当前位置:网站首页>Masterless replication system (1) - write DB when node fails
Masterless replication system (1) - write DB when node fails
2022-07-31 16:39:00 【Huawei cloud】
The idea of single-master and multi-master replication is that the client sends a write request to a master node, and the DB system is responsible for copying the write request to other replicas.The master node decides the write order, and the slave nodes apply the write logs sent by the master node in the same order.
Some data storage systems use a different design: abandoning the primary node, allowing any replica to accept writes directly from clients.The earliest replicated data systems were masterless (or called decentralized replication, centerless replication), but later in the era of relational database dominance, this idea was almost forgotten.After Amazon used it for its in-house Dynamo system[^vi], it was once again a popular DB architecture.Riak, Cassandra, and Voldemort are all open source data stores with a masterless replication model inspired by Dynamo, so such databases are also known as Dynamo style.
[^vi]: Dynamo is not available for users outside of Amazon.Confusingly, AWS offers a managed database product called DynamoDB that uses a completely different architecture: it's based on single-leader replication.
In some unowned implementations, the client sends write requests directly to multiple replicas, while in other implementations, there is a coordinator node that writes on behalf of the client, but unlike the master node's database,The coordinator is not responsible for maintaining write order.This design difference has profound implications for how DBs are used.
4.1 Write DB when node fails
Assuming a three-replica DB, one of which is currently unavailable, perhaps rebooting to install system updates.Under the primary node replication model, to continue processing writes, a failover needs to be performed.
Without a master model, there is no such switch.
Figure-10: Client (user 1234) sends write requests to three replicas in parallel, two available replicas accept writes, and the unavailable replica cannot handle it.Assuming two successful confirmations of the three copies, the user 1234 can consider the writing to be successful after receiving the two confirmation responses.The case where one of the replicas cannot be written can be completely ignored.
The failed node comes back online and clients start reading it.Any writes that occur during a node failure are not yet synchronized at that node, so reads may get stale data.
To solve this problem, when a client reads data from the DB, it does not send a request to 1 replica, but to multiple replicas in parallel.Clients may get different responses from different nodes, i.e. the latest value from one node and the old value from another node.The version number can be used to determine which value is updated.
4.1.1 Read Repair and Anti-Entropy
The replication model should ensure that all data is eventually replicated to all replicas.After a failed node comes back online, how does it catch up with missed writes?
Dynamo-style data storage system mechanism:
Read repair
When a client reads multiple copies in parallel, an expired return value can be detected.As shown in Figure-10, user 2345 gets version 6 from R3 and version 7 from replicas 1 and 2.The client can determine that replica 3 is the expired value, and then write the new value to that replica.Suitable for read-intensive scenarios
Anti-entropy process
Some data stores have background processes that constantly look for data differences between replicas, copying any missing data from one replica to another.Unlike replicated logs based on primary replication, this anti-entropy process does not guarantee any particular order of replicated writes and introduces significant synchronization lag
Not all systems implement either scheme.For example, Voldemort currently has no anti-entropy process.If there is no anti-entropy process, because [read repair] is only possible to perform repair when a read occurs, those rarely accessed data may be lost in some replicas and can no longer be detected, thus reducing the durability of writes.
边栏推荐
- 联邦学习:联邦场景下的多源知识图谱嵌入
- Website vulnerability repair service provider's analysis of unauthorized vulnerability
- T - sne + data visualization parts of the network parameters
- [7.28] Code Source - [Fence Painting] [Appropriate Pairs (Data Enhanced Version)]
- 2.索引及调优篇【mysql高级】
- Three aspects of Ali: How to solve the problem of MQ message loss, duplication and backlog?
- type of timer
- [pytorch] pytorch automatic derivation, Tensor and Autograd
- js的toString方法
- Oracle dynamically registers non-1521 ports
猜你喜欢
外媒所言非虚,苹果降价或许是真的在清库存
关于柱状图的经典画法总结
你辛辛苦苦写的文章可能不是你的原创
2022年必读的12本机器学习书籍推荐
What is the difference between BI software in the domestic market?
How C programs run 01 - the composition of ordinary executable files
二分查找的细节坑
Huawei's top engineers lasted nine years "anecdotal stories network protocol" PDF document summary, is too strong
全新宝马3系上市,安全、舒适一个不落
第05章 存储引擎【1.MySQL架构篇】【MySQL高级】
随机推荐
LevelSequence源码分析
基于ABP实现DDD
[TypeScript]OOP
Small program: Matlab solves differential equations "recommended collection"
【源码解析】BeanFactory和FactoryBean
i.MX6ULL driver development | 33 - NXP original network device driver reading (LAN8720 PHY)
After the form is submitted, the page does not jump [easy to understand]
C language - function
GP 6总体架构学习笔记
2020 WeChat applet decompilation tutorial (can applet decompile source code be used)
使用互相关进行音频对齐
Premiere Pro 2022 for (pr 2022)v22.5.0
【愚公系列】2022年07月 Go教学课程 022-Go容器之字典
字符指针赋值[通俗易懂]
6-22 Vulnerability exploit - postgresql database password cracking
go图书管理系统
[TypeScript] In-depth study of TypeScript type operations
在资源管理类中提供对原始资源的访问——条款15
adb shell error error: device unauthorized
研发过程中的文档管理与工具