SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
<Insert Picture Here>




Eliminating Silent Data Corruption with Oracle Linux
Martin K. Petersen, Linux Kernel Developer
Sergio Leunissen, Sr. Director
The following is intended to outline our general
product direction. It is intended for information
purposes only, and may not be incorporated into any
contract. It is not a commitment to deliver any
material, code, or functionality, and should not be
relied upon in making purchasing decisions.
The development, release, and timing of any
features or functionality described for Oracle s
products remains at the sole discretion of Oracle.




                                                      2
Oracle Linux - History


•    Launched at Oracle Open World in 2006
•    Compatible with Red Hat Enterprise Linux
•    Freely available source and binaries
•    Oracle offers Linux support for RHEL and Oracle Linux
•    Oracle’s base Linux development platform
•    Oracle does not use or test on RHEL
•    Customers can switch in minutes – no reinstall needed
•    Applications run unchanged
•    No Red Hat compatibility bug has ever been reported
     to Oracle




                                                             3
More Than 5,500 Customers Use Oracle Linux




                                             4
Oracle: Enhancing Linux for Mission Critical Use

•  Linux kernel maintainers at Oracle
•  All work submitted to mainline kernel
•  Focus on datacenter use of Linux



                “   Oracle's development work for the
                         Linux kernel represents vital
                     contributions to the open source
                    community, which benefit anyone
                                          using Linux.
                       – Andrew Morton, Linux Kernel
                                 Maintainer, Google
                                                         ”
                                                             5
New: The Unbreakable Enterprise Kernel

•  Fast, modern, reliable and optimized for Oracle
•  Used by Exadata and Exalogic for extreme
   performance
•  Allows Oracle to innovate without sacrificing
   compatibility
 –  Oracle Linux now includes both the Unbreakable Enterprise
    Kernel and our existing Red Hat Compatible Kernel
 –  You choose at boot time: a system optimized for running
    Oracle software or strict Red Hat compatibility.

  Oracle now recommends only the Unbreakable
   Enterprise Kernel for all Oracle software on
                      Linux

                                                                6
Silent Data Corruption


•  Data corruption that goes unnoticed
  –  No errors or warning
•  Logical block checksum checking not enough to
   prevent silent data corruption
  –  Often used at READ time, when it’s already too late
•  Requires end-to-end integrity checking to detect
•  There are areas in the data path that can cause
   corruption
•  End-to-end data protection prevents bad data from
   being written




                                                           7
Potential Data Integrity Problems

       Oracle Database       •  Hardware
                                  –  Memory, CPU, disk
         Oracle ASM


       Operating System
                             •  Firmware
                                  –  RAID controller, disk
                             •  Software
          I/O Driver


       Fibre channel HBA
                                  –  I/O Driver
            Host
                                  –  OS: VM, block layer

             SAN




        RAID Controller




                           Software and hardware
          Disk drives
                           components in the I/O stack




                                                             8
The Impact of Silent Data Corruption
•  System downtime
•  Lost revenue
•  Lack of regulatory compliance
    –  Gramm-Leach-Bliley Act (GLBA)

                            Average financial impact per hour downtime by industry

Airline Reservations


      Catalog Sales


Home Shopping (TV)


      Pay-Per-View


  Credit Card Sales


   Retail Brokerage

                       $0       $1,000,000   $2,000,000   $3,000,000   $4,000,000    $5,000,000    $6,000,000     $7,000,000
                                                              Source: Gartner Group & Contingency Planning Research, Inc.



                                                                                                                               9
Silent Data Corruption: How Common Is It?

         •  NetApp, Univ. of Wisconsin, and Univ. of Toronto
            study1
               –  41 month period
               –  More than 1.5 million SATA and enterprise class fibre channel
                  drives
         •  Silent data corruption detected:
               –  3,078 SATA drives
               –  760 fibre channel drives
         •  CERN study, 20072
               –  Write known data patterns to more than 3,000 nodes
               –  5 week period
               –  22 out of 33,700 files (8.7TB) corrupt
               –  Nearly 1 in 1500 files

1)  http://www.pdsi-scidac.org/publications/papers/schroeder-fast08.pdf
2)  http://indico.cern.ch/getFile.py/access?contribId=3&sessionId=0&resId=1&materialId=paper&confId=13797   10
Data Integrity Timeline




                          11
Industry First: Application-to-SAN data integrity on
Linux

•  Emulex LightPulse® HBA with BlockGuard + Oracle
   Unbreakable Enterprise Kernel
•  Implements T10 PI Model and Oracle's Data Integrity
   Extensions (DIX)
•  Protects against data corruption in the software stack and
   HBA
•  Support for Oracle Database (10gR2, 11gR1, 11gR2) using
   ASMLib
•  Transparent to application




