{"config":{"lang":["en"],"separator":"[\\s\\-]+","pipeline":["stopWordFilter"]},"docs":[{"location":"","title":"School of SRE","text":"
Site Reliability Engineers (SREs) sits at the intersection of software engineering and systems engineering. While there are potentially infinite permutations and combinations of how infrastructure and software components can be put together to achieve an objective, focusing on foundational skills allows SREs to work with complex systems and software, regardless of whether these systems are proprietary, 3rd party, open systems, run on cloud/on-prem infrastructure, etc. Particularly, it is important to gain a deep understanding of how these areas of systems and infrastructure relate to each other and interact with each other. The combination of software and systems engineering skills is rare and is generally built over time with exposure to a wide variety of infrastructure, systems, and software.
SREs bring in engineering practices to keep the site up. Each distributed system is an agglomeration of many components. SREs validate business requirements, convert them to SLAs for each of the components that constitute the distributed system, monitor and measure adherence to SLAs, re-architect or scale out to mitigate or avoid SLA breaches, add these learnings as feedback to new systems or projects and thereby reduce operational toil. Hence SREs play a vital role right from the day 0 design of the system.
In early 2019, we started visiting campuses across India to recruit the best and brightest minds to make sure LinkedIn and all the services that make up its complex technology stack are always available for everyone. This critical function at LinkedIn falls under the purview of the Site Engineering team and Site Reliability Engineers (SREs) who are Software Engineers, specialized in reliability.
As we continued on this journey, we started getting a lot of questions from these campuses on what exactly the site reliability engineering role entails? And, how could someone learn the skills and the disciplines involved to become a successful site reliability engineer? Fast forward a few months, and a few of these campus students had joined LinkedIn either as interns or as full-time engineers to become a part of the Site Engineering team; we also had a few lateral hires who joined our organization who were not from a traditional SRE background. That's when a few of us got together and started to think about how we can onboard new graduate engineers to the Site Engineering team.
There are very few resources out there guiding someone on the basic skill sets one has to acquire as a beginner SRE. Because of the lack of these resources, we felt that individuals have a tough time getting into open positions in the industry. We created the School Of SRE as a starting point for anyone wanting to build their career as an SRE. In this course, we are focusing on building strong foundational skills. The course is structured in a way to provide more real life examples and how learning each of these topics can play an important role in day-to-day job responsibilities of an SRE. Currently, we are covering the following topics under the School Of SRE:
Level 101
Level 102
We believe continuous learning will help in acquiring deeper knowledge and competencies in order to expand your skill sets, every module has added references that could be a guide for further learning. Our hope is that by going through these modules we should be able to build the essential skills required for a Site Reliability Engineer.
At LinkedIn, we are using this curriculum for onboarding our non-traditional hires and new college grads into the SRE role. We had multiple rounds of successful onboarding experiences with new employees and the course helped them be productive in a very short period of time. This motivated us to open source the content for helping other organizations in onboarding new engineers into the role and provide guidance for aspiring individuals to get into the role. We realize that the initial content we created is just a starting point and we hope that the community can help in the journey of refining and expanding the content. Check out the contributing guide to get started.
"},{"location":"CODE_OF_CONDUCT/","title":"Code of Conduct","text":"This code of conduct outlines expectations for participation in LinkedIn-managed open source communities, as well as steps for reporting unacceptable behavior. We are committed to providing a welcoming and inspiring community for all. People violating this code of conduct may be banned from the community.
Our open source communities strive to:
This code of conduct applies to all repos and communities for LinkedIn-managed open source projects regardless of whether or not the repo explicitly calls out its use of this code. The code also applies in public spaces when an individual is representing a project or its community. Examples include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers.
Note: Some LinkedIn-managed communities have codes of conduct that pre-date this document and issue resolution process. While communities are not required to change their code, they are expected to use the resolution process outlined here. The review team will coordinate with the communities involved to address your concerns.
"},{"location":"CODE_OF_CONDUCT/#reporting-code-of-conduct-issues","title":"Reporting Code of Conduct Issues","text":"We encourage all communities to resolve issues on their own whenever possible. This builds a broader and deeper understanding and ultimately a healthier interaction. In the event that an issue cannot be resolved locally, please feel free to report your concerns by contacting oss@linkedin.com.
In your report, please include:
All reports will be reviewed by a multi-person team and will result in a response that is deemed necessary and appropriate to the circumstances. Where additional perspectives are needed, the team may seek insight from others with relevant expertise or experience. The confidentiality of the person reporting the incident will be kept at all times. Involved parties are never part of the review team.
Anyone asked to stop unacceptable behavior is expected to comply immediately. If an individual engages in unacceptable behavior, the review team may take any action they deem appropriate, including a permanent ban from the community.
This code of conduct is based on the Microsoft Open Source Code of Conduct which was based on the template established by the TODO Group and used by numerous other large communities (e.g., Facebook, Yahoo, Twitter, GitHub) and the Scope section from the Contributor Covenant version 1.4.
"},{"location":"CONTRIBUTING/","title":"Contribute","text":"We realise that the initial content we created is just a starting point and our hope is that the community can help in the journey refining and extending the contents.
As a contributor, you represent that the content you submit is not plagiarised. By submitting the content, you (and, if applicable, your employer) are licensing the submitted content to LinkedIn and the open source community subject to the Creative Commons Attribution 4.0 International Public License.
Repository URL: https://github.com/linkedin/school-of-sre
"},{"location":"CONTRIBUTING/#contributing-guidelines","title":"Contributing Guidelines","text":"Ensure that you adhere to the following guidelines:
Run the following commands to build and view the site locally before opening a PR.
python3 -m venv .venv\nsource .venv/bin/activate\npip install -r requirements.txt\nmkdocs build\nmkdocs serve\n"},{"location":"CONTRIBUTING/#opening-a-pr","title":"Opening a PR","text":"Follow the GitHub PR workflow for your contributions.
Fork this repo, create a feature branch, commit your changes and open a PR to this repo.
"},{"location":"sre_community/","title":"SRE Community","text":"We are having an active LinkedIn community for School of SRE.
Please join the group via: https://www.linkedin.com/groups/12493545/
The group has members with different levels of experience in site reliability engineering. There are active conversation on different technical topics centered around site reliability engineering. We encourage everyone to join the conversation and learn from each other and build a successful career in the SRE space.
"},{"location":"level101/big_data/evolution/","title":"Evolution of Hadoop","text":""},{"location":"level101/big_data/evolution/#architecture-of-hadoop","title":"Architecture of Hadoop","text":"HDFS
The main components of HDFS include: 1. NameNode: is the arbitrator and central repository of file namespace in the cluster. The NameNode executes the operations such as opening, closing, and renaming files and directories. 2. DataNode: manages the storage attached to the node on which it runs. It is responsible for serving all the read and writes requests. It performs operations on instructions on NameNode such as creation, deletion, and replications of blocks. 3. Client: Responsible for getting the required metadata from the NameNode and then communicating with the DataNodes for reads and writes.
YARN YARN stands for \u201cYet Another Resource Negotiator\u201c. It was introduced in Hadoop 2.0 to remove the bottleneck on Job Tracker which was present in Hadoop 1.0. YARN was described as a \u201cRedesigned Resource Manager\u201d at the time of its launching, but it has now evolved to be known as a large-scale distributed operating system used for Big Data processing.
The main components of YARN architecture include: 1. Client: It submits map-reduce (MR) jobs to the resource manager. 2. Resource Manager: It is the master daemon of YARN and is responsible for resource assignment and management among all the applications. Whenever it receives a processing request, it forwards it to the corresponding node manager and allocates resources for the completion of the request accordingly. It has two major components: 1. Scheduler: It performs scheduling based on the allocated application and available resources. It is a pure scheduler, which means that it does not perform other tasks such as monitoring or tracking and does not guarantee a restart if a task fails. The YARN scheduler supports plugins such as Capacity Scheduler and Fair Scheduler to partition the cluster resources. 2. Application manager: It is responsible for accepting the application and negotiating the first container from the resource manager. It also restarts the Application Manager container if a task fails. 3. Node Manager: It takes care of individual nodes on the Hadoop cluster and manages application and workflow and that particular node. Its primary job is to keep up with the Node Manager. It monitors resource usage, performs log management, and also kills a container based on directions from the resource manager. It is also responsible for creating the container process and starting it at the request of the Application master. 4. Application Master: An application is a single job submitted to a framework. The application manager is responsible for negotiating resources with the resource manager, tracking the status, and monitoring the progress of a single application. The application master requests the container from the node manager by sending a Container Launch Context (CLC) which includes everything an application needs to run. Once the application is started, it sends the health report to the resource manager from time-to-time. 5. Container: It is a collection of physical resources such as RAM, CPU cores, and disk on a single node. The containers are invoked by Container Launch Context (CLC) which is a record that contains information such as environment variables, security tokens, dependencies, etc.
SELECT pet.name, comment FROM pet JOIN event ON (pet.name = event.name);SELECT pet.name, comment FROM pet, event WHERE pet.name = event.name;Pig
Output:
\n7,Komal,Nayak,24,9848022334,trivendram\n8,Bharathi,Nambiayar,24,9848022333,Chennai\n5,Trupthi,Mohanthy,23,9848022336,Bhuwaneshwar\n6,Archana,Mishra,23,9848022335,Chennai\n Spark
\nUSE studentDB;\nSHOW TABLES;\nSELECT roll_no, name FROM studentDB.studentDetails WHERE section=\u2019A\u2019 LIMIT 5;\n .avro file) and its schema (the .avsc file) is stored with the data file.This course covers the basics of Big Data and how it has evolved to become what it is today. We will take a look at a few realistic scenarios where Big Data would be a perfect fit. An interesting assignment on designing a Big Data system is followed by understanding the architecture of Hadoop and the tooling around it.
"},{"location":"level101/big_data/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"Writing programs to draw analytics from data.
"},{"location":"level101/big_data/intro/#course-contents","title":"Course Contents","text":"300000 x 10 x 60 x 24 = 432 x 10 ^ 7 events per day.We have covered basic concepts of NoSQL databases. There is much more to learn and do. We hope this course gives you a good start and inspires you to explore further.
"},{"location":"level101/databases_nosql/further_reading/#further-reading","title":"Further reading","text":"NoSQL:
https://hostingdata.co.uk/nosql-database/
https://www.mongodb.com/nosql-explained
https://www.mongodb.com/nosql-explained/nosql-vs-sql
Cap Theorem
http://www.julianbrowne.com/article/brewers-cap-theorem
Scalability
http://www.slideshare.net/jboner/scalability-availability-stability-patterns
Eventual Consistency
https://www.allthingsdistributed.com/2008/12/eventually_consistent.html
https://www.toptal.com/big-data/consistent-hashing
https://web.stanford.edu/class/cs244/papers/chord_TON_2003.pdf
"},{"location":"level101/databases_nosql/intro/","title":"NoSQL Concepts","text":""},{"location":"level101/databases_nosql/intro/#prerequisites","title":"Prerequisites","text":"At the end of training, you will have an understanding of what a NoSQL database is, what kind of advantages or disadvantages it has over traditional RDBMS, learn about different types of NoSQL databases and understand some of the underlying concepts & trade-offs w.r.t to NoSQL.
"},{"location":"level101/databases_nosql/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"We will not be deep diving into any specific NoSQL database.
"},{"location":"level101/databases_nosql/intro/#course-contents","title":"Course Contents","text":"When people use the term \u201cNoSQL database\u201d, they typically use it to refer to any non-relational database. Some say the term \u201cNoSQL\u201d stands for \u201cnon SQL\u201d while others say it stands for \u201cnot only SQL.\u201d Either way, most agree that NoSQL databases are databases that store data in a format other than relational tables.
A common misconception is that NoSQL databases or non-relational databases don\u2019t store relationship data well. NoSQL databases can store relationship data\u2014they just store it differently than relational databases do. In fact, when compared with SQL databases, many find modeling relationship data in NoSQL databases to be easier, because related data doesn\u2019t have to be split between tables.
Such databases have existed since the late 1960s, but the name \"NoSQL\" was only coined in the early 21st century. NASA used a NoSQL database to track inventory for the Apollo mission. NoSQL databases emerged in the late 2000s as the cost of storage dramatically decreased. Gone were the days of needing to create a complex, difficult-to-manage data model simply for the purposes of reducing data duplication. Developers (rather than storage) were becoming the primary cost of software development, so NoSQL databases optimized for developer productivity. With the rise of Agile development methodology, NoSQL databases were developed with a focus on scaling, fast performance and at the same time allowed for frequent application changes and made programming easier.
"},{"location":"level101/databases_nosql/intro/#types-of-nosql-databases","title":"Types of NoSQL databases:","text":"Over time due to the way these NoSQL databases were developed to suit requirements at different companies, we ended up with quite a few types of them. However, they can be broadly classified into 4 types. Some of the databases can overlap between different types. They are:
Document databases: They store data in documents similar to JSON (JavaScript Object Notation) objects. Each document contains pairs of fields and values. The values can typically be a variety of types including things like strings, numbers, booleans, arrays, or objects, and their structures typically align with objects developers are working with in code. The advantages include intuitive data model & flexible schemas. Because of their variety of field value types and powerful query languages, document databases are great for a wide variety of use cases and can be used as a general purpose database. They can horizontally scale-out to accomodate large data volumes. Ex: MongoDB, Couchbase
Key-Value databases: These are a simpler type of databases where each item contains keys and values. A value can typically only be retrieved by referencing its key, so learning how to query for a specific key-value pair is typically simple. Key-value databases are great for use cases where you need to store large amounts of data but you don\u2019t need to perform complex queries to retrieve it. Common use cases include storing user preferences or caching. Ex: Redis, DynamoDB, Voldemort/Venice (Linkedin).
Wide-Column stores: They store data in tables, rows, and dynamic columns. Wide-column stores provide a lot of flexibility over relational databases because each row is not required to have the same columns. Many consider wide-column stores to be two-dimensional key-value databases. Wide-column stores are great for when you need to store large amounts of data and you can predict what your query patterns will be. Wide-column stores are commonly used for storing Internet of Things data and user profile data. Cassandra and HBase are two of the most popular wide-column stores.
The table below summarizes the main differences between SQL and NoSQL databases.
SQL Databases NoSQL Databases Data Storage Model Tables with fixed rows and columns Document: JSON documents, Key-value: key-value pairs, Wide-column: tables with rows and dynamic columns, Graph: nodes and edges Primary Purpose General purpose Document: general purpose, Key-value: large amounts of data with simple lookup queries, Wide-column: large amounts of data with predictable query patterns, Graph: analyzing and traversing relationships between connected data Schemas Rigid Flexible Scaling Vertical (scale-up with a larger server) Horizontal (scale-out across commodity servers) Multi-Record ACID Transactions Supported Most do not support multi-record ACID transactions. However, some like MongoDB do. Joins Typically required Typically not required Data to Object Mapping Requires ORM (object-relational mapping) Many do not require ORMs. Document DB documents map directly to data structures in most popular programming languages."},{"location":"level101/databases_nosql/intro/#advantages","title":"Advantages","text":"Flexible Data Models
Most NoSQL systems feature flexible schemas. A flexible schema means you can easily modify your database schema to add or remove fields to support for evolving application requirements. This facilitates with continuous application development of new features without database operation overhead.
Horizontal Scaling
Most NoSQL systems allow you to scale horizontally, which means you can add in cheaper & commodity hardware, whenever you want to scale a system. On the other hand, SQL systems generally scale Vertically (a more powerful server). NoSQL systems can also host huge datasets when compared to traditional SQL systems.
Fast Queries
NoSQL can generally be a lot faster than traditional SQL systems due to data denormalization and horizontal scaling. Most NoSQL systems also tend to store similar data together facilitating faster query responses.
Developer productivity
NoSQL systems tend to map data based on the programming data structures. As a result, developers need to perform fewer data transformations leading to increased productivity & fewer bugs.
Lets looks at some of the key concepts when we talk about NoSQL or distributed systems.
"},{"location":"level101/databases_nosql/key_concepts/#cap-theorem","title":"CAP Theorem","text":"In a keynote titled \u201cTowards Robust Distributed Systems\u201d at ACM\u2019s PODC symposium in 2000, Eric Brewer came up with the so-called CAP-theorem which is widely adopted today by large web companies as well as in the NoSQL community. The CAP acronym stands for Consistency, Availability & Partition Tolerance.
Consistency
It refers to how consistent a system is after an execution. A distributed system is called consistent when a write made by a source is available for all readers of that shared data. Different NoSQL systems support different levels of consistency.
Availability
It refers to how a system responds to loss of functionality of different systems due to hardware and software failures. A high availability implies that a system is still available to handle operations (reads and writes) when a certain part of the system is down due to a failure or upgrade.
Partition Tolerance
It is the ability of the system to continue operations in the event of a network partition. A network partition occurs when a failure causes two or more islands of networks where the systems can\u2019t talk to each other across the islands temporarily or permanently.
Brewer alleges that one can at most choose two of these three characteristics in a shared-data system. The CAP-theorem states that a choice can only be made for two options out of consistency, availability and partition tolerance. A growing number of use cases in large scale applications tend to value reliability implying that availability & redundancy are more valuable than consistency. As a result these systems struggle to meet ACID properties. They attain this by loosening on the consistency requirement, i.e Eventual Consistency.
Eventual Consistency means that all readers will see writes, as time goes on: \u201cIn a steady state, the system will eventually return the last written value\u201d. Clients therefore may face an inconsistent state of data as updates are in progress. For instance, in a replicated database updates may go to one node which replicates the latest version to all other nodes that contain a replica of the modified dataset so that the replica nodes eventually will have the latest version.
NoSQL systems support different levels of eventual consistency models. For example:
Read Your Own Writes Consistency
Clients will see their updates immediately after they are written. The reads can hit nodes other than the one where it was written. However, they might not see updates by other clients immediately.
Session Consistency
Clients will see the updates to their data within a session scope. This generally indicates that reads & writes occur on the same server. Other clients using the same nodes will receive the same updates.
Casual Consistency
A system provides causal consistency if the following condition holds: write operations that are related by potential causality are seen by each process of the system in order. Different processes may observe concurrent writes in different orders
Eventual consistency is useful if concurrent updates of the same partitions of data are unlikely and if clients do not immediately depend on reading updates issued by themselves or by other clients.
Depending on what consistency model was chosen for the system (or parts of it), determines where the requests are routed, ex: replicas.
CAP alternatives illustration
Choice Traits Examples Consistency + Availability(Forfeit Partitions) 2-phase commits
Cache invalidation protocols Single-site databases Cluster databases
LDAP
xFS file system Consistency + Partition tolerance
(Forfeit Availability) Pessimistic locking
Make minority partitions unavailable Distributed databases Distributed locking Majority protocols Availability + Partition tolerance (Forfeit Consistency) expirations/leases
conflict resolution optimistic DNS
Web caching"},{"location":"level101/databases_nosql/key_concepts/#versioning-of-data-in-distributed-systems","title":"Versioning of Data in distributed systems","text":"
When data is distributed across nodes, it can be modified on different nodes at the same time (assuming strict consistency is enforced). Questions arise on conflict resolution for concurrent updates. Some of the popular conflict resolution mechanism are
Timestamps
This is the most obvious solution. You sort updates based on chronological order and choose the latest update. However, this relies on clock synchronization across different parts of the infrastructure. This gets even more complicated when parts of systems are spread across different geographic locations.
Optimistic Locking
You associate a unique value like a clock or counter with every data update. When a client wants to update data, it has to specify which version of data needs to be updated. This would mean you need to keep track of history of the data versions.
Vector Clocks
A vector clock is defined as a tuple of clock values from each node. In a distributed environment, each node maintains a tuple of such clock values which represent the state of the nodes itself and its peers/replicas. A clock value may be real timestamps derived from local clock or version no.
Vector clocks illustration
Vector clocks have the following advantages over other conflict resolution mechanism:
No need to store and maintain multiple versions of the data on different nodes.** **
"},{"location":"level101/databases_nosql/key_concepts/#partitioning","title":"Partitioning","text":"When the amount of data crosses the capacity of a single node, we need to think of splitting data, creating replicas for load balancing & disaster recovery. Depending on how dynamic the infrastructure is, we have a few approaches that we can take.
Memory cached
These are partitioned in-memory databases that are primarily used for transient data. These databases are generally used as a front for traditional RDBMS. Most frequently used data is replicated from a RDBMS into a memory database to facilitate fast queries and to take the load off from backend DB\u2019s. A very common example is Memcached or Couchbase.
Clustering
Traditional cluster mechanisms abstract away the cluster topology from clients. A client need not know where the actual data is residing and which node it is talking to. Clustering is very commonly used in traditional RDBMS where it can help scaling the persistent layer to a certain extent.
Separating reads from writes
In this method, you will have multiple replicas hosting the same data. The incoming writes are typically sent to a single node (Leader) or multiple nodes (multi-Leader), while the rest of the replicas (Follower) handle reads requests. The leader replicates writes asynchronously to all followers. However, the write lag can\u2019t be completely avoided. Sometimes a leader can crash before it replicates all the data to a follower. When this happens, a follower with the most consistent data can be turned into a leader. As you can realize now, it is hard to enforce full consistency in this model. You also need to consider the ratio of read vs write traffic. This model won\u2019t make sense when writes are higher than reads. The replication methods can also vary widely. Some systems do a complete transfer of state periodically, while others use a delta state transfer approach. You could also transfer the state by transferring the operations in order. The followers can then apply the same operations as the leader to catch up.
Sharding
Sharing refers to dividing data in such a way that data is distributed evenly (both in terms of storage & processing power) across a cluster of nodes. It can also imply data locality, which means similar & related data is stored together to facilitate faster access. A shard in turn can be further replicated to meet load balancing or disaster recovery requirements. A single shard replica might take in all writes (single leader) or multiple replicas can take writes (multi-leader). Reads can be distributed across multiple replicas. Since data is now distributed across multiple nodes, clients should be able to consistently figure out where data is hosted. We will look at some of the common techniques below. The downside of sharding is that joins between shards is not possible. So an upstream/downstream application has to aggregate the results from multiple shards.
Sharding example
"},{"location":"level101/databases_nosql/key_concepts/#hashing","title":"Hashing","text":"A hash function is a function that maps one piece of data\u2014typically describing some kind of object, often of arbitrary size\u2014to another piece of data, typically an integer, known as hash code, or simply hash. In a partitioned database, it is important to consistently map a key to a server/replica.
For ex: you can use a very simple hash as a modulo function.
_p = k mod n_\n Where
p -> partition,\n\n\nk -> primary key\n\n\nn -> no of nodes\n The downside of this simple hash is that, whenever the cluster topology changes, the data distribution also changes. When you are dealing with memory caches, it will be easy to distribute partitions around. Whenever a node joins/leaves a topology, partitions can reorder themselves, a cache miss can be re-populated from backend DB. However, when you look at persistent data, it is not possible as the new node doesn\u2019t have the data needed to serve it. This brings us to consistent hashing.
"},{"location":"level101/databases_nosql/key_concepts/#consistent-hashing","title":"Consistent Hashing","text":"Consistent hashing is a distributed hashing scheme that operates independently of the number of servers or objects in a distributed hash table by assigning them a position on an abstract circle, or hash ring. This allows servers and objects to scale without affecting the overall system.
Say that our hash function h() generates a 32-bit integer. Then, to determine to which server we will send a key k, we find the server s whose hash h(s) is the smallest integer that is larger than h(k). To make the process simpler, we assume the table is circular, which means that if we cannot find a server with a hash larger than h(k), we wrap around and start looking from the beginning of the array.
Consistent hashing illustration
In consistent hashing, when a server is removed or added, then only the keys from that server are relocated. For example, if server S3 is removed then, all keys from server S3 will be moved to server S4 but keys stored on server S4 and S2 are not relocated. But there is one problem, when server S3 is removed then keys from S3 are not equally distributed among remaining servers S4 and S2. They are only assigned to server S4 which increases the load on server S4.
To evenly distribute the load among servers when a server is added or removed, it creates a fixed number of replicas (known as virtual nodes) of each server and distributes it along the circle. So instead of server labels S1, S2 and S3, we will have S10,S11,\u2026,S19, S20,S21,\u2026,S29 and S30,S31,\u2026,S39. The factor for a number of replicas is also known as weight, depending on the situation.
All keys which are mapped to replicas Sij are stored on server Si. To find a key, we do the same thing, find the position of the key on the circle and then move forward until you find a server replica. If the server replica is Sij, then the key is stored in server Si.
Suppose server S3 is removed, then all S3 replicas with labels S30,S31,\u2026,S39 must be removed. Now, the objects keys adjacent to S3X labels will be automatically re-assigned to S1X, S2X and S4X. All keys originally assigned to S1, S2 & S4 will not be moved.
Similar things happen if we add a server. Suppose we want to add a server S5 as a replacement of S3, then we need to add labels S50,S51,\u2026,S59. In the ideal case, one-fourth of keys from S1, S2 and S4 will be reassigned to S5.
When applied to persistent storages, further issues arise: if a node has left the scene, data stored on this node becomes unavailable, unless it has been replicated to other nodes before; in the opposite case of a new node joining the others, adjacent nodes are no longer responsible for some pieces of data which they still store but not get asked for anymore as the corresponding objects are no longer hashed to them by requesting clients. In order to address this issue, a replication factor (r) can be introduced.
Introducing replicas in a partitioning scheme\u2014besides reliability benefits\u2014also makes it possible to spread workload for read requests that can go to any physical node responsible for a requested piece of data. Scalability doesn\u2019t work if the clients have to decide between multiple versions of the dataset, because they need to read from a quorum of servers which in turn reduces the efficiency of load balancing.
"},{"location":"level101/databases_nosql/key_concepts/#quorum","title":"Quorum","text":"Quorum is the minimum number of nodes in a cluster that must be online and be able to communicate with each other. If any additional node failure occurs beyond this threshold, the cluster will stop running.
To attain a quorum, you need a majority of the nodes. Commonly, it is (N/2 + 1), where N is the total no of nodes in the system. For example,
In a 3-node cluster, you need 2 nodes for a majority.
In a 5-node cluster, you need 3 nodes for a majority.
In a 6-node cluster, you need 4 nodes for a majority.
Quorum example
Network problems can cause communication failures among cluster nodes. One set of nodes might be able to communicate together across a functioning part of a network but not be able to communicate with a different set of nodes in another part of the network. This is known as split brain in cluster or cluster partitioning.
Now the partition which has quorum is allowed to continue running the application. The other partitions are removed from the cluster.
Eg: In a 5-node cluster, consider what happens if nodes 1, 2, and 3 can communicate with each other but not with nodes 4 and 5. Nodes 1, 2, and 3 constitute a majority, and they continue running as a cluster. Nodes 4 and 5, being a minority, stop running as a cluster. If node 3 loses communication with other nodes, all nodes stop running as a cluster. However, all functioning nodes will continue to listen for communication, so that when the network begins working again, the cluster can form and begin to run.
Below diagram demonstrates Quorum selection on a cluster partitioned into two sets.
Cluster Quorum example
"},{"location":"level101/databases_sql/backup_recovery/","title":"Backup and Recovery","text":""},{"location":"level101/databases_sql/backup_recovery/#backup-and-recovery","title":"Backup and Recovery","text":"Backups are a very crucial part of any database setup. They are generally a copy of the data that can be used to reconstruct the data in case of any major or minor crisis with the database. In general terms, backups can be of two types:
Both the above kinds of backups are supported by MySQL with different tools. It is the job of the SRE to identify which should be used when.
"},{"location":"level101/databases_sql/backup_recovery/#mysqldump","title":"Mysqldump","text":"This utility is available with MySQL installation. It helps in getting the logical backup of the database. It outputs a set of SQL statements to reconstruct the data. It is not recommended to use mysqldump for large tables as it might take a lot of time and the file size will be huge. However, for small tables it is the best and the quickest option.
mysqldump [options] > dump_output.sql\n There are certain options that can be used with mysqldump to get an appropriate dump of the database.
To dump all the databases:
mysqldump -u<user> -p<pwd> --all-databases > all_dbs.sql\n To dump specific databases:
mysqldump -u<user> -p<pwd> --databases db1 db2 db3 > dbs.sql\n To dump a single database:
mysqldump -u<user> -p<pwd> --databases db1 > db1.sql\n OR
mysqldump -u<user> -p<pwd> db1 > db1.sql\n The difference between the above two commands is that the latter one does not contain the CREATE DATABASE command in the backup output.
To dump specific tables in a database:
mysqldump -u<user> -p<pwd> db1 table1 table2 > db1_tables.sql\n To dump only table structures and no data:
mysqldump -u<user> -p<pwd> --no-data db1 > db1_structure.sql\n To dump only table data and no CREATE statements:
mysqldump -u<user> -p<pwd> --no-create-info db1 > db1_data.sql\n To dump only specific records from a table:
mysqldump -u<user> -p<pwd> --no-create-info db1 table1 --where=\u201dsalary>80000\u201d > db1_table1_80000.sql\n mysqldump can also provide output in CSV, other delimited text or XML format to support use-cases if any. The backup from mysqldump utility is offline, i.e. when the backup finishes it will not have the changes to the database which were made when the backup was going on. For example, if the backup started at 3:00 pm and finished at 4:00 pm, it will not have the changes made to the database between 3:00 and 4:00 pm.
Restoring from mysqldump can be done in the following two ways:
From shell
mysql -u<user> -p<pwd> < all_dbs.sql\n OR
From shell, if the database is already created:
mysql -u<user> -p<pwd> db1 < db1.sql\n From within MySQL shell:
mysql> source all_dbs.sql\n"},{"location":"level101/databases_sql/backup_recovery/#percona-xtrabackup","title":"Percona XtraBackup","text":"This utility is installed separately from the MySQL server and is open source, provided by Percona. It helps in getting the full or partial physical backup of the database. It provides online backup of the database, i.e. it will have the changes made to the database when the backup was going on as explained at the end of the previous section.
Percona XtraBackup allows us to get both full and incremental backups as we desire. However, incremental backups take less space than a full backup (if taken per day) but the restore time of incremental backups is more than that of full backups.
Creating a full backup
xtrabackup --defaults-file=<location to my.cnf> --user=<mysql user> --password=<mysql password> --backup --target-dir=<location of target directory>\n Example:
xtrabackup --defaults-file=/etc/my.cnf --user=some_user --password=XXXX --backup --target-dir=/mnt/data/backup/\n Some other options
--stream - can be used to stream the backup files to standard output in a specified format. xbstream is the only option for now.--tmp-dir - set this to a tmp directory to be used for temporary files while taking backups.--parallel - set this to the number of threads that can be used to parallely copy data files to target directory.--compress - by default - quicklz is used. Set this to have the backup in compressed format. Each file is a .qp compressed file and can be extracted by qpress file archiver.--decompress - decompresses all the files which were compressed with the .qp extension. It will not delete the .qp files after decompression. To do that, use --remove-original along with this. Please note that the decompress option should be run separately from the xtrabackup command that used the compress option.Preparing a backup
Once the backup is done with the --backup option, we need to prepare it in order to restore it. This is done to make the data files consistent with point-in-time. There might have been some transactions going on while the backup was being executed and those have changed the data files. When we prepare a backup, all those transactions are applied to the data files.
xtrabackup --prepare --target-dir=<where backup is taken>\n Example:
xtrabackup --prepare --target-dir=/mnt/data/backup/\n It is not recommended to halt a process which is preparing the backup as that might cause data file corruption and backup cannot be used further. The backup will have to be taken again.
Restoring a Full Backup
To restore the backup which is created and prepared from above commands, just copy everything from the backup target-dir to the data-dir of MySQL server, change the ownership of all files to MySQL user (the Linux user used by MySQL server) and start MySQL.
Or the below command can be used as well,
xtrabackup --defaults-file=/etc/my.cnf --copy-back --target-dir=/mnt/data/backups/\n Note - the backup has to be prepared in order to restore it.
Creating Incremental backups
Percona XtraBackup helps create incremental backups, i.e, only the changes can be backed up since the last backup. Every InnoDB page contains a log sequence number or LSN that is also mentioned as one of the last lines of backup and prepare commands.
xtrabackup: Transaction log of lsn <LSN> to <LSN> was copied.\n OR
InnoDB: Shutdown completed; log sequence number <LSN>\n<timestamp> completed OK!\n This indicates that the backup has been taken till the log sequence number mentioned. This is a key information in understanding incremental backups and working towards automating one. Incremental backups do not compare data files for changes, instead, they go through the InnoDB pages and compare their LSN to the last backup\u2019s LSN. So, without one full backup, the incremental backups are useless.
The xtrabackup command creates a xtrabackup_checkpoint file which has the information about the LSN of the backup. Below are the key contents of the file:
backup_type = full-backuped | incremental\nfrom_lsn = 0 (full backup) | to_lsn of last backup <LSN>\nto_lsn = <LSN>\nlast_lsn = <LSN>\n There is a difference between to_lsn and last_lsn. When the last_lsn is more than to_lsn that means there are transactions that ran while we took the backup and are yet to be applied. That is what --prepare is used for.
To take incremental backups, first, we require one full backup.
xtrabackup --defaults-file=/etc/my.cnf --user=some_user --password=XXXX --backup --target-dir=/mnt/data/backup/full/\n Let\u2019s assume the contents of the xtrabackup_checkpoint file to be as follows:
backup_type = full-backuped\nfrom_lsn = 0\nto_lsn = 1000\nlast_lsn = 1000\n Now that we have one full backup, we can have an incremental backup that takes the changes. We will go with differential incremental backups.
xtrabackup --defaults-file=/etc/my.cnf --user=some_user --password=XXXX --backup --target-dir=/mnt/data/backup/incr1/ --incremental-basedir=/mnt/data/backup/full/\n There are delta files created in the incr1 directory like, ibdata1.delta, db1/tbl1.ibd.delta with the changes from the full directory. The xtrabackup_checkpoint file will thus have the following contents.
backup_type = incremental\nfrom_lsn = 1000\nto_lsn = 1500\nlast_lsn = 1500\n Hence, the from_lsn here is equal to the to_lsn of the last backup or the basedir provided for the incremental backups. For the next incremental backup, we can use this incremental backup as the basedir.
xtrabackup --defaults-file=/etc/my.cnf --user=some_user --password=XXXX --backup --target-dir=/mnt/data/backup/incr2/ --incremental-basedir=/mnt/data/backup/incr1/\n The xtrabackup_checkpoint file will thus have the following contents:
backup_type = incremental\nfrom_lsn = 1500\nto_lsn = 2000\nlast_lsn = 2200\n Preparing Incremental backups
Preparing incremental backups is not the same as preparing a full backup. When prepare runs, two operations are performed - committed transactions are applied on the data files and uncommitted transactions are rolled back. While preparing incremental backups, we have to skip rollback of uncommitted transactions as it is likely that they might get committed in the next incremental backup. If we rollback uncommitted transactions, the further incremental backups cannot be applied.
We use --apply-log-only option along with --prepare to avoid the rollback phase.
From the last section, we had the following directories with complete backup:
/mnt/data/backup/full\n/mnt/data/backup/incr1\n/mnt/data/backup/incr2\n First, we prepare the full backup, but only with the --apply-log-only option.
xtrabackup --prepare --apply-log-only --target-dir=/mnt/data/backup/full\n The output of the command will contain the following at the end.
InnoDB: Shutdown complete; log sequence number 1000\n<timestamp> Completed OK!\n Note the LSN mentioned at the end is the same as the to_lsn from the xtrabackup_checkpoint created for full backup.
Next, we apply the changes from the first incremental backup to the full backup.
xtrabackup --prepare --apply-log-only --target-dir=/mnt/data/backup/full --incremental-dir=/mnt/data/backup/incr1\n This applies the delta files in the incremental directory to the full backup directory. It rolls the data files in the full backup directory forward to the time of incremental backup and applies the redo logs as usual.
Lastly, we apply the last incremental backup same as the previous one with just a small change.
xtrabackup --prepare --target-dir=/mnt/data/backup/full --incremental-dir=/mnt/data/backup/incr1\n We do not have to use the --apply-log-only option with it. It applies the incr2 delta files to the full backup data files taking them forward, applies redo logs on them and finally rollbacks the uncommitted transactions to produce the final result. The data now present in the full backup directory can now be used to restore.
Note: To create cumulative incremental backups, the incremental-basedir should always be the full backup directory for every incremental backup. While preparing, we can start with the full backup with the --apply-log-only option and use just the last incremental backup for the final --prepare as that has all the changes since the full backup.
Restoring Incremental backups
Once all the above steps are completed, restoring is the same as done for a full backup.
"},{"location":"level101/databases_sql/backup_recovery/#further-reading","title":"Further Reading","text":"ACID properties
Set of properties that guarantee data integrity of DB transactions
Let\u2019s take some examples to illustrate the above properties.
A query language to interact with and manage data.
CRUD operations\u2014create, read, update, delete queries
Management operations\u2014create DBs/tables/indexes, backup, import/export, users, access controls, etc
Exercise: Classify the below queries into the four types\u2014DDL (definition), DML (manipulation), DCL (control) and TCL (transactions) and explain in detail.
insert, create, drop, delete, update, commit, rollback, truncate, alter, grant, revoke\n You can practise these in the lab section.
Constraints
Rules for data that can be stored. Query fails if you violate any of these defined on a table.
Primary key: One or more columns that contain UNIQUE values, and cannot contain NULL values. A table can have only ONE primary key. An index on it is created by default.
Foreign key: Links two tables together. Its value(s) match a primary key in a different table
Not null: Does not allow null values
Unique: Value of column must be unique across all rows
Default: Provides a default value for a column if none is specified during insert
Check: Allows only particular values (like Balance >= 0)
Indexes
Most indexes use B+ tree structure.
Why use them: Speeds up queries (in large tables that fetch only a few rows, min/max queries, by eliminating rows from consideration, etc)
Types of indexes: unique, primary key, fulltext, secondary
Write-heavy loads, mostly full table scans or accessing large number of rows, etc. do not benefit from indexes
Joins
Allows you to fetch related data from multiple tables, linking them together with some common field. Powerful but also resource-intensive and makes scaling databases difficult. This is the cause of many slow performing queries when run at scale, and the solution is almost always to find ways to reduce the joins.
Access control
DBs have privileged accounts for admin tasks, and regular accounts for clients. There are fine-grained controls on what actions (DDL, DML, etc. discussed earlier) are allowed for these accounts.
DB first verifies the user credentials (authentication), and then examines whether this user is permitted to perform the request (authorization) by looking up these information in some internal tables.
Other controls include activity auditing that allows examining the history of actions done by a user, and resource limits which define the number of queries, connections, etc. allowed.
Commercial, closed source: Oracle, Microsoft SQL Server, IBM DB2
Open source with optional paid support: MySQL, MariaDB, PostgreSQL
Individuals and small companies have always preferred open source DBs because of the huge cost associated with commercial software.
In recent times, even large organizations have moved away from commercial software to open source alternatives because of the flexibility and cost savings associated with it.
Lack of support is no longer a concern because of the paid support available from the developer and third parties.
MySQL is the most widely used open source DB, and it is widely supported by hosting providers, making it easy for anyone to use. It is part of the popular Linux-Apache-MySQL-PHP (LAMP) stack that became popular in the 2000s. We have many more choices for a programming language, but the rest of that stack is still widely used.
"},{"location":"level101/databases_sql/conclusion/","title":"Conclusion","text":"We have covered basic concepts of SQL databases. We have also covered some of the tasks that an SRE may be responsible for\u2014there is so much more to learn and do. We hope this course gives you a good start and inspires you to explore further.
"},{"location":"level101/databases_sql/conclusion/#further-reading","title":"Further reading","text":"General purpose, row level locking, ACID support, transactions, crash recovery and multi-version concurrency control, etc.
"},{"location":"level101/databases_sql/innodb/#architecture","title":"Architecture","text":""},{"location":"level101/databases_sql/innodb/#key-components","title":"Key components:","text":"Memory:
Log buffer: Holds log data before flush to disk.
Size of each above memory is configurable, and impacts performance a lot. Requires careful analysis of workload, available resources, benchmarking and tuning for optimal performance.
Disk:
You will have an understanding of what relational databases are, their advantages, and some MySQL specific concepts.
"},{"location":"level101/databases_sql/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"In-depth implementation details
Advanced topics like normalization, sharding
Specific tools for administration
The main purpose of database systems is to manage data. This includes storage, adding new data, deleting unused data, updating existing data, retrieving data within a reasonable response time, other maintenance tasks to keep the system running, etc.
