255.255.0
HWADDR= <correct MAC address of your second network interface, check ifconfig -a >

Any command-line input or output is written as follows:

# ceph status

New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "You can do this by selecting the ceph-node1 VM from Oracle VM VirtualBox Manager, and then clicking on the Start button."

Note

Warnings or important notes appear in a box like this.

Tip

Tips and tricks appear like this.

Reader feedback

Feedback from our readers is always welcome. Let us know what you think about this book—what you liked or may have disliked. Reader feedback is important for us to develop titles that you really get the most out of.

To send us general feedback, simply send an e-mail to , and mention the book title via the subject of your message.

If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, see our author guide on www.packtpub.com/authors.

Customer support

Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.

Downloading the example code

You can download the example code files for all Packt books you have purchased from your account at http://www.packtpub.com. If you purchased this book elsewhere, you can visit http://www.packtpub.com/support and register to have the files e-mailed directly to you.

Errata

Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you would report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting your book, clicking on the errata submission form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded to our website or added to any list of existing errata under the Errata section of that title.

To view the previously submitted errata, go to https://www.packtpub.com/books/content/support and enter the name of the book in the search field. The required information will appear under the Errata section.

Piracy

Piracy of copyright material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works, in any form, on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.

Please contact us at with a link to the suspected pirated material.

We appreciate your help in protecting our authors, and our ability to bring you valuable content.

Questions

You can contact us at if you are having a problem with any aspect of the book, and we will do our best to address it.