                                                                12
Data Integrity

Preventing Data Corruption with DIX
                       and T10 DIF



                                  13
Emulex LightPulse LPe1200x Fibre Channel HBA




•  8 Gbps Fibre Channel
   host adapter
•  PCI Express 2.0
•  BlockGuard:
  –  T10 Protection Information
     Model
  –  Oracle Data Integrity
     Extensions




                                               14
Typical I/O Stack




                    15
Typical I/O Stack
                      Application-specific data
                    integrity measures such as
                        file format or block
                             checksums.




                                                  16
Typical I/O Stack


                     OS has pointer checks
                    and file or device access
                             controls




                                                17
Typical I/O Stack




                    Server hardware and I/O
                      controller hardware
                     support ECC or parity




                                              18
Typical I/O Stack




                    SAN may use a transport
                         frame CRC




                                              19
Typical I/O Stack




                       Disk array controllers
                    frequently store 8 bytes of
                       internal information in
                     addition to the 512 bytes
                       of user data per block




                                                  20
Typical I/O Stack




                     However, the disk drive
                    has no knowledge about
                     what is stored in those 8
                    extra bytes and considers
                      them part of the data




                                                 21
Typical I/O Stack




                    Disk drive adds an internal
                      ECC to protect all 520
                          bytes per block




                                                  22
T10 Protection Information Model




•  Standardizes those extra 8 bytes
•  Prevents content corruption and misplacement errors
•  Protects path between HBA and storage device
•  Protection information is interleaved with data on the
 wire, i.e. effectively 520-byte logical blocks




                                                            23
T10 Protection Information Model




                                   24
T10 Protection Information Model
                           T10 PI allows multiple
                          components to exchange
                            and verify protection
                                information




                                                    25
T10 Protection Information Model




              T10 PI does not protect
              the top of the I/O stack




                                         26
Oracle Data Integrity Extensions


•  Extends T10 PI all the way up to the application,
   enabling true end-to-end data integrity protection
•  The Data Integrity Extensions (DIX)
  –  Enable DMA transfer of protection information to and from
     host memory
  –  Separate data and protection information buffers to avoid
     inefficient 512+8+512+8+512+8 scatter-gather lists
  –  Provide a set of commands that tell HBA how to handle the
     I/O: Generate, Strip, Forward, Verify, etc.




                                                                 27
Data Integrity Extensions + T10 PI




               DIX facilitates protection
               information interchange
              with I/O controller and this
              enables Linux applications
                 to send and receive
                      checksums




                                             28
Data Integrity Extensions + T10 PI




              When combined, DIX and
              T10 PI enable true end to
                 end data integrity
                     protection




                                          29
Preventing Data Corruption with DIX and T10 DIF




                                                  30
Preventing Data Corruption with DIX and T10 DIF




            Application
Data       creates data
            in memory




                                                  31
Preventing Data Corruption with DIX and T10 DIF




Data           ASM
            generates
            protection
           information
 PI




                                                  32
Preventing Data Corruption with DIX and T10 DIF




          Data         Linux kernel forwards
                         data and protection
                       information to Emulex
           PI              HBA using DIX




                                                  33
Preventing Data Corruption with DIX and T10 DIF




                     Data          Emulex HBA verifies
                                    that data, protection
                                  information, and target
                      PI               location match




                                                            34
Preventing Data Corruption with DIX and T10 DIF




                    Data +       Emulex HBA interleaves
                      PI          data and protection
                                     information and
                                   transmits 520-byte
                                   sectors to storage




                                                          35
Preventing Data Corruption with DIX and T10 DIF




     Storage array controller   Data +
        verifies that data,       PI
     protection information,
       and target location
               match




                                                  36
Preventing Data Corruption with DIX and T10 DIF




                 Disk drive firmware      Data +
                   verifies that data,      PI
                protection information,
                  and target location
                          match




                                                   37
Preventing Data Corruption with DIX and T10 DIF




                                          Data +
    Successful I/O completion               PI
        is reported to the
            application




                                                   38
Preventing Data Corruption with DIX and T10 DIF




                                          Data +
                                            PI
     Mismatches detected by
      HBA, storage array, or
    disk drive will cause I/O to
    be aborted and the error is
       passed up the stack,
     preventing bad data from
           being written



                                                   39
Preventing Data Corruption with DIX and T10 DIF




Data                                                 Data +
                                                       PI