"},{"location":"level101/databases_sql/intro/#pre-reads","title":"Pre-reads","text":"RDBMS Concepts
"},{"location":"level101/databases_sql/intro/#course-contents","title":"Course Contents","text":"Prerequisites
Install Docker
Setup
Create a working directory named sos or something similar, and cd into it.
Enter the following into a file named my.cnf under a directory named custom:
sos $ cat custom/my.cnf\n[mysqld]\n\n# These settings apply to MySQL server\n# You can set port, socket path, buffer size etc.\n# Below, we are configuring slow query settings\n\nslow_query_log=1\nslow_query_log_file=/var/log/mysqlslow.log\nlong_query_time=1\n Start a container and enable slow query log with the following:
sos $ docker run --name db -v custom:/etc/mysql/conf.d -e MYSQL_ROOT_PASSWORD=realsecret -d mysql:8\nsos $ docker cp custom/my.cnf $(docker ps -qf \"name=db\"):/etc/mysql/conf.d/custom.cnf\nsos $ docker restart $(docker ps -qf \"name=db\")\n Import a sample database:
sos $ git clone git@github.com:datacharmer/test_db.git\nsos $ docker cp test_db $(docker ps -qf \"name=db\"):/home/test_db/\nsos $ docker exec -it $(docker ps -qf \"name=db\") bash\nroot@3ab5b18b0c7d:/# cd /home/test_db/\nroot@3ab5b18b0c7d:/# mysql -uroot -prealsecret mysql < employees.sql\nroot@3ab5b18b0c7d:/etc# touch /var/log/mysqlslow.log\nroot@3ab5b18b0c7d:/etc# chown mysql:mysql /var/log/mysqlslow.log\n Workshop 1: Run some sample queries
Run the following:
$ mysql -uroot -prealsecret mysql\nmysql>\n\n# inspect DBs and tables\n# the last 4 are MySQL internal DBs\n\nmysql> SHOW DATABASES;\n+--------------------+\n| Database |\n+--------------------+\n| employees |\n| information_schema |\n| mysql |\n| performance_schema |\n| sys |\n+--------------------+\n\nmysql> USE employees;\nmysql> SHOW TABLES;\n+----------------------+\n| Tables_in_employees |\n+----------------------+\n| current_dept_emp |\n| departments |\n| dept_emp |\n| dept_emp_latest_date |\n| dept_manager |\n| employees |\n| salaries |\n| titles |\n+----------------------+\n\n# read a few rows\nmysql> SELECT * FROM employees LIMIT 5;\n\n# filter data by conditions\nmysql> SELECT COUNT(*) FROM employees WHERE gender = 'M' LIMIT 5;\n\n# find count of particular data\nmysql> SELECT COUNT(*) FROM employees WHERE first_name = 'Sachin'; \n Workshop 2: Use explain and explain analyze to profile a query, identify and add indexes required for improving performance
# View all indexes on table \n# (\\G is to output horizontally, replace it with a ; to get table output)\n\nmysql> SHOW INDEX FROM employees FROM employees\\G\n*************************** 1. row ***************************\n Table: employees\n Non_unique: 0\n Key_name: PRIMARY\n Seq_in_index: 1\n Column_name: emp_no\n Collation: A\n Cardinality: 299113\n Sub_part: NULL\n Packed: NULL\n Null:\n Index_type: BTREE\n Comment:\nIndex_comment:\n Visible: YES\n Expression: NULL\n\n# This query uses an index, identified by 'key' field\n# By prefixing explain keyword to the command, \n# we get query plan (including key used)\n\nmysql> EXPLAIN SELECT * FROM employees WHERE emp_no < 10005\\G\n*************************** 1. row ***************************\n id: 1\n select_type: SIMPLE\n table: employees\n partitions: NULL\n type: range\npossible_keys: PRIMARY\n key: PRIMARY\n key_len: 4\n ref: NULL\n rows: 4\n filtered: 100.00\n Extra: Using where\n\n# Compare that to the next query which does not utilize any index\n\nmysql> EXPLAIN SELECT first_name, last_name FROM employees WHERE first_name = 'Sachin'\\G\n*************************** 1. row ***************************\n id: 1\n select_type: SIMPLE\n table: employees\n partitions: NULL\n type: ALL\npossible_keys: NULL\n key: NULL\n key_len: NULL\n ref: NULL\n rows: 299113\n filtered: 10.00\n Extra: Using where\n\n# Let's see how much time this query takes\n\nmysql> EXPLAIN ANALYZE SELECT first_name, last_name FROM employees WHERE first_name = 'Sachin'\\G\n*************************** 1. row ***************************\nEXPLAIN: -> Filter: (employees.first_name = 'Sachin') (cost=30143.55 rows=29911) (actual time=28.284..3952.428 rows=232 loops=1)\n -> Table scan on employees (cost=30143.55 rows=299113) (actual time=0.095..1996.092 rows=300024 loops=1)\n\n\n# Cost (estimated by query planner) is 30143.55\n# actual time=28.284ms for first row, 3952.428 for all rows\n# Now lets try adding an index and running the query again\n\nmysql> CREATE INDEX idx_firstname ON employees(first_name);\nQuery OK, 0 rows affected (1.25 sec)\nRecords: 0 Duplicates: 0 Warnings: 0\n\nmysql> EXPLAIN ANALYZE SELECT first_name, last_name FROM employees WHERE first_name = 'Sachin';\n+--------------------------------------------------------------------------------------------------------------------------------------------+\n| EXPLAIN |\n+--------------------------------------------------------------------------------------------------------------------------------------------+\n| -> Index lookup on employees using idx_firstname (first_name='Sachin') (cost=81.20 rows=232) (actual time=0.551..2.934 rows=232 loops=1)\n |\n+--------------------------------------------------------------------------------------------------------------------------------------------+\n1 row in set (0.01 sec)\n\n# Actual time=0.551ms for first row\n# 2.934ms for all rows. A huge improvement!\n# Also notice that the query involves only an index lookup,\n# and no table scan (reading all rows of the table),\n# which vastly reduces load on the DB.\n Workshop 3: Identify slow queries on a MySQL server
# Run the command below in two terminal tabs to open two shells into the container.\n\n$ docker exec -it $(docker ps -qf \"name=db\") bash\n\n# Open a `mysql` prompt in one of them and execute this command\n# We have configured to log queries that take longer than 1s,\n# so this `sleep(3)` will be logged\n\n$ mysql -uroot -prealsecret mysql\nmysql> select sleep(3);\n\n# Now, in the other terminal, tail the slow log to find details about the query\n\nroot@62c92c89234d:/etc# tail -f /var/log/mysqlslow.log\n/usr/sbin/mysqld, Version: 8.0.21 (MySQL Community Server - GPL). started with:\nTcp port: 3306 Unix socket: /var/run/mysqld/mysqld.sock\nTime Id Command Argument\n\n# Time: 2020-11-26T14:53:44.822348Z\n# User@Host: root[root] @ localhost [] Id: 9\n# Query_time: 5.404938 Lock_time: 0.000000 Rows_sent: 1 Rows_examined: 1\nuse employees;\n# Time: 2020-11-26T14:53:58.015736Z\n# User@Host: root[root] @ localhost [] Id: 9\n# Query_time: 10.000225 Lock_time: 0.000000 Rows_sent: 1 Rows_examined: 1\n\nSET timestamp=1606402428;\nselect sleep(3);\n These were simulated examples with minimal complexity. In real life, the queries would be much more complex and the explain/analyze and slow query logs would have more details.
"},{"location":"level101/databases_sql/mysql/","title":"MySQL","text":""},{"location":"level101/databases_sql/mysql/#mysql-architecture","title":"MySQL architecture","text":"MySQL architecture enables you to select the right storage engine for your needs, and abstracts away all implementation details from the end users (application engineers and DBA) who only need to know a consistent stable API.
Application layer:
SHOW PRIVILEGES command)Server layer:
EXPLAIN command)Storage engine options:
It is possible to migrate from one storage engine to another. But this migration locks tables for all operations and is not online, as it changes the physical layout of the data. It takes a long time and is generally not recommended. Hence, choosing the right storage engine at the beginning is important.
General guideline is to use InnoDB unless you have a specific need for one of the other storage engines.
Running mysql> SHOW ENGINES; shows you the supported engines on your MySQL server.
Explain and explain+analyze
EXPLAIN <query> analyzes query plans from the optimizer, including how tables are joined, which tables/rows are scanned, etc.
EXPLAIN ANALYZE shows the above and additional info like execution cost, number of rows returned, time taken, etc.
This knowledge is useful to tweak queries and add indexes.
Watch this performance tuning tutorial video.
Checkout the lab section for a hands-on about indexes.
Slow query logs
Used to identify slow queries (configurable threshold), enabled in config or dynamically with a query.
Checkout the lab section about identifying slow queries.
User management
This includes creation and changes to users, like managing privileges, changing password etc.
Backup and restore strategies, pros and cons
Logical backup using mysqldump - slower but can be done online
Physical backup (copy data directory or use XtraBackup) - quick backup/recovery. Copying data directory requires locking or shut down. XtraBackup is an improvement because it supports backups without shutting down (hot backup).
Others - PITR, snapshots etc.
Crash recovery process using redo logs
After a crash, when you restart server, it reads redo logs and replays modifications to recover
Monitoring MySQL
Key MySQL metrics: reads, writes, query runtime, errors, slow queries, connections, running threads, InnoDB metrics
Key OS metrics: CPU, load, memory, disk I/O, network
Replication
Copies data from one instance to one or more instances. Helps in horizontal scaling, data protection, analytics and performance. Binlog dump thread on primary, replication I/O and SQL threads on secondary. Strategies include the standard async, semi async or group replication.
High Availability
Ability to cope with failure at software, hardware and network level. Essential for anyone who needs 99.9%+ uptime. Can be implemented with replication or clustering solutions from MySQL, Percona, Oracle, etc. Requires expertise to setup and maintain. Failover can be manual, scripted or using tools like Orchestrator.
Data directory
Data is stored in a particular directory, with nested directories for the data contained in each database. There are also MySQL log files, InnoDB log files, server process ID file and some other configs. The data directory is configurable.
MySQL configuration
This can be done by passing parameters during startup, or in a file. There are a few standard paths where MySQL looks for config files, /etc/my.cnf is one of the commonly used paths. These options are organized under headers (mysqld for server and mysql for client), you can explore them more in the lab that follows.
Logs
MySQL has logs for various purposes - general query log, errors, binary logs (for replication), slow query log. Only error log is enabled by default (to reduce I/O and storage requirement), the others can be enabled when required - by specifying config parameters at startup or running commands at runtime. Log destination can also be tweaked with config parameters.
Query Performance is a very crucial aspect of relational databases. If not tuned correctly, the select queries can become slow and painful for the application, and for the MySQL server as well. The important task is to identify the slow queries and try to improve their performance by either rewriting them or creating proper indexes on the tables involved in it.
"},{"location":"level101/databases_sql/query_performance/#the-slow-query-log","title":"The Slow Query Log","text":"The slow query log contains SQL statements that take a longer time to execute than set in the config parameter long_query_time. These queries are the candidates for optimization. There are some good utilities to summarize the slow query logs like, mysqldumpslow (provided by MySQL itself), pt-query-digest (provided by Percona), etc. Following are the config parameters that are used to enable and effectively catch slow queries
So, for this section, we will be enabling slow_query_log, long_query_time will be kept to 0.3 (300 ms), and log_queries_not_using index will be enabled as well.
Below are the queries that we will execute on the employees database.
SELECT * FROM employees WHERE last_name = 'Koblick'
SELECT * FROM salaries WHERE salary >= 100000
SELECT * FROM titles WHERE title = 'Manager'
SELECT * FROM employees WHERE year(hire_date) = 1995
SELECT year(e.hire_date), max(s.salary) FROM employees e JOIN salaries s ON e.emp_no=s.emp_no GROUP BY year(e.hire_date)
Now, queries 1, 3 and 4 executed under 300ms but if we check the slow query logs, we will find these queries logged as they are not using any of the index. Queries 2 and 5 are taking longer than 300ms and also not using any index.
Use the following command to get the summary of the slow query log:
mysqldumpslow /var/lib/mysql/mysql-slow.log\n There are some more queries in the snapshot that were along with the queries mentioned. mysqldumpslow replaces actual values that were used by N (in case of numbers) and S (in case of strings). That can be overridden by -a option, however, that will increase the output lines if different values are used in similar queries.
The EXPLAIN command is used with any query that we want to analyze. It describes the query execution plan, how MySQL sees and executes the query. EXPLAIN works with SELECT, INSERT, UPDATE and DELETE statements. It tells about different aspects of the query like, how tables are joined, indexes used or not, etc. The important thing here is to understand the basic EXPLAIN plan output of a query to determine its performance.
Let's take the following query as an example,
mysql> EXPLAIN SELECT * FROM salaries WHERE salary = 100000;\n+----+-------------+----------+------------+------+---------------+------+---------+------+---------+----------+-------------+\n| id | select_type | table | partitions | type | possible_keys | key | key_len | ref | rows | filtered | Extra |\n+----+-------------+----------+------------+------+---------------+------+---------+------+---------+----------+-------------+\n| 1 | SIMPLE | salaries | NULL | ALL | NULL | NULL | NULL | NULL | 2838426 | 10.00 | Using where |\n+----+-------------+----------+------------+------+---------------+------+---------+------+---------+----------+-------------+\n1 row in set, 1 warning (0.00 sec)\n The key aspects to understand in the above output are:
WHERE clause to match target rows, any index or temporary table, etc.So, for the above query, we can determine that there are no partitions, there are no candidate indexes to be used and so no index is used at all, over 2M rows are examined and only 10% of them are included in the result, and lastly, only a WHERE clause is used to match the target rows.
Indexes are used to speed up selecting relevant rows for a given column value. Without an index, MySQL starts with the first row and goes through the entire table to find matching rows. If the table has too many rows, the operation becomes costly. With indexes, MySQL determines the position to start looking for the data without reading the full table.
A primary key is also an index which is also the fastest and is stored along with the table data. Secondary indexes are stored outside of the table data and are used to further enhance the performance of SQL statements. Indexes are mostly stored as B-Trees, with some exceptions like spatial indexes use R-Trees and memory tables use hash indexes.
There are 2 ways to create indexes:
WHERE clauses in SELECT queries, then we can put an index over them while creating a table.ALTER or CREATE INDEX command. This operation does not block the table but might take some time to complete depending on the size of the table.Let\u2019s look at the query that we discussed in the previous section. It\u2019s clear that scanning over 2M records is not a good idea when only 10% of those records are actually in the resultset.
Hence, we create an index on the salary column of the salaries table.
CREATE INDEX idx_salary ON salaries(salary)\n OR
ALTER TABLE salaries ADD INDEX idx_salary(salary)\n And the same explain plan now looks like this:
mysql> EXPLAIN SELECT * FROM salaries WHERE salary = 100000;\n+----+-------------+----------+------------+------+---------------+------------+---------+-------+------+----------+-------+\n| id | select_type | table | partitions | type | possible_keys | key | key_len | ref | rows | filtered | Extra |\n+----+-------------+----------+------------+------+---------------+------------+---------+-------+------+----------+-------+\n| 1 | SIMPLE | salaries | NULL | ref | idx_salary | idx_salary | 4 | const | 13 | 100.00 | NULL |\n+----+-------------+----------+------------+------+---------------+------------+---------+-------+------+----------+-------+\n1 row in set, 1 warning (0.00 sec)\n Now the index used is idx_salary, the one we recently created. The index actually helped examine only 13 records and all of them are in the resultset. Also, the query execution time is also reduced from over 700ms to almost negligible.
Let\u2019s look at another example. Here, we are searching for a specific combination of first_name and last_name. But, we might also search based on last_name only.
mysql> EXPLAIN SELECT * FROM employees WHERE last_name = 'Dredge' AND first_name = 'Yinghua';\n+----+-------------+-----------+------------+------+---------------+------+---------+------+--------+----------+-------------+\n| id | select_type | table | partitions | type | possible_keys | key | key_len | ref | rows | filtered | Extra |\n+----+-------------+-----------+------------+------+---------------+------+---------+------+--------+----------+-------------+\n| 1 | SIMPLE | employees | NULL | ALL | NULL | NULL | NULL | NULL | 299468 | 1.00 | Using where |\n+----+-------------+-----------+------------+------+---------------+------+---------+------+--------+----------+-------------+\n1 row in set, 1 warning (0.00 sec)\n Now only 1% record out of almost 300K is the resultset. Although the query time is particularly quick as we have only 300K records, this will be a pain if the number of records are over millions. In this case, we create an index on last_name and first_name, not separately, but a composite index including both the columns.
CREATE INDEX idx_last_first ON employees(last_name, first_name)\n mysql> EXPLAIN SELECT * FROM employees WHERE last_name = 'Dredge' AND first_name = 'Yinghua';\n+----+-------------+-----------+------------+------+----------------+----------------+---------+-------------+------+----------+-------+\n| id | select_type | table | partitions | type | possible_keys | key | key_len | ref | rows | filtered | Extra |\n+----+-------------+-----------+------------+------+----------------+----------------+---------+-------------+------+----------+-------+\n| 1 | SIMPLE | employees | NULL | ref | idx_last_first | idx_last_first | 124 | const,const | 1 | 100.00 | NULL |\n+----+-------------+-----------+------------+------+----------------+----------------+---------+-------------+------+----------+-------+\n1 row in set, 1 warning (0.00 sec)\n We chose to put last_name before first_name while creating the index as the optimizer starts from the leftmost prefix of the index while evaluating the query. For example, if we have a 3-column index like idx(c1, c2, c3), then the search capability of the index follows - (c1), (c1, c2) or (c1, c2, c3) i.e. if your WHERE clause has only first_name, this index won\u2019t work.
mysql> EXPLAIN SELECT * FROM employees WHERE first_name = 'Yinghua';\n+----+-------------+-----------+------------+------+---------------+------+---------+------+--------+----------+-------------+\n| id | select_type | table | partitions | type | possible_keys | key | key_len | ref | rows | filtered | Extra |\n+----+-------------+-----------+------------+------+---------------+------+---------+------+--------+----------+-------------+\n| 1 | SIMPLE | employees | NULL | ALL | NULL | NULL | NULL | NULL | 299468 | 10.00 | Using where |\n+----+-------------+-----------+------------+------+---------------+------+---------+------+--------+----------+-------------+\n1 row in set, 1 warning (0.00 sec)\n But, if you have only the last_name in the WHERE clause, it will work as expected.
mysql> EXPLAIN SELECT * FROM employees WHERE last_name = 'Dredge';\n+----+-------------+-----------+------------+------+----------------+----------------+---------+-------+------+----------+-------+\n| id | select_type | table | partitions | type | possible_keys | key | key_len | ref | rows | filtered | Extra |\n+----+-------------+-----------+------------+------+----------------+----------------+---------+-------+------+----------+-------+\n| 1 | SIMPLE | employees | NULL | ref | idx_last_first | idx_last_first | 66 | const | 200 | 100.00 | NULL |\n+----+-------------+-----------+------------+------+----------------+----------------+---------+-------+------+----------+-------+\n1 row in set, 1 warning (0.00 sec)\n For another example, use the following queries:
CREATE TABLE employees_2 LIKE employees;\nCREATE TABLE salaries_2 LIKE salaries;\nALTER TABLE salaries_2 DROP PRIMARY KEY;\n We made copies of employees and salaries tables without the Primary Key of salaries table to understand an example of SELECT with JOIN.
When you have queries like the below, it becomes tricky to identify the pain point of the query.
mysql> SELECT e.first_name, e.last_name, s.salary, e.hire_date FROM employees_2 e JOIN salaries_2 s ON e.emp_no=s.emp_no WHERE e.last_name='Dredge';\n1860 rows in set (4.44 sec)\n This query is taking about 4.5 seconds to complete with 1860 rows in the resultset. Let\u2019s look at the Explain plan. There will be 2 records in the Explain plan as 2 tables are used in the query.
mysql> EXPLAIN SELECT e.first_name, e.last_name, s.salary, e.hire_date FROM employees_2 e JOIN salaries_2 s ON e.emp_no=s.emp_no WHERE e.last_name='Dredge';\n+----+-------------+-------+------------+--------+------------------------+---------+---------+--------------------+---------+----------+-------------+\n| id | select_type | table | partitions | type | possible_keys | key | key_len | ref | rows | filtered | Extra |\n+----+-------------+-------+------------+--------+------------------------+---------+---------+--------------------+---------+----------+-------------+\n| 1 | SIMPLE | s | NULL | ALL | NULL | NULL | NULL | NULL | 2837194 | 100.00 | NULL |\n| 1 | SIMPLE | e | NULL | eq_ref | PRIMARY,idx_last_first | PRIMARY | 4 | employees.s.emp_no | 1 | 5.00 | Using where |\n+----+-------------+-------+------------+--------+------------------------+---------+---------+--------------------+---------+----------+-------------+\n2 rows in set, 1 warning (0.00 sec)\n These are in order of evaluation, i.e. salaries_2 will be evaluated first and then employees_2 will be joined to it. As it looks like, it scans almost all the rows of salaries_2 table and tries to match the employees_2 rows as per the JOIN condition. Though WHERE clause is used in fetching the final resultset, but the index corresponding to the WHERE clause is not used for the employees_2 table.
If the join is done on two indexes which have the same data-types, it will always be faster. So, let\u2019s create an index on the emp_no column of salaries_2 table and analyze the query again.
CREATE INDEX idx_empno ON salaries_2(emp_no)\n mysql> EXPLAIN SELECT e.first_name, e.last_name, s.salary, e.hire_date FROM employees_2 e JOIN salaries_2 s ON e.emp_no=s.emp_no WHERE e.last_name='Dredge';\n+----+-------------+-------+------------+------+------------------------+----------------+---------+--------------------+------+----------+-------+\n| id | select_type | table | partitions | type | possible_keys | key | key_len | ref | rows | filtered | Extra |\n+----+-------------+-------+------------+------+------------------------+----------------+---------+--------------------+------+----------+-------+\n| 1 | SIMPLE | e | NULL | ref | PRIMARY,idx_last_first | idx_last_first | 66 | const | 200 | 100.00 | NULL |\n| 1 | SIMPLE | s | NULL | ref | idx_empno | idx_empno | 4 | employees.e.emp_no | 9 | 100.00 | NULL |\n+----+-------------+-------+------------+------+------------------------+----------------+---------+--------------------+------+----------+-------+\n2 rows in set, 1 warning (0.00 sec)\n Now, not only did the index help the optimizer to examine only a few rows in both tables, it reversed the order of the tables in evaluation. The employees_2 table is evaluated first and rows are selected as per the index respective to the WHERE clause. Then, the records are joined to salaries_2 table as per the index used due to the JOIN condition. The execution time of the query came down from 4.5s to 0.02s.
mysql> SELECT e.first_name, e.last_name, s.salary, e.hire_date FROM employees_2 e JOIN salaries_2 s ON e.emp_no=s.emp_no WHERE e.last_name='Dredge'\\G\n1860 rows in set (0.02 sec)\n"},{"location":"level101/databases_sql/replication/","title":"MySQL Replication","text":""},{"location":"level101/databases_sql/replication/#mysql-replication","title":"MySQL Replication","text":"Replication enables data from one MySQL host (termed as Primary) to be copied to another MySQL host (termed as Replica). MySQL Replication is asynchronous in nature by default, but it can be changed to semi-synchronous with some configurations.
Some common applications of MySQL replication are:
MySQL supports different types of synchronizations as well:
DROP DATABASE is executed by mistake on the primary, we still have 30 minutes to recover the data from R2 as that command has not been replicated on R2 yet.Pre-Requisites
Before we dive into setting up replication, we should know about the binary logs. Binary logs play a very important role in MySQL replication. Binary logs, or commonly known as binlogs contain events about the changes done to the database, like table structure changes, data changes via DML operations, etc. They are not used to log SELECT statements. For replication, the primary sends the information to the replicas using its binlogs about the changes done to the database, and the replicas make the same data changes.
With respect to MySQL replication, the binary log format can be of two types that decides the main type of replication:
Statement-Based Binlog Format
Originally, the replication in MySQL was based on SQL statements getting replicated and executed on the replica from the primary. This is called statement-based logging. The binlog contains the exact SQL statement run by the session.
So, if we run the above statements to insert 3 records and the update 3 in a single update statement, they will be logged exactly the same as when we executed them.
Row-Based Binlog Format
The row-based is the default one in the latest MySQL releases. This is a lot different from the Statement format as here, row events are logged instead of statements. By that we mean, in the above example one update statement affected 3 records, but binlog had only one UPDATE statement; if it is a row-based format, binlog will have an event for each record updated.
Statement-Based v/s Row-Based binlogs
Let\u2019s have a look at the operational differences between statement-based and row-based binlogs.
Statement-Based Row-Based Logs SQL statements as executed Logs row events based on SQL statements executed Takes lesser disk space Takes more disk space Restoring using binlogs is faster Restoring using binlogs is slower When used for replication, if any statement has a predefined function that has its own value, likesysdate(), uuid() etc, the output could be different on the replica which makes it inconsistent. Whatever is executed becomes a row event with values, so there will be no problem if such functions are used in SQL statements. Only statements are logged so no other row events are generated. A lot of events are generated when a table is copied into another using INSERT INTO SELECT. Note: There is another type of binlog format called Mixed. With mixed logging, statement-based is used by default but it switches to row-based in certain cases. If MySQL cannot guarantee that statement-based logging is safe for the statements executed, it issues a warning and switches to row-based for those statements.
We will be using binary log format as Row for the entire replication topic.
Replication in Motion
The above figure indicates how a typical MySQL replication works.
Replica_IO_Thread is responsible to fetch the binlog events from the primary binary logs to the replica.Replica_SQL_Thread applies the relay logs on the replica MySQL server.log-bin is enabled on the replica, then the replica will have its own binary logs as well. If log-slave-updates is enabled, then it will have the updates from the primary logged in the binlogs as well.In this section, we will set up a simple asynchronous replication. The binlogs will be in row-based format. The replication will be set up on two fresh hosts with no prior data present. There are two different ways in which we can set up replication.
server_uuid:# positive integer.We will set up a GTID-based replication in the following section but will also discuss binlog-based replication setup as well.
Primary Host Configurations
The following config parameters should be present in the primary my.cnf file for setting up GTID-based replication.
server-id - a unique ID for the mysql server\nlog-bin - the binlog location\nbinlog-format - ROW | STATEMENT (we will use ROW)\ngtid-mode - ON\nenforce-gtid-consistency - ON (allows execution of only those statements which can be logged using GTIDs)\n Replica Host Configurations
The following config parameters should be present in the replica my.cnf file for setting up replication.
server-id - different than the primary host\nlog-bin - (optional, if you want replica to log its own changes as well)\nbinlog-format - depends on the above\ngtid-mode - ON\nenforce-gtid-consistency - ON\nlog-slave-updates - ON (if binlog is enabled, then we can enable this. This enables the replica to log the changes coming from the primary along with its own changes. Helps in setting up chain replication)\n Replication User
Every replica connects to the primary using a mysql user for replicating. So there must be a mysql user account for the same on the primary host. Any user can be used for this purpose provided it has REPLICATION SLAVE privilege. If the sole purpose is replication, then we can have a user with only the required privilege.
On the primary host:
mysql> CREATE USER repl_user@<replica_IP> IDENTIFIED BY 'xxxxx';\n\nmysql> GRANT REPLICATION SLAVE ON *.* TO repl_user@'<replica_IP>';\n Obtaining Starting position from Primary
Run the following command on the primary host:
mysql> SHOW MASTER STATUS\\G\n*************************** 1. row ***************************\n File: mysql-bin.000001\n Position: 73\n Binlog_Do_DB:\n Binlog_Ignore_DB:\nExecuted_Gtid_Set: e17d0920-d00e-11eb-a3e6-000d3aa00f87:1-3\n1 row in set (0.00 sec)\n If we are working with binary log-based replication, the top two output lines are the most important ones. That tells the current binlog on the primary host and till what position it has written. For fresh hosts we know that no data is written, so we can directly set up replication using the very first binlog file and position 4. If we are setting up a replication from a backup, then that changes the way we obtain the starting position. For GTIDs, the executed_gtid_set is the value where primary is right now. Again, for a fresh setup, we don\u2019t have to specify anything about the starting point and it will start from the transaction id 1, but when we set up from a backup, the backup will contain the GTID positions till where backup has been taken.
Setting up Replica
The replication setup must know about the primary host, the user and password to connect, the binlog coordinates (for binlog-based replication) or the GTID auto-position parameter. The following command is used for setting up:
CHANGE MASTER TO\nmaster_host = '<primary host IP>',\nmaster_port = <primary host port - default=3306>,\nmaster_user = 'repl_user',\nmaster_password = 'xxxxx',\nmaster_auto_position = 1;\n Note: The CHANGE MASTER TO command has been replaced with CHANGE REPLICATION SOURCE TO from Mysql 8.0.23 onwards, also all the master and slave keywords are replaced with source and replica.
If it is binlog-based replication, then instead of master_auto_position, we need to specify the binlog coordinates.
master_log_file = 'mysql-bin.000001',\nmaster_log_pos = 4\n Starting Replication and Check Status
Now that everything is configured, we just need to start the replication on the replica via the following command
START SLAVE;\n OR from MySQL 8.0.23 onwards,
START REPLICA;\n Whether or not the replication is running successfully, we can determine by running the following command:
SHOW SLAVE STATUS\\G\n OR from MySQL 8.0.23 onwards,
SHOW REPLICA STATUS\\G\n mysql> SHOW REPLICA STATUS\\G\n*************************** 1. row ***************************\n Replica_IO_State: Waiting for master to send event\n Source_Host: <primary IP>\n Source_User: repl_user\n Source_Port: <primary port>\n Connect_Retry: 60\n Source_Log_File: mysql-bin.000001\n Read_Source_Log_Pos: 852\n Relay_Log_File: mysql-relay-bin.000002\n Relay_Log_Pos: 1067\n Relay_Source_Log_File: mysql-bin.000001\n Replica_IO_Running: Yes\n Replica_SQL_Running: Yes\n Replicate_Do_DB:\n Replicate_Ignore_DB:\n Replicate_Do_Table:\n Replicate_Ignore_Table:\n Replicate_Wild_Do_Table:\n Replicate_Wild_Ignore_Table:\n Last_Errno: 0\n Last_Error:\n Skip_Counter: 0\n Exec_Source_Log_Pos: 852\n Relay_Log_Space: 1283\n Until_Condition: None\n Until_Log_File:\n Until_Log_Pos: 0\n Source_SSL_Allowed: No\n Source_SSL_CA_File:\n Source_SSL_CA_Path:\n Source_SSL_Cert:\n Source_SSL_Cipher:\n Source_SSL_Key:\n Seconds_Behind_Source: 0\nSource_SSL_Verify_Server_Cert: No\n Last_IO_Errno: 0\n Last_IO_Error:\n Last_SQL_Errno: 0\n Last_SQL_Error:\n Replicate_Ignore_Server_Ids:\n Source_Server_Id: 1\n Source_UUID: e17d0920-d00e-11eb-a3e6-000d3aa00f87\n Source_Info_File: mysql.slave_master_info\n SQL_Delay: 0\n SQL_Remaining_Delay: NULL\n Replica_SQL_Running_State: Slave has read all relay log; waiting for more updates\n Source_Retry_Count: 86400\n Source_Bind:\n Last_IO_Error_Timestamp:\n Last_SQL_Error_Timestamp:\n Source_SSL_Crl:\n Source_SSL_Crlpath:\n Retrieved_Gtid_Set: e17d0920-d00e-11eb-a3e6-000d3aa00f87:1-3\n Executed_Gtid_Set: e17d0920-d00e-11eb-a3e6-000d3aa00f87:1-3\n Auto_Position: 1\n Replicate_Rewrite_DB:\n Channel_Name:\n Source_TLS_Version:\n Source_public_key_path:\n Get_Source_public_key: 0\n Network_Namespace:\n1 row in set (0.00 sec)\n Some of the parameters are explained below:
Parameters Description Relay_Source_Log_File the primary\u2019s file where replica is currently reading from Execute_Source_Log_Pos for the above file on which position is the replica reading currently from. These two parameters are of utmost importance when binlog based replication is used Replica_IO_Running IO thread of replica is running or not Replica_SQL_Running SQL thread of replica is running or not Seconds_Behind_Source the difference of seconds when a statement was executed on Primary and then on Replica. This indicates how much replication lag is there Source_UUID the uuid of the primary host Retrieved_Gtid_Set the GTIDs fetched from the primary host by the replica to be executed Executed_Gtid_Set the GTIDs executed on the replica. This set remains the same for the entire cluster if the replicas are in sync Auto_Position it directs the replica to fetch the next GTID automaticallyCreate a Replica for the already setup cluster
The steps discussed in the previous section talks about the setting up replication on two fresh hosts. When we have to set up a replica for a host which is already serving applications, then the backup of the primary is used, either fresh backup taken for the replica (should only be done if the traffic it is serving is less) or use a recently taken backup.
If the size of the databases on the MySQL primary server is small, less than 100G recommended, then mysqldump can be used to take backup along with the following options.
mysqldump -uroot -p -hhost_ip -P3306 --all-databases --single-transaction --master-data=1 > primary_host.bkp\n --single-transaction - this option starts a transaction before taking the backup which ensures it is consistent. As transactions are isolated from each other, so no other writes affect the backup.--master-data - this option is required if binlog-based replication is desired to be set up. It includes the binary log file and log file position in the backup file.When GTID mode is enabled and mysqldump is executed, it includes the GTID executed to be used to start the replica after the backup position. The contents of the mysqldump output file will have the following
It is recommended to comment these before restoring otherwise they could throw errors. Also, using master-data=2 will automatically comment the master_log_file line.
Similarly, when taking backup of the host using xtrabackup, the file xtrabckup_info file contains the information about binlog file and file position, as well as the GTID executed set.
server_version = 8.0.25\nstart_time = 2021-06-22 03:45:17\nend_time = 2021-06-22 03:45:20\nlock_time = 0\nbinlog_pos = filename 'mysql-bin.000007', position '196', GTID of the last change 'e17d0920-d00e-11eb-a3e6-000d3aa00f87:1-5'\ninnodb_from_lsn = 0\ninnodb_to_lsn = 18153149\npartial = N\nincremental = N\nformat = file\ncompressed = N\nencrypted = N\n Now, after setting MySQL server on the desired host, restore the backup taken from any one of the above methods. If the intended way is binlog-based replication, then use the binlog file and position info in the following command:
CHANGE REPLICATION SOURCE TO \nsource_host = \u2018primary_ip\u2019,\nsource_port = 3306,\nsource_user = \u2018repl_user\u2019,\nsource_password = \u2018xxxxx\u2019,\nsource_log_file = \u2018mysql-bin.000007\u2019,\nsource_log_pos = \u2018196\u2019;\n If the replication needs to be set via GITDs, then run the below command to tell the replica about the GTIDs already executed. On the Replica host, run the following commands:
RESET MASTER;\n\nset global gtid_purged = \u2018e17d0920-d00e-11eb-a3e6-000d3aa00f87:1-5\u2019\n\nCHANGE REPLICATION SOURCE TO\nsource_host = \u2018primary_ip\u2019,\nsource_port = 3306,\nsource_user = \u2018repl_user\u2019,\nsource_password = \u2018xxxxx\u2019,\nsource_auto_position = 1\n The reset master command resets the position of the binary log to initial. It can be skipped if the host is a freshly installed MySQL, but we restored a backup so it is necessary. The gtid_purged global variable lets the replica know the GTIDs that have already been executed, so that the replication can start after that. Then in the change source command, we set the auto-position to 1 which automatically gets the next GTID to proceed.
The most commonly used command while working with MySQL is SELECT. It is used to fetch the resultset from one or more tables. The general form of a typical select query looks like:
SELECT expr\nFROM table1\n[WHERE condition]\n[GROUP BY column_list HAVING condition]\n[ORDER BY column_list ASC|DESC]\n[LIMIT #]\n The above general form contains some commonly used clauses of a SELECT query:
Let\u2019s have a look at some examples for a better understanding of the above. The dataset used for the examples below is available here and is free to use.
Select all records
mysql> SELECT * FROM employees LIMIT 5;\n+--------+------------+------------+-----------+--------+------------+\n| emp_no | birth_date | first_name | last_name | gender | hire_date |\n+--------+------------+------------+-----------+--------+------------+\n| 10001 | 1953-09-02 | Georgi | Facello | M | 1986-06-26 |\n| 10002 | 1964-06-02 | Bezalel | Simmel | F | 1985-11-21 |\n| 10003 | 1959-12-03 | Parto | Bamford | M | 1986-08-28 |\n| 10004 | 1954-05-01 | Chirstian | Koblick | M | 1986-12-01 |\n| 10005 | 1955-01-21 | Kyoichi | Maliniak | M | 1989-09-12 |\n+--------+------------+------------+-----------+--------+------------+\n5 rows in set (0.00 sec)\n Select specific fields for all records
mysql> SELECT first_name, last_name, gender FROM employees LIMIT 5;\n+------------+-----------+--------+\n| first_name | last_name | gender |\n+------------+-----------+--------+\n| Georgi | Facello | M |\n| Bezalel | Simmel | F |\n| Parto | Bamford | M |\n| Chirstian | Koblick | M |\n| Kyoichi | Maliniak | M |\n+------------+-----------+--------+\n5 rows in set (0.00 sec)\n Select all records Where hire_date >= January 1, 1990
mysql> SELECT * FROM employees WHERE hire_date >= '1990-01-01' LIMIT 5;\n+--------+------------+------------+-------------+--------+------------+\n| emp_no | birth_date | first_name | last_name | gender | hire_date |\n+--------+------------+------------+-------------+--------+------------+\n| 10008 | 1958-02-19 | Saniya | Kalloufi | M | 1994-09-15 |\n| 10011 | 1953-11-07 | Mary | Sluis | F | 1990-01-22 |\n| 10012 | 1960-10-04 | Patricio | Bridgland | M | 1992-12-18 |\n| 10016 | 1961-05-02 | Kazuhito | Cappelletti | M | 1995-01-27 |\n| 10017 | 1958-07-06 | Cristinel | Bouloucos | F | 1993-08-03 |\n+--------+------------+------------+-------------+--------+------------+\n5 rows in set (0.01 sec)\n Select first_name and last_name from all records Where birth_date >= 1960 AND gender = \u2018F\u2019
mysql> SELECT first_name, last_name FROM employees WHERE year(birth_date) >= 1960 AND gender='F' LIMIT 5;\n+------------+-----------+\n| first_name | last_name |\n+------------+-----------+\n| Bezalel | Simmel |\n| Duangkaew | Piveteau |\n| Divier | Reistad |\n| Jeong | Reistad |\n| Mingsen | Casley |\n+------------+-----------+\n5 rows in set (0.00 sec)\n Display the total number of records
mysql> SELECT COUNT(*) FROM employees;\n+----------+\n| COUNT(*) |\n+----------+\n| 300024 |\n+----------+\n1 row in set (0.05 sec)\n Display gender-wise count of all records
mysql> SELECT gender, COUNT(*) FROM employees GROUP BY gender;\n+--------+----------+\n| gender | COUNT(*) |\n+--------+----------+\n| M | 179973 |\n| F | 120051 |\n+--------+----------+\n2 rows in set (0.14 sec)\n Display the year of hire_date and number of employees hired that year, also only those years where more than 20k employees were hired
mysql> SELECT year(hire_date), COUNT(*) FROM employees GROUP BY year(hire_date) HAVING COUNT(*) > 20000;\n+-----------------+----------+\n| year(hire_date) | COUNT(*) |\n+-----------------+----------+\n| 1985 | 35316 |\n| 1986 | 36150 |\n| 1987 | 33501 |\n| 1988 | 31436 |\n| 1989 | 28394 |\n| 1990 | 25610 |\n| 1991 | 22568 |\n| 1992 | 20402 |\n+-----------------+----------+\n8 rows in set (0.14 sec)\n Display all records ordered by their hire_date in descending order. If hire_date is the same, then in order of their birth_date ascending order
mysql> SELECT * FROM employees ORDER BY hire_date DESC, birth_date ASC LIMIT 5;\n+--------+------------+------------+-----------+--------+------------+\n| emp_no | birth_date | first_name | last_name | gender | hire_date |\n+--------+------------+------------+-----------+--------+------------+\n| 463807 | 1964-06-12 | Bikash | Covnot | M | 2000-01-28 |\n| 428377 | 1957-05-09 | Yucai | Gerlach | M | 2000-01-23 |\n| 499553 | 1954-05-06 | Hideyuki | Delgrande | F | 2000-01-22 |\n| 222965 | 1959-08-07 | Volkmar | Perko | F | 2000-01-13 |\n| 47291 | 1960-09-09 | Ulf | Flexer | M | 2000-01-12 |\n+--------+------------+------------+-----------+--------+------------+\n5 rows in set (0.12 sec)\n"},{"location":"level101/databases_sql/select_query/#select-joins","title":"SELECT - JOINS","text":"JOIN statement is used to produce a combined resultset from two or more tables based on certain conditions. It can be also used with UPDATE and DELETE statements, but we will be focussing on the select query.