 PI
                  Protection information is also
               transmitted for read requests and
              ASM will verify I/O before signaling
                  completion to the application


                                                              40
Preventing Data Corruption with DIX and T10 DIF




                                 Protection information
Data                 Data       exchange is dynamically
                                negotiated. Protection is
                                 automatically enabled
 PI                   PI        between application and
                                HBA when using legacy
                                        storage




                                                            41
What’s Available Today

                    Today                                                                   2011



    Oracle Application         Emulex LightPulse            Emulex HBA sends           Array validates          Array sends block to
    sends block with                                        data block with            protection information   drive. Drive firmware
    protection information     LPe1200x HBA                 protection information                              validates protection
                               validates protection
    to Emulex Adapter                                       across SAN to the                                   information before
                               information
    through Linux I/O stack                                 array                                               writing to media




        Oracle                Linux OS                HBA                     Switch               Storage               Disk drive
      Database                                                                                      Array




             Data Integrity Extensions                                   T10 PI                                 T10-PI


Application-to-Disk Data Integrity: current and future support




                                                                                                                                        42
Resources


•  Oracle Linux Information
  oracle.com/linux
•  Follow us on Twitter
  @ORCL_Linux
•  Free Download: Oracle Linux
  edelivery.oracle.com/linux
•  Free Download:
  –  Unbreakable Enterprise Kernel
     public-yum.oracle.com

•  Data Integrity Project Information
  oss.oracle.com/~mkp/



                                        43

Contenu connexe

Tendances

Sparc t4 4 system technical overview
Sparc t4 4 system technical overviewSparc t4 4 system technical overview
Sparc t4 4 system technical overviewsolarisyougood
 
Exadata x3 workshop
Exadata x3 workshopExadata x3 workshop
Exadata x3 workshopFran Navarro
 
Sparc t3 4 system technical overview
Sparc t3 4 system technical overviewSparc t3 4 system technical overview
Sparc t3 4 system technical overviewsolarisyougood
 
Fujitsu m10 server features and capabilities
Fujitsu m10 server features and capabilitiesFujitsu m10 server features and capabilities
Fujitsu m10 server features and capabilitiessolarisyougood
 
Oracle virtual appliance
Oracle virtual applianceOracle virtual appliance
Oracle virtual appliancesolarisyougood
 
Sparc t3 2 technical presentation
Sparc t3 2 technical presentationSparc t3 2 technical presentation
Sparc t3 2 technical presentationsolarisyougood
 
Oracle Database Appliance - RAC in a box Some strings attached
Oracle Database Appliance - RAC in a box Some strings attached Oracle Database Appliance - RAC in a box Some strings attached
Oracle Database Appliance - RAC in a box Some strings attached Fuad Arshad
 
Exadata x4 for_sap
Exadata x4 for_sapExadata x4 for_sap
Exadata x4 for_sapFran Navarro
 
Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015Connor McDonald
 
3 additional dpdk_theory(1)
3 additional dpdk_theory(1)3 additional dpdk_theory(1)
3 additional dpdk_theory(1)videos
 
Oracle Linux Nov 2011 Webcast
Oracle Linux Nov 2011 WebcastOracle Linux Nov 2011 Webcast
Oracle Linux Nov 2011 WebcastTerry Wang
 
Miro Consulting Oracle Exadata Database Machine Offering
Miro Consulting  Oracle Exadata Database Machine OfferingMiro Consulting  Oracle Exadata Database Machine Offering
Miro Consulting Oracle Exadata Database Machine Offeringgarylcoleman
 
Oracle Database Appliance X5
Oracle Database Appliance X5Oracle Database Appliance X5
Oracle Database Appliance X5Amro Ibrahim
 
oda-x5-2-DATA SHEET
oda-x5-2-DATA SHEEToda-x5-2-DATA SHEET
oda-x5-2-DATA SHEETDaryll Whyte
 
Oracle Exadata Database
Oracle Exadata DatabaseOracle Exadata Database
Oracle Exadata Databaselanka76
 
Sun Oracle Exadata Technical Overview V1
Sun Oracle Exadata Technical Overview V1Sun Oracle Exadata Technical Overview V1
Sun Oracle Exadata Technical Overview V1jenkin
 
Efficient and Effective Infrastructure Optimization on Oracle
Efficient and Effective Infrastructure Optimization on OracleEfficient and Effective Infrastructure Optimization on Oracle
Efficient and Effective Infrastructure Optimization on OracleAndreas Kuncoro
 

Tendances (20)

Sparc t4 4 system technical overview
Sparc t4 4 system technical overviewSparc t4 4 system technical overview
Sparc t4 4 system technical overview
 
IBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product GuideIBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product Guide
 
Exadata x3 workshop
Exadata x3 workshopExadata x3 workshop
Exadata x3 workshop
 
Sparc t3 4 system technical overview
Sparc t3 4 system technical overviewSparc t3 4 system technical overview
Sparc t3 4 system technical overview
 
Fujitsu m10 server features and capabilities
Fujitsu m10 server features and capabilitiesFujitsu m10 server features and capabilities
Fujitsu m10 server features and capabilities
 
Oracle virtual appliance
Oracle virtual applianceOracle virtual appliance
Oracle virtual appliance
 
Sparc t3 2 technical presentation
Sparc t3 2 technical presentationSparc t3 2 technical presentation
Sparc t3 2 technical presentation
 
Oracle Database Appliance - RAC in a box Some strings attached
Oracle Database Appliance - RAC in a box Some strings attached Oracle Database Appliance - RAC in a box Some strings attached
Oracle Database Appliance - RAC in a box Some strings attached
 
Unisys Stealth Black
Unisys Stealth BlackUnisys Stealth Black
Unisys Stealth Black
 
Exadata x4 for_sap
Exadata x4 for_sapExadata x4 for_sap
Exadata x4 for_sap
 
Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015
 
3 additional dpdk_theory(1)
3 additional dpdk_theory(1)3 additional dpdk_theory(1)
3 additional dpdk_theory(1)
 
Ip san-best-practices-en
Ip san-best-practices-enIp san-best-practices-en
Ip san-best-practices-en
 
Oracle Linux Nov 2011 Webcast
Oracle Linux Nov 2011 WebcastOracle Linux Nov 2011 Webcast
Oracle Linux Nov 2011 Webcast
 
Miro Consulting Oracle Exadata Database Machine Offering
Miro Consulting  Oracle Exadata Database Machine OfferingMiro Consulting  Oracle Exadata Database Machine Offering
Miro Consulting Oracle Exadata Database Machine Offering
 
Oracle Database Appliance X5
Oracle Database Appliance X5Oracle Database Appliance X5
Oracle Database Appliance X5
 
oda-x5-2-DATA SHEET
oda-x5-2-DATA SHEEToda-x5-2-DATA SHEET
oda-x5-2-DATA SHEET
 
Oracle Exadata Database
Oracle Exadata DatabaseOracle Exadata Database
Oracle Exadata Database
 
Sun Oracle Exadata Technical Overview V1
Sun Oracle Exadata Technical Overview V1Sun Oracle Exadata Technical Overview V1
Sun Oracle Exadata Technical Overview V1
 
Efficient and Effective Infrastructure Optimization on Oracle
Efficient and Effective Infrastructure Optimization on OracleEfficient and Effective Infrastructure Optimization on Oracle
Efficient and Effective Infrastructure Optimization on Oracle
 

En vedette

Oracle Intercalls
Oracle IntercallsOracle Intercalls
Oracle IntercallsOracle
 
交點高雄Vol.16 - Eeddie Li - 決不讓別人影響我的教育
交點高雄Vol.16 - Eeddie Li - 決不讓別人影響我的教育交點高雄Vol.16 - Eeddie Li - 決不讓別人影響我的教育
交點高雄Vol.16 - Eeddie Li - 決不讓別人影響我的教育交點
 
WCI 10gR3 overview
WCI 10gR3 overviewWCI 10gR3 overview
WCI 10gR3 overviewTerry Wang
 
Oracle Buys Ksplice
Oracle Buys KspliceOracle Buys Ksplice
Oracle Buys KspliceTerry Wang
 
我的 Ubuntu 之旅
我的 Ubuntu 之旅我的 Ubuntu 之旅
我的 Ubuntu 之旅Terry Wang
 
Oracle Audit Vault & Database Vault
Oracle Audit Vault & Database VaultOracle Audit Vault & Database Vault
Oracle Audit Vault & Database VaultOrhan ERIPEK
 
Btrfs by Chris Mason
Btrfs by Chris MasonBtrfs by Chris Mason
Btrfs by Chris MasonTerry Wang
 

En vedette (9)

Oracle Intercalls
Oracle IntercallsOracle Intercalls
Oracle Intercalls
 
交點高雄Vol.16 - Eeddie Li - 決不讓別人影響我的教育
交點高雄Vol.16 - Eeddie Li - 決不讓別人影響我的教育交點高雄Vol.16 - Eeddie Li - 決不讓別人影響我的教育
交點高雄Vol.16 - Eeddie Li - 決不讓別人影響我的教育
 