Following is a basic general form for joins:
SELECT table1.col1, table2.col1, ... (any combination)\nFROM\ntable1 <join_type> table2\nON (or USING depends on join_type) table1.column_for_joining = table2.column_for_joining\nWHERE \u2026\n Any number of columns can be selected, but it is recommended to select only those which are relevant to increase the readability of the resultset. All other clauses like WHERE, GROUP BY are not mandatory. Let\u2019s discuss the types of JOINs supported by MySQL Syntax.
Inner Join
This joins table A with table B on a condition. Only the records where the condition is True are selected in the resultset.
Display some details of employees along with their salary:
mysql> SELECT e.emp_no,e.first_name,e.last_name,s.salary FROM employees e JOIN salaries s ON e.emp_no=s.emp_no LIMIT 5;\n+--------+------------+-----------+--------+\n| emp_no | first_name | last_name | salary |\n+--------+------------+-----------+--------+\n| 10001 | Georgi | Facello | 60117 |\n| 10001 | Georgi | Facello | 62102 |\n| 10001 | Georgi | Facello | 66074 |\n| 10001 | Georgi | Facello | 66596 |\n| 10001 | Georgi | Facello | 66961 |\n+--------+------------+-----------+--------+\n5 rows in set (0.00 sec)\n Similar result can be achieved by:
mysql> SELECT e.emp_no,e.first_name,e.last_name,s.salary FROM employees e JOIN salaries s USING (emp_no) LIMIT 5;\n+--------+------------+-----------+--------+\n| emp_no | first_name | last_name | salary |\n+--------+------------+-----------+--------+\n| 10001 | Georgi | Facello | 60117 |\n| 10001 | Georgi | Facello | 62102 |\n| 10001 | Georgi | Facello | 66074 |\n| 10001 | Georgi | Facello | 66596 |\n| 10001 | Georgi | Facello | 66961 |\n+--------+------------+-----------+--------+\n5 rows in set (0.00 sec)\n And also by:
mysql> SELECT e.emp_no,e.first_name,e.last_name,s.salary FROM employees e NATURAL JOIN salaries s LIMIT 5;\n+--------+------------+-----------+--------+\n| emp_no | first_name | last_name | salary |\n+--------+------------+-----------+--------+\n| 10001 | Georgi | Facello | 60117 |\n| 10001 | Georgi | Facello | 62102 |\n| 10001 | Georgi | Facello | 66074 |\n| 10001 | Georgi | Facello | 66596 |\n| 10001 | Georgi | Facello | 66961 |\n+--------+------------+-----------+--------+\n5 rows in set (0.00 sec)\n Outer Join
Majorly of two types:
LEFT JOIN.Let us assume the below tables for understanding LEFT JOIN better.
mysql> SELECT * FROM dummy1;\n+----------+------------+\n| same_col | diff_col_1 |\n+----------+------------+\n| 1 | A |\n| 2 | B |\n| 3 | C |\n+----------+------------+\n\nmysql> SELECT * FROM dummy2;\n+----------+------------+\n| same_col | diff_col_2 |\n+----------+------------+\n| 1 | X |\n| 3 | Y |\n+----------+------------+\n A simple SELECT JOIN will look like the one below:
mysql> SELECT * FROM dummy1 d1 LEFT JOIN dummy2 d2 ON d1.same_col=d2.same_col;\n+----------+------------+----------+------------+\n| same_col | diff_col_1 | same_col | diff_col_2 |\n+----------+------------+----------+------------+\n| 1 | A | 1 | X |\n| 3 | C | 3 | Y |\n| 2 | B | NULL | NULL |\n+----------+------------+----------+------------+\n3 rows in set (0.00 sec)\n Which can also be written as:
mysql> SELECT * FROM dummy1 d1 LEFT JOIN dummy2 d2 USING(same_col);\n+----------+------------+------------+\n| same_col | diff_col_1 | diff_col_2 |\n+----------+------------+------------+\n| 1 | A | X |\n| 3 | C | Y |\n| 2 | B | NULL |\n+----------+------------+------------+\n3 rows in set (0.00 sec)\n And also as:
mysql> SELECT * FROM dummy1 d1 NATURAL LEFT JOIN dummy2 d2;\n+----------+------------+------------+\n| same_col | diff_col_1 | diff_col_2 |\n+----------+------------+------------+\n| 1 | A | X |\n| 3 | C | Y |\n| 2 | B | NULL |\n+----------+------------+------------+\n3 rows in set (0.00 sec)\n Cross Join
This does a cross product of table A and table B without any condition. It doesn\u2019t have a lot of applications in the real world.
A Simple CROSS JOIN looks like this:
mysql> SELECT * FROM dummy1 CROSS JOIN dummy2;\n+----------+------------+----------+------------+\n| same_col | diff_col_1 | same_col | diff_col_2 |\n+----------+------------+----------+------------+\n| 1 | A | 3 | Y |\n| 1 | A | 1 | X |\n| 2 | B | 3 | Y |\n| 2 | B | 1 | X |\n| 3 | C | 3 | Y |\n| 3 | C | 1 | X |\n+----------+------------+----------+------------+\n6 rows in set (0.01 sec)\n One use case that can come in handy is when you have to fill in some missing entries. For example, all the entries from dummy1 must be inserted into a similar table dummy3, with each record must have 3 entries with statuses 1, 5 and 7.
mysql> DESC dummy3;\n+----------+----------+------+-----+---------+-------+\n| Field | Type | Null | Key | Default | Extra |\n+----------+----------+------+-----+---------+-------+\n| same_col | int | YES | | NULL | |\n| value | char(15) | YES | | NULL | |\n| status | smallint | YES | | NULL | |\n+----------+----------+------+-----+---------+-------+\n3 rows in set (0.02 sec)\n Either you create an INSERT query script with as many entries as in dummy1 or use CROSS JOIN to produce the required resultset.
mysql> SELECT * FROM dummy1 \nCROSS JOIN \n(SELECT 1 UNION SELECT 5 UNION SELECT 7) T2 \nORDER BY same_col;\n+----------+------------+---+\n| same_col | diff_col_1 | 1 |\n+----------+------------+---+\n| 1 | A | 1 |\n| 1 | A | 5 |\n| 1 | A | 7 |\n| 2 | B | 1 |\n| 2 | B | 5 |\n| 2 | B | 7 |\n| 3 | C | 1 |\n| 3 | C | 5 |\n| 3 | C | 7 |\n+----------+------------+---+\n9 rows in set (0.00 sec)\n The T2 section in the above query is called a sub-query. We will discuss the same in the next section.
Natural Join
This implicitly selects the common column from table A and table B and performs an inner join.
mysql> SELECT e.emp_no,e.first_name,e.last_name,s.salary FROM employees e NATURAL JOIN salaries s LIMIT 5;\n+--------+------------+-----------+--------+\n| emp_no | first_name | last_name | salary |\n+--------+------------+-----------+--------+\n| 10001 | Georgi | Facello | 60117 |\n| 10001 | Georgi | Facello | 62102 |\n| 10001 | Georgi | Facello | 66074 |\n| 10001 | Georgi | Facello | 66596 |\n| 10001 | Georgi | Facello | 66961 |\n+--------+------------+-----------+--------+\n5 rows in set (0.00 sec)\n Notice how NATURAL JOIN and using takes care that the common column is displayed only once if you are not explicitly selecting columns for the query.
Some More Examples
Display emp_no, salary, title and dept of the employees where salary > 80000.
mysql> SELECT e.emp_no, s.salary, t.title, d.dept_no \nFROM \nemployees e \nJOIN salaries s USING (emp_no) \nJOIN titles t USING (emp_no) \nJOIN dept_emp d USING (emp_no) \nWHERE s.salary > 80000 \nLIMIT 5;\n+--------+--------+--------------+---------+\n| emp_no | salary | title | dept_no |\n+--------+--------+--------------+---------+\n| 10017 | 82163 | Senior Staff | d001 |\n| 10017 | 86157 | Senior Staff | d001 |\n| 10017 | 89619 | Senior Staff | d001 |\n| 10017 | 91985 | Senior Staff | d001 |\n| 10017 | 96122 | Senior Staff | d001 |\n+--------+--------+--------------+---------+\n5 rows in set (0.00 sec)\n Display title-wise count of employees in each department ordered by dept_no:
mysql> SELECT d.dept_no, t.title, COUNT(*) \nFROM titles t \nLEFT JOIN dept_emp d USING (emp_no) \nGROUP BY d.dept_no, t.title \nORDER BY d.dept_no \nLIMIT 10;\n+---------+--------------------+----------+\n| dept_no | title | COUNT(*) |\n+---------+--------------------+----------+\n| d001 | Manager | 2 |\n| d001 | Senior Staff | 13940 |\n| d001 | Staff | 16196 |\n| d002 | Manager | 2 |\n| d002 | Senior Staff | 12139 |\n| d002 | Staff | 13929 |\n| d003 | Manager | 2 |\n| d003 | Senior Staff | 12274 |\n| d003 | Staff | 14342 |\n| d004 | Assistant Engineer | 6445 |\n+---------+--------------------+----------+\n10 rows in set (1.32 sec)\n"},{"location":"level101/databases_sql/select_query/#select-subquery","title":"SELECT - Subquery","text":"A subquery is generally a smaller resultset that can be used to power a SELECT query in many ways. It can be used in a WHERE condition, can be used in place of JOIN mostly where a JOIN could be an overkill. These subqueries are also termed as derived tables. They must have a table alias in the SELECT query.
Let\u2019s look at some examples of subqueries.
Here, we got the department name from the departments table by a subquery which used dept_no from dept_emp table.
mysql> SELECT e.emp_no, \n(SELECT dept_name FROM departments WHERE dept_no=d.dept_no) dept_name FROM employees e \nJOIN dept_emp d USING (emp_no) \nLIMIT 5;\n+--------+-----------------+\n| emp_no | dept_name |\n+--------+-----------------+\n| 10001 | Development |\n| 10002 | Sales |\n| 10003 | Production |\n| 10004 | Production |\n| 10005 | Human Resources |\n+--------+-----------------+\n5 rows in set (0.01 sec)\n Here, we used the AVG query above (which got the avg salary) as a subquery to list the employees whose latest salary is more than the average.
mysql> SELECT AVG(salary) FROM salaries;\n+-------------+\n| AVG(salary) |\n+-------------+\n| 63810.7448 |\n+-------------+\n1 row in set (0.80 sec)\n\nmysql> SELECT e.emp_no, MAX(s.salary) \nFROM employees e \nNATURAL JOIN salaries s \nGROUP BY e.emp_no \nHAVING MAX(s.salary) > (SELECT AVG(salary) FROM salaries) \nLIMIT 10;\n+--------+---------------+\n| emp_no | MAX(s.salary) |\n+--------+---------------+\n| 10001 | 88958 |\n| 10002 | 72527 |\n| 10004 | 74057 |\n| 10005 | 94692 |\n| 10007 | 88070 |\n| 10009 | 94443 |\n| 10010 | 80324 |\n| 10013 | 68901 |\n| 10016 | 77935 |\n| 10017 | 99651 |\n+--------+---------------+\n10 rows in set (0.56 sec)\n"},{"location":"level101/git/branches/","title":"Working With Branches","text":"Coming back to our local repo which has two commits. So far, what we have is a single line of history. Commits are chained in a single line. But sometimes you may have a need to work on two different features in parallel in the same repo. Now one option here could be making a new folder/repo with the same code and use that for another feature development. But there's a better way. Use branches. Since git follows tree-like structure for commits, we can use branches to work on different sets of features. From a commit, two or more branches can be created and branches can also be merged.
Using branches, there can exist multiple lines of histories and we can checkout to any of them and work on it. Checking out, as we discussed earlier, would simply mean replacing contents of the directory (repo) with the snapshot at the checked out version.
Let's create a branch and see how it looks like:
$ git branch b1\n$ git log --oneline --graph\n* 7f3b00e (HEAD -> master, b1) adding file 2\n* df2fb7a adding file 1\n We create a branch called b1. Git log tells us that b1 also points to the last commit (7f3b00e) but the HEAD is still pointing to master. If you remember, HEAD points to the commit/reference wherever you are checkout to. So if we checkout to b1, HEAD should point to that. Let's confirm:
$ git checkout b1\nSwitched to branch 'b1'\n$ git log --oneline --graph\n* 7f3b00e (HEAD -> b1, master) adding file 2\n* df2fb7a adding file 1\n b1 still points to the same commit but HEAD now points to b1. Since we create a branch at commit 7f3b00e, there will be two lines of histories starting this commit. Depending on which branch you are checked out on, the line of history will progress.
At this moment, we are checked out on branch b1, so making a new commit will advance branch reference b1 to that commit and current b1 commit will become its parent. Let's do that.
# Creating a file and making a commit\n$ echo \"I am a file in b1 branch\" > b1.txt\n$ git add b1.txt\n$ git commit -m \"adding b1 file\"\n[b1 872a38f] adding b1 file\n1 file changed, 1 insertion(+)\ncreate mode 100644 b1.txt\n\n# The new line of history\n$ git log --oneline --graph\n* 872a38f (HEAD -> b1) adding b1 file\n* 7f3b00e (master) adding file 2\n* df2fb7a adding file 1\n$\n Do note that master is still pointing to the old commit it was pointing to. We can now checkout to master branch and make commits there. This will result in another line of history starting from commit 7f3b00e.
# checkout to master branch\n$ git checkout master\nSwitched to branch 'master'\n\n# Creating a new commit on master branch\n$ echo \"new file in master branch\" > master.txt\n$ git add master.txt\n$ git commit -m \"adding master.txt file\"\n[master 60dc441] adding master.txt file\n1 file changed, 1 insertion(+)\ncreate mode 100644 master.txt\n\n# The history line\n$ git log --oneline --graph\n* 60dc441 (HEAD -> master) adding master.txt file\n* 7f3b00e adding file 2\n* df2fb7a adding file 1\n Notice how branch b1 is not visible here since we are on the master. Let's try to visualize both to get the whole picture:
$ git log --oneline --graph --all\n* 60dc441 (HEAD -> master) adding master.txt file\n| * 872a38f (b1) adding b1 file\n|/\n* 7f3b00e adding file 2\n* df2fb7a adding file 1\n Above tree structure should make things clear. Notice a clear branch/fork on commit 7f3b00e. This is how we create branches. Now they both are two separate lines of history on which feature development can be done independently.
To reiterate, internally, git is just a tree of commits. Branch names (human readable) are pointers to those commits in the tree. We use various git commands to work with the tree structure and references. Git accordingly modifies contents of our repo.
"},{"location":"level101/git/branches/#merges","title":"Merges","text":"Now say the feature you were working on branch b1 is complete and you need to merge it on master branch, where all the final version of code goes. So first, you will checkout to branch master and then you pull the latest code from upstream (eg: GitHub). Then you need to merge your code from b1 into master. There could be two ways this can be done.
Here is the current history:
$ git log --oneline --graph --all\n* 60dc441 (HEAD -> master) adding master.txt file\n| * 872a38f (b1) adding b1 file\n|/\n* 7f3b00e adding file 2\n* df2fb7a adding file 1\n Option 1: Directly merge the branch. Merging the branch b1 into master will result in a new merge commit. This will merge changes from two different lines of history and create a new commit of the result.
$ git merge b1\nMerge made by the 'recursive' strategy.\nb1.txt | 1 +\n1 file changed, 1 insertion(+)\ncreate mode 100644 b1.txt\n$ git log --oneline --graph --all\n* 8fc28f9 (HEAD -> master) Merge branch 'b1'\n|\\\n| * 872a38f (b1) adding b1 file\n* | 60dc441 adding master.txt file\n|/\n* 7f3b00e adding file 2\n* df2fb7a adding file 1\n You can see a new merge commit created (8fc28f9). You will be prompted for the commit message. If there are a lot of branches in the repo, this result will end-up with a lot of merge commits. Which looks ugly compared to a single line of history of development. So let's look at an alternative approach.
First, let's reset our last merge and go to the previous state.
$ git reset --hard 60dc441\nHEAD is now at 60dc441 adding master.txt file\n$ git log --oneline --graph --all\n* 60dc441 (HEAD -> master) adding master.txt file\n| * 872a38f (b1) adding b1 file\n|/\n* 7f3b00e adding file 2\n* df2fb7a adding file 1\n Option 2: Rebase. Now, instead of merging two branches which has a similar base (commit: 7f3b00e), let us rebase branch b1 on to current master. What this means is take branch b1 (from commit 7f3b00e to commit 872a38f) and rebase (put them on top of) master (60dc441).
# Switch to b1\n$ git checkout b1\nSwitched to branch 'b1'\n\n# Rebase (b1 which is current branch) on master\n$ git rebase master\nFirst, rewinding head to replay your work on top of it...\nApplying: adding b1 file\n\n# The result\n$ git log --oneline --graph --all\n* 5372c8f (HEAD -> b1) adding b1 file\n* 60dc441 (master) adding master.txt file\n* 7f3b00e adding file 2\n* df2fb7a adding file 1\n You can see b1 which had 1 commit. That commit's parent was 7f3b00e. But since we rebase it on master (60dc441). That becomes the parent now. As a side effect, you also see it has become a single line of history. Now if we were to merge b1 into master, it would simply mean change master to point to 5372c8f which is b1. Let's try it:
# checkout to master since we want to merge code into master\n$ git checkout master\nSwitched to branch 'master'\n\n# the current history, where b1 is based on master\n$ git log --oneline --graph --all\n* 5372c8f (b1) adding b1 file\n* 60dc441 (HEAD -> master) adding master.txt file\n* 7f3b00e adding file 2\n* df2fb7a adding file 1\n\n\n# Performing the merge, notice the \"fast-forward\" message\n$ git merge b1\nUpdating 60dc441..5372c8f\nFast-forward\nb1.txt | 1 +\n1 file changed, 1 insertion(+)\ncreate mode 100644 b1.txt\n\n# The Result\n$ git log --oneline --graph --all\n* 5372c8f (HEAD -> master, b1) adding b1 file\n* 60dc441 adding master.txt file\n* 7f3b00e adding file 2\n* df2fb7a adding file 1\n Now you see both b1 and master are pointing to the same commit. Your code has been merged to the master branch and it can be pushed. Also we have clean line of history! :D
There are a lot of git commands and features which we have not explored here. But with the base built-up, be sure to explore concepts like
As an engineer in the field of computer science, having knowledge of version control tools becomes almost a requirement. While there are a lot of version control tools that exist today like SVN, Mercurial, etc, Git perhaps is the most used one and this course we will be working with Git. While this course does not start with Git 101 and expects basic knowledge of git as a prerequisite, it will reintroduce the git concepts known by you with details covering what is happening under the hood as you execute various git commands. So that next time you run a git command, you will be able to press enter more confidently!
Advanced usage and specifics of internal implementation details of Git.
"},{"location":"level101/git/git-basics/#course-contents","title":"Course Contents","text":"Though you might be aware already, let's revisit why we need a version control system. As the project grows and multiple developers start working on it, an efficient method for collaboration is warranted. Git helps the team collaborate easily and also maintains the history of the changes happening with the codebase.
"},{"location":"level101/git/git-basics/#creating-a-git-repo","title":"Creating a Git Repo","text":"Any folder can be converted into a git repository. After executing the following command, we will see a .git folder within the folder, which makes our folder a git repository. All the magic that git does, .git folder is the enabler for the same.
# creating an empty folder and changing current dir to it\n$ cd /tmp\n$ mkdir school-of-sre\n$ cd school-of-sre/\n\n# initialize a git repo\n$ git init\nInitialized empty Git repository in /private/tmp/school-of-sre/.git/\n As the output says, an empty git repo has been initialized in our folder. Let's take a look at what is there.
$ ls .git/\nHEAD config description hooks info objects refs\n There are a bunch of folders and files in the .git folder. As I said, all these enable git to do its magic. We will look into some of these folders and files. But for now, what we have is an empty git repository.
Now as you might already know, let us create a new file in our repo (we will refer to the folder as repo now.) And see git status:
$ echo \"I am file 1\" > file1.txt\n$ git status\nOn branch master\n\nNo commits yet\n\nUntracked files:\n (use \"git add <file>...\" to include in what will be committed)\n\n file1.txt\n\nnothing added to commit but untracked files present (use \"git add\" to track)\n The current git status says No commits yet and there is one untracked file. Since we just created the file, git is not tracking that file. We explicitly need to ask git to track files and folders. (Also checkout gitignore) And how we do that is via git add command as suggested in the above output. Then, we go ahead and create a commit.
$ git add file1.txt\n$ git status\nOn branch master\n\nNo commits yet\n\nChanges to be committed:\n (use \"git rm --cached <file>...\" to unstage)\n\n new file: file1.txt\n\n$ git commit -m \"adding file 1\"\n[master (root-commit) df2fb7a] adding file 1\n1 file changed, 1 insertion(+)\ncreate mode 100644 file1.txt\n Notice how after adding the file, git status says Changes to be committed:. What it means is whatever is listed there, will be included in the next commit. Then, we go ahead and create a commit, with an attached message via -m.
Commit is a snapshot of the repo. Whenever a commit is made, a snapshot of the current state of repo (the folder) is taken and saved. Each commit has a unique ID. (df2fb7a for the commit we made in the previous step). As we keep adding/changing more and more contents and keep making commits, all those snapshots are stored by git. Again, all this magic happens inside the .git folder. This is where all this snapshot or versions are stored in an efficient manner.
Let us create one more file and commit the change. It would look the same as the previous commit we made.
$ echo \"I am file 2\" > file2.txt\n$ git add file2.txt\n$ git commit -m \"adding file 2\"\n[master 7f3b00e] adding file 2\n1 file changed, 1 insertion(+)\ncreate mode 100644 file2.txt\n A new commit with ID 7f3b00e has been created. You can issue git status at any time to see the state of the repository.
**IMPORTANT: Note that commit IDs are long string (SHA) but we can refer to a commit by its initial few (8 or more) characters too. We will interchangeably using shorter and longer commit IDs.**\n Now that we have two commits, let's visualize them:
$ git log --oneline --graph\n* 7f3b00e (HEAD -> master) adding file 2\n* df2fb7a adding file 1\n git log, as the name suggests, prints the log of all the git commits. Here you see two additional arguments, --oneline prints the shorter version of the log, ie: the commit message only and not the person who made the commit and when. --graph prints it in graph format.
Now at this moment, the commits might look like just one in each line but all commits are stored as a tree like data structure internally by git. That means there can be two or more children commits of a given commit. And not just a single line of commits. We will look more into this part when we get to the Branches section. For now, this is our commit history:
df2fb7a ===> 7f3b00e\n"},{"location":"level101/git/git-basics/#are-commits-really-linked","title":"Are commits really linked?","text":"As I just said, the two commits we just made are linked via tree like data structure and we saw how they are linked. But let's actually verify it. Everything in git is an object. Newly created files are stored as an object. Changes to file are stored as an objects and even commits are objects. To view contents of an object, we can use the following command with the object's ID. We will take a look at the contents of the second commit:
$ git cat-file -p 7f3b00e\ntree ebf3af44d253e5328340026e45a9fa9ae3ea1982\nparent df2fb7a61f5d40c1191e0fdeb0fc5d6e7969685a\nauthor Sanket Patel <spatel1@linkedin.com> 1603273316 -0700\ncommitter Sanket Patel <spatel1@linkedin.com> 1603273316 -0700\n\nadding file 2\n Take a note of parent attribute in the above output. It points to the commit id of the first commit we made. So this proves that they are linked! Additionally, you can see the second commit's message in this object. As I said all this magic is enabled by .git folder and the object to which we are looking at also is in that folder.
$ ls .git/objects/7f/3b00eaa957815884198e2fdfec29361108d6a9\n.git/objects/7f/3b00eaa957815884198e2fdfec29361108d6a9\n It is stored in .git/objects/ folder. All the files and changes to them as well are stored in this folder.
We already can see two commits (versions) in our git log. One thing a version control tool gives you is ability to browse back and forth in history. For example: some of your users are running an old version of code and they are reporting an issue. In order to debug the issue, you need access to the old code. The one in your current repo is the latest code. In this example, you are working on the second commit (7f3b00e) and someone reported an issue with the code snapshot at commit (df2fb7a). This is how you would get access to the code at any older commit.
# Current contents, two files present\n$ ls\nfile1.txt file2.txt\n\n# checking out to (an older) commit\n$ git checkout df2fb7a\nNote: checking out 'df2fb7a'.\n\nYou are in 'detached HEAD' state. You can look around, make experimental\nchanges and commit them, and you can discard any commits you make in this\nstate without impacting any branches by performing another checkout.\n\nIf you want to create a new branch to retain commits you create, you may\ndo so (now or later) by using -b with the checkout command again. Example:\n\n git checkout -b <new-branch-name>\n\nHEAD is now at df2fb7a adding file 1\n\n# checking contents, can verify it has old contents\n$ ls\nfile1.txt\n So this is how we would get access to old versions/snapshots. All we need is a reference to that snapshot. Upon executing git checkout ..., what git does for you is use the .git folder, see what was the state of things (files and folders) at that version/reference and replace the contents of current directory with those contents. The then-existing content will no longer be present in the local dir (repo) but we can and will still get access to them because they are tracked via git commit and .git folder has them stored/tracked.
I mention in the previous section that we need a reference to the version. By default, git repo is made of tree of commits. And each commit has a unique IDs. But the unique ID is not the only thing we can reference commits via. There are multiple ways to reference commits. For example: HEAD is a reference to current commit. Whatever commit your repo is checked out at, HEAD will point to that. HEAD~1 is reference to previous commit. So while checking out previous version in section above, we could have done git checkout HEAD~1.
Similarly, master is also a reference (to a branch). Since git uses tree like structure to store commits, there of course will be branches. And the default branch is called master. Master (or any branch reference) will point to the latest commit in the branch. Even though we have checked out to the previous commit in out repo, master still points to the latest commit. And we can get back to the latest version by checkout at master reference
$ git checkout master\nPrevious HEAD position was df2fb7a adding file 1\nSwitched to branch 'master'\n\n# now we will see latest code, with two files\n$ ls\nfile1.txt file2.txt\n Note, instead of master in above command, we could have used commit's ID as well.
Let's look at the state of things. Two commits, master and HEAD references are pointing to the latest commit
$ git log --oneline --graph\n* 7f3b00e (HEAD -> master) adding file 2\n* df2fb7a adding file 1\n The magic? Let's examine these files:
$ cat .git/refs/heads/master\n7f3b00eaa957815884198e2fdfec29361108d6a9\n Viola! Where master is pointing to is stored in a file. Whenever git needs to know where master reference is pointing to, or if git needs to update where master points, it just needs to update the file above. So when you create a new commit, a new commit is created on top of the current commit and the master file is updated with the new commit's ID.
Similary, for HEAD reference:
$ cat .git/HEAD\nref: refs/heads/master\n We can see HEAD is pointing to a reference called refs/heads/master. So HEAD will point where ever the master points.
We discussed how git will update the files as we execute commands. But let's try to do it ourselves, by hand, and see what happens.
$ git log --oneline --graph\n* 7f3b00e (HEAD -> master) adding file 2\n* df2fb7a adding file 1\n Now, let's change master to point to the previous/first commit.
$ echo df2fb7a61f5d40c1191e0fdeb0fc5d6e7969685a > .git/refs/heads/master\n$ git log --oneline --graph\n* df2fb7a (HEAD -> master) adding file 1\n\n# RESETTING TO ORIGINAL\n$ echo 7f3b00eaa957815884198e2fdfec29361108d6a9 > .git/refs/heads/master\n$ git log --oneline --graph\n* 7f3b00e (HEAD -> master) adding file 2\n* df2fb7a adding file 1\n We just edited the master reference file and now we can see only the first commit in git log. Undoing the change to the file brings the state back to original. Not so much of magic, is it?
Till now all the operations we did were in our local repo while git also helps us in a collaborative environment. GitHub is one place on the Internet where you can centrally host your git repos and collaborate with other developers.
Most of the workflow will remain the same as we discussed, with addition of couple of things:
GitHub has written nice guides and tutorials about this and you can refer to them here:
Git has another nice feature called hooks. Hooks are basically scripts which will be called when a certain event happens. Here is where hooks are located:
$ ls .git/hooks/\napplypatch-msg.sample fsmonitor-watchman.sample pre-applypatch.sample pre-push.sample pre-receive.sample update.sample\ncommit-msg.sample post-update.sample pre-commit.sample pre-rebase.sample prepare-commit-msg.sample\n Names are self-explanatory. These hooks are useful when you want to do certain things when a certain event happens. If you want to run tests before pushing code, you would want to setup pre-push hooks. Let's try to create a pre commit hook.
$ echo \"echo this is from pre commit hook\" > .git/hooks/pre-commit\n$ chmod +x .git/hooks/pre-commit\n We basically create a file called pre-commit in hooks folder and make it executable. Now if we make a commit, we should see the message getting printed.
$ echo \"sample file\" > sample.txt\n$ git add sample.txt\n$ git commit -m \"adding sample file\"\nthis is from pre commit hook # <===== THE MESSAGE FROM HOOK EXECUTION\n[master 9894e05] adding sample file\n1 file changed, 1 insertion(+)\ncreate mode 100644 sample.txt\n"},{"location":"level101/linux_basics/command_line_basics/","title":"Command Line Basics","text":""},{"location":"level101/linux_basics/command_line_basics/#lab-environment-setup","title":"Lab Environment Setup","text":"One can use an online Bash interpreter to run all the commands that are provided as examples in this course. This will also help you in getting a hands-on experience of various Linux commands.
REPL is one of the popular online Bash interpreters for running Linux commands. We will be using it for running all the commands mentioned in this course.
"},{"location":"level101/linux_basics/command_line_basics/#what-is-a-command","title":"What is a Command","text":"A command is a program that tells the operating system to perform specific work. Programs are stored as files in Linux. Therefore, a command is also a file which is stored somewhere on the disk.
Commands may also take additional arguments as input from the user. These arguments are called command line arguments. Knowing how to use the commands is important and there are many ways to get help in Linux, especially for commands. Almost every command will have some form of documentation, most commands will have a command-line argument -h or --help that will display a reasonable amount of documentation. But the most popular documentation system in Linux is called man pages\u2014short for manual pages.
Using --help to show the documentation for ls command.
The Linux file system has a hierarchical (or tree-like) structure with its highest-level directory called root (denoted by /). Directories present inside the root directory stores files related to the system. These directories in turn can either store system files or application files or user-related files.
bin directory dev This directory contains files related to devices on the system etc This directory contains all the system configuration files home This directory contains user-related files and directories lib This directory contains all the library files mnt This directory contains files related to mounted devices on the system proc This directory contains files related to the running processes on the system root This directory contains root user-related files and directories sbin This directory contains programs used for system administration tmp This directory is used to store temporary files on the system usr This directory is used to store application programs on the system"},{"location":"level101/linux_basics/command_line_basics/#commands-for-navigating-the-file-system","title":"Commands for Navigating the File System","text":"There are three basic commands which are used frequently to navigate the file system:
ls
pwd
cd
We will now try to understand what each command does and how to use these commands. You should also practice the given examples on the online Bash shell.
"},{"location":"level101/linux_basics/command_line_basics/#pwd-print-working-directory","title":"pwd (print working directory)","text":"At any given moment of time, we will be standing in a certain directory. To get the name of the directory in which we are standing, we can use the pwd command in Linux.
We will now use the cd command to move to a different directory and then print the working directory.
The cd command can be used to change the working directory. Using the command, you can move from one directory to another.
In the below example, we are initially in the root directory. We have then used the cd command to change the directory.
The ls command is used to list the contents of a directory. It will list down all the files and folders present in the given directory.
If we just type ls in the shell, it will list all the files and directories present in the current directory.
We can also provide the directory name as argument to ls command. It will then list all the files and directories inside the given directory.
There are five basic commands which are used frequently to manipulate files:
touch
mkdir
cp
mv
rm
We will now try to understand what each command does and how to use these commands. You should also practice the given examples on the online Bash shell.
"},{"location":"level101/linux_basics/command_line_basics/#touch-create-new-file","title":"touch (create new file)","text":"The touch command can be used to create an empty new file. This command is very useful for many other purposes, but we will discuss the simplest use case of creating a new file.
General syntax of using touch command:
touch <file_name>\n "},{"location":"level101/linux_basics/command_line_basics/#mkdir-create-new-directories","title":"mkdir (create new directories)","text":"The mkdir command is used to create directories. You can use ls command to verify that the new directory is created.
General syntax of using mkdir command:
mkdir <directory_name>\n "},{"location":"level101/linux_basics/command_line_basics/#rm-delete-files-and-directories","title":"rm (delete files and directories)","text":"The rm command can be used to delete files and directories. It is very important to note that this command permanently deletes the files and directories. It's almost impossible to recover these files and directories once you have executed rm command on them successfully. Do run this command with care.
General syntax of using rm command:
rm <file_name>\n Let's try to understand the rm command with an example. We will try to delete the file and directory we created using touch and mkdir command respectively.
The cp command is used to copy files and directories from one location to another. Do note that the cp command doesn't do any change to the original files or directories. The original files or directories and their copy both co-exist after running cp command successfully.
General syntax of using cp command:
cp <source_path> <destination_path>\n We are currently in the /home/runner directory. We will use the mkdir command to create a new directory named test_directory. We will now try to copy the _test_runner.py file to the directory we created just now.
Do note that nothing happened to the original _test_runner.py file. It's still there in the current directory. A new copy of it got created inside the test_directory.
We can also use the cp command to copy the whole directory from one location to another. Let's try to understand this with an example.
We again used the mkdir command to create a new directory called another_directory. We then used the cp command along with an additional argument -r to copy the test_directory.
mv (move files and directories)
The mv command can either be used to move files or directories from one location to another or it can be used to rename files or directories. Do note that moving files and copying them are very different. When you move the files or directories, the original copy is lost.
General syntax of using mv command:
mv <source_path> <destination_path>\n In this example, we will use the mv command to move the _test_runner.py file to test_directory. In this case, this file already exists in test_directory. The mv command will just replace it. Do note that the original file doesn't exist in the current directory after mv command ran successfully.
We can also use the mv command to move a directory from one location to another. In this case, we do not need to use the -r flag that we did while using the cp command. Do note that the original directory will not exist if we use mv command.
One of the important uses of the mv command is to rename files and directories. Let's see how we can use this command for renaming.
We have first changed our location to test_directory. We then use the mv command to rename the _test_runner.py file to test.py.
There are five basic commands which are used frequently to view the files:
cat
head
tail
more
less
We will now try to understand what each command does and how to use these commands. You should also practice the given examples on the online Bash shell.
We will create a new file called numbers.txt and insert numbers from 1 to 100 in this file. Each number will be in a separate line.
Do not worry about the above command now. It's an advanced command which is used to generate numbers. We have then used a redirection operator to push these numbers to the file. We will be discussing I/O redirection in the later sections.
"},{"location":"level101/linux_basics/command_line_basics/#cat","title":"cat","text":"The most simplest use of cat command is to print the contents of the file on your output screen. This command is very useful and can be used for many other purposes. We will study about other use cases later.
You can try to run the above command and you will see numbers being printed from 1 to 100 on your screen. You will need to scroll up to view all the numbers.
"},{"location":"level101/linux_basics/command_line_basics/#head","title":"head","text":"The head command displays the first 10 lines of the file by default. We can include additional arguments to display as many lines as we want from the top.
In this example, we are only able to see the first 10 lines from the file when we use the head command.
By default, head command will only display the first 10 lines. If we want to specify the number of lines we want to see from start, use the -n argument to provide the input.
The tail command displays the last 10 lines of the file by default. We can include additional arguments to display as many lines as we want from the end of the file.
By default, the tail command will only display the last 10 lines. If we want to specify the number of lines we want to see from the end, use -n argument to provide the input.
In this example, we are only able to see the last 5 lines from the file when we use the tail command with explicit -n option.
The more command displays the contents of a file or a command output, displaying one screen at a time in case the file is large (Eg: log files). It also allows forward navigation and limited backward navigation in the file.
The more command displays as much as can fit on the current screen and waits for user input to advance. Forward navigation can be done by pressing Enter, which advances the output by one line and Space, which advances the output by one screen.
The less command is an improved version of more. It displays the contents of a file or a command output, one page at a time. It allows backward navigation as well as forward navigation in the file and also has search options. We can use arrow keys for advancing backward or forward by one line. For moving forward by one page, press Space and for moving backward by one page, press b on your keyboard. You can go to the beginning and the end of a file instantly.
The echo command is one of the simplest commands that is used in the shell. This command is equivalent to print in other programming languages.
The echo command prints the given input string on the screen.
In the previous section, we learned how to view the content of a file. In many cases, we will be interested in performing the below operations:
Print only the lines which contain a particular word(s)
Replace a particular word with another word in a file
Sort the lines in a particular order
There are three basic commands which are used frequently to process texts:
grep
sed
sort
We will now try to understand what each command does and how to use these commands. You should also practice the given examples on the online Bash shell.
We will create a new file called numbers.txt and insert numbers from 1 to 10 in this file. Each number will be in a separate line.
The grep command in its simplest form can be used to search particular words in a text file. It will display all the lines in a file that contains a particular input. The word we want to search is provided as an input to the grep command.
General syntax of using grep command:
grep <word_to_search> <file_name>\n In this example, we are trying to search for a string \"1\" in this file. The grep command outputs the lines where it found this string.
The sed command in its simplest form can be used to replace a text in a file.
General syntax of using the sed command for replacement:
sed 's/<text_to_replace>/<replacement_text>/' <file_name>\n Let's try to replace each occurrence of \"1\" in the file with \"3\" using sed command.
The content of the file will not change in the above example. To do so, we have to use an extra argument -i so that the changes are reflected back in the file.
The sort command can be used to sort the input provided to it as an argument. By default, it will sort in increasing order.
Let's first see the content of the file before trying to sort it.
Now, we will try to sort the file using the sort command. The sort command sorts the content in lexicographical order.
The content of the file will not change in the above example.
"},{"location":"level101/linux_basics/command_line_basics/#io-redirection","title":"I/O Redirection","text":"Each open file gets assigned a file descriptor. A file descriptor is an unique identifier for open files in the system. There are always three default files open, stdin (the keyboard), stdout (the screen), and stderr (error messages output to the screen). These files can be redirected.
Everything is a file in Linux - https://unix.stackexchange.com/questions/225537/everything-is-a-file
Till now, we have displayed all the output on the screen which is the standard output. We can use some special operators to redirect the output of the command to files or even to the input of other commands. I/O redirection is a very powerful feature.
In the below example, we have used the > operator to redirect the output of ls command to output.txt file.
In the below example, we have redirected the output from echo command to a file.
We can also redirect the output of a command as an input to another command. This is possible with the help of pipes.
In the below example, we have passed the output of cat command as an input to grep command using pipe (|) operator.
In the below example, we have passed the output of sort command as an input to uniq command using pipe (|) operator. The uniq command only prints the unique numbers from the input.
I/O redirection - https://tldp.org/LDP/abs/html/io-redirection.html
"},{"location":"level101/linux_basics/conclusion/","title":"Conclusion","text":"We have covered the basics of Linux operating systems and basic commands used in Linux. We have also covered the Linux server administration commands.
We hope that this course will make it easier for you to operate on the command line.