WCI 10gR3 overview
WCI 10gR3 overviewWCI 10gR3 overview
WCI 10gR3 overview
 
Oracle Buys Ksplice
Oracle Buys KspliceOracle Buys Ksplice
Oracle Buys Ksplice
 
Git
GitGit
Git
 
我的 Ubuntu 之旅
我的 Ubuntu 之旅我的 Ubuntu 之旅
我的 Ubuntu 之旅
 
Oracle Audit Vault & Database Vault
Oracle Audit Vault & Database VaultOracle Audit Vault & Database Vault
Oracle Audit Vault & Database Vault
 
OEM Grid control 11g
OEM Grid control 11gOEM Grid control 11g
OEM Grid control 11g
 
Btrfs by Chris Mason
Btrfs by Chris MasonBtrfs by Chris Mason
Btrfs by Chris Mason
 

Similaire à Eliminating Silent Data Corruption with Oracle Linux

Oracle strategy for_information_management
Oracle strategy for_information_managementOracle strategy for_information_management
Oracle strategy for_information_managementInSync Conference
 
Engineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureEngineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureBob Rhubart
 
Oracle en Entel Summit 2010
Oracle en Entel Summit 2010Oracle en Entel Summit 2010
Oracle en Entel Summit 2010Entel
 
Exalogic workshop overview__hardwarev4
Exalogic workshop overview__hardwarev4Exalogic workshop overview__hardwarev4
Exalogic workshop overview__hardwarev4Fran Navarro
 
CON6492 - Oracle Database Public Cloud Services v1 1
CON6492 - Oracle Database Public Cloud Services v1 1CON6492 - Oracle Database Public Cloud Services v1 1
CON6492 - Oracle Database Public Cloud Services v1 1David van Schalkwyk
 
Uk Linux Presentation Abhishek Kapoor
Uk Linux Presentation Abhishek KapoorUk Linux Presentation Abhishek Kapoor
Uk Linux Presentation Abhishek KapoorIDS Infotech
 
Eng systems oracle_overview
Eng systems oracle_overviewEng systems oracle_overview
Eng systems oracle_overviewFran Navarro
 
Engineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureEngineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureBob Rhubart
 
PDoolan Oracle Overview
PDoolan Oracle OverviewPDoolan Oracle Overview
PDoolan Oracle OverviewPeter Doolan
 
Get the Facts: Oracle's Unbreakable Enterprise Kernel
Get the Facts: Oracle's Unbreakable Enterprise KernelGet the Facts: Oracle's Unbreakable Enterprise Kernel
Get the Facts: Oracle's Unbreakable Enterprise KernelTerry Wang
 
Systems oracle overview_hardware
Systems oracle overview_hardwareSystems oracle overview_hardware
Systems oracle overview_hardwareFran Navarro
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014StampedeCon
 
Oracleonoracle dec112012
Oracleonoracle dec112012Oracleonoracle dec112012
Oracleonoracle dec112012patmisasi
 
Intel and Red Hat: Enhancing OpenStack for Enterprise Deployment
Intel and Red Hat: Enhancing OpenStack for Enterprise DeploymentIntel and Red Hat: Enhancing OpenStack for Enterprise Deployment
Intel and Red Hat: Enhancing OpenStack for Enterprise DeploymentIntel® Software
 
Oracle Cloud DBaaS
Oracle Cloud DBaaSOracle Cloud DBaaS
Oracle Cloud DBaaSArush Jain
 
A5 oracle exadata-the game changer for online transaction processing data w...
A5   oracle exadata-the game changer for online transaction processing data w...A5   oracle exadata-the game changer for online transaction processing data w...
A5 oracle exadata-the game changer for online transaction processing data w...Dr. Wilfred Lin (Ph.D.)
 
S100298 pendulum-swings-orlando-v1804a
S100298 pendulum-swings-orlando-v1804aS100298 pendulum-swings-orlando-v1804a
S100298 pendulum-swings-orlando-v1804aTony Pearson
 

Similaire à Eliminating Silent Data Corruption with Oracle Linux (20)

Oracle strategy for_information_management
Oracle strategy for_information_managementOracle strategy for_information_management
Oracle strategy for_information_management
 
ZFS appliance
ZFS applianceZFS appliance
ZFS appliance
 
Engineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureEngineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the Future
 
Oracle en Entel Summit 2010
Oracle en Entel Summit 2010Oracle en Entel Summit 2010
Oracle en Entel Summit 2010
 
Exalogic workshop overview__hardwarev4
Exalogic workshop overview__hardwarev4Exalogic workshop overview__hardwarev4
Exalogic workshop overview__hardwarev4
 
CON6492 - Oracle Database Public Cloud Services v1 1
CON6492 - Oracle Database Public Cloud Services v1 1CON6492 - Oracle Database Public Cloud Services v1 1
CON6492 - Oracle Database Public Cloud Services v1 1
 
Uk Linux Presentation Abhishek Kapoor
Uk Linux Presentation Abhishek KapoorUk Linux Presentation Abhishek Kapoor
Uk Linux Presentation Abhishek Kapoor
 
Eng systems oracle_overview
Eng systems oracle_overviewEng systems oracle_overview
Eng systems oracle_overview
 
Engineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureEngineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the Future
 
PDoolan Oracle Overview
PDoolan Oracle OverviewPDoolan Oracle Overview
PDoolan Oracle Overview
 
Get the Facts: Oracle's Unbreakable Enterprise Kernel
Get the Facts: Oracle's Unbreakable Enterprise KernelGet the Facts: Oracle's Unbreakable Enterprise Kernel
Get the Facts: Oracle's Unbreakable Enterprise Kernel
 
Systems oracle overview_hardware
Systems oracle overview_hardwareSystems oracle overview_hardware
Systems oracle overview_hardware
 
Why_Oracle_Hardware.ppt
Why_Oracle_Hardware.pptWhy_Oracle_Hardware.ppt
Why_Oracle_Hardware.ppt
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
 
Oow Ppt 2
Oow Ppt 2Oow Ppt 2
Oow Ppt 2
 
Oracleonoracle dec112012
Oracleonoracle dec112012Oracleonoracle dec112012
Oracleonoracle dec112012
 
Intel and Red Hat: Enhancing OpenStack for Enterprise Deployment
Intel and Red Hat: Enhancing OpenStack for Enterprise DeploymentIntel and Red Hat: Enhancing OpenStack for Enterprise Deployment
Intel and Red Hat: Enhancing OpenStack for Enterprise Deployment
 
Oracle Cloud DBaaS
Oracle Cloud DBaaSOracle Cloud DBaaS
Oracle Cloud DBaaS
 
A5 oracle exadata-the game changer for online transaction processing data w...
A5   oracle exadata-the game changer for online transaction processing data w...A5   oracle exadata-the game changer for online transaction processing data w...
A5 oracle exadata-the game changer for online transaction processing data w...
 
S100298 pendulum-swings-orlando-v1804a
S100298 pendulum-swings-orlando-v1804aS100298 pendulum-swings-orlando-v1804a
S100298 pendulum-swings-orlando-v1804a
 

Plus de Terry Wang

Introduction to containers, k8s, Microservices & Cloud Native
Introduction to containers, k8s, Microservices & Cloud NativeIntroduction to containers, k8s, Microservices & Cloud Native
Introduction to containers, k8s, Microservices & Cloud NativeTerry Wang
 
Debugging and Configuration Best Practices for Oracle Linux
Debugging and Configuration Best Practices for Oracle LinuxDebugging and Configuration Best Practices for Oracle Linux
Debugging and Configuration Best Practices for Oracle LinuxTerry Wang
 
Git 101 tutorial presentation
Git 101 tutorial presentationGit 101 tutorial presentation
Git 101 tutorial presentationTerry Wang
 
Git 入门 与 实践
Git 入门 与 实践Git 入门 与 实践
Git 入门 与 实践Terry Wang
 
Git 入门与实践
Git 入门与实践Git 入门与实践
Git 入门与实践Terry Wang
 

Plus de Terry Wang (7)

Introduction to containers, k8s, Microservices & Cloud Native
Introduction to containers, k8s, Microservices & Cloud NativeIntroduction to containers, k8s, Microservices & Cloud Native
Introduction to containers, k8s, Microservices & Cloud Native
 
Debugging and Configuration Best Practices for Oracle Linux
Debugging and Configuration Best Practices for Oracle LinuxDebugging and Configuration Best Practices for Oracle Linux
Debugging and Configuration Best Practices for Oracle Linux
 
RHEL roadmap
RHEL roadmapRHEL roadmap
RHEL roadmap
 
Git 101 tutorial presentation
Git 101 tutorial presentationGit 101 tutorial presentation
Git 101 tutorial presentation
 