"},{"location":"level101/linux_basics/conclusion/#applications-in-sre-role","title":"Applications in SRE Role","text":"ls, pwd and cd commands.grep command would be very useful here. I/O redirection will become handy if you want to store the output in a file or pass it as an input to another command.tail command is very useful to view the latest data in the log file.chown, chmod and chgrp commands.ssh is one of the most frequently used commands for a SRE. Logging into servers and troubleshooting along with performing basic administration tasks will only be possible if we are able to login into the server.systemd-related commands can help in troubleshooting issues. If a service goes down, we can start it using systemctl start command. We can also stop a service in case it is not needed.top and free are quite helpful here.This course is divided into three parts. In the first part, we cover the fundamentals of Linux operating systems. We will talk about Linux architecture, Linux distributions and uses of Linux operating systems. We will also talk about the difference between GUI and CLI.
In the second part, we cover some basic commands used in Linux. We will focus on commands used for navigating the file system, viewing and manipulating files, I/O redirection, etc.
In the third part, we cover Linux system administration. This includes day-to-day tasks performed by Linux admins, like managing users/groups, managing file permissions, monitoring system performance, log files etc.
In the second and third part, we will be showing examples to understand the concepts.
"},{"location":"level101/linux_basics/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"We are not covering advanced Linux commands and Bash scripting in this course. We will also not be covering Linux internals.
"},{"location":"level101/linux_basics/intro/#course-contents","title":"Course Contents","text":"The following topics has been covered in this course:
Most of us are familiar with the Windows operating system used in more than 75% of the personal computers. The Windows operating systems are based on Windows NT kernel.
A kernel is the most important part of an operating system\u2014it performs important functions like process management, memory management, filesystem management, etc.
Linux operating systems are based on the Linux kernel. A Linux-based operating system will consist of Linux kernel, GUI/CLI, system libraries and system utilities. The Linux kernel was independently developed and released by Linus Torvalds. The Linux kernel is free and open-source (See https://github.com/torvalds/linux).
Linux is a kernel and not a complete operating system. Linux kernel is combined with GNU system to make a complete operating system. Therefore, Linux-based operating systems are also called as GNU/Linux systems. GNU is an extensive collection of free softwares like compiler, debugger, C library etc. (See Linux and the GNU System)
History of Linux - https://en.wikipedia.org/wiki/History_of_Linux
"},{"location":"level101/linux_basics/intro/#what-are-popular-linux-distributions","title":"What are popular Linux distributions","text":"A Linux distribution (distro) is an operating system based on the Linux kernel and a package management system. A package management system consists of tools that help in installing, upgrading, configuring and removing softwares on the operating system.
Software are usually adopted to a distribution and are packaged in a distro-specific format. These packages are available through a distro-specific repository. Packages are installed and managed in the operating system by a package manager.
List of popular Linux distributions:
Fedora
Ubuntu
Debian
Centos
Red Hat Enterprise Linux
Suse
Arch Linux
.deb) Debian, Ubuntu APT Red Hat style (.rpm) Fedora, CentOS, Red Hat Enterprise Linux YUM"},{"location":"level101/linux_basics/intro/#linux-architecture","title":"Linux Architecture","text":"The Linux kernel is monolithic in nature.
System calls are used to interact with the Linux kernel space.
Kernel code can only be executed in the kernel mode. Non-kernel code is executed in the user mode.
Device drivers are used to communicate with the hardware devices.
Operating system based on Linux kernel are widely used in:
Personal computers
Servers
Mobile phones - Android is based on Linux operating system
Embedded devices - watches, televisions, traffic lights, etc.
Satellites
Network devices - routers, switches, etc.
A user interacts with a computer with the help of user interfaces. The user interface can be either GUI or CLI.
Graphical user interface allows a user to interact with the computer using graphics such as icons and images. When a user clicks on an icon to open an application on a computer, he or she is actually using the GUI. It's easy to perform tasks using GUI.
Command line interface allows a user to interact with the computer using commands. A user types the command in a terminal and the system helps in executing these commands. A new user with experience on GUI may find it difficult to interact with CLI as he/she needs to be aware of the commands to perform a particular operation.
"},{"location":"level101/linux_basics/intro/#shell-vs-terminal","title":"Shell vs Terminal","text":"Shell is a program that takes commands from the users and gives them to the operating system for processing. Shell is an example of a CLI (command line interface). Bash is one of the most popular shell programs available on Linux servers. Other popular shell programs are zsh, ksh and tcsh.
Terminal is a program that opens a window and lets you interact with the shell. Some popular examples of terminals are GNOME-terminal, xterm, Konsole, etc.
Linux users do use the terms shell, terminal, prompt, console, etc. interchangeably. In simple terms, these all refer to a way of taking commands from the user.
"},{"location":"level101/linux_basics/linux_server_administration/","title":"Linux Server Administration","text":"In this course, will try to cover some of the common tasks that a Linux server administrator performs. We will first try to understand what a particular command does and then try to understand the commands using examples. Do keep in mind that it's very important to practice the Linux commands on your own.
"},{"location":"level101/linux_basics/linux_server_administration/#lab-environment-setup","title":"Lab Environment Setup","text":"Install docker on your system - https://docs.docker.com/engine/install/ OR you can use online Docker playground
We will be running all the commands on Red Hat Enterprise Linux (RHEL) 8 system.
An operating system is considered as multi-user if it allows multiple people/users to use a computer and not affect each other's files and preferences. Linux-based operating systems are multi-user in nature as it allows multiple users to access the system at the same time. A typical computer will only have one keyboard and monitor but multiple users can log in via SSH if the computer is connected to the network. We will cover more about SSH later.
As a server administrator, we are mostly concerned with the Linux servers which are physically present at a very large distance from us. We can connect to these servers with the help of remote login methods like SSH.
Since Linux supports multiple users, we need to have a method which can protect the users from each other. One user should not be able to access and modify files of other users
"},{"location":"level101/linux_basics/linux_server_administration/#usergroup-management","title":"User/Group Management","text":"Users in Linux has an associated user ID called UID attached to them.
Users also has a home directory and a login shell associated with them.
A group is a collection of one or more users. A group makes it easier to share permissions among a group of users.
Each group has a group ID called GID associated with it.
id command can be used to find the uid and gid associated with an user. It also lists down the groups to which the user belongs to.
The uid and gid associated with the root user is 0.
A good way to find out the current user in Linux is to use the whoami command.
root user or superuser is the most privileged user with unrestricted access to all the resources on the system. It has UID 0
uid, the gid, the home directory, the login shell etc /etc/shadow Stores the password associated with the users /etc/group Stores information about different groups on the system If you want to understand each field discussed in the above outputs, you can go through below links:
https://tldp.org/LDP/lame/LAME/linux-admin-made-easy/shadow-file-formats.html
https://tldp.org/HOWTO/User-Authentication-HOWTO/x71.html
Some of the commands which are used frequently to manage users/groups on Linux are following:
useradd - Creates a new userpasswd - Adds or modifies passwords for a userusermod - Modifies attributes of an useruserdel - Deletes an userThe useradd command adds a new user in Linux.
We will create a new user shivam. We will also verify that the user has been created by tailing the /etc/passwd file. The uid and gid are 1000 for the newly created user. The home directory assigned to the user is /home/shivam and the login shell assigned is /bin/bash. Do note that the user home directory and login shell can be modified later on.
If we do not specify any value for attributes like home directory or login shell, default values will be assigned to the user. We can also override these default values when creating a new user.
"},{"location":"level101/linux_basics/linux_server_administration/#passwd","title":"passwd","text":"The passwd command is used to create or modify passwords for a user.
In the above examples, we have not assigned any password for users shivam or amit while creating them.
!! in an account entry in shadow means the account of an user has been created, but not yet given a password.
Let's now try to create a password for user shivam.
Do remember the password as we will be later using examples where it will be useful.
Also, let's change the password for the root user now. When we switch from a normal user to root user, it will request you for a password. Also, when you login using root user, the password will be asked.
"},{"location":"level101/linux_basics/linux_server_administration/#usermod","title":"usermod","text":"The usermod command is used to modify the attributes of an user like the home directory or the shell.
Let's try to modify the login shell of user amit to /bin/bash.
In a similar way, you can also modify many other attributes for a user. Try usermod -h for a list of attributes you can modify.
The userdel command is used to remove a user on Linux. Once we remove a user, all the information related to that user will be removed.
Let's try to delete the user amit. After deleting the user, you will not find the entry for that user in /etc/passwd or /etc/shadow file.
Commands for managing groups are quite similar to the commands used for managing users. Each command is not explained in detail here as they are quite similar. You can try running these commands on your system.
Command Description groupadd <group_name> Creates a new group groupmod <group_name> Modifies attributes of a group groupdel <group_name> Deletes a group gpasswd <group_name> Modifies password for groupWe will now try to add user shivam to the group we have created above.
Before running the below commands, do make sure that you have set up a password for user shivam and user root using the passwd command described in the above section.
The su command can be used to switch users in Linux. Let's now try to switch to user shivam.
Let's now try to open the /etc/shadow file.
The operating system didn't allow the user shivam to read the content of the /etc/shadow file. This is an important file in Linux which stores the passwords of users. This file can only be accessed by root or users who have the superuser privileges.
The sudo command allows a user to run commands with the security privileges of the root user. Do remember that the root user has all the privileges on a system. We can also use su command to switch to the root user and open the above file but doing that will require the password of the root user. An alternative way which is preferred on most modern operating systems is to use sudo command for becoming a superuser. Using this way, a user has to enter his/her password and they need to be a part of the sudo group.
How to provide superpriveleges to other users ?
Let's first switch to the root user using su command. Do note that using the below command will need you to enter the password for the root user.
In case, you forgot to set a password for the root user, type exit and you will be back as the root user. Now, set up a password using the passwd command.
The file /etc/sudoers holds the names of users permitted to invoke sudo. In Red Hat operating systems, this file is not present by default. We will need to install sudo.
We will discuss the yum command in detail in later sections.
Try to open the /etc/sudoers file on the system. The file has a lot of information. This file stores the rules that users must follow when running the sudo command. For example, root is allowed to run any commands from anywhere.
One easy way of providing root access to users is to add them to a group which has permissions to run all the commands. wheel is a group in Red Hat Linux with such privileges.
Let's add the user shivam to this group so that it also has sudo privileges.
Let's now switch back to user shivam and try to access the /etc/shadow file.
We need to use sudo before running the command since it can only be accessed with the sudo privileges. We have already given sudo privileges to user shivam by adding him to the group wheel.
On a Linux operating system, each file and directory is assigned access permissions for the owner of the file, the members of a group of related users and everybody else. This is to make sure that one user is not allowed to access the files and resources of another user.
To see the permissions of a file, we can use the ls command. Let's look at the permissions of /etc/passwd file.
Let's go over some of the important fields in the output that are related to file permissions.
"},{"location":"level101/linux_basics/linux_server_administration/#chmod-command","title":"Chmod command","text":"The chmod command is used to modify files and directories permissions in Linux.
The chmod command accepts permissions in as a numerical argument. We can think of permission as a series of bits with 1 representing True or allowed and 0 representing False or not allowed.
We will now create a new file and check the permission of the file.
The group owner doesn't have the permission to write to this file. Let's give the group owner or root the permission to write to it using chmod command.
chmod command can be also used to change the permissions of a directory in the similar way.
The chown command is used to change the owner of files or directories in Linux.
Command syntax: chown \\<new_owner\\> \\<file_name\\>
In case, we do not have sudo privileges, we need to use sudo command. Let's switch to user shivam and try changing the owner. We have also changed the owner of the file to root before running the below command.
Chown command can also be used to change the owner of a directory in the similar way.
"},{"location":"level101/linux_basics/linux_server_administration/#chgrp-command","title":"Chgrp command","text":"The chgrp command can be used to change the group ownership of files or directories in Linux. The syntax is very similar to that of chown command.
chgrp command can also be used to change the owner of a directory in the similar way.
The ssh command is used for logging into the remote systems, transfer files between systems and for executing commands on a remote machine. SSH stands for secure shell and is used to provide an encrypted secured connection between two hosts over an insecure network like the internet.
Reference: https://www.ssh.com/ssh/command/
We will now discuss passwordless authentication which is secure and most commonly used for ssh authentication.
Using this method, we can ssh into hosts without entering the password. This method is also useful when we want some scripts to perform ssh-related tasks.
Passwordless authentication requires the use of a public and private key pair. As the name implies, the public key can be shared with anyone but the private key should be kept private. Let's not get into the details of how this authentication works. You can read more about it here
Steps for setting up a passwordless authentication with a remote host:
Generating public-private key pair
If we already have a key pair stored in ~/.ssh directory, we will not need to generate keys again.
Install openssh package which contains all the commands related to ssh.
Generate a key pair using the ssh-keygen command. One can choose the default values for all prompts.
After running the ssh-keygen command successfully, we should see two keys present in the ~/.ssh directory. id_rsa is the private key and id_rsa.pub is the public key. Do note that the private key can only be read and modified by you.
Transferring the public key to the remote host
There are multiple ways to transfer the public key to the remote server. We will look at one of the most common ways of doing it using the ssh-copy-id command.
Install the openssh-clients package to use ssh-copy-id command.
Use the ssh-copy-id command to copy your public key to the remote host.
Now, ssh into the remote host using the password authentication.
Our public key should be there in ~/.ssh/authorized_keys now.
~/.ssh/authorized_key contains a list of public keys. The users associated with these public keys have the ssh access into the remote host.
General syntax:
ssh \\<user\\>@\\<hostname/hostip\\> \\<command\\>\n "},{"location":"level101/linux_basics/linux_server_administration/#how-to-transfer-files-from-one-host-to-another-host","title":"How to transfer files from one host to another host ?","text":"General syntax:
scp \\<source\\> \\<destination\\>\n "},{"location":"level101/linux_basics/linux_server_administration/#package-management","title":"Package Management","text":"Package management is the process of installing and managing software on the system. We can install the packages which we require from the Linux package distributor. Different distributors use different packaging systems.
Packaging systems Distributions Debian style (.deb) Debian, Ubuntu Red Hat style (.rpm) Fedora, CentOS, Red Hat Enterprise Linux Popular Packaging Systems in Linux
Command Description yum install <package_name> Installs a package on your system yum update <package_name> Updates a package to its latest available version yum remove <package_name> Removes a package from your system yum search <keyword> Searches for a particular keywordDNF is the successor to YUM which is now used in Fedora for installing and managing packages. DNF may replace YUM in the future on all RPM-based Linux distributions.
We did find an exact match for the keyword httpd when we searched using yum search command. Let's now install the httpd package.
After httpd is installed, we will use the yum remove command to remove httpd package.
In this section, we will study about some useful commands that can be used to monitor the processes on Linux systems.
"},{"location":"level101/linux_basics/linux_server_administration/#ps-process-status","title":"ps (process status)","text":"The ps command is used to know the information of a process or list of processes.
If you get an error \"ps command not found\" while running ps command, do install procps package.
ps without any arguments is not very useful. Let's try to list all the processes on the system by using the below command.
Reference: https://unix.stackexchange.com/questions/106847/what-does-aux-mean-in-ps-aux
We can use an additional argument with ps command to list the information about the process with a specific process ID (PID).
We can use grep in combination with ps command to list only specific processes.
The top command is used to show information about Linux processes running on the system in real time. It also shows a summary of the system information.
For each process, top lists down the process ID, owner, priority, state, CPU utilization, memory utilization and much more information. It also lists down the memory utilization and CPU utilization of the system as a whole along with system uptime and CPU load average.
In this section, we will study about some useful commands that can be used to view information about the system memory.
"},{"location":"level101/linux_basics/linux_server_administration/#free","title":"free","text":"The free command is used to display the memory usage of the system. The command displays the total free and used space available in the RAM along with space occupied by the caches/buffers.
free command by default shows the memory usage in kilobytes. We can use an additional argument to get the data in human-readable format.
The vmstat command can be used to display the memory usage along with additional information about IO and CPU usage.
In this section, we will study about some useful commands that can be used to view disk space on Linux.
"},{"location":"level101/linux_basics/linux_server_administration/#df-disk-free","title":"df (disk free)","text":"The df command is used to display the free and available space for each mounted file system.
The du command is used to display disk usage of files and directories on the system.
The below command can be used to display the top 5 largest directories in the root directory.
A computer program that runs as a background process is called a daemon. Traditionally, the name of daemon processes ends with d - sshd, httpd, etc. We cannot interact with a daemon process as they run in the background.
Services and daemons are used interchangeably most of the time.
"},{"location":"level101/linux_basics/linux_server_administration/#systemd","title":"Systemd","text":"systemd is a system and service manager for Linux operating systems. systemd units are the building blocks of systemd. These units are represented by unit configuration files.
The below examples shows the unit configuration files available at /usr/lib/systemd/system which are distributed by installed RPM packages. We are more interested in the configuration file that ends with service as these are service units.
Service units end with .service file extension. systemctl command can be used to start/stop/restart the services managed by systemd.
In this section, we will talk about some important files and directories which can be very useful for viewing system logs and applications logs in Linux. These logs can be very useful when you are troubleshooting on the system.
"},{"location":"level101/linux_networking/conclusion/","title":"Conclusion","text":"With this, we have traversed through the TCP/IP stack completely. We hope there will be a different perspective when one opens any website in the browser post the course.
During the course we have also dissected what are common tasks in this pipeline which falls under the ambit of SRE.
"},{"location":"level101/linux_networking/conclusion/#post-training-exercises","title":"Post Training Exercises","text":"dev environment which acts as an authoritative DNS server for example.com and forwarder for other domains. Update resolv.conf to use the new DNS resolver running in localhost.dummy.example.com in localhost and run a webserver with a self-signed certificate. Update the trusted CAs or pass self-signed CA\u2019s public key as a parameter so that curl https://dummy.example.com -v works properly without self-signed cert warning.8.8.8.8/32 and run ping 8.8.8.8. Do the packet capture on the new gateway to see L3 hop is working as expected (might need to disable icmp_redirect).Domain Names are the simple human-readable names for websites. The Internet understands only IP addresses, but since memorizing incoherent numbers is not practical, domain names are used instead. These domain names are translated into IP addresses by the DNS infrastructure. When somebody tries to open www.linkedin.com in the browser, the browser tries to convert www.linkedin.com to an IP Address. This process is called DNS resolution. A simple pseudocode depicting this process looks this:
ip, err = getIPAddress(domainName)\nif err:\n print(\"unknown Host Exception while trying to resolve:%s\".format(domainName))\n Now, let\u2019s try to understand what happens inside the getIPAddress function. The browser would have a DNS cache of its own where it checks if there is a mapping for the domainName to an IP Address already available, in which case the browser uses that IP address. If no such mapping exists, the browser calls gethostbyname syscall to ask the operating system to find the IP address for the given domainName.
def getIPAddress(domainName):\n resp, fail = lookupCache(domainName)\n If not fail:\n return resp\n else:\n resp, err = gethostbyname(domainName)\n if err:\n return null, err\n else:\n return resp\n Now, let's understand what operating system kernel does when the gethostbyname function is called. The Linux operating system looks at the file /etc/nsswitch.conf file which usually has a line.
hosts: files dns\n This line means the OS has to look up first in file (/etc/hosts) and then use DNS protocol to do the resolution if there is no match in /etc/hosts.
The file /etc/hosts is of format:
IPAddress FQDN [FQDN].*
127.0.0.1 localhost.localdomain localhost\n::1 localhost.localdomain localhost\n If a match exists for a domain in this file, then that IP address is returned by the OS. Let's add a line to this file:
127.0.0.1 test.linkedin.com\n And then do ping test.linkedin.com.
ping test.linkedin.com -n\n PING test.linkedin.com (127.0.0.1) 56(84) bytes of data.\n64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0.047 ms\n64 bytes from 127.0.0.1: icmp_seq=2 ttl=64 time=0.036 ms\n64 bytes from 127.0.0.1: icmp_seq=3 ttl=64 time=0.037 ms\n\n As mentioned earlier, if no match exists in /etc/hosts, the OS tries to do a DNS resolution using the DNS protocol. The Linux system makes a DNS request to the first IP in /etc/resolv.conf. If there is no response, requests are sent to subsequent servers in resolv.conf. These servers in resolv.conf are called DNS resolvers. The DNS resolvers are populated by DHCP or statically configured by an administrator. Dig is a userspace DNS system which creates and sends request to DNS resolvers and prints the response it receives to the console.
# run this command in one shell to capture all DNS requests\nsudo tcpdump -s 0 -A -i any port 53\n# make a dig request from another shell\ndig linkedin.com\n 13:19:54.432507 IP 172.19.209.122.56497 > 172.23.195.101.53: 527+ [1au] A? linkedin.com. (41)\n....E..E....@.n....z...e...5.1.:... .........linkedin.com.......)........\n13:19:54.485131 IP 172.23.195.101.53 > 172.19.209.122.56497: 527 1/0/1 A 108.174.10.10 (57)\n....E..U..@.|. ....e...z.5...A...............linkedin.com..............3..l.\n\n..)........\n The packet capture shows a request is made to 172.23.195.101:53 (this is the resolver in /etc/resolv.conf) for linkedin.com and a response is received from 172.23.195.101 with the IP address of linkedin.com 108.174.10.10.
Now, let's try to understand how DNS resolver tries to find the IP address of linkedin.com. DNS resolver first looks at its cache. Since many devices in the network can query for the domain name linkedin.com, the name resolution result may already exist in the cache. If there is a cache miss, it starts the DNS resolution process. The DNS server breaks \u201clinkedin.com\u201d to \u201c.\u201d, \u201ccom.\u201d and \u201clinkedin.com.\u201d and starts DNS resolution from \u201c.\u201d. The \u201c.\u201d is called root domain and those IPs are known to the DNS resolver software. DNS resolver queries the root domain nameservers to find the right top-level domain (TLD) nameservers which could respond regarding details for \"com.\". The address of the TLD nameserver of \u201ccom.\u201d is returned. Now the DNS resolution service contacts the TLD nameserver for \u201ccom.\u201d to fetch the authoritative nameserver for \u201clinkedin.com\u201d. Once an authoritative nameserver of \u201clinkedin.com\u201d is known, the resolver contacts LinkedIn\u2019s nameserver to provide the IP address of \u201clinkedin.com\u201d. This whole process can be visualized by running the following:
dig +trace linkedin.com\n linkedin.com. 3600 IN A 108.174.10.10\n This DNS response has 5 fields where the first field is the request and the last field is the response. The second field is the Time-to-Live (TTL) which says how long the DNS response is valid in seconds. In this case, this mapping of linkedin.com is valid for 1 hour. This is how the resolvers and application (browser) maintain their cache. Any request for linkedin.com beyond 1 hour will be treated as a cache miss as the mapping has expired its TTL and the whole process has to be redone. The 4th field says the type of DNS response/request. Some of the various DNS query types are A, AAAA, NS, TXT, PTR, MX and CNAME.
2-01-2c3e-005a.cdx.cedexis.net.dig A linkedin.com +short\n108.174.10.10\n\n\ndig AAAA linkedin.com +short\n2620:109:c002::6cae:a0a\n\n\ndig NS linkedin.com +short\ndns3.p09.nsone.net.\ndns4.p09.nsone.net.\ndns2.p09.nsone.net.\nns4.p43.dynect.net.\nns1.p43.dynect.net.\nns2.p43.dynect.net.\nns3.p43.dynect.net.\ndns1.p09.nsone.net.\n\ndig www.linkedin.com CNAME +short\n2-01-2c3e-005a.cdx.cedexis.net.\n Armed with these fundamentals of DNS lets see use cases where DNS is used by SREs.
"},{"location":"level101/linux_networking/dns/#applications-in-sre-role","title":"Applications in SRE role","text":"This section covers some of the common solutions SRE can derive from DNS.
serviceb.internal.example.com could list instances which run service b internally in example.com company. Cloud providers provide options to enable DNS discovery (example).Till this point we have only got the IP address of linkedin.com. The HTML page of linkedin.com is served by HTTP protocol which the browser renders. Browser sends a HTTP request to the IP of the server determined above. Request has a verb GET, PUT, POST followed by a path and query parameters and lines of key-value pair which gives information about the client and capabilities of the client like contents it can accept and a body (usually in POST or PUT).
# Eg. run the following in your container and have a look at the headers \ncurl linkedin.com -v\n * Connected to linkedin.com (108.174.10.10) port 80 (#0)\n> GET / HTTP/1.1\n> Host: linkedin.com\n> User-Agent: curl/7.64.1\n> Accept: */*\n> \n< HTTP/1.1 301 Moved Permanently\n< Date: Mon, 09 Nov 2020 10:39:43 GMT\n< X-Li-Pop: prod-esv5\n< X-LI-Proto: http/1.1\n< Location: https://www.linkedin.com/\n< Content-Length: 0\n< \n* Connection #0 to host linkedin.com left intact\n* Closing connection 0\n Here, in the first line GET is the verb, / is the path and 1.1 is the HTTP protocol version. Then there are key-value pairs which give client capabilities and some details to the server. The server responds back with HTTP version, Status Code and Status message. Status codes 2xx means success, 3xx denotes redirection, 4xx denotes client-side errors and 5xx server-side errors.
We will now jump in to see the difference between HTTP/1.0 and HTTP/1.1.
#On the terminal type\ntelnet www.linkedin.com 80\n#Copy and paste the following with an empty new line at last in the telnet STDIN\nGET / HTTP/1.1\nHOST:linkedin.com\nUSER-AGENT: curl\n\n This would get server response and waits for next input as the underlying connection to www.linkedin.com can be reused for further queries. While going through TCP, we can understand the benefits of this. But in HTTP/1.0, this connection will be immediately closed after the response meaning new connection has to be opened for each query. HTTP/1.1 can have only one inflight request in an open connection but connection can be reused for multiple requests one after another. One of the benefits of HTTP/2.0 over HTTP/1.1 is we can have multiple inflight requests on the same connection. We are restricting our scope to generic HTTP and not jumping to the intricacies of each protocol version but they should be straight forward to understand post the course.
HTTP is called stateless protocol. This section we will try to understand what stateless means. Say we logged in to linkedin.com, each request to linkedin.com from the client will have no context of the user and it makes no sense to prompt user to login for each page/resource. This problem of HTTP is solved by COOKIE. A user is created a session when a user logs in. This session identifier is sent to the browser via SET-COOKIE header. The browser stores the COOKIE till the expiry set by the server and sends the cookie for each request from hereon for linkedin.com. More details on cookies are available here. Cookies are a critical piece of information like password and since HTTP is a plain text protocol, any man-in-the-middle can capture either password or cookies and can breach the privacy of the user. Similarly as discussed during DNS, a spoofed IP of linkedin.com can cause a phishing attack on users where an user can give LinkedIn\u2019s password to login on the malicious site. To solve both problems, HTTPS came in place and HTTPS has to be mandated.
HTTPS has to provide server identification and encryption of data between client and server. The server administrator has to generate a private-public key pair and certificate request. This certificate request has to be signed by a certificate authority which converts the certificate request to a certificate. The server administrator has to update the certificate and private key to the webserver. The certificate has details about the server (like domain name for which it serves, expiry date), public key of the server. The private key is a secret to the server and losing the private key loses the trust the server provides. When clients connect, the client sends a HELLO. The server sends its certificate to the client. The client checks the validity of the cert by seeing if it is within its expiry time, if it is signed by a trusted authority and the hostname in the cert is the same as the server. This validation makes sure the server is the right server and there is no phishing. Once that is validated, the client negotiates a symmetrical key and cipher with the server by encrypting the negotiation with the public key of the server. Nobody else other than the server who has the private key can understand this data. Once negotiation is complete, that symmetric key and algorithm is used for further encryption which can be decrypted only by client and server from thereon as they only know the symmetric key and algorithm. The switch to symmetric algorithm from asymmetric encryption algorithm is to not strain the resources of client devices as symmetric encryption is generally less resource intensive than asymmetric.
# Try the following on your terminal to see the cert details like Subject Name (domain name), Issuer details, Expiry date\ncurl https://www.linkedin.com -v \n * Connected to www.linkedin.com (13.107.42.14) port 443 (#0)\n* ALPN, offering h2\n* ALPN, offering http/1.1\n* successfully set certificate verify locations:\n* CAfile: /etc/ssl/cert.pem\n CApath: none\n* TLSv1.2 (OUT), TLS handshake, Client hello (1):\n} [230 bytes data]\n* TLSv1.2 (IN), TLS handshake, Server hello (2):\n{ [90 bytes data]\n* TLSv1.2 (IN), TLS handshake, Certificate (11):\n{ [3171 bytes data]\n* TLSv1.2 (IN), TLS handshake, Server key exchange (12):\n{ [365 bytes data]\n* TLSv1.2 (IN), TLS handshake, Server finished (14):\n{ [4 bytes data]\n* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):\n} [102 bytes data]\n* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):\n} [1 bytes data]\n* TLSv1.2 (OUT), TLS handshake, Finished (20):\n} [16 bytes data]\n* TLSv1.2 (IN), TLS change cipher, Change cipher spec (1):\n{ [1 bytes data]\n* TLSv1.2 (IN), TLS handshake, Finished (20):\n{ [16 bytes data]\n* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384\n* ALPN, server accepted to use h2\n* Server certificate:\n* subject: C=US; ST=California; L=Sunnyvale; O=LinkedIn Corporation; CN=www.linkedin.com\n* start date: Oct 2 00:00:00 2020 GMT\n* expire date: Apr 2 12:00:00 2021 GMT\n* subjectAltName: host \"www.linkedin.com\" matched cert's \"www.linkedin.com\"\n* issuer: C=US; O=DigiCert Inc; CN=DigiCert SHA2 Secure Server CA\n* SSL certificate verify ok.\n* Using HTTP2, server supports multi-use\n* Connection state changed (HTTP/2 confirmed)\n* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0\n* Using Stream ID: 1 (easy handle 0x7fb055808200)\n* Connection state changed (MAX_CONCURRENT_STREAMS == 100)!\n 0 82117 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\n* Connection #0 to host www.linkedin.com left intact\nHTTP/2 200 \ncache-control: no-cache, no-store\npragma: no-cache\ncontent-length: 82117\ncontent-type: text/html; charset=utf-8\nexpires: Thu, 01 Jan 1970 00:00:00 GMT\nset-cookie: JSESSIONID=ajax:2747059799136291014; SameSite=None; Path=/; Domain=.www.linkedin.com; Secure\nset-cookie: lang=v=2&lang=en-us; SameSite=None; Path=/; Domain=linkedin.com; Secure\nset-cookie: bcookie=\"v=2&70bd59e3-5a51-406c-8e0d-dd70befa8890\"; domain=.linkedin.com; Path=/; Secure; Expires=Wed, 09-Nov-2022 22:27:42 GMT; SameSite=None\nset-cookie: bscookie=\"v=1&202011091050107ae9b7ac-fe97-40fc-830d-d7a9ccf80659AQGib5iXwarbY8CCBP94Q39THkgUlx6J\"; domain=.www.linkedin.com; Path=/; Secure; Expires=Wed, 09-Nov-2022 22:27:42 GMT; HttpOnly; SameSite=None\nset-cookie: lissc=1; domain=.linkedin.com; Path=/; Secure; Expires=Tue, 09-Nov-2021 10:50:10 GMT; SameSite=None\nset-cookie: lidc=\"b=VGST04:s=V:r=V:g=2201:u=1:i=1604919010:t=1605005410:v=1:sig=AQHe-KzU8i_5Iy6MwnFEsgRct3c9Lh5R\"; Expires=Tue, 10 Nov 2020 10:50:10 GMT; domain=.linkedin.com; Path=/; SameSite=None; Secure\nx-fs-txn-id: 2b8d5409ba70\nx-fs-uuid: 61bbf94956d14516302567fc882b0000\nexpect-ct: max-age=86400, report-uri=\"https://www.linkedin.com/platform-telemetry/ct\"\nx-xss-protection: 1; mode=block\ncontent-security-policy-report-only: default-src 'none'; connect-src 'self' www.linkedin.com www.google-analytics.com https://dpm.demdex.net/id lnkd.demdex.net blob: https://linkedin.sc.omtrdc.net/b/ss/ static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com; script-src 'sha256-THuVhwbXPeTR0HszASqMOnIyxqEgvGyBwSPBKBF/iMc=' 'sha256-PyCXNcEkzRWqbiNr087fizmiBBrq9O6GGD8eV3P09Ik=' 'sha256-2SQ55Erm3CPCb+k03EpNxU9bdV3XL9TnVTriDs7INZ4=' 'sha256-S/KSPe186K/1B0JEjbIXcCdpB97krdzX05S+dHnQjUs=' platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com; img-src data: blob: *; font-src data: *; style-src 'self' 'unsafe-inline' static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com; media-src dms.licdn.com; child-src blob: *; frame-src 'self' lnkd.demdex.net linkedin.cdn.qualaroo.com; manifest-src 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=g\ncontent-security-policy: default-src *; connect-src 'self' https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id lnkd.demdex.net blob: https://accounts.google.com/gsi/status https://linkedin.sc.omtrdc.net/b/ss/ www.google-analytics.com static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media.licdn.com media-exp1.licdn.com media-exp2.licdn.com media-exp3.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/ platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l\nx-frame-options: sameorigin\nx-content-type-options: nosniff\nstrict-transport-security: max-age=2592000\nx-li-fabric: prod-lva1\nx-li-pop: afd-prod-lva1\nx-li-proto: http/2\nx-li-uuid: Ybv5SVbRRRYwJWf8iCsAAA==\nx-msedge-ref: Ref A: CFB9AC1D2B0645DDB161CEE4A4909AEF Ref B: BOM02EDGE0712 Ref C: 2020-11-09T10:50:10Z\ndate: Mon, 09 Nov 2020 10:50:10 GMT\n\n* Closing connection 0\n Here, my system has a list of certificate authorities it trusts in this file /etc/ssl/cert.pem. cURL validates the certificate is for www.linkedin.com by seeing the CN section of the subject part of the certificate. It also makes sure the certificate is not expired by seeing the expire date. It also validates the signature on the certificate by using the public key of issuer Digicert in /etc/ssl/cert.pem. Once this is done, using the public key of www.linkedin.com it negotiates cipher TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 with a symmetric key. Subsequent data transfer including first HTTP request uses the same cipher and symmetric key.
Throughout the course, we cover how an SRE can optimize the system to improve their web stack performance and troubleshoot if there is an issue in any of the layers of the networking stack. This course tries to dig through each layer of traditional TCP/IP stack and expects an SRE to have a picture beyond the bird\u2019s eye view of the functioning of the Internet.
"},{"location":"level101/linux_networking/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"This course spends time on the fundamentals. We are not covering concepts like HTTP/2.0, QUIC, TCP congestion control protocols, Anycast, BGP, CDN, Tunnels and Multicast. We expect that this course will provide the relevant basics to understand such concepts.
"},{"location":"level101/linux_networking/intro/#birds-eye-view-of-the-course","title":"Birds eye view of the course","text":"The course covers the question \u201cWhat happens when you open linkedin.com in your browser?\u201d The course follows the flow of TCP/IP stack. More specifically, the course covers topics of Application layer protocols (DNS and HTTP), transport layer protocols (UDP and TCP), networking layer protocol (IP) and data link layer protocol.
"},{"location":"level101/linux_networking/intro/#course-contents","title":"Course Contents","text":"We will dig how packets that leave the client reach the server and vice versa. When the packet reaches the IP layer, the transport layer populates source port, destination port. IP/Network layer populates destination IP (discovered from DNS) and then looks up the route to the destination IP on the routing table.
# Linux `route -n` command gives the default routing table\nroute -n\n Kernel IP routing table\nDestination Gateway Genmask Flags Metric Ref Use Iface\n0.0.0.0 172.17.0.1 0.0.0.0 UG 0 0 0 eth0\n172.17.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0\n Here, the destination IP is bitwise AND\u2019d with the Genmask and if the answer is the destination part of the table, then that gateway and interface is picked for routing. Here, linkedin.com\u2019s IP 108.174.10.10 is AND\u2019d with 255.255.255.0 and the answer we get is 108.174.10.0 which doesn\u2019t match with any destination in the routing table. Then, Linux does an AND of destination IP with 0.0.0.0 and we get 0.0.0.0. This answer matches the default row.
Routing table is processed in the order of more octets of 1 set in Genmask and Genmask 0.0.0.0 is the default route if nothing matches. At the end of this operation, Linux figured out that the packet has to be sent to next hop 172.17.0.1 via eth0. The source IP of the packet will be set as the IP of interface eth0. Now, to send the packet to 172.17.0.1, Linux has to figure out the MAC address of 172.17.0.1. MAC address is figured by looking at the internal ARP cache which stores translation between IP address and MAC address. If there is a cache miss, Linux broadcasts ARP request within the internal network asking who has 172.17.0.1. The owner of the IP sends an ARP response which is cached by the kernel and the kernel sends the packet to the gateway by setting Source MAC address as MAC address of eth0 and destination MAC address of 172.17.0.1 which we got just now. Similar routing lookup process is followed in each hop till the packet reaches the actual server. Transport layer and layers above it come to play only at end servers. During intermediate hops, only till the IP/Network layer is involved.
One weird gateway we saw in the routing table is 0.0.0.0. This gateway means no Layer3 (Network layer) hop is needed to send the packet. Both source and destination are in the same network. Kernel has to figure out the MAC of the destination and populate source and destination MAC appropriately and send the packet out so that it reaches the destination without any Layer3 hop in the middle.
As we followed in other modules, let's complete this session with SRE use cases.
"},{"location":"level101/linux_networking/ipr/#applications-in-sre-role","title":"Applications in SRE role","text":"TCP is a transport layer protocol like UDP but it guarantees reliability, flow control and congestion control. TCP guarantees reliable delivery by using sequence numbers. A TCP connection is established by a three-way handshake. In our case, the client sends a SYN packet along with the starting sequence number it plans to use, the server acknowledges the SYN packet and sends a SYN with its sequence number. Once the client acknowledges the SYN packet, the connection is established. Each data transferred from here on is considered delivered reliably once acknowledgement for that sequence is received by the concerned party.
# To understand handshake run packet capture on one bash session\ntcpdump -S -i any port 80\n# Run curl on one bash session\ncurl www.linkedin.com\n Here, client sends a SYN flag shown by [S] flag with a sequence number 1522264672. The server acknowledges receipt of SYN with an ACK [.] flag and a SYN flag for its sequence number [S]. The server uses the sequence number 1063230400 and acknowledges the client it's expecting sequence number 1522264673 (client sequence + 1). Client sends a zero length acknowledgement packet to the server (server sequence + 1) and connection stands established. This is called three way handshake. The client sends a 76 bytes length packet after this and increments its sequence number by 76. Server sends a 170 byte response and closes the connection. This was the difference we were talking about between HTTP/1.1 and HTTP/1.0. In HTTP/1.1, this same connection can be reused which reduces overhead of three-way handshake for each HTTP request. If a packet is missed between client and server, server won\u2019t send an ACK to the client and client would retry sending the packet till the ACK is received. This guarantees reliability. The flow control is established by the WIN size field in each segment. The WIN size says available TCP buffer length in the kernel which can be used to buffer received segments. A size 0 means the receiver has a lot of lag to catch from its socket buffer and the sender has to pause sending packets so that receiver can cope up. This flow control protects from slow receiver and fast sender problem.
TCP also does congestion control which determines how many segments can be in transit without an ACK. Linux provides us the ability to configure algorithms for congestion control which we are not covering here.
While closing a connection, client/server calls a close syscall. Let's assume client do that. Client\u2019s kernel will send a FIN packet to the server. Server\u2019s kernel can\u2019t close the connection till the close syscall is called by the server application. Once server app calls close, server also sends a FIN packet and client enters into TIME_WAIT state for 2*MSS (120s) so that this socket can\u2019t be reused for that time period to prevent any TCP state corruptions due to stray stale packets.
Armed with our TCP and HTTP knowledge, let's see how this is used by SREs in their role.
"},{"location":"level101/linux_networking/tcp/#applications-in-sre-role","title":"Applications in SRE role","text":"sysctl variables for rmem and wmem like we did for UDP can improve throughput of sender and receiver.sysctl variable tcp_max_syn_backlog and socket variable somax_conn determines how many connections for which the kernel can complete 3-way handshake before app calling accept syscall. This is much useful in single-threaded applications. Once the backlog is full, new connections stay in SYN_RCVD state (when you run netstat) till the application calls accept syscall.TIME_WAIT state (it has its own risk). Making apps reuse a pool of connections instead of creating ad hoc connection can also help.CLOSE_WAIT state is a problem on application whereas retransmissions can be a problem more on network or on OS stack than the application itself. Understanding the fundamentals can help us narrow down where the bottleneck is.UDP is a transport layer protocol. DNS is an application layer protocol that runs on top of UDP (most of the times). Before jumping into UDP, let's try to understand what an application and transport layer is. DNS protocol is used by a DNS client (eg dig) and DNS server (eg named). The transport layer makes sure the DNS request reaches the DNS server process and similarly the response reaches the DNS client process. Multiple processes can run on a system and they can listen on any ports. DNS servers usually listen on port number 53. When a client makes a DNS request, after filling the necessary application payload, it passes the payload to the kernel via sendto system call. The kernel picks a random port number (>1024) as source port number and puts 53 as destination port number and sends the packet to lower layers. When the kernel on server-side receives the packet, it checks the port number and queues the packet to the application buffer of the DNS server process which makes a recvfrom system call and reads the packet. This process by the kernel is called multiplexing (combining packets from multiple applications to same lower layers) and demultiplexing (segregating packets from single lower layer to multiple applications). Multiplexing and Demultiplexing is done by the Transport layer.
UDP is one of the simplest transport layer protocol and it does only multiplexing and demultiplexing. Another common transport layer protocol TCP does a bunch of other things like reliable communication, flow control and congestion control. UDP is designed to be lightweight and handle communications with little overhead. So, it doesn\u2019t do anything beyond multiplexing and demultiplexing. If applications running on top of UDP need any of the features of TCP, they have to implement that in their application.
This example from python wiki covers a sample UDP client and server where \u201cHello World\u201d is an application payload sent to server listening on port number 5005. The server receives the packet and prints the \u201cHello World\u201d string from the client.
sendto syscall from the application will hang till the kernel finds some of its buffer is freed. This can affect the throughput of the system. Increasing write memory buffer values using sysctl variables net.core.wmem_max and net.core.wmem_default provides some cushion to the application from the slow networkWe have covered basic concepts of Message Services. There is much more to learn and do. We hope this course gives you a good start and inspires you to explore further.
"},{"location":"level101/messagequeue/further_reading/#further-reading","title":"Further reading","text":"https://sudhir.io/the-big-little-guide-to-message-queues
Understanding message brokers: learn the mechanics of messaging though ActiveMQ and Kafka
Video: The Myth of the Magical Messaging Fabric by Jakub Korab
G. Fu, Y. Zhang and G. Yu, \"A Fair Comparison of Message Queuing Systems,\" in IEEE Access, vol. 9, pp. 421-432, 2021, doi: 10.1109/ACCESS.2020.3046503. (PDF)
Design Patterns for Cloud Native Applications: Chapter 2 Communication Patterns
Choose between Azure messaging services - Event Grid, Event Hubs, and Service Bus
Exactly-once message delivery
Task Queues
RabbitMQ tutorial
"},{"location":"level101/messagequeue/intro/","title":"Messaging services","text":""},{"location":"level101/messagequeue/intro/#what-to-expect-from-this-course","title":"What to expect from this course","text":"At the end of training, you will have an understanding of what a Message Services is, learn about different types of Message Service implementation and understand some of the underlying concepts & trade-offs.
"},{"location":"level101/messagequeue/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"We will not be deep diving into any specific Message Service.
"},{"location":"level101/messagequeue/intro/#course-contents","title":"Course Contents","text":"In today's distributed systems and microservices architectures, messaging services play a crucial role in ensuring reliable communication and coordination between different components. These services enable the asynchronous exchange of messages, providing a wide range of benefits, such as increased performance, improved fault tolerance, and enhanced scalability.
This article will provide an overview of the various types of messaging services available, including general-purpose message queues, pub/sub messaging, stream processing, brokerless messaging, and database-as-queue systems. We will also explore key concepts like delivery guarantees, message ordering, parallelism, poison pills, and dead letters, which are essential to understanding how messaging services function and how they can be effectively utilized.
"},{"location":"level101/messagequeue/intro/#types-of-messaging-services","title":"Types of Messaging services:","text":"In this section, we will explore various types of messaging services, each designed to address different requirements and use cases in distributed systems.
General-purpose message queue: General-purpose message queues are versatile and can be used in various non-very-scenarios, from distributing tasks and buffering requests to enabling communication between microservices. These messaging systems are designed to provide reliable message delivery and ensure that messages are processed in the correct order, and handle message volumes typically up to 100,000 messages per second. Message queues often support multiple messaging patterns, such as point-to-point and publish-subscribe, providing flexibility for different use cases. Examples of general-purpose message queues include RabbitMQ, ActiveMQ, and Amazon SQS. By using these message queues, developers can decouple their applications and scale them independently, improving overall system resilience and performance.
Pub/Sub messaging: Publish-Subscribe (Pub/Sub) messaging services allow publishers to send messages to multiple subscribers without direct point-to-point connections. This enables decoupling of producers and consumers, making the system more scalable and fault-tolerant. Pub/Sub systems are particularly useful in scenarios where multiple consumers need to receive and process the same messages, such as sending notifications, logging, or data replication. The Pub/Sub model supports dynamic subscription management, allowing consumers to subscribe and unsubscribe from specific topics or channels at runtime. Examples of Pub/Sub messaging services include Google Cloud Pub/Sub, Apache Pulsar, Azure Event Grid, AWS SNS and NATS. By adopting a Pub/Sub messaging system, developers can create event-driven architectures, reduce system complexity, and streamline the integration of new services.
Streaming processing: Stream processing services are designed to handle large volumes of real-time data (say 1 milion messages per second), allowing continuous processing and analysis of data streams. These services enable complex event processing, time-windowed aggregations, and stateful transformations. They provide a robust platform for building real-time analytics, monitoring, and alerting applications. Stream processing systems often use a combination of in-memory and disk-based storage to balance performance and durability. They also support horizontal scaling, allowing developers to process massive data volumes with low latency. Examples of stream processing services include Apache Kafka, Amazon Kinesis Data Streams, Azure Event Hubs, RocketMQ, Apache Pulsar and Redis Streams. By leveraging stream processing services, organizations can gain valuable insights from their data in real-time and make data-driven decisions more effectively.
Brokerless: Brokerless messaging systems enable direct communication between producers and consumers without relying on a central broker, thereby reducing latency and improving performance. In brokerless systems, nodes communicate with each other using a peer-to-peer architecture, which can simplify deployment and reduce the need for dedicated message broker infrastructure. These systems are particularly suitable for high-performance, low-latency applications or situations where network connectivity is intermittent or unreliable. Examples of brokerless messaging systems include ZeroMQ, nanomsg, Chronicle Queue and the Disruptor. By adopting a brokerless messaging system, developers can build lightweight, fast, and efficient communication channels between components in their distributed systems
Database-as-queue In some cases, a traditional relational or NoSQL database can be used as a message queue, allowing for simpler integration with existing systems and providing familiar tools for data management. This approach can be particularly useful for smaller-scale applications or as a transitional step when migrating from monolithic to distributed architectures. Using a database-as-queue can leverage built-in database features like transactions, indexing, and querying to manage messages effectively. Examples of using a database-as-queue include PostgreSQL's LISTEN/NOTIFY feature or leveraging Amazon DynamoDB Streams. While using a database-as-queue might not provide the same performance and scalability as dedicated messaging services and sometimes is considered as an anti-pattern, it can be a suitable option for specific use cases or when the application requirements are less demanding.
Let's looks at some of the key concepts when we talk about messaging system
"},{"location":"level101/messagequeue/key_concepts/#delivery-guarantees","title":"Delivery guarantees","text":"One of the essential aspects of messaging services is ensuring that messages are delivered to their intended recipients. Different systems offer varying levels of delivery guarantees, and it is crucial to understand these guarantees to choose the right messaging service for your needs.
at-most-once-delivery This guarantee ensures that a message is delivered at most once to its intended recipient. In other words, messages may be lost, but they will never be delivered more than once. This approach is suitable for scenarios where message loss is tolerable and duplication is not desired.
at-lesat-once-delivery Under this guarantee, a message will be delivered to its intended recipient at least once, but it may be delivered multiple times in case of failures. This approach is appropriate for situations where message loss is unacceptable, but duplication can be managed by the recipient.
exactly-once-delivery This guarantee ensures that a message is delivered exactly once to its intended recipient, with no loss or duplication. This is the most stringent level of delivery guarantee and is suitable for applications where both message loss and duplication are unacceptable. However, it's important to note that it is challenging, if not impossible, for any messaging system to guarantee exactly-once delivery due to the inherent complexities and potential failures in distributed systems.
Selecting the right delivery guarantee depends on the specific requirements of your application. For example, in financial transactions, an exactly-once delivery guarantee is essential to avoid double-processing of payments or missed transactions. In contrast, a log monitoring system may only require at-most-once delivery to reduce system overhead.
"},{"location":"level101/messagequeue/key_concepts/#messages-ordering-and-parallelism","title":"Messages ordering and parallelism","text":"Ensuring the correct order of messages and processing them in parallel can be a challenge in distributed messaging systems. The following strategies help maintain order and ensure parallelism:
Strict ordering: In some cases, maintaining strict order is essential, such as when processing financial transactions. This may require additional overhead, such as sequencing numbers, buffering, and reordering messages.
Partial ordering: Partial ordering can be used when only a subset of messages must be ordered. For example, messages within a specific group or partition must be processed in order, but messages between groups or partitions can be processed independently.
Unordered processing: In some scenarios, processing messages in any order is acceptable. This approach reduces complexity and enables higher parallelism, improving overall system performance.
Strategies to maintain order and ensure parallelism: Partitioning messages by a key, using sequencing numbers, and buffering can help maintain order while still allowing parallel processing. It is crucial to strike the right balance between ordering requirements and parallelism to optimize system performance.
"},{"location":"level101/messagequeue/key_concepts/#fan-out-in","title":"Fan Out / In","text":"Fan out and fan in are two crucial concepts in messaging systems that deal with the distribution of messages among multiple consumers and the aggregation of messages from multiple producers, respectively.
"},{"location":"level101/messagequeue/key_concepts/#fan-out","title":"Fan Out","text":"Fan out is a pattern where a single message is sent to multiple consumers, ensuring that each consumer receives a copy of the message. This can be achieved using the Publish-Subscribe (Pub/Sub) messaging pattern or by creating multiple bindings with unique routing keys in a message broker like RabbitMQ. Fan out is useful in scenarios where multiple services or applications need to process the same messages independently, such as sending notifications to multiple subscribers or replicating data across multiple databases.
"},{"location":"level101/messagequeue/key_concepts/#fan-in","title":"Fan In","text":"Fan in is a pattern where messages from multiple producers are aggregated and processed by a single consumer or a group of consumers. This can be achieved by using a message broker with multiple producers sending messages to a shared queue, which is then consumed by one or more consumers. Fan in is beneficial when you need to centralize processing or consolidate data from multiple sources, such as aggregating logs from various services or combining sensor data from multiple IoT devices.
"},{"location":"level101/messagequeue/key_concepts/#poison-pills-and-dead-letters","title":"Poison Pills and Dead Letters","text":"In messaging systems, poison pills are problematic messages that can cause failures or crashes in the message processing pipeline. To handle these messages, messaging services often employ Dead Letter Queues (DLQs).
A poison pill is a message that cannot be processed due to various reasons, such as invalid format, missing information, or incorrect data. When a consumer encounters a poison pill, it must handle it gracefully to avoid crashing or getting stuck in an infinite processing loop.
A Dead Letter Queues (DLQ) is a separate queue used to store poison pills or messages that could not be processed successfully. Instead of discarding problematic messages, they are redirected to a DLQ, allowing engineers to analyze and resolve the issues.
To handle poison pills effectively, you can implement error handling and monitoring, set up retries with backoff policies, and use DLQs for further analysis and resolution. Regularly monitor the DLQ, identify patterns causing poison pills, and implement fixes in the message processing pipeline to prevent future issues.
"},{"location":"level101/messagequeue/key_concepts/#messaging-patterns","title":"Messaging Patterns","text":""},{"location":"level101/messagequeue/key_concepts/#point-to-point-queue-based","title":"Point-to-Point (Queue-based)","text":"In this pattern, messages are sent from a single producer to a single consumer via a message queue. The message is consumed by only one consumer, even if there are multiple consumers listening to the queue. This pattern ensures that the message is processed by a single consumer, making it suitable for scenarios where messages must be processed in sequence or by specific consumers.
"},{"location":"level101/messagequeue/key_concepts/#publish-subscribe-pattern","title":"Publish-subscribe pattern","text":"The publish-subscribe pattern involves a producer sending messages to a topic, and multiple consumers subscribing to that topic to receive the messages. This pattern allows for one-to-many communication, where a single message can be delivered to multiple consumers simultaneously. It is ideal for event-driven architectures and applications that require real-time updates or notifications.
"},{"location":"level101/metrics_and_monitoring/alerts/","title":"Proactive Monitoring with Alerts","text":""},{"location":"level101/metrics_and_monitoring/alerts/#_1","title":"Proactive Monitoring with Alerts","text":""},{"location":"level101/metrics_and_monitoring/alerts/#proactive-monitoring-using-alerts","title":"Proactive monitoring using alerts","text":"Earlier we discussed different ways to collect key metric data points from a service and its underlying infrastructure. This data gives us a better understanding of how the service is performing. One of the main objectives of monitoring is to detect any service degradations early (reduce Mean Time To Detect) and notify stakeholders so that the issues are either avoided or can be fixed early, thus reducing Mean Time To Recover (MTTR). For example, if you are notified when resource usage by a service exceeds 90%, you can take preventive measures to avoid any service breakdown due to a shortage of resources. On the other hand, when a service goes down due to an issue, early detection and notification of such incidents can help you quickly fix the issue.
Figure 8: An alert notification received on Slack
Today most of the monitoring services available provide a mechanism to set up alerts on one or a combination of metrics to actively monitor the service health. These alerts have a set of defined rules or conditions, and when the rule is broken, you are notified. These rules can be as simple as notifying when the metric value exceeds n to as complex as a week-over-week (WoW) comparison of standard deviation over a period of time. Monitoring tools notify you about an active alert, and most of these tools support instant messaging (IM) platforms, SMS, email, or phone calls. Figure 8 shows a sample alert notification received on Slack for memory usage exceeding 90% of total RAM space on the host.
"},{"location":"level101/metrics_and_monitoring/best_practices/","title":"Best Practices for Monitoring","text":""},{"location":"level101/metrics_and_monitoring/best_practices/#_1","title":"Best Practices for Monitoring","text":""},{"location":"level101/metrics_and_monitoring/best_practices/#best-practices-for-monitoring","title":"Best practices for monitoring","text":"When setting up monitoring for a service, keep the following best practices in mind.
Use the right metric type\u2014Most of the libraries available today offer various metric types. Choose the appropriate metric type for monitoring your system. Following are the types of metrics and their purposes.
Gauge\u2014Gauge is a constant type of metric. After the metric is initialized, the metric value does not change unless you intentionally update it.
Timer\u2014Timer measures the time taken to complete a task.
Counter\u2014Counter counts the number of occurrences of a particular event.
For more information about these metric types, see Data Types.
Avoid over-monitoring\u2014Monitoring can be a significant engineering endeavor. Therefore, be sure not to spend too much time and resources on monitoring services, yet make sure all important metrics are captured.
Prevent alert fatigue\u2014Set alerts for metrics that are important and actionable. If you receive too many non-critical alerts, you might start ignoring alert notifications over time. As a result, critical alerts might get overlooked.
Have a runbook for alerts\u2014For every alert, make sure you have a document explaining what actions and checks need to be performed when the alert fires. This enables any engineer on the team to handle the alert and take necessary actions, without any help from others.
Most of the Linux distributions today come with a set of tools that monitor the system's performance. These tools help you measure and understand various subsystem statistics (CPU, memory, network, and so on). Let's look at some of the tools that are predominantly used.
ps/top: The process status command (ps) displays information about all the currently running processes in a Linux system. The top command is similar to the ps command, but it periodically updates the information displayed until the program is terminated. An advanced version of top, called htop, has a more user-friendly interface and some additional features. These command-line utilities come with options to modify the operation and output of the command. Following are some important options supported by the ps command.
-p <pid1, pid2,...>: Displays information about processes that match the specified process IDs. Similarly, you can use -u <uid> and -g <gid> to display information about processes belonging to a specific user or group.
-a: Displays information about other users' processes, as well as one's own.
-x: When displaying processes matched by other options, includes processes that do not have a controlling terminal.
Figure 2: Results of top command
ss: The socket statistics command (ss) displays information about network sockets on the system. This tool is the successor of netstat, which is deprecated. Following are some command-line options supported by the ss command:
-t: Displays the TCP socket. Similarly, -u displays UDP sockets, -x is for UNIX domain sockets, and so on.
-l: Displays only listening sockets.
-n: Instructs the command to not resolve service names. Instead displays the port numbers.
Figure 3: List of listening sockets on a system
free: The free command displays memory usage statistics on the host like available memory, used memory, and free memory. Most often, this command is used with the -h command-line option, which displays the statistics in a human-readable format.
Figure 4: Memory statistics on a host in human-readable form
df: The df command displays disk space usage statistics. The -i command-line option is also often used to display inode usage statistics. The -h command-line option is used for displaying statistics in a human-readable format.
Figure 5: Disk usage statistics on a system in human-readable form
sar: The sar utility monitors various subsystems, such as CPU and memory, in real time. This data can be stored in a file specified with the -o option. This tool helps to identify anomalies.
iftop: The interface top command (iftop) displays bandwidth utilization by a host on an interface. This command is often used to identify bandwidth usage by active connections. The -i option specifies which network interface to watch.
Figure 6: Network bandwidth usage by active connection on the host
tcpdump: The tcpdump command is a network monitoring tool that captures network packets flowing over the network and displays a description of the captured packets. The following options are available:
-i <interface>: Interface to listen on
host <IP/hostname>: Filters traffic going to or from the specified host
src/dst: Displays one-way traffic from the source (src) or to the destination (dst)
port <port number>: Filters traffic to or from a particular port
Figure 7: tcpdump of packets on docker0 interface on a host
A robust monitoring and alerting system is necessary for maintaining and troubleshooting a system. A dashboard with key metrics can give you an overview of service performance, all in one place. Well-defined alerts (with realistic thresholds and notifications) further enable you to quickly identify any anomalies in the service infrastructure and in resource saturation. By taking necessary actions, you can avoid any service degradations and decrease MTTD for service breakdowns.
In addition to in-house monitoring, monitoring real-user experience can help you to understand service performance as perceived by the users. Many modules are involved in serving the user, and most of them are out of your control. Therefore, you need to have real-user monitoring in place.
Metrics give very abstract details on service performance. To get a better understanding of the system and for faster recovery during incidents, you might want to implement the other two pillars of observability: logs and tracing. Logs and trace data can help you understand what led to service failure or degradation.
Following are some resources to learn more about monitoring and observability:
Google SRE book: Monitoring Distributed Systems
Mastering Distributed Tracing by Yuri Shkuro
Google SRE book: Monitoring Distributed Systems
Mastering Distributed Tracing, by Yuri Shkuro
Monitoring and Observability
Three PIllars with Zero Answers
Engineering blogs on LinkedIn, Grafana, Elastic.co, OpenTelemetry
Linux Basics
Python and the Web
Systems Design
Linux Networking Fundamentals
Monitoring is an integral part of any system. As an SRE, you need to have a basic understanding of monitoring a service infrastructure. By the end of this course, you will gain a better understanding of the following topics:
What is monitoring?
What needs to be measured
How the metrics gathered can be used to improve business decisions and overall reliability
Proactive monitoring with alerts
Log processing and its importance
What is observability?
Distributed tracing
Logs
Metrics
Guide to setting up a monitoring infrastructure
Deep dive into different monitoring technologies and benchmarking or comparison of any tools
Introduction
Four golden signals of monitoring
Why is monitoring important?
Command-line tools
Third-party monitoring
Proactive monitoring using alerts
Best practices for monitoring
Observability
Conclusion
"},{"location":"level101/metrics_and_monitoring/introduction/#_2","title":"Introduction","text":""},{"location":"level101/metrics_and_monitoring/introduction/#introduction","title":"Introduction","text":"Monitoring is a process of collecting real-time performance metrics from a system, analyzing the data to derive meaningful information, and displaying the data to the users. In simple terms, you measure various metrics regularly to understand the state of the system, including but not limited to, user requests, latency, and error rate. What gets measured, gets fixed\u2014if you can measure something, you can reason about it, understand it, discuss it, and act upon it with confidence.
"},{"location":"level101/metrics_and_monitoring/introduction/#four-golden-signals-of-monitoring","title":"Four golden signals of monitoring","text":"When setting up monitoring for a system, you need to decide what to measure. The four golden signals of monitoring provide a good understanding of service performance and lay a foundation for monitoring a system. These four golden signals are
Traffic
Latency
Error
Saturation
These metrics help you to understand the system performance and bottlenecks, and to create a better end-user experience. As discussed in the Google SRE book, if you can measure only four metrics of your service, focus on these four. Let's look at each of the four golden signals.
Traffic\u2014Traffic gives a better understanding of the service demand. Often referred to as service QPS (queries per second), traffic is a measure of requests served by the service. This signal helps you to decide when a service needs to be scaled up to handle increasing customer demand and scaled down to be cost-effective.
Latency\u2014Latency is the measure of time taken by the service to process the incoming request and send the response. Measuring service latency helps in the early detection of slow degradation of the service. Distinguishing between the latency of successful requests and the latency of failed requests is important. For example, an HTTP 5XX error triggered due to loss of connection to a database or other critical backend might be served very quickly. However, because an HTTP 500 error indicates a failed request, factoring 500s into overall latency might result in misleading calculations.
Error (rate)\u2014Error is the measure of failed client requests. These failures can be easily identified based on the response codes (HTTP 5XX error). There might be cases where the response is considered erroneous due to wrong result data or due to policy violations. For example, you might get an HTTP 200 response, but the body has incomplete data, or response time is breaching the agreed-upon SLAs. Therefore, you need to have other mechanisms (code logic or instrumentation) in place to capture errors in addition to the response codes.
Saturation\u2014Saturation is a measure of the resource utilization by a service. This signal tells you the state of service resources and how full they are. These resources include memory, compute, network I/O, and so on. Service performance slowly degrades even before resource utilization is at 100 percent. Therefore, having a utilization target is important. An increase in latency is a good indicator of saturation; measuring the 99th percentile of latency can help in the early detection of saturation.
Depending on the type of service, you can measure these signals in different ways. For example, you might measure queries per second served for a web server. In contrast, for a database server, transactions performed and database sessions created give you an idea about the traffic handled by the database server. With the help of additional code logic (monitoring libraries and instrumentation), you can measure these signals periodically and store them for future analysis. Although these metrics give you an idea about the performance at the service end, you need to also ensure that the same user experience is delivered at the client end. Therefore, you might need to monitor the service from outside the service infrastructure, which is discussed under third-party monitoring.
"},{"location":"level101/metrics_and_monitoring/introduction/#why-is-monitoring-important","title":"Why is monitoring important?","text":"Monitoring plays a key role in the success of a service. As discussed earlier, monitoring provides performance insights for understanding service health. With access to historical data collected over time, you can build intelligent applications to address specific needs. Some of the key use cases follow:
Reduction in time to resolve issues\u2014With a good monitoring infrastructure in place, you can identify issues quickly and resolve them, which reduces the impact caused by the issues.
Business decisions\u2014Data collected over a period of time can help you make business decisions such as determining the product release cycle, which features to invest in, and geographical areas to focus on. Decisions based on long-term data can improve the overall product experience.
Resource planning\u2014By analyzing historical data, you can forecast service compute-resource demands, and you can properly allocate resources. This allows financially effective decisions, with no compromise in end-user experience.
Before we dive deeper into monitoring, let's understand some basic terminologies.
Metric\u2014A metric is a quantitative measure of a particular system attribute\u2014for example, memory or CPU
Node or host\u2014A physical server, virtual machine, or container where an application is running
QPS\u2014Queries Per Second, a measure of traffic served by the service per second
Latency\u2014The time interval between user action and the response from the server\u2014for example, time spent after sending a query to a database before the first response bit is received
Error rate\u2014Number of errors observed over a particular time period (usually a second)
Graph\u2014In monitoring, a graph is a representation of one or more values of metrics collected over time
Dashboard\u2014A dashboard is a collection of graphs that provide an overview of system health
Incident\u2014An incident is an event that disrupts the normal operations of a system
MTTD\u2014Mean Time To Detect is the time interval between the beginning of a service failure and the detection of such failure
MTTR\u2014Mean Time To Resolve is the time spent to fix a service failure and bring the service back to its normal state
Before we discuss monitoring an application, let us look at the monitoring infrastructure. Following is an illustration of a basic monitoring system.
Figure 1: Illustration of a monitoring infrastructure
Figure 1 shows a monitoring infrastructure mechanism for aggregating metrics on the system, and collecting and storing the data for display. In addition, a monitoring infrastructure includes alert subsystems for notifying concerned parties during any abnormal behavior. Let's look at each of these infrastructure components:
Host metrics agent\u2014A host metrics agent is a process running on the host that collects performance statistics for host subsystems such as memory, CPU, and network. These metrics are regularly relayed to a metrics collector for storage and visualization. Some examples are collectd, telegraf, and metricbeat.
Metric aggregator\u2014A metric aggregator is a process running on the host. Applications running on the host collect service metrics using instrumentation. Collected metrics are sent either to the aggregator process or directly to the metrics collector over API, if available. Received metrics are aggregated periodically and relayed to the metrics collector in batches. An example is StatsD.
Metrics collector\u2014A metrics collector process collects all the metrics from the metric aggregators running on multiple hosts. The collector takes care of decoding and stores this data on the database. Metric collection and storage might be taken care of by one single service such as InfluxDB, which we discuss next. An example is carbon daemons.
Storage\u2014A time-series database stores all of these metrics. Examples are OpenTSDB, Whisper, and InfluxDB.
Metrics server\u2014A metrics server can be as basic as a web server that graphically renders metric data. In addition, the metrics server provides aggregation functionalities and APIs for fetching metric data programmatically. Some examples are Grafana and Graphite-Web.
Alert manager\u2014The alert manager regularly polls metric data available and, if there are any anomalies detected, notifies you. Each alert has a set of rules for identifying such anomalies. Today many metrics servers such as Grafana support alert management. We discuss alerting in detail later. Examples are Grafana and Icinga.
Engineers often use observability when referring to building reliable systems. Observability is a term derived from control theory, it is a measure of how well internal states of a system can be inferred from knowledge of its external outputs. Service infrastructures used on a daily basis are becoming more and more complex; proactive monitoring alone is not sufficient to quickly resolve issues causing application failures. With monitoring, you can keep known past failures from recurring, but with a complex service architecture, many unknown factors can cause potential problems. To address such cases, you can make the service observable. An observable system provides highly granular insights into the implicit failure modes. In addition, an observable system furnishes ample context about its inner workings, which unlocks the ability to uncover deeper systemic issues.
Monitoring enables failure detection; observability helps in gaining a better understanding of the system. Among engineers, there is a common misconception that monitoring and observability are two different things. Actually, observability is the superset to monitoring; that is, monitoring improves service observability. The goal of observability is not only to detect problems, but also to understand where the issue is and what is causing it. In addition to metrics, observability has two more pillars: logs and traces, as shown in Figure 9. Although these three components do not make a system 100 percent observable, these are the most important and powerful components that give a better understanding of the system. Each of these pillars has its flaws, which are described in Three Pillars with Zero Answers.
Figure 9: Three pillars of observability
Because we have covered metrics already, let's look at the other two pillars (logs and traces).
"},{"location":"level101/metrics_and_monitoring/observability/#logs","title":"Logs","text":"Logs (often referred to as events) are a record of activities performed by a service during its run time, with a corresponding timestamp. Metrics give abstract information about degradations in a system, and logs give a detailed view of what is causing these degradations. Logs created by the applications and infrastructure components help in effectively understanding the behavior of the system by providing details on application errors, exceptions, and event timelines. Logs help you to go back in time to understand the events that led to a failure. Therefore, examining logs is essential to troubleshooting system failures.
Log processing involves the aggregation of different logs from individual applications and their subsequent shipment to central storage. Moving logs to central storage helps to preserve the logs, in case the application instances are inaccessible, or the application crashes due to a failure. After the logs are available in a central place, you can analyze the logs to derive sensible information from them. For audit and compliance purposes, you archive these logs on the central storage for a certain period of time. Log analyzers fetch useful information from log lines, such as request user information, request URL (feature), and response headers (such as content length) and response time. This information is grouped based on these attributes and made available to you through a visualization tool for quick understanding.
You might be wondering how this log information helps. This information gives a holistic view of activities performed on all the involved entities. For example, let's say someone is performing a DoS (denial of service) attack on a web application. With the help of log processing, you can quickly look at top client IPs derived from access logs and identify where the attack is coming from.
Similarly, if a feature in an application is causing a high error rate when accessed with a particular request parameter value, the results of log analysis can help you to quickly identify the misbehaving parameter value and take further action.
Figure 10: Log processing and analysis using ELK stack
Figure 10 shows a log processing platform using ELK (Elasticsearch, Logstash, Kibana), which provides centralized log processing. Beats is a collection of lightweight data shippers that can ship logs, audit data, network data, and so on over the network. In this use case specifically, we are using Filebeat as a log shipper. Filebeat watches service log files and ships the log data to Logstash. Logstash parses these logs and transforms the data, preparing it to store on Elasticsearch. Transformed log data is stored on Elasticsearch and indexed for fast retrieval. Kibana searches and displays log data stored on Elasticsearch. Kibana also provides a set of visualizations for graphically displaying summaries derived from log data.
Storing logs is expensive. And extensive logging of every event on the server is costly and takes up more storage space. With an increasing number of services, this cost can increase proportionally to the number of services.
"},{"location":"level101/metrics_and_monitoring/observability/#tracing","title":"Tracing","text":"So far, we covered the importance of metrics and logging. Metrics give an abstract overview of the system, and logging gives a record of events that occurred. Imagine a complex distributed system with multiple microservices, where a user request is processed by multiple microservices in the system. Metrics and logging give you some information about how these requests are being handled by the system, but they fail to provide detailed information across all the microservices and how they affect a particular client request. If a slow downstream microservice is leading to increased response times, you need to have detailed visibility across all involved microservices to identify such microservice. The answer to this need is a request tracing mechanism.
A trace is a series of spans, where each span is a record of events performed by different microservices to serve the client's request. In simple terms, a trace is a log of client-request serving derived from various microservices across different physical machines. Each span includes span metadata such as trace ID and span ID, and context, which includes information about transactions performed.
Figure 11: Trace and spans for a URL shortener request
Figure 11 is a graphical representation of a trace captured on the URL shortener example we covered earlier while learning Python.
Similar to monitoring, the tracing infrastructure comprises a few modules for collecting traces, storing them, and accessing them. Each microservice runs a tracing library that collects traces in the background, creates in-memory batches, and submits the tracing backend. The tracing backend normalizes received trace data and stores it on persistent storage. Tracing data comes from multiple different microservices; therefore, trace storage is often organized to store data incrementally and is indexed by trace identifier. This organization helps in the reconstruction of trace data and in visualization. Figure 12 illustrates the anatomy of the distributed system.
Figure 12: Anatomy of distributed tracing
Today a set of tools and frameworks are available for building distributed tracing solutions. Following are some of the popular tools:
OpenTelemetry: Observability framework for cloud-native software
Jaeger: Open-source distributed tracing solution
Zipkin: Open-source distributed tracing solution
Today most cloud providers offer a variety of monitoring solutions. In addition, a number of companies such as Datadog offer monitoring-as-a-service. In this section, we are not covering monitoring-as-a-service in depth.
In recent years, more and more people have access to the Internet. Many services are offered online to cater to the increasing user base. As a result, web pages are becoming larger, with increased client-side scripts. Users want these services to be fast and error-free. From the service point of view, when the response body is composed, an HTTP 200 OK response is sent, and everything looks okay. But there might be errors during transmission or on the client-side. As previously mentioned, monitoring services from within the service infrastructure give good visibility into service health, but this is not enough. You need to monitor user experience, specifically the availability of services for clients. A number of third-party services such as Catchpoint, Pingdom, and so on are available for achieving this goal.
Third-party monitoring services can generate synthetic traffic simulating user requests from various parts of the world, to ensure the service is globally accessible. Other third-party monitoring solutions for real user monitoring (RUM) provide performance statistics such as service uptime and response time, from different geographical locations. This allows you to monitor the user experience from these locations, which might have different Internet backbones, different operating systems, and different browsers and browser versions. Catchpoint Global Monitoring Network is a comprehensive 3-minute video that explains the importance of monitoring the client experience.
"},{"location":"level101/python_web/intro/","title":"Python and The Web","text":""},{"location":"level101/python_web/intro/#prerequisites","title":"Prerequisites","text":"This course is divided into two high-level parts. In the first part, assuming familiarity with Python language\u2019s basic operations and syntax usage, we will dive a little deeper into understanding Python as a language. We will compare Python with other programming languages that you might already know like Java and C. We will also explore concepts of Python objects and with help of that, explore Python features like decorators.
In the second part which will revolve around the web, and also assume familiarity with the Flask framework, we will start from the socket module and work with HTTP requests. This will demystify how frameworks like Flask work internally.
And to introduce SRE flavour to the course, we will design, develop and deploy (in theory) a URL-shortening application. We will emphasize parts of the whole process that are more important as an SRE of the said app/service.
"},{"location":"level101/python_web/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"Extensive knowledge of Python internals and advanced Python.
"},{"location":"level101/python_web/intro/#lab-environment-setup","title":"Lab Environment Setup","text":"Have latest version of Python installed
"},{"location":"level101/python_web/intro/#course-contents","title":"Course Contents","text":"Assuming you know a little bit of C/C++ and Java, let's try to discuss the following questions in context of those two languages and Python. You might have heard that C/C++ is a compiled language while Python is an interpreted language. Generally, with compiled language we first compile the program and then run the executable while in case of Python we run the source code directly like python hello_world.py. While Java, being an interpreted language, still has a separate compilation step and then it's run. So, what's really the difference?
This might sound a little weird to you: Python, in a way is a compiled language! Python has a compiler built-in! It is obvious in the case of Java since we compile it using a separate command, ie: javac helloWorld.java and it will produce a .class file which we know as a bytecode. Well, Python is very similar to that. One difference here is that there is no separate compile command/binary needed to run a Python program.
What is the difference then, between Java and Python? Well, Java's compiler is more strict and sophisticated. As you might know Java is a statically typed language. So the compiler is written in a way that it can verify types-related errors during compile time. While Python being a dynamic language, types are not known until a program is run. So in a way, Python compiler is dumb (or, less strict). But there indeed is a compile step involved when a Python program is run. You might have seen Python bytecode files with .pyc extension. Here is how you can see bytecode for a given Python program.
# Create a Hello World\n$ echo \"print('hello world')\" > hello_world.py\n\n# Making sure it runs\n$ python3 hello_world.py\nhello world\n\n# The bytecode of the given program\n$ python -m dis hello_world.py\n 1 0 LOAD_NAME 0 (print)\n 2 LOAD_CONST 0 ('hello world')\n 4 CALL_FUNCTION 1\n 6 POP_TOP\n 8 LOAD_CONST 1 (None)\n 10 RETURN_VALUE\n Read more about dis module here.
Now coming to C/C++, there of course is a compiler. But the output is different than what Java/Python compiler would produce. Compiling a C program would produce what we also know as machine code, as opposed to bytecode.
"},{"location":"level101/python_web/intro/#running-the-programs","title":"Running The Programs","text":"We know compilation is involved in all 3 languages we are discussing. Just that the compilers are different in nature and they output different types of content. In case of C/C++, the output is machine code which can be directly read by your operating system. When you execute that program, your OS will know how exactly to run it. But this is not the case with bytecode.
Those bytecodes are language specific. Python has its own set of bytecode defined (more in dis module) and so does Java. So naturally, your operating system will not know how to run it. To run this bytecode, we have something called Virtual Machines. Ie: The JVM or the Python VM (CPython, Jython). These so-called Virtual Machines are the programs which can read the bytecode and run it on a given operating system. Python has multiple VMs available. CPython is a Python VM implemented in C language, similarly Jython is a Java implementation of Python VM. At the end of the day, what they should be capable of is to understand Python language syntax, be able to compile it to bytecode and be able to run that bytecode. You can implement a Python VM in any language! (And people do so, just because it can be done)
The Operating System\n\n +------------------------------------+\n | |\n | |\n | |\nhello_world.py Python bytecode | Python VM Process |\n | |\n+----------------+ +----------------+ | +----------------+ |\n|print(... | COMPILE |LOAD_CONST... | | |Reads bytecode | |\n| +--------------->+ +------------------->+line by line | |\n| | | | | |and executes. | |\n| | | | | | | |\n+----------------+ +----------------+ | +----------------+ |\n | |\n | |\n | |\nhello_world.c OS Specific machinecode | A New Process |\n | |\n+----------------+ +----------------+ | +----------------+ |\n|void main() { | COMPILE | binary contents| | | binary contents| |\n| +--------------->+ +------------------->+ | |\n| | | | | | | |\n| | | | | | | |\n+----------------+ +----------------+ | +----------------+ |\n | (binary contents |\n | runs as is) |\n | |\n | |\n +------------------------------------+\n Two things to note for above diagram:
Though you are expected to know python and its syntax at basic level, let us discuss some fundamental concepts that will help you understand the Python language better.
Everything in Python is an object.
That includes the functions, lists, dicts, classes, modules, a running function (instance of function definition), everything. In the CPython, it would mean there is an underlying struct variable for each object.
In Python's current execution context, all the variables are stored in a dict. It'd be a string to object mapping. If you have a function and a float variable defined in the current context, here is how it is handled internally.
>>> float_number=42.0\n>>> def foo_func():\n... pass\n...\n\n# NOTICE HOW VARIABLE NAMES ARE STRINGS, stored in a dict\n>>> locals()\n{'__name__': '__main__', '__doc__': None, '__package__': None, '__loader__': <class '_frozen_importlib.BuiltinImporter'>, '__spec__': None, '__annotations__': {}, '__builtins__': <module 'builtins' (built-in)>, 'float_number': 42.0, 'foo_func': <function foo_func at 0x1055847a0>}\n"},{"location":"level101/python_web/python-concepts/#python-functions","title":"Python Functions","text":"Since functions too are objects, we can see what all attributes a function contains as following
>>> def hello(name):\n... print(f\"Hello, {name}!\")\n...\n>>> dir(hello)\n['__annotations__', '__call__', '__class__', '__closure__', '__code__', '__defaults__', '__delattr__', '__dict__',\n'__dir__', '__doc__', '__eq__', '__format__', '__ge__', '__get__', '__getattribute__', '__globals__', '__gt__',\n'__hash__', '__init__', '__init_subclass__', '__kwdefaults__', '__le__', '__lt__', '__module__', '__name__',\n'__ne__', '__new__', '__qualname__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__',\n'__subclasshook__']\n While there are a lot of them, let's look at some interesting ones.
"},{"location":"level101/python_web/python-concepts/#globals","title":"globals","text":"This attribute, as the name suggests, has references of global variables. If you ever need to know what all global variables are in the scope of this function, this will tell you. See how the function start seeing the new variable in globals
>>> hello.__globals__\n{'__name__': '__main__', '__doc__': None, '__package__': None, '__loader__': <class '_frozen_importlib.BuiltinImporter'>, '__spec__': None, '__annotations__': {}, '__builtins__': <module 'builtins' (built-in)>, 'hello': <function hello at 0x7fe4e82554c0>}\n\n# adding new global variable\n>>> GLOBAL=\"g_val\"\n>>> hello.__globals__\n{'__name__': '__main__', '__doc__': None, '__package__': None, '__loader__': <class '_frozen_importlib.BuiltinImporter'>, '__spec__': None, '__annotations__': {}, '__builtins__': <module 'builtins' (built-in)>, 'hello': <function hello at 0x7fe4e82554c0>, 'GLOBAL': 'g_val'}\n"},{"location":"level101/python_web/python-concepts/#code","title":"code","text":"This is an interesting one! As everything in Python is an object, this includes the bytecode too. The compiled Python bytecode is a Python code object. Which is accessible via __code__ attribute here. A function has an associated code object which carries some interesting information.