Git 入门 与 实践
Git 入门 与 实践Git 入门 与 实践
Git 入门 与 实践
 
Git 入门与实践
Git 入门与实践Git 入门与实践
Git 入门与实践
 
ALUI 6.5
ALUI 6.5ALUI 6.5
ALUI 6.5
 

Eliminating Silent Data Corruption with Oracle Linux

  • 1. <Insert Picture Here> Eliminating Silent Data Corruption with Oracle Linux Martin K. Petersen, Linux Kernel Developer Sergio Leunissen, Sr. Director
  • 2. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 2
  • 3. Oracle Linux - History •  Launched at Oracle Open World in 2006 •  Compatible with Red Hat Enterprise Linux •  Freely available source and binaries •  Oracle offers Linux support for RHEL and Oracle Linux •  Oracle’s base Linux development platform •  Oracle does not use or test on RHEL •  Customers can switch in minutes – no reinstall needed •  Applications run unchanged •  No Red Hat compatibility bug has ever been reported to Oracle 3
  • 4. More Than 5,500 Customers Use Oracle Linux 4
  • 5. Oracle: Enhancing Linux for Mission Critical Use •  Linux kernel maintainers at Oracle •  All work submitted to mainline kernel •  Focus on datacenter use of Linux “ Oracle's development work for the Linux kernel represents vital contributions to the open source community, which benefit anyone using Linux. – Andrew Morton, Linux Kernel Maintainer, Google ” 5
  • 6. New: The Unbreakable Enterprise Kernel •  Fast, modern, reliable and optimized for Oracle •  Used by Exadata and Exalogic for extreme performance •  Allows Oracle to innovate without sacrificing compatibility –  Oracle Linux now includes both the Unbreakable Enterprise Kernel and our existing Red Hat Compatible Kernel –  You choose at boot time: a system optimized for running Oracle software or strict Red Hat compatibility. Oracle now recommends only the Unbreakable Enterprise Kernel for all Oracle software on Linux 6
  • 7. Silent Data Corruption •  Data corruption that goes unnoticed –  No errors or warning •  Logical block checksum checking not enough to prevent silent data corruption –  Often used at READ time, when it’s already too late •  Requires end-to-end integrity checking to detect •  There are areas in the data path that can cause corruption •  End-to-end data protection prevents bad data from being written 7
  • 8. Potential Data Integrity Problems Oracle Database •  Hardware –  Memory, CPU, disk Oracle ASM Operating System •  Firmware –  RAID controller, disk •  Software I/O Driver Fibre channel HBA –  I/O Driver Host –  OS: VM, block layer SAN RAID Controller Software and hardware Disk drives components in the I/O stack 8
  • 9. The Impact of Silent Data Corruption •  System downtime •  Lost revenue •  Lack of regulatory compliance –  Gramm-Leach-Bliley Act (GLBA) Average financial impact per hour downtime by industry Airline Reservations Catalog Sales Home Shopping (TV) Pay-Per-View Credit Card Sales Retail Brokerage $0 $1,000,000 $2,000,000 $3,000,000 $4,000,000 $5,000,000 $6,000,000 $7,000,000 Source: Gartner Group & Contingency Planning Research, Inc. 9
  • 10. Silent Data Corruption: How Common Is It? •  NetApp, Univ. of Wisconsin, and Univ. of Toronto study1 –  41 month period –  More than 1.5 million SATA and enterprise class fibre channel drives •  Silent data corruption detected: –  3,078 SATA drives –  760 fibre channel drives •  CERN study, 20072 –  Write known data patterns to more than 3,000 nodes –  5 week period –  22 out of 33,700 files (8.7TB) corrupt –  Nearly 1 in 1500 files 1)  http://www.pdsi-scidac.org/publications/papers/schroeder-fast08.pdf 2)  http://indico.cern.ch/getFile.py/access?contribId=3&sessionId=0&resId=1&materialId=paper&confId=13797 10
  • 12. Industry First: Application-to-SAN data integrity on Linux •  Emulex LightPulse® HBA with BlockGuard + Oracle Unbreakable Enterprise Kernel •  Implements T10 PI Model and Oracle's Data Integrity Extensions (DIX) •  Protects against data corruption in the software stack and HBA •  Support for Oracle Database (10gR2, 11gR1, 11gR2) using ASMLib •  Transparent to application 12
  • 13. Data Integrity Preventing Data Corruption with DIX and T10 DIF 13
  • 14. Emulex LightPulse LPe1200x Fibre Channel HBA •  8 Gbps Fibre Channel host adapter •  PCI Express 2.0 •  BlockGuard: –  T10 Protection Information Model –  Oracle Data Integrity Extensions 14
  • 16. Typical I/O Stack Application-specific data integrity measures such as file format or block checksums. 16
  • 17. Typical I/O Stack OS has pointer checks and file or device access controls 17
  • 18. Typical I/O Stack Server hardware and I/O controller hardware support ECC or parity 18