# the file in which function is defined\n# stdin here since this is run in an interpreter\n>>> hello.__code__.co_filename\n'<stdin>'\n\n# number of arguments the function takes\n>>> hello.__code__.co_argcount\n1\n\n# local variable names\n>>> hello.__code__.co_varnames\n('name',)\n\n# the function code's compiled bytecode\n>>> hello.__code__.co_code\nb't\\x00d\\x01|\\x00\\x9b\\x00d\\x02\\x9d\\x03\\x83\\x01\\x01\\x00d\\x00S\\x00'\n There are more code attributes which you can enlist by >>> dir(hello.__code__).
Related to functions, Python has another feature called decorators. Let's see how that works, keeping everything is an object in mind.
Here is a sample decorator:
>>> def deco(func):\n... def inner():\n... print(\"before\")\n... func()\n... print(\"after\")\n... return inner\n...\n>>> @deco\n... def hello_world():\n... print(\"hello world\")\n...\n>>>\n>>> hello_world()\nbefore\nhello world\nafter\n Here @deco syntax is used to decorate the hello_world function. It is essentially same as doing
>>> def hello_world():\n... print(\"hello world\")\n...\n>>> hello_world = deco(hello_world)\n What goes inside the deco function might seem complex. Let's try to uncover it.
hello_world is createddeco functiondeco create a new functionhello_world functiondeco returns the newly created functionhello_world is replaced with above functionLet's visualize it for better understanding
BEFORE function_object (ID: 100)\n\n \"hello_world\" +--------------------+\n + |print(\"hello_world\")|\n | | |\n +--------------> | |\n | |\n +--------------------+\n\n\n WHAT DECORATOR DOES\n\n creates a new function (ID: 101)\n +---------------------------------+\n |input arg: function with id: 100 |\n | |\n |print(\"before\") |\n |call function object with id 100 |\n |print(\"after\") |\n | |\n +---------------------------------+\n ^\n |\n AFTER |\n |\n |\n \"hello_world\" +-------------+\n Note how the hello_world name points to a new function object but that new function object knows the reference (ID) of the original function.
Back in the old days, websites were simple. They were simple static html contents. A webserver would be listening on a defined port and according to the HTTP request received, it would read files from disk and return them in response. But since then, complexity has evolved and websites are now dynamic. Depending on the request, multiple operations need to be performed like reading from database or calling other API and finally returning some response (HTML data, JSON content, etc.)
Since serving web requests is no longer a simple task like reading files from disk and return contents, we need to process each HTTP request, perform some operations programmatically and construct a response.
"},{"location":"level101/python_web/python-web-flask/#sockets","title":"Sockets","text":"Though we have frameworks like Flask, HTTP is still a protocol that works over TCP protocol. So, let us setup a TCP server and send an HTTP request and inspect the request's payload. Note that this is not a tutorial on socket programming but what we are doing here is inspecting HTTP protocol at its ground level and look at what its contents look like. (Ref: Socket Programming in Python (Guide) on RealPython)
import socket\n\nHOST = '127.0.0.1' # Standard loopback interface address (localhost)\nPORT = 65432 # Port to listen on (non-privileged ports are > 1023)\n\nwith socket.socket(socket.AF_INET, socket.SOCK_STREAM) as s:\n s.bind((HOST, PORT))\n s.listen()\n conn, addr = s.accept()\n with conn:\n print('Connected by', addr)\n while True:\n data = conn.recv(1024)\n if not data:\n break\n print(data)\n Then, we open localhost:65432 in our web browser and following would be the output:
Connected by ('127.0.0.1', 54719)\nb'GET / HTTP/1.1\\r\\nHost: localhost:65432\\r\\nConnection: keep-alive\\r\\nDNT: 1\\r\\nUpgrade-Insecure-Requests: 1\\r\\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Edg/85.0.564.44\\r\\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\\r\\nSec-Fetch-Site: none\\r\\nSec-Fetch-Mode: navigate\\r\\nSec-Fetch-User: ?1\\r\\nSec-Fetch-Dest: document\\r\\nAccept-Encoding: gzip, deflate, br\\r\\nAccept-Language: en-US,en;q=0.9\\r\\n\\r\\n'\n Examine closely and the content will look like the HTTP protocol's format. ie:
HTTP_METHOD URI_PATH HTTP_VERSION\nHEADERS_SEPARATED_BY_SEPARATOR\n So though it's a blob of bytes, knowing http protocol specification, you can parse that string (ie: split by \\r\\n) and get meaningful information out of it.
Flask, and other such frameworks does pretty much what we just discussed in the last section (with added more sophistication). They listen on a port on a TCP socket, receive an HTTP request, parse the data according to protocol format and make it available to you in a convenient manner.
That is you can access headers in Flask by request.headers which is made available to you by splitting above payload by /r/n, as defined in HTTP protocol.
Another example: we register routes in Flask by @app.route(\"/hello\"). What Flask will do is maintain a registry internally which will map /hello with the function you decorated with. Now, whenever a request comes with the /hello route (second component in the first line, split by space), Flask calls the registered function and returns whatever the function returned.
Same with all other web frameworks in other languages too. They all work on similar principles. What they basically do is understand the HTTP protocol, parses the HTTP request data and gives us programmers a nice interface to work with HTTP requests.
Not so much of magic in it?
"},{"location":"level101/python_web/sre-conclusion/","title":"Conclusion","text":""},{"location":"level101/python_web/sre-conclusion/#scaling-the-app","title":"Scaling The App","text":"The design and development is just a part of the journey. We will need to setup continuous integration and continuous delivery pipelines sooner or later. And we have to deploy this app somewhere.
Initially, we can start with deploying this app on one virtual machine on any cloud provider. But this is a Single point of failure which is something we never allow as an SRE (or even as an engineer). So an improvement here can be having multiple instances of applications deployed behind a load balancer. This certainly prevents problems of one machine going down.
Scaling here would mean adding more instances behind the load balancer. But this is scalable upto only a certain point. After that, other bottlenecks in the system will start appearing. ie: DB will become the bottleneck, or perhaps the load balancer itself. How do you know what is the bottleneck? You need to have observability into each aspects of the application architecture.
Only after you have metrics, you will be able to know what is going wrong where. What gets measured, gets fixed!
Get deeper insights into scaling from School Of SRE's Scalability module and post going through it, apply your learnings and takeaways to this app. Think how will we make this app geographically distributed and highly available and scalable.
"},{"location":"level101/python_web/sre-conclusion/#monitoring-strategy","title":"Monitoring Strategy","text":"Once we have our application deployed. It will be working okay. But not forever. Reliability is in the title of our job and we make systems reliable by making the design in a certain way. But things still will go down. Machines will fail. Disks will behave weirdly. Buggy code will get pushed to production. And all these possible scenarios will make the system less reliable. So what do we do? We monitor!
We keep an eye on the system's health and if anything is not going as expected, we want ourselves to get alerted.
Now let's think in terms of the given URL-shortening app. We need to monitor it. And we would want to get notified in case something goes wrong. But we first need to decide what is that something that we want to keep an eye on.
In the world of SRE, Python is a widely used language for small scripts and tooling developed for various purposes. Since tooling developed by SRE works with critical pieces of infrastructure and has great power (to bring things down), it is important to know what you are doing while using a programming language and its features. Also it is equally important to know the language and its characteristics while debugging the issues. As an SRE having a deeper understanding of Python language, it has helped me a lot to debug very sneaky bugs and be generally more aware and informed while making certain design decisions.
While developing tools may or may not be part of SRE job, supporting tools or services is more likely to be a daily duty. Building an application or tool is just a small part of productionization. While there is certainly that goes in the design of the application itself to make it more robust, as an SRE you are responsible for its reliability and stability once it is deployed and running. And to ensure that, you\u2019d need to understand the application first and then come up with a strategy to monitor it properly and be prepared for various failure scenarios.
"},{"location":"level101/python_web/sre-conclusion/#optional-exercises","title":"Optional Exercises","text":"This module, in the first part, aims to make you more aware of the things that will happen when you choose Python as your programming language and what happens when you run a Python program. With the knowledge of how Python handles things internally as objects, lot of seemingly magic things in Python will start to make more sense.
The second part will first explain how a framework like Flask works using the existing knowledge of protocols like TCP and HTTP. It then touches the whole lifecycle of an application development lifecycle including the SRE parts of it. While the design and areas in architecture considered will not be exhaustive, it will give a good overview of things that are also important being an SRE and why they are important.
"},{"location":"level101/python_web/url-shorten-app/","title":"The URL Shortening App","text":"Let's build a very simple URL-shortening app using Flask and try to incorporate all aspects of the development process including the reliability aspects. We will not be building the UI and we will come up with a minimal set of API that will be enough for the app to function well.
"},{"location":"level101/python_web/url-shorten-app/#design","title":"Design","text":"We don't jump directly to coding. First thing we do is gather requirements. Come up with an approach. Have the approach/design reviewed by peers. Evolve, iterate, document the decisions and tradeoffs. And then finally implement. While we will not do the full blown design document here, we will raise certain questions here that are important to the design.
"},{"location":"level101/python_web/url-shorten-app/#1-high-level-operations-and-api-endpoints","title":"1. High Level Operations and API Endpoints","text":"Since it's a URL-shortening app, we will need an API for generating the shorten link given an original link. And an API/Endpoint which will accept the shorten link and redirect to original URL. We are not including the user aspect of the app to keep things minimal. These two API should make app functional and usable by anyone.
"},{"location":"level101/python_web/url-shorten-app/#2-how-to-shorten","title":"2. How to shorten?","text":"Given a URL, we will need to generate a shortened version of it. One approach could be using random characters for each link. Another thing that can be done is to use some sort of hashing algorithm. The benefit here is we will reuse the same hash for the same link. Ie: if lot of people are shortening https://www.linkedin.com, they all will have the same value, compared to multiple entries in DB if chosen random characters.
What about hash collisions? Even in random characters approach, though there is a less probability, hash collisions can happen. And we need to be mindful of them. In that case, we might want to prepend/append the string with some random value to avoid conflict.
Also, choice of hash algorithm matters. We will need to analyze algorithms. Their CPU requirements and their characteristics. Choose one that suits the most.
"},{"location":"level101/python_web/url-shorten-app/#3-is-url-valid","title":"3. Is URL Valid?","text":"Given a URL to shorten, how do we verify if the URL is valid? Do we even verify or validate? One basic check that can be done is see if the URL matches a regex of a URL. To go even further, we can try opening/visiting the URL. But there are certain gotchas here.
Finally, storage. Where will we store the data that we will generate over time? There are multiple database solutions available and we will need to choose the one that suits this app the most. Relational database like MySQL would be a fair choice but be sure to checkout School of SRE's SQL database section and NoSQL databases section for deeper insights into making a more informed decision.
"},{"location":"level101/python_web/url-shorten-app/#5-other","title":"5. Other","text":"We are not accounting for users into our app and other possible features like rate limiting, customized links, etc. but it will eventually come up with time. Depending on the requirements, they too might need to get incorporated.
The minimal working code is given below for reference, but I'd encourage you to come up with your own.
from flask import Flask, redirect, request\nfrom hashlib import md5\n\napp = Flask(\"url_shortener\")\n\nmapping = {}\n\n@app.route(\"/shorten\", methods=[\"POST\"])\ndef shorten():\n global mapping\n payload = request.json\n\n if \"url\" not in payload:\n return \"Missing URL Parameter\", 400\n\n # TODO: check if URL is valid\n\n hash_ = md5()\n hash_.update(payload[\"url\"].encode())\n digest = hash_.hexdigest()[:5] # limiting to 5 chars. Less the limit more the chances of collission\n\n if digest not in mapping:\n mapping[digest] = payload[\"url\"]\n return f\"Shortened: r/{digest}\\n\"\n else:\n # TODO: check for hash collission\n return f\"Already exists: r/{digest}\\n\"\n\n\n@app.route(\"/r/<hash_>\")\ndef redirect_(hash_):\n if hash_ not in mapping:\n return \"URL Not Found\", 404\n return redirect(mapping[hash_])\n\n\nif __name__ == \"__main__\":\n app.run(debug=True)\n\n\"\"\"\nOUTPUT:\n\n\n===> SHORTENING\n\n$ curl localhost:5000/shorten -H \"content-type: application/json\" --data '{\"url\":\"https://linkedin.com\"}'\nShortened: r/a62a4\n\n\n===> REDIRECTING, notice the response code 302 and the location header\n\n$ curl localhost:5000/r/a62a4 -v\n* Uses proxy env variable NO_PROXY == '127.0.0.1'\n* Trying ::1...\n* TCP_NODELAY set\n* Connection failed\n* connect to ::1 port 5000 failed: Connection refused\n* Trying 127.0.0.1...\n* TCP_NODELAY set\n* Connected to localhost (127.0.0.1) port 5000 (#0)\n> GET /r/a62a4 HTTP/1.1\n> Host: localhost:5000\n> User-Agent: curl/7.64.1\n> Accept: */*\n>\n* HTTP 1.0, assume close after body\n< HTTP/1.0 302 FOUND\n< Content-Type: text/html; charset=utf-8\n< Content-Length: 247\n< Location: https://linkedin.com\n< Server: Werkzeug/0.15.4 Python/3.7.7\n< Date: Tue, 27 Oct 2020 09:37:12 GMT\n<\n<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 3.2 Final//EN\">\n<title>Redirecting...</title>\n<h1>Redirecting...</h1>\n* Closing connection 0\n<p>You should be redirected automatically to target URL: <a href=\"https://linkedin.com\">https://linkedin.com</a>. If not click the link.\n\"\"\"\n"},{"location":"level101/security/conclusion/","title":"Conclusion","text":"Now that you have completed this course on Security you are now aware of the possible security threats to computer systems & networks. Not only that, but you are now better able to protect your systems as well as recommend security measures to others.
This course provides fundamental everyday knowledge on security domain which will also help you keep security at the top of your priority.
"},{"location":"level101/security/conclusion/#other-resources","title":"Other Resources","text":"Some books that would be a great resource
Holistic Info-Sec for Web Developers (https://holisticinfosecforwebdevelopers.com/)\u2014Free and downloadable book series with very broad and deep coverage of what Web Developers and DevOps Engineers need to know in order to create robust, reliable, maintainable and secure software, networks and other, that are delivered continuously, on time, with no nasty surprises.
Docker Security: Quick Reference\u2014For DevOps Engineers (https://leanpub.com/dockersecurity-quickreference)\u2014A book on understanding the Docker security defaults, how to improve them (theory and practical), along with many tools and techniques.
How to Hack Like a Legend (https://amzn.to/2uWh1Up)\u2014A hacker\u2019s tale breaking into a secretive offshore company, Sparc Flow, 2018
How to Investigate Like a Rockstar (https://books2read.com/u/4jDWoZ)\u2014Live a real crisis to master the secrets of forensic analysis, Sparc Flow, 2017
Real World Cryptography (https://www.manning.com/books/real-world-cryptography)\u2014This early-access book teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications.
AWS Security (https://www.manning.com/books/aws-security?utm_source=github&utm_medium=organic&utm_campaign=book_shields_aws_1_31_20)\u2014This early-access book covers common AWS security issues and best practices for access policies, data protection, auditing, continuous monitoring, and incident response.
Core Pillars of Information Security:
Thinking like a Security Engineer:
Security Principles By OWASP (Open Web Application Security Project)
Fail securely
\n is_admin = true;\n try {\n code_which_may_fail();\n is_admin = is_user_assigned_role(\"Adminstrator\");\n }\n catch (Exception err) {\n log.error(err.toString());\n }\n\n
codeWhichMayFail() or isUserInRole fails or throws an exception, the user is an admin by default. This is obviously a security risk.Don\u2019t trust services
\nOpenID is an authentication protocol that allows us to authenticate users without using a local auth system. In such a scenario, a user has to be registered with an OpenID Provider and the same provider should be integrated with the authentication flow of your application. To verify the details, we have to forward the authentication requests to the provider. On successful authentication, we receive a success message and/or profile details with which we can execute the necessary flow.
\nOAuth is an authorization mechanism that allows your application user access to a provider (Gmail/Facebook/Instagram/etc). On successful response, we (your application) receive a token with which the application can access certain APIs on behalf of a user. OAuth is convenient in case your business use case requires some certain user-facing APIs like access to Google Drive or sending tweets on your behalf. Most OAuth 2.0 providers can be used for pseudo authentication. Having said that, it can get pretty complicated if you are using multiple OAuth providers to authenticate users on top of the local authentication system.
"},{"location":"level101/security/fundamentals/#cryptography","title":"Cryptography","text":"It is the science and study of hiding any text in such a way that only the intended recipients or authorized persons can read it and that any text can even use things such as invisible ink or the mechanical cryptography machines of the past.
\nCryptography is necessary for securing critical or proprietary information and is used to encode private data messages by converting some plain text into ciphertext. At its core, there are two ways of doing this, more advanced methods are all built upon.
\n\nE(k,m) = c\nD(k,c) = m\n\n\n\nD(k,E(k,m)) = m\n\nStream Ciphers:
\nBlock Ciphers:
\nA block cipher is a symmetric cipher in which blocks of plaintext are treated as a whole and used to produce ciphertext blocks. The block cipher takes blocks that are b bits long and encrypts them to blocks that are also b bits long. Block sizes are typically 64 or 128 bits long.
\n\n
\nEncryption
\nSymmetric Key Encryption
\nDES
\nThe Data Encryption Standard (DES) has been the worldwide encryption standard for a long time. IBM developed DES in 1975, and it has held up remarkably well against years of cryptanalysis. DES is a symmetric encryption algorithm with a fixed key length of 56 bits. The algorithm is still good, but because of the short key length, it is susceptible to brute-force attacks that have sufficient resources.
\nDES usually operates in block mode, whereby it encrypts data in 64-bit blocks. The same algorithm and key are used for both encryption and decryption.
\nBecause DES is based on simple mathematical functions, it can be easily implemented and accelerated in hardware.
\nTriple DES
\nWith advances in computer processing power, the original 56-bit DES key became too short to withstand an attacker with even a limited budget. One way of increasing the effective key length of DES without changing the well-analyzed algorithm itself is to use the same algorithm with different keys several times in a row.
\nThe technique of applying DES three times in a row to a plain text block is called Triple DES (3DES). The 3DES technique is shown in Figure. Brute-force attacks on 3DES are considered unfeasible today. Because the basic algorithm has been tested in the field for more than 25 years, it is considered to be more trustworthy than its predecessor.\n
\nAES
\nOn October 2, 2000, The U.S. National Institute of Standards and Technology (NIST) announced the selection of the Rijndael cipher as the AES algorithm. This cipher, developed by Joan Daemen and Vincent Rijmen, has a variable block length and key length. The algorithm currently specifies how to use keys with a length of 128, 192, or 256 bits to encrypt blocks with a length of 128, 192, or 256 bits (all nine combinations of key length and block length are possible). Both block and key lengths can be extended easily to multiples of 32 bits.
\nAES was chosen to replace DES and 3DES because they are either too weak (DES, in terms of key length) or too slow (3DES) to run on modern, efficient hardware. AES is more efficient and much faster, usually by a factor of 5 compared to DES on the same hardware. AES is also more suitable for high throughput, especially if pure software encryption is used. However, AES is a relatively young algorithm, and as the golden rule of cryptography states, \u201cA more mature algorithm is always more trusted.\u201d
\nAsymmetric Key Algorithm
\n\nIn a symmetric key system, Alice first puts the secret message in a box and then padlocks the box using a lock to which she has a key. She then sends the box to Bob through regular mail. When Bob receives the box, he uses an identical copy of Alice's key (which he has obtained previously) to open the box and read the message.
\nIn an asymmetric key system, instead of opening the box when he receives it, Bob simply adds his own personal lock to the box and returns the box through public mail to Alice. Alice uses her key to remove her lock and returns the box to Bob, with Bob's lock still in place. Finally, Bob uses his key to remove his lock and reads the message from Alice.
\nNOTE: In terms of TLS key exchange, this is the common approach.
\nDiffie-Hellman
\nn = gk mod p.RSA
\nRefer: https://medium.com/curiositypapers/a-complete-explanation-of-rsa-asymmetric-encryption-742c5971e0f
\nNOTE: RSA Keys can be used for key exchange just like Diffie Hellman
\nHashing Algorithms
\nHashing is one of the mechanisms used for data integrity assurance. Hashing is based on a one-way mathematical function, which is relatively easy to compute but significantly harder to reverse.
\nA hash function, which is a one-way function to input data to produce a fixed-length digest (fingerprint) of output data. The digest is cryptographically strong; that is, it is impossible to recover input data from its digest. If the input data changes just a little, the digest (fingerprint) changes substantially in what is called an avalanche effect.
\nMore:
\nMD5
\nSHA-1
\nNOTE: SHA-1 is also recently demonstrated to be broken, Minimum current recommendation is SHA-256
\nDigital Certificates
\nDigital signatures, provide a means to digitally authenticate devices and individual users. In public-key cryptography, such as the RSA encryption system, each user has a key-pair containing both a public key and a private key. The keys act as complements, and anything encrypted with one of the keys can be decrypted with the other. In simple terms, a signature is formed when data is encrypted with a user's private key. The receiver verifies the signature by decrypting the message with the sender's public key.
\nKey management is often considered the most difficult task in designing and implementing cryptographic systems. Businesses can simplify some of the deployment and management issues that are encountered with secured data communications by employing a Public Key Infrastructure (PKI). Because corporations often move security-sensitive communications across the Internet, an effective mechanism must be implemented to protect sensitive information from the threats presented on the Internet.
\nPKI provides a hierarchical framework for managing digital security attributes. Each PKI participant holds a digital certificate that has been issued by a CA (either public or private). The certificate contains several attributes that are used when parties negotiate a secure connection. These attributes must include the certificate validity period, end-host identity information, encryption keys that will be used for secure communications, and the signature of the issuing CA. Optional attributes may be included, depending on the requirements and capability of the PKI.
\nCA Enrollment process
\nRefer: https://www.ssh.com/manuals/server-zos-product/55/ch06s03s01.html
"},{"location":"level101/security/fundamentals/#login-security","title":"Login Security","text":""},{"location":"level101/security/fundamentals/#ssh","title":"SSH","text":"What SSH is not:
\nThe major features and guarantees of the SSH protocol are:
\nSo when it comes to Computer Science, Kerberos is a network authentication protocol and is currently the default authentication technology used by Microsoft Active Directory to authenticate users to services within a local area network.
\nKerberos uses symmetric-key cryptography and requires a trusted third-party authentication service to verify user identities. So they used the name of Kerberos for their computer network authentication protocol as the three heads of the Kerberos represent:
\na server: Kerberos protected hosts reside
\n\na Key Distribution Center (KDC), which acts as the trusted third-party authentication service.
\nThe KDC includes the following two servers:
\nTicket-Granting Server (TGS) that issues service tickets that are based on the initial ticket-granting tickets (TGT).
\n\nThe first part of the output of the OpenSSL command shows three certificates numbered 0, 1, and 2 (not 2 anymore). Each certificate has a subject, s, and an issuer, i. The first certificate, number 0, is called the end-entity certificate. The subject line tells us it\u2019s valid for any subdomain of google.com because its subject is set to *.google.com.
$ openssl s_client -connect www.google.com:443 -CApath /etc/ssl/certs\nCONNECTED(00000005)\ndepth=2 OU = GlobalSign Root CA - R2, O = GlobalSign, CN = GlobalSign\nverify return:1\ndepth=1 C = US, O = Google Trust Services, CN = GTS CA 1O1\nverify return:1\ndepth=0 C = US, ST = California, L = Mountain View, O = Google LLC, CN = www.google.com\nverify return:1`\n`---\nCertificate chain\n 0 s:/C=US/ST=California/L=Mountain View/O=Google LLC/CN=www.google.com\n i:/C=US/O=Google Trust Services/CN=GTS CA 1O1\n 1 s:/C=US/O=Google Trust Services/CN=GTS CA 1O1\n i:/OU=GlobalSign Root CA - R2/O=GlobalSign/CN=GlobalSign\n---\n\nServer certificate
\nThe public certificate of GlobalSign Authority must be present in the system\u2019s trust store to close the verification chain. This is called a chain of trust, and the figure below summarizes its behaviour at a high level.
\n\nHigh-level view of the concept of chain of trust applied to verifying the authenticity of a website. The Root CA in the Firefox trust store provides the initial trust to verify the entire chain and trust the end-entity certificate.
\nAt the end of the handshake, both parties possess a secret session key used to encrypt data for the rest of the connection. This is what OpenSSL refers to as Master-Key.
\nNOTE
\nLinux Basics
Linux Networking
The course covers fundamentals of information security along with touching on subjects of system security, network & web security. This course aims to get you familiar with the basics of information security in day-to-day operations and then as an SRE develop the mindset of ensuring that security takes a front-seat while developing solutions. The course also serves as an introduction to common risks and best practices along with practical ways to find out vulnerable systems and loopholes which might become compromised if not secured.
"},{"location":"level101/security/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"The courseware is not an ethical hacking workshop or a very deep dive into the fundamentals of the problems. The course does not deal with hacking or breaking into systems but rather an approach on how to ensure you don\u2019t get into those situations and also to make you aware of different ways a system can be compromised.
"},{"location":"level101/security/intro/#course-contents","title":"Course Contents","text":"The OSI model is a seven-layer architecture. The OSI architecture is similar to the TCP/IP architecture, except that the OSI model specifies two additional layers between the application layer and the transport layer in the TCP/IP architecture. These two layers are the presentation layer and the session layer. Figure 5.1 shows the relationship between the TCP/IP layers and the OSI layers. The application layer in TCP/IP corresponds to the application layer and the presentation layer in OSI. The transport layer in TCP/IP corresponds to the session layer and the transport layer in OSI. The remaining three layers in the TCP/IP architecture are one-to-one correspondent to the remaining three layers in the OSI model.
Correspondence between layers of the TCP/IP architecture and the OSI model. Also shown are placements of cryptographic algorithms in network layers, where the dotted arrows indicate actual communications of cryptographic algorithms
The functionalities of OSI layers are briefly described as follows:
The physical layer is responsible for transmitting device-dependent frames through some physical media.
Starting from the application layer, data generated from an application program is passed down layer-by-layer to the physical layer. Data from the previous layer is enclosed in a new envelope at the current layer, where the data from the previous layer is also just an envelope containing the data from the layer before it. This is similar to enclosing a smaller envelope in a larger one. The envelope added at each layer contains sufficient information for handling the packet. Application-layer data are divided into blocks small enough to be encapsulated in an envelope at the next layer.
Application data blocks are \u201cdressed up\u201d in the TCP/IP architecture according to the following basic steps. At the sending side, an application data block is encapsulated in a TCP packet when it is passed down to the TCP layer. In other words, a TCP packet consists of a header and a payload, where the header corresponds to the TCP envelope and the payload is the application data block. Likewise, the TCP packet will be encapsulated in an IP packet when it is passed down to the IP layer. An IP packet consists of a header and a payload, which is the TCP packet passed down from the TCP layer. The IP packet will be encapsulated in a device-dependent frame (e.g., an Ethernet frame) when it is passed down to the data-link layer. A frame has a header, and it may also have a trailer. For example, in addition to having a header, an Ethernet frame also has a 32-bit cyclic redundancy check (CRC) trailer. When it is passed down to the physical layer, a frame will be transformed into a sequence of media signals for transmission
Flow Diagram of a Packet Generation
At the destination side, the medium signals are converted by the physical layer into a frame, which is passed up to the data-link layer. The data-link layer passes the frame payload (i.e., the IP packet encapsulated in the frame) up to the IP layer. The IP layer passes the IP payload, namely, the TCP packet encapsulated in the IP packet, up to the TCP layer. The TCP layer passes the TCP payload, namely, the application data block, up to the application layer. When a packet arrives at a router, it only goes up to the IP layer, where certain fields in the IP header are modified (e.g., the value of TTL is decreased by 1). This modified packet is then passed back down layer-by-layer to the physical layer for further transmission.
PGP
GPG (GnuPG)
S/MIME
SSL/TLS
A year after releasing SSL 2.0, Netscape fixed several security issues and released SSL 3.0, a protocol that, albeit being officially deprecated since June 2015, remains in use in certain parts of the world more than 20 years after its introduction. To standardize SSL, the Internet Engineering Task Force (IETF) created a slightly modified SSL 3.0 and, in 1999, unveiled it as Transport Layer Security (TLS) 1.0. The name change between SSL and TLS continues to confuse people today. Officially, TLS is the new SSL, but in practice, people use SSL and TLS interchangeably to talk about any version of the protocol.
Must See:
Let us see how we keep a check on the perimeter, i.e the edges, the first layer of protection.
"},{"location":"level101/security/network_security/#general-firewall-framework","title":"General Firewall Framework","text":"2 types:
Stateless
Stateful
Its system management is appropriate.
Bastion Hosts
nmap [scan type] [options] [target specification]\n Nmap uses 6 different port states:
UDP Scan
SYN Scan
FIN Scan
ACK Scan
Scan Techniques
A couple of scan techniques which can be used to gain more information about a system and its ports. You can read more at https://medium.com/infosec-adventures/nmap-cheatsheet-a423fcdda0ca.
"},{"location":"level101/security/network_security/#openvas","title":"OpenVAS","text":"A simple demo of Wireshark
Capture only UDP packets:
Capture filter = \u201cudp\u201dCapture only TCP packets:
Capture filter = \u201ctcp\u201dTCP/IP three-way Handshake:
Filter by IP address: displays all traffic from IP, be it source or destination
ip.addr == 192.168.1.1Filter by source address: display traffic only from IP source
ip.src == 192.168.0.1Filter by destination: display traffic only form IP destination
ip.dst == 192.168.0.1Filter by IP subnet: display traffic from subnet, be it source or destination
ip.addr = 192.168.0.1/24 Filter by protocol: filter traffic by protocol name
Exclude IP address: remove traffic from and to IP address
!ip.addr ==192.168.0.1Display traffic between two specific subnet
ip.addr == 192.168.0.1/24 and ip.addr == 192.168.1.1/24Display traffic between two specific workstations
ip.addr == 192.168.0.1 and ip.addr == 192.168.0.2Filter by MAC
eth.addr = 00:50:7f:c5:b6:78Filter TCP port
tcp.port == 80Filter TCP port source
tcp.srcport == 80Filter TCP port destination
tcp.dstport == 80Find user agents
http.user_agent contains Firefox!http.user_agent contains || !http.user_agent contains ChromeFilter broadcast traffic
!(arp or icmp or dns)Filter IP address and port
tcp.port == 80 && ip.addr == 192.168.0.1Filter all HTTP GET requests
http.requestFilter all HTTP GET requests and responses
http.request or http.responseFilter three-way handshake
tcp.flags.syn==1 or (tcp.seq==1 and tcp.ack==1 and tcp.len==0 and tcp.analysis.initial_rtt)Find files by type
frame contains \u201c(attachment|tar|exe|zip|pdf)\u201dFind traffic based on keyword
tcp contains facebookframe contains facebookDetecting SYN Floods
tcp.flags.syn == 1 and tcp.flags.ack == 0Wireshark Promiscuous Mode
pcapng, which is also the format used by Wireshark.pcap library to capture traffic from the first available network interface and writes the received raw packet data, along with the packets\u2019 time stamps into a pcapng file. The capture filter syntax follows the rules of the pcap library.dumpcap.exe can be used to capture LAN traffic over an extended period of time.daemonlogger \u2013i eth1libpcap for capture, netsniff-ng utilizes zero-copy mechanisms to capture packets. This is done with the intent to support full packet capture over high throughput links.netsniff-ng \u2013i eth1 \u2013o data.pcap\n"},{"location":"level101/security/network_security/#netflow","title":"NetFlow","text":"NetFlow is a feature that was introduced on Cisco routers around 1996 that provides the ability to collect IP network traffic as it enters or exits an interface. By analyzing the data provided by NetFlow, a network administrator can determine things such as the source and destination of traffic, class of service, and the causes of congestion. A typical flow monitoring setup (using NetFlow) consists of three main components:[1]
Flow exporter: aggregates packets into flows and exports flow records towards one or more flow collectors.
A security solution that detects security-related events in your environment but does not block them. IDS sensors can be software- and hardware-based used to collect and analyze the network traffic. These sensors are available in two varieties, network IDS and host IDS.
Signature Based IDS
The formula is fairly simple: an analyst observes a malicious activity, derives indicators from the activity and develops them into signatures, and then those signatures will alert whenever the activity occurs again.
ex: SNORT & SURICATA
Policy-Based IDS
Anomaly Based IDS
Host-Based IDS & Network-Based IDS
A host IDS can be described as a distributed agent residing on each server of the network that needs protection. These distributed agents are tied very closely to the underlying operating system.
Network IDSs, on the other hand, can be described as intelligent sniffing devices. Data (raw packets) is captured from the network by a network IDS, whereas host IDSs capture the data from the host on which they are installed.
Honeypots
IP Spoofing Detection Techniques
Direct TTL Probes
IP Identification Number.
If IP IDs are not in the near value of packet being checked, suspect traffic is spoofed.
TCP Flow Control Method
More specifically for TCP/IP, in some instances, covert channels are established, and data can be secretly passed between two end systems.
ICMP can be leveraged for more than data exfiltration. For eg. some C&C tools such as Loki used ICMP channel to establish encrypted interactive session back in 1996.
Deep packet inspection has since come a long way. A lot of IDS/IPS detect ICMP tunnelling.
All such fragments have the same Identification field value, and the fragmentation offset indicates the position of the current fragment in the context of the original packet.
Many access routers and firewalls do not perform packet reassembly. In normal operation, IP fragments do not overlap, but attackers can create artificially fragmented packets to mislead the routers or firewalls. Usually, these packets are small and almost impractical for end systems because of data and computational overhead.
TCP Flags
six different flags are part of the TCP header: Urgent pointer field (URG), Acknowledgment field (ACK), Push function (PSH), Reset the connection (RST), Synchronize sequence numbers (SYN), and the sender is finished with this connection (FIN).
Abuse of the normal operation or settings of these flags can be used by attackers to launch DoS attacks. This causes network servers or web servers to crash or hang.
| SYN | FIN | PSH | RST | Validity| \n|------|------|-------|------|---------|\n| 1 |1 |0 |0 |Illegal Combination\n| 1 |1 |1 |0 |Illegal Combination\n| 1 |1 |0 |1 |Illegal Combination\n| 1 |1 |1 |1 |Illegal Combination\n SYN FLOOD
FIN Attack
This is a four-way handshake mechanism, with both sender and receiver expected to send an acknowledgement on a received FIN packet.
During an attack that is trying to kill connections, a spoofed FIN packet is constructed. This packet also has the correct sequence number, so the packets are seen as valid by the targeted host. These sequence numbers are easy to predict. This process is referred to as TCP sequence number prediction, whereby the attacker either sniffs the current Sequence and Acknowledgment (SEQ/ACK) numbers of the connection or can algorithmically predict these numbers.
STEPS:
Mechanism:
Counter Measure:
Address Resolution Protocol Spoofing
DNS Spoofing
Infamous BGP Injection attack on Youtube
Ex: In 2008, Pakistan decided to block YouTube by creating a BGP route that led into a black hole. Instead, this routing information got transmitted to a Hong Kong ISP and from there accidentally got propagated to the rest of the world meaning millions were routed through to this black hole and therefore unable to access YouTube.
BGP Security
SELECT USERNAME,PASSWORD from USERS where USERNAME='<username>' AND PASSWORD='<password>';\n Here, the username & password is the input provided by the user. Suppose an attacker gives the input as OR '1'='1' in both fields. Therefore the SQL query will look like:
SELECT USERNAME,PASSWORD from USERS where USERNAME='' OR '1'='1' AND PASSOWRD='' OR '1'='1';\n This query results in a true statement & the user gets logged in. This example depicts the most basic type of SQL injection.
"},{"location":"level101/security/threats_attacks_defences/#sql-injection-attack-defenses","title":"SQL Injection Attack Defenses","text":"A virtual private network (VPN) is a service that offers a secure, reliable connection over a shared public infrastructure such as the Internet. Cisco defines a VPN as an encrypted connection between private networks over a public network. To date, there are three types of VPNs:
In spite of the most aggressive steps to protect computers from attacks, attackers sometimes get through. Any event that results in a violation of any of the confidentiality, integrity, or availability (CIA) security tenets is a security breach.
"},{"location":"level101/security/threats_attacks_defences/#denial-of-service-attacks","title":"Denial of Service Attacks","text":"Although the term wiretapping is generally associated with voice telephone communications, attackers can also use wiretapping to intercept data communications.
Attackers can tap telephone lines and data communication lines. Wiretapping can be active, where the attacker makes modifications to the line. It can also be passive, where an unauthorized user simply listens to the transmission without changing the contents. Passive intrusion can include the copying of data for a subsequent active attack.
The first and most important step in reducing security and reliability issues is to educate developers. However, even the best-trained engineers make mistakes, security experts can write insecure code and SREs can miss reliability issues. It\u2019s difficult to keep the many considerations and tradeoffs involved in building secure and reliable systems in mind simultaneously, especially if you\u2019re also responsible for producing software.
"},{"location":"level101/security/writing_secure_code/#use-frameworks-to-enforce-security-and-reliability-while-writing-code","title":"Use frameworks to enforce security and reliability while writing code","text":"Try to keep your code clean and simple.
"},{"location":"level101/security/writing_secure_code/#avoid-multi-level-nesting","title":"Avoid Multi-Level Nesting","text":"Availability is generally expressed as \u201cNines\u201d, common \u2018Nines\u2019 are listed below.
Availability % Downtime per year Downtime per month Downtime per week Downtime per day 99% (Two Nines) 3.65 days 7.31 hours 1.68 hours 14.40 minutes 99.5% (Two and a half Nines) 1.83 days 3.65 hours 50.40 minutes 7.20 minutes 99.9% (Three Nines) 8.77 hours 43.83 minutes 10.08 minutes 1.44 minutes 99.95% (Three and a half Nines) 4.38 hours 21.92 minutes 5.04 minutes 43.20 seconds 99.99% (Four Nines) 52.60 minutes 4.38 minutes 1.01 minutes 8.64 seconds 99.995% (Four and a half Nines) 26.30 minutes 2.19 minutes 30.24 seconds 4.32 seconds 99.999% (Five Nines) 5.26 minutes 26.30 seconds 6.05 seconds 864.0 ms"},{"location":"level101/systems_design/availability/#refer","title":"Refer","text":"A System with components is operating in the series if the failure of a part leads to the combination becoming inoperable.
For example, if LB in our architecture fails, all access to app tiers will fail. LB and app tiers are connected serially.
The combined availability of the system is the product of individual components availability:
A = Ax x Ay x \u2026..
"},{"location":"level101/systems_design/availability/#refer_1","title":"Refer","text":"A System with components is operating in parallel if the failure of a part leads to the other part taking over the operations of the failed part.
If we have more than one LB and if the rest of the LBs can take over the traffic during one LB failure, then LBs are operating in parallel.
The combined availability of the system is
A = 1 - ( (1-Ax) x (1-Ax) x \u2026.. )
"},{"location":"level101/systems_design/availability/#refer_2","title":"Refer","text":"Elimination of single points of failure (SPOF) This means adding redundancy to the system so that the failure of a component does not mean failure of the entire system.
Reliable crossover In redundant systems, the crossover point itself tends to become a single point of failure. Reliable systems must provide for reliable crossover.
Detection of failures as they occur If the two principles above are observed, then a user may never see a failure.
"},{"location":"level101/systems_design/availability/#refer_3","title":"Refer","text":"WHAT: Never implement and always eliminate single points of failure.
WHEN TO USE: During architecture reviews and new designs.
HOW TO USE: Identify single instances on architectural diagrams. Strive for active/active configurations. At the very least, we should have a standby to take control when active instances fail.
WHY: Maximize availability through multiple instances.
KEY TAKEAWAYS: Strive for active/active rather than active/passive solutions. Use load balancers to balance traffic across instances of a service. Use control services with active/passive instances for patterns that require singletons.
"},{"location":"level101/systems_design/availability/#ha-reliable-crossover","title":"HA - Reliable Crossover","text":"WHAT: Ensure when system components failover they do so reliably.
WHEN TO USE: During architecture reviews, failure modeling, and designs.
HOW TO USE: Identify how available a system is during the crossover and ensure it is within acceptable limits.
WHY: Maximize availability and ensure data handling semantics are preserved.
KEY TAKEAWAYS: Strive for active/active rather than active/passive solutions, they have a lesser risk of cross over being unreliable. Use LB and the right load-balancing methods to ensure reliable failover. Model and build your data systems to ensure data is correctly handled when crossover happens. Generally, DB systems follow active/passive semantics for writes. Masters accept writes and when the master goes down, the follower is promoted to master (active from being passive) to accept writes. We have to be careful here that the cutover never introduces more than one master. This problem is called a split brain.
"},{"location":"level101/systems_design/availability/#applications-in-sre-role","title":"Applications in SRE role","text":"Post our understanding about HA, our architecture diagram looks something like this below:
"},{"location":"level101/systems_design/conclusion/","title":"Conclusion","text":"Armed with these principles, we hope the course will give a fresh perspective to design software systems. It might be over-engineering to get all this on day zero. But some are really important from day 0 like eliminating single points of failure, making scalable services by just increasing replicas. As a bottleneck is reached, we can split code by services, shard data to scale. As the organization matures, bringing in chaos engineering to measure how systems react to failure will help in designing robust software systems.
"},{"location":"level101/systems_design/fault-tolerance/","title":"Fault Tolerance","text":"Failures are not avoidable in any system and will happen all the time, hence we need to build systems that can tolerate failures or recover from them.
Common failure metrics that get measured and tracked for any system.
Mean time to repair (MTTR): The average time to repair and restore a failed system.
Mean time between failures (MTBF): The average operational time between one device failure or system breakdown and the next.
Mean time to failure (MTTF): The average time a device or system is expected to function before it fails.
Mean time to detect (MTTD): The average time between the onset of a problem and when the organization detects it.
Mean time to investigate (MTTI): The average time between the detection of an incident and when the organization begins to investigate its cause and solution.
Mean time to restore service (MTRS): The average elapsed time from the detection of an incident until the affected system or component is again available to users.
Mean time between system incidents (MTBSI): The average elapsed time between the detection of two consecutive incidents. MTBSI can be calculated by adding MTBF and MTRS (MTBSI = MTBF + MTRS).
Failure rate: Another reliability metric, which measures the frequency with which a component or system fails. It is expressed as a number of failures over a unit of time.
"},{"location":"level101/systems_design/fault-tolerance/#refer","title":"Refer","text":"Systems should have a short circuit. Say in our content sharing system, if \u201cNotifications\u201d is not working, the site should gracefully handle that failure by removing the functionality instead of taking the whole site down.
Swimlane is one of the commonly used fault isolation methodologies. Swimlane adds a barrier to the service from other services so that failure on either of them won\u2019t affect the other. Say we roll out a new feature \u2018Advertisement\u2019 in our content sharing app. We can have two architectures
If Ads are generated on the fly synchronously during each Newsfeed request, the faults in the Ads feature get propagated to the Newsfeed feature. Instead if we swimlane the \u201cGeneration of Ads\u201d service and use a shared storage to populate Newsfeed App, Ads failures won\u2019t cascade to Newsfeed, and worst case if Ads don\u2019t meet SLA, we can have Newsfeed without Ads.
Let's take another example, we have come up with a new model for our Content sharing App. Here, we roll out an enterprise content sharing App where enterprises pay for the service and the content should never be shared outside the enterprise.
"},{"location":"level101/systems_design/fault-tolerance/#swimlane-principles","title":"Swimlane Principles","text":"Principle 1: Nothing is shared (also known as \u201cshare as little as possible\u201d). The less that is shared within a swimlane, the more fault isolative the swimlane becomes. (as shown in Enterprise use-case)
Principle 2: Nothing crosses a swimlane boundary. Synchronous (defined by expecting a request\u2014not the transfer protocol) communication never crosses a swimlane boundary; if it does, the boundary is drawn incorrectly. (as shown in Ads feature)
"},{"location":"level101/systems_design/fault-tolerance/#swimlane-approaches","title":"Swimlane Approaches","text":"Approach 1: Swimlane the money-maker. Never allow your cash register to be compromised by other systems. (Tier 1 vs Tier 2 in enterprise use case)
Approach 2: Swimlane the biggest sources of incidents. Identify the recurring causes of pain and isolate them. (If Ads feature is in code yellow, swimlaning it is the best option.)
Approach 3: Swimlane natural barriers. Customer boundaries make good swimlanes. (Public vs Enterprise customers)
"},{"location":"level101/systems_design/fault-tolerance/#refer_1","title":"Refer","text":"Fundamentals of common software system components:
Thinking about and designing for scalability, availability, and reliability of large scale software systems.
"},{"location":"level101/systems_design/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"Individual software components\u2019 scalability and reliability concerns like e.g. Databases, while the same scalability principles and thinking can be applied, these individual components have their own specific nuances when scaling them and thinking about their reliability.
More light will be shed on concepts rather than on setting up and configuring components like Loadbalancers to achieve scalability, availability, and reliability of systems
"},{"location":"level101/systems_design/intro/#course-contents","title":"Course Contents","text":"So, how do you go about learning to design a system?
\"Like most great questions, it showed a level of naivety that was breathtaking. The only short answer I could give was, essentially, that you learned how to design a system by designing systems and finding out what works and what doesn\u2019t work.\"\u2014Jim Waldo, Sun Microsystems, On System Design
As software and hardware systems have multiple moving parts, we need to think about how those parts will grow, their failure modes, their inter-dependencies, how it will impact the users and the business.
There is no one-shot method or way to learn or do system design, we only learn to design systems by designing and iterating on them.
This course will be a starter to make one think about scalability, availability, and fault tolerance during systems design.
"},{"location":"level101/systems_design/intro/#backstory","title":"Backstory","text":"Let\u2019s design a simple content sharing application where users can share photos, media in our application which can be liked by their friends. Let\u2019s start with a simple design of the application and evolve it as we learn system design concepts.
"},{"location":"level101/systems_design/scalability/","title":"Scalability","text":"What does scalability mean for a system/service? A system is composed of services/components, each service/component scalability needs to be tackled separately, and the scalability of the system as a whole.
A service is said to be scalable if, as resources are added to the system, it results in increased performance in a manner proportional to resources added.
An always-on service is said to be scalable if adding resources to facilitate redundancy does not result in a loss of performance.
"},{"location":"level101/systems_design/scalability/#refer","title":"Refer","text":"The Scale Cube is a model for segmenting services, defining microservices, and scaling products. It also creates a common language for teams to discuss scale-related options in designing solutions. The following section talks about certain scaling patterns based on our inferences from the AKF cube.
"},{"location":"level101/systems_design/scalability/#scalability-horizontal-scaling","title":"Scalability: Horizontal scaling","text":"Horizontal scaling stands for cloning of an application or service such that work can easily be distributed across instances with absolutely no bias.
Let's see how our monolithic application improves with this principle.
Here, DB is scaled separately from the application. This is to let you know each component\u2019s scaling capabilities can be different. Usually, web applications can be scaled by adding resources unless there is state stored inside the application. But DBs can be scaled only for Reads by adding more followers but Writes have to go to only one leader to make sure data is consistent. There are some DBs that support multi-leader writes but we are keeping them out of scope at this point.
Apps should be able to differentiate between Reads and Writes to choose appropriate DB servers. Load balancers can split traffic between identical servers transparently.
WHAT: Duplication of services or databases to spread transaction load.
WHEN TO USE: Databases with a very high read-to-write ratio (5:1 or greater\u2014the higher the better). Because only read replicas of DBs can be scaled, not the Leader.
HOW TO USE: Simply clone services and implement a load balancer. For databases, ensure that the accessing code understands the difference between a read and a write.
WHY: Allows for the fast scale of transactions at the cost of duplicated data and functionality.
KEY TAKEAWAYS: This is fast to implement, is a low cost from a developer effort perspective, and can scale transaction volumes nicely. However, they tend to be high cost from the perspective of the operational cost of data. The cost here means if we have 3 followers and 1 Leader DB, the same database will be stored as 4 copies in the 4 servers. Hence added storage cost.
"},{"location":"level101/systems_design/scalability/#refer_1","title":"Refer","text":"Improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives. A commonly used technique is load balancing traffic across identical server clusters. A similar philosophy is used to load balance traffic across network links by ECMP, disk drives by RAID, etc.
Aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any single resource. Using multiple components with load balancing instead of a single component may increase reliability and availability through redundancy. In our updated architecture diagram, we have 4 servers to handle app traffic instead of a single server.
The device or system that performs load balancing is called a load balancer, abbreviated as LB.
"},{"location":"level101/systems_design/scalability/#refer_2","title":"Refer","text":"What does an LB do?
"},{"location":"level101/systems_design/scalability/#service-discovery","title":"Service discovery:","text":"What backends are available in the system? In our architecture, 4 servers are available to serve App traffic. LB acts as a single endpoint that clients can use transparently to reach one of the 4 servers.
"},{"location":"level101/systems_design/scalability/#health-checking","title":"Health checking:","text":"What backends are currently healthy and available to accept requests? If one out of the 4 App servers turns bad, LB should automatically short circuit the path so that clients don\u2019t sense any application downtime.
"},{"location":"level101/systems_design/scalability/#load-balancing","title":"Load balancing:","text":"What algorithm should be used to balance individual requests across the healthy backends? There are many algorithms to distribute traffic across one of the four servers. Based on observations/experience, SRE can pick the algorithm that suits their pattern.
"},{"location":"level101/systems_design/scalability/#scalability-pattern-lb-methods","title":"Scalability Pattern: LB Methods","text":"Common Load Balancing Methods
"},{"location":"level101/systems_design/scalability/#least-connection-method","title":"Least Connection Method","text":"This method directs traffic to the server with the fewest active connections. Most useful when there are a large number of persistent connections in the traffic unevenly distributed between the servers. Works if clients maintain long-lived connections.
"},{"location":"level101/systems_design/scalability/#least-response-time-method","title":"Least Response Time Method","text":"This method directs traffic to the server with the fewest active connections and the lowest average response time. Here, response time is used to provide feedback of the server\u2019s health.
"},{"location":"level101/systems_design/scalability/#round-robin-method","title":"Round Robin Method","text":"This method rotates servers by directing traffic to the first available server and then moves that server to the bottom of the queue. Most useful when servers are of equal specification and there are not many persistent connections.
"},{"location":"level101/systems_design/scalability/#ip-hash","title":"IP Hash","text":"The IP address of the client determines which server receives the request. This can sometimes cause skewness in distribution but is useful if apps store some state locally and need some stickiness.
More advanced client/server-side example techniques:
CDNs are added closer to the client\u2019s location. If the app has static data like images, JavaScript, CSS which don\u2019t change very often, they can be cached. Since our example is a content-sharing site, static content can be cached in CDNs with a suitable expiry.
WHAT: Use CDNs (content delivery networks) to offload traffic from your site.
WHEN TO USE: When speed improvements and scale warrant the additional cost.
HOW TO USE: Most CDNs leverage DNS to serve content on your site\u2019s behalf. Thus you may need to make minor DNS changes or additions and move content to be served from new subdomains.
Eg media-exp1.licdn.com is a domain used by Linkedin to serve static content
Here, a CNAME points the domain to the DNS of the CDN provider.
dig media-exp1.licdn.com +short\n\n2-01-2c3e-005c.cdx.cedexis.net.\n WHY: CDNs help offload traffic spikes and are often economical ways to scale parts of a site\u2019s traffic. They also often substantially improve page download times.
KEY TAKEAWAYS: CDNs are a fast and simple way to offset the spikiness of traffic as well as traffic growth in general. Make sure you perform a cost-benefit analysis and monitor the CDN usage. If CDNs have a lot of cache misses, then we don\u2019t gain much from CDN and are still serving requests using our compute resources.
"},{"location":"level101/systems_design/scalability/#scalability-microservices","title":"Scalability: Microservices","text":"This pattern represents the separation of work by service or function within the application. Microservices are meant to address the issues associated with growth and complexity in the codebase and datasets. The intent is to create fault isolation as well as to reduce response times.
Microservices can scale transactions, data sizes, and codebase sizes. They are most effective in scaling the size and complexity of your codebase. They tend to cost a bit more than horizontal scaling because the engineering team needs to rewrite services or, at the very least, disaggregate them from the original monolithic application.
WHAT: Sometimes referred to as scale through services or resources, this rule focuses on scaling by splitting datasets, transactions, and engineering teams along verb (services) or noun (resources) boundaries.
WHEN TO USE: Very large datasets where relations between data are not necessary. Large, complex systems where scaling engineering resources requires specialization.
HOW TO USE: Split up actions by using verbs, or resources by using nouns, or use a mix. Split both the services and the data along the lines defined by the verb/noun approach.
WHY: Allows for efficient scaling of not only transactions but also very large datasets associated with those transactions. It also allows for the efficient scaling of teams.
KEY TAKEAWAYS: Microservices allow for efficient scaling of transactions, large datasets, and can help with fault isolation. It helps reduce the communication overhead of teams. The codebase becomes less complex as disjoint features are decoupled and spun as new services thereby letting each service scale independently specific to its requirement.
"},{"location":"level101/systems_design/scalability/#refer_3","title":"Refer","text":"This pattern represents the separation of work based on attributes that are looked up to or determined at the time of the transaction. Most often, these are implemented as splits by requestor, customer, or client.
Very often, a lookup service or deterministic algorithm will need to be written for these types of splits.
Sharding aids in scaling transaction growth, scaling instruction sets, and decreasing processing time (the last by limiting the data necessary to perform any transaction). This is more effective at scaling growth in customers or clients. It can aid with disaster recovery efforts, and limit the impact of incidents to only a specific segment of customers.
Here the auth data is sharded based on user names so that DBs can respond faster as the amount of data DBs have to work on has drastically reduced during queries.
There can be other ways to split
Here the whole data center is split and replicated and clients are directed to a data center based on their geography. This helps in improving performance as clients are directed to the closest data center and performance increases as we add more data centers. There are some replication and consistency overhead with this approach one needs to be aware of. This also gives fault tolerance by rolling out test features to one site and rollback if there is an impact to that geography.
WHAT: This is very often a split by some unique aspect of the customer such as customer ID, name, geography, and so on.
WHEN TO USE: Very large, similar datasets such as large and rapidly growing customer bases or when the response time for a geographically distributed customer base is important.
HOW TO USE: Identify something you know about the customer, such as customer ID, last name, geography, or device, and split or partition both data and services based on that attribute.
WHY: Rapid customer growth exceeds other forms of data growth, or you have the need to perform fault isolation between certain customer groups as you scale.
KEY TAKEAWAYS: Shards are effective at helping you to scale customer bases but can also be applied to other very large datasets that can\u2019t be pulled apart using the microservices methodology.
"},{"location":"level101/systems_design/scalability/#refer_4","title":"Refer","text":"In this sub-module we have toured the world of containers starting from why we use containers, how containers evolved from the virtual machine past (though they are, in no means, obsolete) and how they are different from virtual machines. We then saw how containers are implemented with emphasis on cgroups and namespaces along with some hands-on exercises. Finally we concluded our journey with container orchestration where we learnt a bit of Kubernetes with some practical examples.
Hope this module gives you enough knowledge and interest to continue learning and applying these technologies in greater depth!
"},{"location":"level102/containerization_and_orchestration/containerization_with_docker/","title":"Containerization With Docker","text":""},{"location":"level102/containerization_and_orchestration/containerization_with_docker/#introduction","title":"Introduction","text":"Docker has gained huge popularity among other container engines since it was released to the public in 2013. Here are some of the reasons why Docker so popular:
Docker containers can be shipped and run across environments be it local machine, on-prem or cloud instances in the form of Docker images. Compared to docker containers, LXC containers have more machine specifications. - Lighter weight
Docker images are light weight compared to VM images. For example, an Ubuntu 18.04 VM size is about 3GB whereas the docker image is 45MB!
Docker supports maintaining multiple versions of images which makes it easier to look up the history of an image and even rollback.
Since Docker images are in the form of layers, one image can be used as base on top of which new images are built. For example, Alpine is a light weight image (5MB) which is commonly used as a base image. Docker layers are managed using storage drivers.
Docker hub is a container registry where anyone logged in can upload or download a container image. Docker images of popular OS distros are regularly updated in docker hub and receive large community support.
Let\u2019s look at some terms which come up during our discussion of Docker.
"},{"location":"level102/containerization_and_orchestration/containerization_with_docker/#docker-terminology","title":"Docker terminology","text":"Docker image contains the executable version of the application along with the dependencies (config files, libraries, binaries) required for the application to run as a standalone container. It can be understood as a snapshot of a container. Docker images are present as layers on top of the base layer. These layers are the ones that are versioned. The most recent version of layer is the one that is used on top of the base image.
docker image ls lists the images present in the host machine.
Docker container is the running instance of the docker image. While images are static, containers created from the images can be executed into and interacted with. This is actually the \u201ccontainer\u201d from the previous sections of the module.
docker run is the command used to instantiate containers from images.
docker ps lists docker containers currently running in the host machine.
It is a plain text file of instructions based on which an image is assembled by docker engine (daemon, to be precise). It contains information on base image, ENV variables to be injected.
docker build is used to build images from dockerfile.
It is Docker\u2019s official container registry of images. Any user with a docker login can upload custom images to Docker hub using docker push and fetch images using docker pull.
Having known the basic terminologies let\u2019s look at how docker engine works; how CLI commands are interpreted and container life-cycle is managed.
"},{"location":"level102/containerization_and_orchestration/containerization_with_docker/#components-of-docker-engine","title":"Components of Docker engine","text":"Let\u2019s start with the diagram of Docker Engine to understand better:
The docker engine follows a client-server architecture. It consists of 3 components:
This is the component the user directly interacts with. When you execute docker commands which we saw earlier (push, pull, container ls, image ls) , we are actually using the docker client. A single docker client can communicate with multiple docker daemons.
Provides an interface for the docker client and daemon to communicate.
This is the main component of the docker engine. It builds images from dockerfile, fetches images from docker registry, pushes images to the registry, stops, starts containers etc. It also manages networking between containers.
"},{"location":"level102/containerization_and_orchestration/containerization_with_docker/#lab","title":"LAB","text":"The official docker github provides labs at several levels for learning Docker. We're linking one of the labs which we found great for people beginning from scratch. Please follow the labs in this order:
Setting up local environment for the labs
Basics for using docker CLI
Creating and containerizing a basic Flask app
Here is another beginner level lab for dockerizing a MERN (Mongo + React + Express) application and it\u2019s easy to follow along.
"},{"location":"level102/containerization_and_orchestration/containerization_with_docker/#advanced-features-of-docker","title":"Advanced features of Docker","text":"While we have covered the basics of containerization and how a standalone application can be dockerized, processes in the real world need to communicate with each other. This need is particularly prevalent in applications which follow a microservice architecture.
Docker networks
Docker networks facilitate the interaction between containers running on the same hosts or even different hosts. There are several options provided through docker network command which specifies how the container interacts with the host and with other containers. The host option allows sharing of network stack with the host, bridge allows communication between containers running on the same host but not external to the host, overlay facilitates interaction between containers across hosts attached to the same network and macvlan which assigns a separate MAC address to a container for legacy containers are some important types of networks supported by Docker. This however is outside the scope of this module. The official documentation on docker networks itself is a good place to start.
Volumes
Apart from images, containers and networks, Docker also provides the option to create and mount volumes within containers. Generally, data within docker containers is non-persistent i.e once you kill the container the data is lost. Volumes are used for storing persistent data in containers. This Docker lab is a great place to start playing with volumes.
In the next section we see how container deployments are orchestrated with Kubernetes.
"},{"location":"level102/containerization_and_orchestration/intro/","title":"Containers and orchestration","text":""},{"location":"level102/containerization_and_orchestration/intro/#introduction","title":"Introduction","text":"Containers, Docker and Kubernetes are \"cool\" terms that are being spoken of by everyone involved with software in some way. Let's dive into each of these pieces of technology at enough depth to understand what the whole deal is about!
In this module we talk about the ins and outs of containers: the internals and usage of containers; how they are implemented, how to containerize your application and finally, how to deploy containerized applications on a large scale without losing your sleep. We'll also get our hands dirty by trying out a few lab exercises.
"},{"location":"level102/containerization_and_orchestration/intro/#prerequisites","title":"Prerequisites","text":"This module is divided into 3 sub-modules. In the first sub module, we will cover the internals of containerization and why they\u2019re used for.
The second sub-module introduces Docker, a popular container engine and contains lab exercises on dockerizing a basic webapp.
The last module talks about container orchestration with Kubernetes and some lab exercises to show how it makes the lives of SREs easy.
"},{"location":"level102/containerization_and_orchestration/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"We will not cover advanced docker and kubernetes concepts. However, we will be leading you to links and references from where you can pick them up as per your interest.
"},{"location":"level102/containerization_and_orchestration/intro/#course-contents","title":"Course Contents","text":"The following topics has been covered in this course:
Here's a popular definition of containers according to Docker, a popular containerization engine :
A container is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another
Let's break this down. A container is your code bundled along with its entire runtime environment. That includes your system libraries, binaries and config files needed for your application to run.
"},{"location":"level102/containerization_and_orchestration/intro_to_containers/#why-containers","title":"Why containers","text":"You might wonder why we need to pack your application along with its dependencies. This is where the second part of the definition comes,
...so the application runs quickly and reliably from one computing environment to another.
Developers usually write code in their dev environment (or local machine), test it in one or two staging/test environments before pushing their code into production. Ideally, for reliably testing applications before pushing to production, we need all these environments to be uniform to a tee (underlying OS, system libraries etc).
Of course, the ideal is hard to achieve especially when we're using a mix of on-prem (complete control) and cloud infrastructure providers (more restrictive in terms of control of hardware and security options), a scenario which is more common today.
This is exactly why we need to package not only the code but also the dependencies; so that your application runs reliably irrespective of which infrastructure or environment it runs on.
We can run several containers on a single host. Due to how containers are implemented, each container has its own isolated environment within the same host. This means that a monolithic application can be broken down into micro-services and packaged into containers. Each microservice runs in the host machine in isolated environments. This is another reason why containers are used: separation of concerns.
Providing isolated environments does not let the failure of one application in one container affect the other. This is called fault isolation. Isolation also gives the added benefit of increased security due to restricted visibility of processes in a container.
Due to how most of the containerization solutions are implemented, we also have the option to cap the amount of resources consumed by applications running within a container. This is called resource limiting. Will will discuss this feature in more detail in the section on cgroups.
"},{"location":"level102/containerization_and_orchestration/intro_to_containers/#difference-between-virtual-machines-and-containers","title":"Difference between virtual machines and containers","text":"Let's digress a little and go into some history. In the previous section we talked about how containers help us in achieving separation of concerns. Before the wide-spread usage of containers, virtualization was used for running applications in isolated environments in the same host (it\u2019s still being used today in some cases).
In plain terms, virtualization is where we package software along with a copy of the OS on which it runs. This package is called a virtual machine (VM). The image of the OS bundled in the VM is called Guest OS. A component called Hypervisor sits between the Guest and the Host OS and is responsible for facilitating the access of the underlying OS\u2019s hardware to the Guest OS. You can learn more about hypervisors here.
Similar to how multiple containers can be run in a single host machine, multiple VMs can be run on a single host and in this way, it\u2019s possible to run applications (or each microservice) in a separate VM and achieve separation of concerns.
The main focus here is on the size of the VMs and containers. VMs come along with a copy of the guest operating system and therefore are heavy-weight compared to containers. If you\u2019re more interested in comparison of VMs and containers, you can check these articles from Backblaze and NetApp.
While it is possible to run an operating system on a host with an incompatible kernel using hypervisors (e.g Windows 10 VM on CentOS 7), in cases where kernels can be shared (e.g Ubuntu on CentOS 7) containers are preferred over VMs due to the size factor. Sharing kernels, as you will see later, also gives containers many performance benefits over VMs like quicker boot-ups. Let\u2019s look at the diagram of how containers work.
Comparing the two diagrams, we notice two things:
Containers do not have a separate (guest) OS
Container engine is the intermediary between containers and Host OS. It is used to facilitate the life-cycle of a container on the Host OS (it is not a necessity, however).
The next section explains in detail how containers share the same operating system (kernel, to be precise) as the host machine and yet provide isolated environments for applications to run.
"},{"location":"level102/containerization_and_orchestration/intro_to_containers/#how-are-containers-implemented","title":"How are containers implemented","text":"We\u2019ve talked about how containers, unlike virtual machines, share the same kernel as the host operating system and provide isolated environments for applications to run. This is achieved without the overhead of running a guest operating system on the host OS, thanks to two features of linux kernel called cgroups and kernel namespaces.
Now that we are touching upon the internals of containers, it would be appropriate to give a more technically accurate representation of what they are. A container is a linux process or a group of linux processes which is restricted in - visibility into processes outside the container (implemented using namespace) - quantity of resources it can use (implemented using cgroups) and - system calls that can be made from the container. Refer seccomp, if interested in knowing more.
These restrictions are what make a containerized application remain isolated from other processes running in the same host.
Now let\u2019s talk about namespaces and cgroup in a little more detail.
"},{"location":"level102/containerization_and_orchestration/intro_to_containers/#namespaces","title":"Namespaces","text":"Visibility of processes inside a container should be restricted within itself. This is what linux namespaces do. The idea is that processes within a namespace can\u2019t affect those which it can\u2019t \u201csee\u201d. Processes sharing a single namespace have identities, service and/or interfaces unique to the namespace they exist in. Here\u2019s a list of namespaces in linux:
Process groups sharing a mount namespace share a separate, private set of mount points and file system view. Any modifications made to these namespaced mount points are not visible outside the namespace. For example it is possible to have a /var within the a mount namespace which is different from /var in the host.
A processes in a pid namespace have process ids which are unique only within the namespace. A process can be a root process (pid 1) in its own pid namespace and have an entire tree of processes under it.
Each network namespace will have its own network device instances that can be configured with individual network addresses. Processes in the same network namespace can have their own ports and route tables.
User namespaces can have their own users and group ids. It\u2019s possible for a process using a non-privileged user in the host machine to have a root user identity within a user namespace.
Allows creation of cgroups which can be used only within the cgroup namespace. Cgroups will be covered in more detail in the following section.
This namespace has its own hostname and domain name IPC. Each IPC namespace has its own System V and POSIX message queues.
As complex as it seems, creating namespaces in linux is quite simple. Let\u2019s see a quick demo to create a PID namespace. You\u2019ll need a linux based OS with sudoers permission to follow along.
"},{"location":"level102/containerization_and_orchestration/intro_to_containers/#demo-namespaces","title":"DEMO: namespaces","text":"You can see that ps aux (which itself is a process launched in the PID namespace so created) can only see processes within its own namespace. Hence, the output shows only 2 processes running within the namespace. Also note, the root process (pid 1) in the namespace is not init but it is the bash shell which we specified while creating the namespace.
Note the difference in pid (23844 in the host and 44 within the namespace) though both refer to the same process (start time and all other attributes are same).
It\u2019s also possible to nest namespaces i.e create a pid namespace from another pid namespace. Try out sudo nsenter -t 23844 --pid -r bash to reenter the namespace and create another pid namespace within it. It should be fun to do!
A cgroup can be defined as a set of processes whose usage of resources is metered and monitored. The resources can be memory pages, disk i/o, CPU etc. In fact, cgroups are classified based on which resource the limit is imposed on and nature of action taken when a limit is violated.
The component in the cgroup which tracks resource utilization and controls the behaviour of processes in a cgroup is called resource-subsystem or resource controller.
Following is the set of resource controllers and their function according to RHEL\u2019s introduction to cgroups:
Cgroups follow a hierarchical, tree-like structure for each resource controller i.e one cgroup exists for each controller. Each cgroup in a hierarchy inherits certain attributes (e.g limits) from its parent cgroup.
Let\u2019s try out a quick demo with memory cgroups to wrap our heads around the above ideas. You\u2019ll need a linux based OS (here, RedHat) with sudo permission to follow along.
"},{"location":"level102/containerization_and_orchestration/intro_to_containers/#demo-cgroups","title":"DEMO: cgroups","text":"mount | grep \"^cgroup\". If you have the tools installed you\u2019ll see a output like this:If not, install the tools with sudo yum install libcgroup-tools -y.
sudo cgcreate -a root -g memory:mem_group. Verify that cgroup is created. /sys/fs/cgroup/<cgroup type> is the pseudo filesystem where a newly created cgroup is added as a sub-group.
This limit is too low and hence most of the processes attached to mem_group should be OOM killed.
The process is OOM killed as expected. You can confirm the same with dmesg logs (mm_fault_error).
If you want to try out a more in-depth exercise on cgroups, check out this tutorial from Geeks for Geeks.
Let\u2019s come back to containers again. Containers share the same kernel as the underlying host operating system and provide an isolated environment of the application within. Cgroups help in managing resources used by processes within a container and namespaces help isolate network stack, pids, users, group ids and mount points in a container from another container running on the same host.
Of course, there are more components to containers which truly make it fully functional but that discussion is out of scope of this module.
"},{"location":"level102/containerization_and_orchestration/intro_to_containers/#container-engine","title":"Container engine","text":"Container engines ease the process of creating and managing containers in a host machine. How?
There are several container engines available like Docker, RKT, LXC (one of the first container engines) which require different image formats (Docker, LXD). OCI (Open Container Initiative) is a collaborative project started by Docker that aims to standardize container runtime specifications and image formats across vendors. OCI FAQ section is a good place to start if you\u2019re curious about this project. We will focus on Docker in the next section.
"},{"location":"level102/containerization_and_orchestration/orchestration_with_kubernetes/","title":"Orchestration With Kubernetes","text":""},{"location":"level102/containerization_and_orchestration/orchestration_with_kubernetes/#introduction","title":"Introduction","text":"Now we finally arrive at the most awaited part: running and managing containers at scale. So far, we have seen how Docker facilitates managing the life-cycle of containers and provides improved portability of applications. Docker does provide a solution for easing the deployment of containers on a large scale ( you can check out Docker Swarm, if interested) which integrates well with Docker containers. However, Kubernetes has become the de-facto tool for orchestrating the management of microservices (as containers) in large distributed environments.
Let\u2019s see the points of interest for us, SREs, to use container orchestration tools and Kubernetes in particular.
"},{"location":"level102/containerization_and_orchestration/orchestration_with_kubernetes/#motivation-to-use-kubernetes","title":"Motivation to use Kubernetes","text":"Though there is a steep learning curve associated with Kubernetes, once learnt , can be used as a one stop tool to manage your microservices. With a single command it is possible to deploy full fledged production ready environments. The desired state of an application needs to be recorded as a YAML manifest and Kubernetes manages the application for you.
We can specify limits on resources used by each container in a deployment. We can also specify our choice of nodes where Kubernetes can schedule nodes to be deployed (e.g microservices with high CPU consumption can be instructed to be deployed in high compute nodes).
Self-healing is built into basic resource types of Kubernetes. This removes the headache of designing a fault tolerant application system from scratch. This applies especially to stateless applications.
Kubernetes does not have vendor lock-in. It can be set up in multiple cloud environments or in on-prem data centers.
Kubernetes is open-source and many technologies like operators, service mesh etc. have been built by the community to manage and monitor Kubernetes-orchestrated applications better.
We can build our custom resource definitions which fit our use case for managing applications and use Kubernetes to manage them (with custom controllers).
You can check out this article if you are more interested in this topic.
"},{"location":"level102/containerization_and_orchestration/orchestration_with_kubernetes/#architecture-of-kubernetes","title":"Architecture of Kubernetes","text":"Here\u2019s a diagram (from the official Kubernetes documentation) containing different components which make Kubernetes work:
Kubernetes components can be divided into two parts: control plane components and data plane components.
A Kubernetes cluster consists of 1 or more host machines (called nodes) where the containers managed by Kubernetes are run. This constitutes the data plane (or node plane).
The brain of Kubernetes which responds to events from the node plane (e.g create a pod, replicas mismatch) and does the main orchestration is called the control plane. All control plane components are typically installed in a master node. This master node does not run any user containers.
The Kubernetes components themselves are run as containers wrapped in Pods (which is the most basic kubernetes resource object).
This workflow might help you understand the working on components better:
An SRE installs kubectl in their local machine. This is the client which interacts with the Kubernetes control plane (and hence the cluster).
They create a YAML file, called manifest which specifies the desired state of the resource (e.g a deployment names \u201cfrontend\u201d needs 3 pods to always be running)
When they issue a command to create objects based in the YAML file, the kubectl CLI tool sends a rest API request to the kube-apiserver.
If the manifest is valid, it is stored as key value pairs in the etcd server on the control plane.
kube-scheduler chooses which nodes to put the containers on (basically schedules them)
There are controller processes (managed by kube-controller manager) which makes sure the current state of the cluster is equivalent to the desired state (here, 3 pods are indeed running in the cluster -> all is fine).
On the node plane side, kubelet makes sure that pods are locally kept in running state.
The best way to start this exercise is to use a Play with kubernetes lab.
The environment gets torn down after 4 hours. So make sure that you save your files if you want to resume them. For persistent kubernetes clusters, you can set it up either in your local (using minikube) or you can create a kubernetes cluster in Azure, GCP or any other cloud provider.
Knowledge of YAML is nice to have for understanding the manifest files.
"},{"location":"level102/containerization_and_orchestration/orchestration_with_kubernetes/#hands-on","title":"Hands-on","text":""},{"location":"level102/containerization_and_orchestration/orchestration_with_kubernetes/#lab-1","title":"Lab 1:","text":"We are going to create an object called Pod which is the most basic unit for running a container in Kubernetes. Here, we will create a pod called \u2018nginx-pod\u201d which contains an nginx container called \u201cweb\u201d. We will also expose port 80 in the container so that we can interact with the nginx container. Save the below manifest in a file called nginx-pod.yaml
apiVersion: v1 #[1]\nkind: Pod #[2]\nmetadata: #[3]\n name: nginx-pod #[4]\n labels: #[5]\n app: nginx \nspec: #[6]\n containers: #[7]\n - name: web #[8]\n image: nginx #[9]\n ports: #[10]\n - name: web #[11]\n containerPort: 80 #[12]\n protocol: TCP #[13]\n Let\u2019s very briefly understand what\u2019s here:
#[2] - kind: The \u201ckind\u201d of object that\u2019s being created. Here it is a Pod#[1] - apiVersion: The apiVersion of the \u201cPod\u201d resource. There could be minor changes in the values or keys in the yaml file if the version varies.#[3] - metadata: The metadata section of the file where pod labels and name is given#[6] - spec: This is the main part where the things inside the pod are definedThese are not random key value pairs! They have to be interpretable by the kubeapiserver. You can check which key value pairs are optional/mandatory using kubectl explain pod command. Do try it out!
kubectl apply -f nginx-pod.yaml. This creates the \u201cnginx-pod\u201d pod in the kubernetes cluster.kubectl get pod.It shows that nginx-pod is in Running state. 1/1 indicates that out of 1 out of 1 container(s) inside the pod is healthy.
kubectl describe pod/nginx-pod command. This gives a lengthy output with a detailed description of the pod and the events that happened since the pod was created. This command is very useful for debugging. The part we are concerned here is this:You can see \u201cweb\u201d under the Containers section with Image as nginx. This is what we are looking for.
Here, this is 10.244.1.3
Issue a curl request from the host curl 10.244.1.3:80. You will get the welcome page!
Let\u2019s say we want to use a specific tag of nginx (say 1.20.1) in the same pod i.e we want to modify some property of the pod. You can try editing nginx-pod.yaml (image: nginx:1.20.1 in #[9])and reapplying (step 2.). It will create a new container in the same pod with the new image.
A container is created within the pod but the pod is the same. You can verify by checking the pod start time in describe command. It would show a much older time.
What if we want to change the image to 1.20.1 for 1000 nginx pods? Stepping a little back, what if we want to create 1000 nginx pods. Of course, we can write a script but Kubernetes already offers a resource type called \u201cdeployment\u201d to manage large scale deployments better.
"},{"location":"level102/containerization_and_orchestration/orchestration_with_kubernetes/#lab-2","title":"Lab 2:","text":"We\u2019ll go a step further to see how we can create more than a single instance of the nginx pod at the same time.
apiVersion: apps/v1\nkind: Deployment #[1]\nmetadata:\n name: nginx-deployment\n labels:\n app: nginx \nspec:\n replicas: 3 #[2]\n selector:\n matchLabels:\n app: nginx #[3]\n template: #[4]\n metadata:\n labels:\n app: nginx #[5]\n spec:\n containers:\n - name: web\n image: nginx\n ports:\n - name: web\n containerPort: 80\n protocol: \"TCP\"\n You can see that it is similar to a pod definition till spec (#[1] has Deployment as kind, api version is also different).
Another thing interesting observation is the metadata and spec parts under #[4] is almost the same as the metadata and spec section under the Pod definition in Lab 1 (do go up and cross check this). What this implies is that we are deploying 3 nginx pods similar to Lab1. Also, the labels in matchLabels should be the same as labels under #[4].
kubectl apply -f nginx-deploy.yamlVerify that 3 pods are indeed created.
If you\u2019re curious, check the output of kubectl get deploy and kubectl describe deploy nginx-deployment.
kubectl delete pod <pod name>. After a few seconds again do kubectl get pod.You can see that a new pod is spawned to keep the total number of pods as 3 (see AGE 15s compared to others created 27 minutes ago)! This is a demonstration of how Kubernetes does fault tolerance.
This is a property of Kubernetes deployment object (kill the pod from Lab1, it won\u2019t be respawned :) )
kubectl scale deploy --replicas=10 nginx-deployment.You can see that 3/10 pods are older than the rest. This means Kubernetes has added 7 extra pods to scale the deployment to 10. This shows how simple it is to scale up and scale down containers using Kubernetes.
kubectl expose deployment nginx-deployment --name=nginx-service. Curl the IP corresponding to 10.96.114.184. This curl request reaches one of the 10 pods in the deployment \u201cnginx-deployment\u201d in a round robin fashion. What happens when we execute the expose command is that a kubernetes Service is created of type Cluster IP so that all the pods behind this service are accessible through a single local IP (10.96.114.184, here).
It is possible to have a public IP instead (i.e an actual external load balancer) by creating a Service of type LoadBalancer. Do feel free to play around with it!
The above exercises a pretty good exposure to using Kubernetes to manage large scale deployments. Trust me, the process is very similar to the above for operating 1000 deployments and containers too! While a Deployment object is good enough for managing stateless applications, Kubernetes provides other resources like Job, Daemonset, Cronjob, Statefulset etc. to manage special use cases.
eAdditional labs: https://kubernetes.courselabs.co/ (Huge number of free follow-along exercises to play with Kubernetes)
"},{"location":"level102/containerization_and_orchestration/orchestration_with_kubernetes/#advanced-topics","title":"Advanced topics","text":"Most often than not, microservices orchestrated with Kubernetes contain dozens of instances of resources like deployment, services and configs. The manifests for these applications can be auto- generated with Helm templates and passed on as Helm charts. Similar to how we have PiPy for python packages there are remote repositories like Bitnami where Helm charts (e.g for setting up a production-ready Prometheus or Kafka with a single click) can be downloaded and used. This is a good place to begin.
Kubernetes provides the flexibility to create our custom resources (similar to Deployment or the Pod which we saw). For instance, if you want to create 5 instances of a resource with kind as SchoolOfSre you can! The only thing is that you have to write your custom resource for it. You can also build a custom operator for your custom resource to take certain actions on the resource instance. You can check here for more information.
"},{"location":"level102/continuous_integration_and_continuous_delivery/cicd_brief_history/","title":"Brief History","text":""},{"location":"level102/continuous_integration_and_continuous_delivery/cicd_brief_history/#the-evolution-of-the-cicd","title":"The Evolution of the CI/CD","text":"Traditional development approaches have been around for a very long time. The waterfall model has been widely used in both large and small projects and has been successful. Despite the success, it has a lot of drawbacks like longer cycle times or delivery.
While multiple team members are working on the project, the code changes get accumulated and never integrated until the planned build date. The build usually happens on agreed cycles that range from a month to a quarter. This results in several integration issues and build failures as the developers were working on their features in silos.
It was a nightmare situation for the operations teams/for anyone to deploy the new builds/releases to the production environment because of lack of proper documentation on every change and the configuration requirements. So, to deploy successfully, often it required hot fixes and immediate patches.
Another big challenge was collaboration. It is rare that the developer meets the operation engineers and does not have a full understanding of the production environment. All these challenges have given rise to longer cycle times for the delivery of the code changes.
Agile methodology prescribes the delivery of incremental delivery of features in multiple iterations. So, the developers commit their code changes in smaller increments and roll out more frequently. Every code commit triggers a new build, and the integration issues are identified much early. This has improved the build process and thereby reduced the cycle time. This process is known as continuous integration or CI.