  • 19. Typical I/O Stack SAN may use a transport frame CRC 19
  • 20. Typical I/O Stack Disk array controllers frequently store 8 bytes of internal information in addition to the 512 bytes of user data per block 20
  • 21. Typical I/O Stack However, the disk drive has no knowledge about what is stored in those 8 extra bytes and considers them part of the data 21
  • 22. Typical I/O Stack Disk drive adds an internal ECC to protect all 520 bytes per block 22
  • 23. T10 Protection Information Model •  Standardizes those extra 8 bytes •  Prevents content corruption and misplacement errors •  Protects path between HBA and storage device •  Protection information is interleaved with data on the wire, i.e. effectively 520-byte logical blocks 23
  • 25. T10 Protection Information Model T10 PI allows multiple components to exchange and verify protection information 25
  • 26. T10 Protection Information Model T10 PI does not protect the top of the I/O stack 26
  • 27. Oracle Data Integrity Extensions •  Extends T10 PI all the way up to the application, enabling true end-to-end data integrity protection •  The Data Integrity Extensions (DIX) –  Enable DMA transfer of protection information to and from host memory –  Separate data and protection information buffers to avoid inefficient 512+8+512+8+512+8 scatter-gather lists –  Provide a set of commands that tell HBA how to handle the I/O: Generate, Strip, Forward, Verify, etc. 27
  • 28. Data Integrity Extensions + T10 PI DIX facilitates protection information interchange with I/O controller and this enables Linux applications to send and receive checksums 28
  • 29. Data Integrity Extensions + T10 PI When combined, DIX and T10 PI enable true end to end data integrity protection 29
  • 30. Preventing Data Corruption with DIX and T10 DIF 30
  • 31. Preventing Data Corruption with DIX and T10 DIF Application Data creates data in memory 31
  • 32. Preventing Data Corruption with DIX and T10 DIF Data ASM generates protection information PI 32
  • 33. Preventing Data Corruption with DIX and T10 DIF Data Linux kernel forwards data and protection information to Emulex PI HBA using DIX 33
  • 34. Preventing Data Corruption with DIX and T10 DIF Data Emulex HBA verifies that data, protection information, and target PI location match 34
  • 35. Preventing Data Corruption with DIX and T10 DIF Data + Emulex HBA interleaves PI data and protection information and transmits 520-byte sectors to storage 35
  • 36. Preventing Data Corruption with DIX and T10 DIF Storage array controller Data + verifies that data, PI protection information, and target location match 36
  • 37. Preventing Data Corruption with DIX and T10 DIF Disk drive firmware Data + verifies that data, PI protection information, and target location match 37
  • 38. Preventing Data Corruption with DIX and T10 DIF Data + Successful I/O completion PI is reported to the application 38
  • 39. Preventing Data Corruption with DIX and T10 DIF Data + PI Mismatches detected by HBA, storage array, or disk drive will cause I/O to be aborted and the error is passed up the stack, preventing bad data from being written 39
  • 40. Preventing Data Corruption with DIX and T10 DIF Data Data + PI PI Protection information is also transmitted for read requests and ASM will verify I/O before signaling completion to the application 40
  • 41. Preventing Data Corruption with DIX and T10 DIF Protection information Data Data exchange is dynamically negotiated. Protection is automatically enabled PI PI between application and HBA when using legacy storage 41
  • 42. What’s Available Today Today 2011 Oracle Application Emulex LightPulse Emulex HBA sends Array validates Array sends block to sends block with data block with protection information drive. Drive firmware protection information LPe1200x HBA protection information validates protection validates protection to Emulex Adapter across SAN to the information before information through Linux I/O stack array writing to media Oracle Linux OS HBA Switch Storage Disk drive Database Array Data Integrity Extensions T10 PI T10-PI Application-to-Disk Data Integrity: current and future support 42
  • 43. Resources •  Oracle Linux Information oracle.com/linux •  Follow us on Twitter @ORCL_Linux •  Free Download: Oracle Linux edelivery.oracle.com/linux •  Free Download: –  Unbreakable Enterprise Kernel public-yum.oracle.com •  Data Integrity Project Information oss.oracle.com/~mkp/ 43