The big barrier between the developers and the operation teams has been shrunken with the emergence of the trend where organizations are adapting to the DevOps and SRE disciplines. The collaboration between the developers and the operation teams is improved. Moreover, the use of the same tools and processes by both the teams has improved coordination and avoided conflicting understanding of the process. One of the main drivers in this regard is the continuous delivery (CD) process that ensures the incremental deployment of smaller changes. There are multiple pre-production environments also called the staging environments before deploying to production environments.
"},{"location":"level102/continuous_integration_and_continuous_delivery/cicd_brief_history/#cicd-and-devops","title":"CI/CD and DevOps","text":"The term DevOps represents the combination of Development (Dev) and Operations (Ops) teams. That is bringing developers and operations teams together for more collaboration. The development team often wants to introduce more features and more changes while the operation teams are more focused on the stability of the application in production. A change is always taken as a threat by the operations team as it can shake the stability of the environment. DevOps is termed as a culture that introduces the processes to reduce the barriers between developers and operations.
The collaboration between Dev and Ops allows better follow-up of end-to-end production deployments and more frequent deployments. So, thus CI/CD is a key element in the DevOps processes.
"},{"location":"level102/continuous_integration_and_continuous_delivery/conclusion/","title":"Conclusion","text":""},{"location":"level102/continuous_integration_and_continuous_delivery/conclusion/#applications-in-sre-role","title":"Applications in SRE Role","text":"The Monitoring, Automation and Eliminating the toil are some of the core pillars of the SRE discipline. As an SRE, you may require spending about 50% of time on automating the repetitive tasks and to eliminate the toil. CI/CD pipelines are one of the crucial tools for the SRE. They help in delivering the quality application with the smaller and regular and more frequent builds. Additionally, the CI/CD metrics such as Deployment time, Success rate, Cycle time and Automated test success rate etc. are the key things to watch to improve the quality of the product thus improving the reliability of the applications.
In this chapter, we have studied the CI/CD pipelines with brief history on the challenges with the traditional build practices. We have also looked at how the CI/CD pipelines augments the SRE discipline. Use of CI/CD pipelines in software development life cycle is a modern approach in the SRE realm that helps achieve greater efficiency.
We have also performed a hands-on lab activity on creating the CI/CD pipeline using Jenkins.
"},{"location":"level102/continuous_integration_and_continuous_delivery/conclusion/#references","title":"References","text":"Continuous Delivery means deploying the application builds more frequently in the non-production environments such as SIT, UAT, INT and performing the integration tests and the acceptance tests automatically.
In the CD, the tests are performed on the integrated application instead of the single microservice in the cases of microservice based application. The tests must include all the functional tests and the acceptance tests that may contain the UI tests. The build must be immutable in nature, that is the same package must be deployed across all the environments including the Production.
The deployment to the Production is often manual after performing additional acceptance tests such as performance tests etc. So, the fully automated deployment to the Production environments is called the Continuous Deployment (whereas CD \u2013 Continuous delivery doesn\u2019t automatically deploy to Production). The continuous deployment must have a feature toggle so that a feature can be toggled off without the need for redeploying the code.
Often, the deployment involves more than one production environment, for example in blue-green environments the application is first deployed to the blue environment and then to the green environment so that the downtime is not required.
Fig 3: Continuous Delivery Pipeline
"},{"location":"level102/continuous_integration_and_continuous_delivery/continuous_integration_build_pipeline/","title":"Continuous Integration","text":"CI is a software development practice where members of a team integrate their work frequently. Each integration is verified by an automated build (including test) to detect integration errors as quickly as possible.
Continuous integration requires that all the code changes be maintained in a single code repository where all the members can push the changes to their feature branches regularly. The code changes must be quickly integrated with the rest of the code and automated builds should happen and feedback to the member to resolve them early.
There should be a CI server where it can trigger a build as soon as the code is pushed by a member. The build typically involves compiling the code and transforming it to an executable file such as JARs or DLLs etc. called packaging. It must also perform unit tests with code coverage. Optionally, the build process can have additional stages such as static code analysis and vulnerability checks etc.
Jenkins, Bamboo, Travis CI, GitLab, Azure DevOps etc. are the few popular CI tools. These tools provide various plugins and integration such as ant, maven etc. for building and packaging, and Junit, selenium etc. are for performing the unit tests. SonarQube can be used for static code analysis and code security.
Fig 1: Continuous Integration Pipeline
Fig 2: Continuous Integration Process
"},{"location":"level102/continuous_integration_and_continuous_delivery/introduction/","title":"Introduction","text":""},{"location":"level102/continuous_integration_and_continuous_delivery/introduction/#prerequisites","title":"Prerequisites","text":"In this course, you will learn the basics of CI/CD and how it helps drive the SRE discipline in an organization. It also discusses the various DevOps tools in CI/CD practice and a hands-on lab session on Jenkins based pipeline. Finally, it will conclude by explaining the role in the growing SRE philosophy.
"},{"location":"level102/continuous_integration_and_continuous_delivery/introduction/#what-is-not-covered-under-this-course","title":"What is not covered under this course?","text":"The course does not cover DevOps elements such as Infrastructure as a code, continuous monitoring applications and infrastructure comprehensively.
"},{"location":"level102/continuous_integration_and_continuous_delivery/introduction/#table-of-contents","title":"Table of Contents","text":"Continuous Integration and Continuous Delivery, also known as CI/CD, is a set of processes that helps in faster integration of software code changes and deployment to the end user in a reliable manner. The more frequent integrations and deployments helps reduce the software development lifecycle. There are three practices in CI/CD:
Jenkins is an open-source continuous integration server for orchestrating the CI/CD pipelines. It supports integration with several components, infrastructure such as git, cloud etc. that helps in complete software development life cycle.
In this hands-on lab, let us: * Create a build pipeline (CI) for a simple java application. * Adding Test stage to build pipeline
This hands-on is based on the Jenkins running on docker on your local workstation, designed for Windows OS. For Linux OS, please follow the demo
Note: The hands-on lab is designed with Jenkins on the docker. However, the steps are applicable for the direct docker installation on your windows workstation as well.
"},{"location":"level102/continuous_integration_and_continuous_delivery/jenkins_cicd_pipeline_hands_on_lab/#installing-git-docker-and-jenkins","title":"Installing Git, Docker and Jenkins:","text":"For this hands-on, let us fork a simple java application from the GitHub simple-java-maven-app. 1. Sign up for the GitHub account Join GitHub \u00b7 GitHub. Once signed up, proceed to login. 2. Open the simple-java-maven-app by clicking on this link 3. On the top right corner, click on the \u2018Fork\u2019 to create a copy of the project to your GitHub account. (Refer Fork A Repo) 4. Once forked, clone this repository to your local workstation.
"},{"location":"level102/continuous_integration_and_continuous_delivery/jenkins_cicd_pipeline_hands_on_lab/#create-jenkins-project","title":"Create Jenkins Project:","text":"Fig 4: Jenkins - Create a Job
Fig 5: Jenkins - Create Pipeline
Screen looks like below after entering the details.
Fig 6: Jenkins - Pipeline Configuration
"},{"location":"level102/continuous_integration_and_continuous_delivery/jenkins_cicd_pipeline_hands_on_lab/#create-build-pipeline-using-the-jenkinsfile","title":"Create Build pipeline using the Jenkinsfile:","text":"Jenkinsfile is a script file containing the pipeline configuration and the stages and other instructions to Jenkins to create a pipeline from the file. This file will be saved at the root of the code repository. 1. Using your favorite text editor or IDE, create and save a new text file with the name Jenkinsfile at the root of your local simple-java-maven-app Git repository. 2. Copy the following declarative pipeline code and paste it into the empty Jenkinsfile.
pipeline {\n agent {\n docker {\n image 'maven:3.8.1-adoptopenjdk-11' \n args '-v /root/.m2:/root/.m2' \n }\n }\n stages {\n stage('Build') { \n steps {\n sh 'mvn -B -DskipTests clean package' \n }\n }\n }\n}\n Note: If you are running Jenkins on your local workstation without the docker, please change the agent to any as shown below so that it runs on the localhost. Please ensure that the maven tool is installed on your local workstation.
pipeline {\n agent any\n\n stages {\n stage('Build') { \n steps {\n sh 'mvn -B -DskipTests clean package' \n }\n }\n }\n}\n In the above Jenkinsfile: * We specified an agent where the pipeline should run. 'docker\u2019 in the agent section indicates to run a new docker container with the specified image. * In the stages section, we can define multiple steps as different stages. Here, we have a stage called \u2018Build\u2019, with the maven command for building the java application.
cd <your local simple-java-maven-app repo cloned folder>\ngit add .\ngit commit -m \"Add initial Jenkinsfile\"\ngit push origin master\n Fig 7: Jenkins - Building the Pipeline
Fig 8: Jenkins - View Running Builds
In the previous section, we have created the pipeline with a single stage. Typically, your CI pipeline contains multiple stages such as Build, Test and other optional stages such Code scanning etc. In this section, let us add a Test stage to the build pipeline and run.
stage('Test') {\n steps {\n sh 'mvn test'\n }\n post {\n always {\n junit 'target/surefire-reports/*.xml'\n }\n }\n }\n The Jenkinsfile looks like below after adding the Test stage.
pipeline {\n agent {\n docker {\n image 'maven:3.8.1-adoptopenjdk-11' \n args '-v /root/.m2:/root/.m2' \n }\n }\n stages {\n stage('Build') { \n steps {\n sh 'mvn -B -DskipTests clean package' \n }\n }\n stage('Test') {\n steps {\n sh 'mvn test'\n }\n post {\n always {\n junit 'target/surefire-reports/*.xml'\n }\n }\n }\n }\n}\n Note: If you are running Jenkins on your local workstation without the docker, please change the agent to any so that it runs on the localhost. Please ensure that the maven tool is installed on your local workstation.
pipeline {\n agent any\n\n stages {\u2026\n\n }\n}\n cd <your local simple-java-maven-app repo cloned folder>\ngit add .\ngit commit -m \"Test stage is added to Jenkinsfile\"\ngit push origin master\n Fig 9: Jenkins - Viewing the Running Builds with Test stage Included
We have now successfully created CI pipeline with two stages: Build and Test stages.
"},{"location":"level102/linux_intermediate/archiving_backup/","title":"Archiving and Backup","text":""},{"location":"level102/linux_intermediate/archiving_backup/#introduction","title":"Introduction","text":"One of the things SREs make sure of is the services are up all the time (at least 99.99% of the time), but the amount of data generated at each server running those services are immense. This data could be logs, user data in the database, or any other kind of metadata. Hence we need to compress, archive, rotate, and Backup the data in a timely manner for data safety and to make sure we don\u2019t run out of space.
"},{"location":"level102/linux_intermediate/archiving_backup/#archiving","title":"Archiving","text":"We usually archive the data that are no longer needed but are kept mostly for compliance purposes. This helps in storing the data into compressed format saving a lot of space. Below section is to familiarize with the archiving tools and commands.
"},{"location":"level102/linux_intermediate/archiving_backup/#gzip","title":"gzip","text":"gzip is a program used to compress one or more files, it replaces the original file with a compressed version of the original file.
Here we can see that the messages log file is compressed to almost one-fifth of the original size and replaced with messages.gz. We can uncompress this file using gunzip command.
"},{"location":"level102/linux_intermediate/archiving_backup/#tar","title":"tar","text":"tar program is a tool for archiving files and directories into a single file (often called tarball). This tool is usually used to prepare archives of files before it is transferred to a long term backup server. tar doesn\u2019t replace the existing files and folders but creates a new file with extension .tar . It provides lot of flag to choose from for archiving
Flags Description -c Creates archive -x Extracts the archive -f Creates archive with the given filename -t Displays or lists files in archived file -u Archives and adds to an existing archive file -v Displays verbose information -A Concatenates the archived file -z Compresses the tar file using gzip -j Compresses the tar file using bzip2 -W Verifies an archive file -r Updates or adds file or directory in already existing .tar file"},{"location":"level102/linux_intermediate/archiving_backup/#create-an-archive-with-files-and-folder","title":"Create an archive with files and folder","text":"Flag c is used for creating the archive where f is the filename.
We can use flag t for listing out what an archive contains.
We can use flag x to unarchive the archive.
Backup is a process of copying/duplicating the existing data, This backup can be used to restore the dataset in case of data loss. Data backup also becomes critical when the data is not needed in a day to day job but can be referred to as a source of truth and for compliance reasons in future. Different types of backup are :
"},{"location":"level102/linux_intermediate/archiving_backup/#incremental-backup","title":"Incremental backup","text":"Incremental backup is the backup of data since the last backup, this reduces data redundancy and storage efficiency.
"},{"location":"level102/linux_intermediate/archiving_backup/#differential-backup","title":"Differential backup","text":"Sometimes our data keeps on modifying/updating. In that case we take backup of changes that occurred since the last backup called differential backup.
"},{"location":"level102/linux_intermediate/archiving_backup/#network-backup","title":"Network backup","text":"Network backup refers to sending out data over the network from the source to a backup destination in a client-server model. This backup destination can be centralized or decentralized. Decentralized backups are useful for disaster recovery scenarios.
rsync is one of the linux command which sync up file from one server to the destination server over the network.
The syntax for rsync goes like rsync \\[options\\] <source> <destination>. We can locate the file on the path specified after : (colon) in the \u201cdestination\u201d. If nothing is specified the default path is the home directory of the user used for backup. /home/azureuser in this case. You can always look for different options for rsync using the man rsync command.
There are various third parties which provide the backup of data to the cloud. These cloud backups are much more reliable than stored backups on local machines or any server without RAID configuration as these providers manage redundancy of data, data recovery along with the data security. Two most widely used cloud backup options are Azure backup (from Microsoft) and Amazon Glacier backup (from AWS).
"},{"location":"level102/linux_intermediate/bashscripting/","title":"Bash Scripting","text":""},{"location":"level102/linux_intermediate/bashscripting/#introduction","title":"Introduction","text":"As an SRE, the Linux system sits at the core of our day to day work and so is bash scripting. It\u2019s a scripting language that is run by Linux Bash Interpreter. Until now we have covered a lot of features mostly on a command line, now we will use this command line as an interpreter to write programs that will ease our day to day job as an SRE.
"},{"location":"level102/linux_intermediate/bashscripting/#writing-the-first-bash-script","title":"Writing the first bash script:","text":"We will start with a simple program, we will use Vim as the editor during the whole journey.
#!/bin/bash\n\n# This if my first bash script\n# Line starting with # is commented\n\necho \"Hello world!\"\n The first line of the script starting with \u201c#!\u201d is called she-bang. This is simply to let the system which interpreter to use while executing the script.
Any Line starting with \u201c#\u201d (other than #!) is referred to as comments in script and is ignored by the interpreter while executing the script. Line 6 shows the \u201cecho\u201d command that we would be running.
We will save this script as \u201cfirstscript.sh\u201d and make the script executable using chmod.
Next thing is to run the script with the explicit path. We can see the desired \u201cHello World!\u201d as output.
"},{"location":"level102/linux_intermediate/bashscripting/#taking-user-input-and-working-with-variables","title":"Taking user input and working with variables:","text":"Taking standard input using the read command and working with variables in bash.
#!/bin/bash\n\n#We will take standard input\n#Will list all files at the path\n#We will concate variable and string\n\necho \"Enter the path\"\nread path\n\necho \"How deep in directory you want to go:\"\nread depth\n\necho \"All files at path \" $path\n\ndu -d $depth -all -h $path\n We are reading path in variable \u201cpath\u201d and variable \u201cdepth\u201d to list files and directories up to that depth. We concatenated strings with variables. We always use $ (dollar-sign) to reference the value it contains.
We pass these variables to the du command to list out all the files and directories in that path upto the desired depth.
Every command and script when it completes executing, returns an integer in the range from 0 to 255 to the system, this is called exit status. \u201c0\u201d denotes success of the command while non-zero return code usually indicates various kinds of errors.
We use $? special shell variable to get exit status of the last executed script or command.
Another way to pass some values to the script is using command line arguments. Usually command line arguments in bash are accessed by $ followed by the index. The 0th index refers to the file itself, $1 to the first argument and so on. We use $# to check the count of arguments passed to the script.
Making decisions in the programming language is it\u2019s integral part, and to tackle different conditions we use if \u2026 else statements or some more nested variant of it.
The below script uses multiple concepts in one script. The aim of the script is to get some properties of the file.
Line 4 to 7 is the standard example of \"if statement\" in bash. Syntax is as explained below:
If [ condition ]; then\n\nIf_block_to_execute\n\nelse\n\nelse_block_to_execute\n\nfi\n fi is to close the if \u2026 else block. We are comparing count of argument($#) if it is equal to 1 or not. If not we prompt for only one argument and exit the script with status code 1(not a success). One or more if statements can exist without else statement but vice versa doesn\u2019t make any sense.
Operator -ne is used to compare two integers, read as \u201cinteger1 not equal to integer 2\u201d. Other comparison operators are:
Operations Description num1 -eq num2 check if 1st number is equal to 2nd number num1 -ge num2 checks if 1st number is greater than or equal to 2nd number num1 -gt num2 checks if 1st number is greater than 2nd number num1 -le num2 checks if 1st number is less than or equal to 2nd number num1 -lt num2 checks if 1st number is less than 2nd number#!/bin/bash\n# This script evaluate the status of a file\n\nif [ $# -ne 1 ]; then\n echo \"Please pass one file name as argument\"\n exit 1\nfi\n\nFILE=$1\nif [ -e \"$FILE\" ]; then\n if [ -f \"$FILE\" ]; then\n echo \"$FILE is a regular file.\"\n fi\n if [ -d \"$FILE\" ]; then\n echo \"$FILE is a directory.\"\n fi\n if [ -r \"$FILE\" ]; then\n echo \"$FILE is readable.\"\n fi\n if [ -w \"$FILE\" ]; then\n echo \"$FILE is writable.\"\n fi\n if [ -x \"$FILE\" ]; then\n echo \"$FILE is executable/searchable.\"\n fi\nelse\n echo \"$FILE does not exist\"\n exit 2\nfi\n\nexit 0\n There are lots of file expressions to evaluate file,like in bash script \u201c-e\u201d in line 10 returns true if the file passed as argument exist, false otherwise. Below are the some widely used file expressions:
File Operations Description -e file File exists -d file File exists and is directory -f file File exists and is regular file -L file File exists and is symbolic link -r file File exists and has readable permission -w file File exists and has writable permission -x file File exists and has executable permission -s file File exists and size is greater than zero -S file File exists and is a network socket.Exit status is 2 when the file is not found. And if the file is found it prints out the properties it holds with exit status 0(success).
"},{"location":"level102/linux_intermediate/bashscripting/#looping-over-to-do-a-repeated-task","title":"Looping over to do a repeated task.","text":"We usually come up with tasks that are mostly repetitive, looping helps us to code those repetitive tasks in a more formal manner. There are different types of loop statement we can use in bash:
Loop Syntax while while [ expression ]do\u00a0\u00a0\u00a0\u00a0\u00a0[ while_block_to_execute ]done for for variable in 1,2,3 .. ndo\u00a0\u00a0\u00a0\u00a0\u00a0[ for_block_to_execute ]done until until [ expression ]\u00a0do\u00a0\u00a0\u00a0\u00a0\u00a0[ until_block_to_execute ]done#!/bin/bash\n#Script to monitor the server\n\nhosts=`cat host_list`\n\nwhile true\ndo\n for i in $hosts\n do\n h=\"$i\"\n ping -c 1 -q \"$h\" &>/dev/null\n if [ $? -eq 0 ]\n then\n echo `date` \"server $h alive\"\n else\n echo `date` \"server $h is dead\"\n fi\n done\n sleep 60\ndone\n Monitoring a server is an important part of being an SRE. The file \u201chost_list\u201d contains the list of host which we want to monitor.
We used an infinite \u201cwhile\u201d loop that will sleep every 60seconds. And for each host in the host_list we want to ping that host and check if that ping was successful with its exit status, if it\u2019s successful we say server is live or it\u2019s dead.
The output of the script shows it is running every minute with the timestamp.
"},{"location":"level102/linux_intermediate/bashscripting/#function","title":"Function","text":"Developers always try to make their applications/programs in modular fashion so that they don\u2019t have to write the same code every time and everywhere to carry out similar tasks. Functions help us achieve this.
We usually call functions with some arguments and expect result based on that argument.
The backup process we discussed in earlier section, we will try to automate that process using the below script and also get familiar with some more concepts like string comparison, functions and logical AND and OR operations.
In the below code \u201clog_backup\u201d is a function which won\u2019t be executed until it is called.
Line37 will be executed first where we will check the no. of arguments passed to the script.
There are many logical operators like AND,OR, XOR etc.
Logical Operator Symbol AND && OR | NOT !Passing the wrong argument to script \u201cbackup.sh\u201d will prompt for correct usage. We have to pass whether we want to have incremental backup of the directory or the full backup along with the path of the directory we want to backup. If we want the incremental backup we will an additional argument as a meta file which is used to store the information of previous backed up files.(usually a metafile is .snar extension).
#!/bin/bash\n#Scripts to take incremental and full backup\n\nbackup_dir=\"/mnt/backup/\"\ntime_stamp=\"`date +%d-%m-%Y-%Hh-%Mm-%Ss`\"\n\nlog_backup(){\n if [ $# -lt 2 ]; then\n echo \"Usage: ./backup.sh [backup_type] [log_path]\"\n exit 1;\n fi\n if [ $1 == \"incremental\" ]; then\n if [ $# -ne 3 ]; then\n echo \"Usage: ./backup.sh [backup_type] [log_path] [meta_file]\"\n exit 3;\n fi\n tar --create --listed-incremental=$3 --verbose --verbose --file=\"${backup_dir}incremental-${time_stamp}.tar\" $2\n if [ $? -eq 0 ]; then\n echo \"Incremental backup succesful at '${backup_dir}incremental-${time_stamp}.tar'\"\n else\n echo \"Incremental Backup Failure\"\n fi\n\n elif [ $1 == \"full\" ];then\n tar cf \"${backup_dir}fullbackup-${time_stamp}.tar\" $2\n if [ $? -eq 0 ];then\n echo \"Full backup successful at '${backup_dir}fullbackup-${time_stamp}.tar'\"\n else\n echo \"Full Backup Failure\"\n fi\n else\n echo \"Unknown parameter passed\"\n echo \"Usage: ./backup.sh [incremental|full] [log_path]\"\n exit 2;\n fi\n}\n\nif [ $# -lt 2 ] || [ $# -gt 3 ];then\n echo \"Usage: ./backup.sh [incremental|full] [log_path]\"\n exit 1\nelif [ $# -eq 2 ];then\n log_backup $1 $2\nelif [ $# -eq 3 ];then\n log_backup $1 $2 $3\nfi\nexit 0\n Passing all 3 arguments for incremental backup will take incremental backup at \u201c/mnt/backup/\u201d with each archive having timestamp concatenated to each file.
The arguments passed inside the function can be accessed via $ followed by the index. The 0th index refers to the function itself,
$1 to the first argument and so on. We use #$ to check the count of arguments passed to the function.
Once we pass the string \u201cincremental\u201d or \u201cfull\u201d it gets compared inside the function and the specific block is executed. Below are some more operations that can be performed over strings.
String Operations Description string1 == string2 Returns true if string1 equals string 2 otherwise false. string1 != string2 Returns true if string NOT equal string 2 otherwise false. string1 ~= regex Returns true if string1 matches the extended regular expression. -z string Returns true if string length is zero otherwise false. -n string Returns true if string length is non-zero otherwise false."},{"location":"level102/linux_intermediate/conclusion/","title":"Conclusion","text":"Understanding package management is very crucial as an SRE, we always want the right set of software with their compatible versions to work in harmony to drive the big infrastructure and organization.
We also saw how we can configure and use storage drives and how we can have redundancy of data using RAID to avoid the data loss, how data is placed over disk and use of file systems.
Archiving and Backup is also a crucial part of being an SRE, It\u2019s our responsibility to keep the data safe and in a more efficient manner.
Bash is very useful to automate the day to day toil that an SRE stumbles into. The above walkthrough of bash gives us an idea to get started, but mere reading through it won\u2019t take you much further. I believe \u201ctaking action and practicing the topic\u201d would give you confidence and will help you become a better SRE.
"},{"location":"level102/linux_intermediate/introduction/","title":"Linux-Intermediate","text":""},{"location":"level102/linux_intermediate/introduction/#prerequisites","title":"Prerequisites","text":"This course is divided into two sections. In the first section we will cover where we left off the Linux Basics, earlier in the School of SRE curriculum, we will deep dive into some of the more advanced linux commands and concepts.
In this second section we will discuss how we use Bash scripting in day to day work, automation and toil reduction as an SRE with the help of real life examples of any SRE.
"},{"location":"level102/linux_intermediate/introduction/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"This course aims to make you familiar with the intersection of Linux commands, shell scripting and how SRE uses it. We would not be covering Linux internals.
"},{"location":"level102/linux_intermediate/introduction/#lab-environment-setup","title":"Lab Environment Setup","text":"Install docker on your system. https://docs.docker.com/engine/install/
We would be using RedHat Enterprise Linux (RHEL) 8.
__________________________________________________________________________
"},{"location":"level102/linux_intermediate/introduction/#course-content","title":"Course Content","text":"Package Management
Package:
Dependencies
Repository
High Level and Low-Level Package management tools
Storage Media
Listing the mounted storage devices
Creating a FileSystem
Mounting the device
Unmounting the device
Making it easier with /etc/fstab file?
Checking and Repairing FS
RAID
RAID levels
RAID 0 (Striping)
RAID 1(Mirroring)
RAID 5(Striping with distributed parity)
RAID 6(Striping with double parity)
RAID 10(RAID 1+0 : Mirroring and Striping)
Commands to monitor RAID
LVM
Archiving and Backup
Archiving
gzip
tar
Create an archive with files and folder
Listing files in the archive
Extract files from the archive
Backup
Incremental backup
Differential backup
Network backup
Cloud Backup
Introduction to Vim
Opening a file and using insert mode
Saving a file
Exiting the VIM editor
Bash Scripting
Writing the first bash script
Taking user input and working with variables
Exit status
Command line arguments and understanding If \u2026 else branching
Looping over to do a repeated task
Function
Conclusion
"},{"location":"level102/linux_intermediate/introvim/","title":"Introduction to Vim","text":""},{"location":"level102/linux_intermediate/introvim/#introduction","title":"Introduction","text":"As an SRE we several times log into into the servers and make changes to the config file, edit and modify scripts and the editor which comes handy and available in almost all linux distribution is Vim. Vim is an open-source and free command line editor, widely accepted and used. We will see some basics of how to use vim for creating and editing files. This knowledge will help us in understanding the next section, Scripting.
"},{"location":"level102/linux_intermediate/introvim/#opening-a-file-and-using-insert-mode","title":"Opening a file and using insert mode","text":"We use the command vim filename to open a file filename. The terminal will open an editor but once you start writing, it won\u2019t work. It\u2019s because we are not in \"INSERT\" mode in vim.
Press i and get into insert mode and start writing.
You will see on the bottom left \u201cINSERT\u201d after pressing \u201ci\u201d . You can use *ESC\u201d key to get back to normal mode.
After you insert your text in INSERT mode press ESC(escape) key on your keyboard to get out of it. Press :(colon shift +;) and press w and hit enter, the text you entered will get written in the file.
Exiting vim can get real challenging for the beginners. There are various ways you can exit the Vim like exit without saving the work, exit with saving the work.
Try below commands after exiting insert mode and pressing :(colon).
This is basic we would be needing in bash scripting in the next section. You can always visit tutorial for learning more. For quick practice of vim commands visit: https://www.openvim.com/
"},{"location":"level102/linux_intermediate/package_management/","title":"Package Management","text":""},{"location":"level102/linux_intermediate/package_management/#introduction","title":"Introduction","text":"One of the main features of any operating system is the ability to run other programs and softwares, and hence Package management comes into picture. Package management is a method of installing and maintaining software programs on any operating system.
"},{"location":"level102/linux_intermediate/package_management/#package","title":"Package","text":"In the early days of Linux, one had to download source code of any software and compile it to install and run the software. As the Linux space became more mature, it is understood the software landscape is very dynamic and started distributing software in the form of packages. Package file is a compressed collection of files that contains software, its dependencies, installation instructions and metadata about the package.
"},{"location":"level102/linux_intermediate/package_management/#dependencies","title":"Dependencies","text":"It is rare that a software package is stand-alone, it depends on the different software, libraries and modules. These subroutines are stored and made available in the form of shared libraries which may serve more than one program. These shared resources are called dependencies. Package management does this hard job of resolving dependencies and installing them for the user along with the software.
"},{"location":"level102/linux_intermediate/package_management/#repository","title":"Repository","text":"Repository is a storage location where all the packages, updates, dependencies are stored. Each repository can contain thousands of software packages hosted on a remote server intended to be installed and updated on linux systems. We usually update the package information ( often referred to as metadata) by running \u201csudo dnf update\u201d.
Try out sudo dnf repolist all to list all the repositories.
We usually add repositories for installing packages from third party vendors.
dnf config-manager --add-repo http://www.example.com/example.repo
"},{"location":"level102/linux_intermediate/package_management/#high-level-and-low-level-package-management-tools","title":"High Level and Low-Level Package management tools","text":"There are mainly two types of packages management tools:
1. Low-level tools: This is mostly used for installing, removing and upgrading package files.
2. High-Level tools: In addition to Low-level tools, High-level tools do metadata searching and dependency resolution as well.
Linux Distribution Low-Level Tools High-Level tools Debian dpkg apt-get Fedora, RedHat dnf dnf"},{"location":"level102/linux_intermediate/storage_media/","title":"Storage Media","text":""},{"location":"level102/linux_intermediate/storage_media/#introduction","title":"Introduction","text":"Storage media are devices which are used to store data and information. Linux has amazing capabilities when it comes to handling external devices including storage devices. There are many kinds of storage devices physical storage devices like hard drives, virtual storage devices like RAID or LVM, network storage and so on.
In this section we will learn to work with any storage device and configure it to our needs.
"},{"location":"level102/linux_intermediate/storage_media/#listing-the-mounted-storage-devices","title":"Listing the mounted storage devices:","text":"We can use command mount to list all the storage devices mounted to your computer.
The format in which we see above output is:
device on mount_point type file\\_system\\_type (options)
For example in the first line the device virtual sysfs is mounted at /sys path and has a sysfs file system. Now let\u2019s see what and how a filesystem is created.
"},{"location":"level102/linux_intermediate/storage_media/#creating-a-filesystem","title":"Creating a FileSystem","text":"Imagine a disk where all the data stored in the disk is in the form of one large chunk, there is nothing to figure out where one piece of data starts and ends, which piece of data is located at which place of the whole chunk of data and hence the File System comes into picture. File System(fs) is responsible for data storage, indexing and retrieval on any storage device.
Below are the most popularly used file systems:
FS Type Description FAT File Allocation Table, initially used on DOS and Microsoft Windows and now widely used for portable USB storage NTFS (New Technology File System) Used on Microsoft\u2019s Windows based operating systems ext Extended file system, designed for Linux systems. ext4 Fourth extended filesystem, is a journaled file system that is commonly used by the Linux kernel. HFS Hierarchical File System, in use until HFS+ was introduced on Mac OS 8.1. HFS+ Supports file system journaling, enabling recovery of data after a system crash. NFS Network File System originally from Sun Microsystems is the standard in UNIX-based networks.We will try to create an ext4 file system which is linux native fs using mkfs.
Discalimer: Run this command on empty disk as this will wipe out the existing data.
Here the device /dev/sdb1 is formatted and it\u2019s filesystem is changed to ext4.
"},{"location":"level102/linux_intermediate/storage_media/#mounting-the-device","title":"Mounting the device:","text":"In Linux systems all files are arranged in a tree structure with (/) as root. Mounting a fs simply means making that fs accessible to a certain point in the Linux directory tree.
We need a mount point(location) where we want to mount the above formatted device.
We created a mount point /mount and used the mount command to attach the filesystem. Here -t flag specifies what is the fs type and after that the /dev/sdb1 (device name) and /mount (mount point we created earlier).
"},{"location":"level102/linux_intermediate/storage_media/#unmounting-the-device","title":"Unmounting the device:","text":"Now let\u2019s see how we can unmount the device, which is equally important if we have removable storage media and want to mount on another host. We use umount for unmounting the device.
Our first attempt did not unmount the /sdb1 because we were inside the storage device and it was being used. Once we jumped back to the home directory we were successfully able to unmount the device.
"},{"location":"level102/linux_intermediate/storage_media/#making-it-easier-with-etcfstab-file","title":"Making it easier with /etc/fstab file?","text":"In our production environment, we can have servers with many storage devices that need to be mounted, and it is not feasible to mount each device using the command every time we reboot the system. To ease this burden, we can make use of configuration table called \u201cfstab\u201d usually found in /etc/fstab on Linux systems.
Here on the first line we have /dev/mapper/rootvg-rootlv (storage device) mounted on / (root mount point) which has the xfs filesystem type followed by options.
We can run mount -a to reload this file after making changes.
Filesystems encounter issues in case of any hardware failure, power failure and sometimes due to improper shutdown. Linux usually checks and repairs the corrupted disk if any during startup. We can also manually check for filesystem corruption using the command fsck.
We can repair the same filesystem using fsck -y /dev/sdb1.
There are error codes attached to each kind of file system error ,and A sum of active errors is returned.
Error Codes Description 0 No errors 1 Filesystem errors corrected 2 System should be rebooted 4 Filesystem errors left uncorrected 8 Operational error 16 Usage or syntax error 32 Checking canceled by user request 128 Shared-library errorIn the above fs check we got return code as 12 which is the sum of error code 8(operational error) and 4(uncorrected FS error).
"},{"location":"level102/linux_intermediate/storage_media/#raid","title":"RAID","text":"RAID or \u201cRedundant Arrays of Independent Disks\u201d is a technique that distributes I/O across multiple disks to achieve increased performance and data redundancy. RAID has the ability to increase overall disk performance and survive disk failures. Software RAID uses the computer\u2019s CPU to carry out RAID operations whereas hardware RAID uses specialized processors, on disk controllers, to manage the disks. Three essential features of RAID are mirroring, striping and parity.
"},{"location":"level102/linux_intermediate/storage_media/#raid-levels","title":"RAID levels","text":"The below section discusses the RAID levels that are commonly used. For information on all RAID levels, please refer to here .
"},{"location":"level102/linux_intermediate/storage_media/#raid-0-striping","title":"RAID 0 (Striping)","text":"Striping is the method by which data is split up into \u201cblocks\u201d and written across all the disks present in the array. By spreading data across multiple drives, it means multiple disks can access the file, resulting in faster read/write speeds. The first disk in the array is not reused until an equal amount of data is written to each of the other disks in the array.
Advantages
It can be easily implemented.
Bottlenecks caused due to I/O operations from the same disk are avoided, increasing the performance of such operations.
Disadvantages
Use cases
RAID 0 can be used for systems with non-critical data that has to be read at high speed, such as a video/audio editing station or gaming environments.
"},{"location":"level102/linux_intermediate/storage_media/#raid-1mirroring","title":"RAID 1(Mirroring)","text":"Mirroring writes a copy of data to each disk which is part of the array. This means that the data is written as many times as disks in the array . It stores an exact replica of all data on a separate disk or disks. As expected, this would result in a slow write performance compared to that of a single disk. On the other hand, read operations can be done parallelly improving read performance.
Advantages
RAID 1 offers a better read performance than RAID 0 or single disk.
It can survive multiple disk failures without the need for special data recovery algorithms
Disadvantages
Use cases
Applications that require low downtime but can have a slight hit on write performance.
"},{"location":"level102/linux_intermediate/storage_media/#raid-4striping-with-dedicated-parity","title":"RAID 4(Striping with dedicated parity)","text":"RAID 4 works uses block-level striping (data can be striped in blocks of a variety of sizes depending on the applications and data to be stored) and a dedicated drive used to store parity information.The parity information is generated by an algorithm every time data is written to an array disk. The use of a parity bit is a way of adding checksums into data that can enable the target device to determine whether the data has been received correctly. In the event of a drive failure , the algorithm can be reversed and missing data can be generated based on the remaining data and parity information.
Advantages
Each drive in a RAID 4 array operates independently so I/O requests take place in parallel, speeding up performance over previous RAID levels.
It can survive multiple disk failures without the need for special data recovery algorithms
Disadvantages
A minimum of 3 disks is required for setup.
It needs hardware support for parity calculation.
Write speeds are slow since parity relies on a single disk drive and carry out modifications of parity blocks for each I/O session.
Use cases
Operations dealing with really large files \u2013 when sequential read and write data process is used
"},{"location":"level102/linux_intermediate/storage_media/#raid-5striping-with-distributed-parity","title":"RAID 5(Striping with distributed parity)","text":"RAID 5 is similar to RAID 4, except that the parity information is spread across all drives in the array. This helps reduce the bottleneck inherent in writing parity information to a single drive during each write operation. RAID 5 is the most common secure RAID level.
Advantages
Read data transactions are fast as compared to write data transactions that are somewhat slow due to the calculation of parity.
Data remains accessible even after drive failure and during replacement of a failed hard drive because the storage controller rebuilds the data on the new drive.
Disadvantages
RAID 5 requires a minimum of 3 drives and can work up to a maximum of 16 drives
It needs hardware support for parity calculation.
More than two drive failures can cause data loss.
Use cases
File storage and application servers, such as email, general storage servers, etc.
"},{"location":"level102/linux_intermediate/storage_media/#raid-6striping-with-double-parity","title":"RAID 6(Striping with double parity)","text":"RAID 6 is similar to RAID 5 with an added advantage of double distributed parity, which provides fault tolerance up to two failed drives.
Advantages
Read data transactions are fast.
This provides a fault tolerance up to 2 failed drives.
RAID 6 is more resilient than RAID 5.
Disadvantages
Write data transactions are slow due to double parity.
Rebuilding the RAID array takes a longer time because of complex structure.
Use cases
Office automation, online customer service, and applications that require very high availability.
"},{"location":"level102/linux_intermediate/storage_media/#raid-10raid-10-mirroring-and-striping","title":"RAID 10(RAID 1+0 : Mirroring and Striping)","text":"RAID 10 is a combination of RAID 0 and RAID 1. It means that both mirroring and striping in one single RAID array.
Advantages
Rebuilding the RAID array is fast.
Read and write operations performance are good.
Disadvantages
Just like RAID 1, only half the drive capacity is available.
It can be expensive to implement RAID 10.
Use cases
Transactional databases with sensitive information that require high performance and high data security.
"},{"location":"level102/linux_intermediate/storage_media/#commands-to-monitor-raid","title":"Commands to monitor RAID","text":"The command cat /proc/mdstat will give the status of a software RAID. Let us examine the output of the command:
Personalities : [raid1]\n\nmd0 : active raid1 sdb1[2] sda1[0]\n\n10476544 blocks super 1.1 [2/2] [UU]\n\nbitmap: 0/1 pages [0KB], 65536KB chunk\n\nmd1 : active raid1 sdb2[2] sda2[0]\n\n10476544 blocks super 1.1 [2/2] [UU]\n\nbitmap: 1/1 pages [4KB], 65536KB chunk\n\nmd2 : active raid1 sdb3[2]\n\n41909248 blocks super 1.1 [2/1] [_U]\n\nbitmap: 1/1 pages [4KB], 65536KB chunk\n The \u201cpersonalities\u201d gives us the raid level that the raid is configured. In the above example, the raid is configured with RAID 1. md0 : active raid1 sdb1[2] sda1[0] tells us that there is an active raid of RAID 1 between sdb1(which is device 2) and sda1(which is device 0).An inactive array generally means that one of the disks are faulty. Md2 in the above example shows that we have 41909248 blocks super 1.1 [2/1] [_U] , this means that one disk is down in this particular raid.
The command mdadm --detail /dev/<raid-array> gives detailed information about that particular array.
sudo mdadm --detail /dev/md0\n\n/dev/md0:\n\nVersion : 1.1\n\nCreation Time : Fri Nov 17 11:49:20 2019\n\nRaid Level : raid1\n\nArray Size : 10476544 (9.99 GiB 10.32 GB)\n\nUsed Dev Size : 10476544 (9.99 GiB 10.32 GB)\n\nRaid Devices : 2\n\nTotal Devices : 2\n\nPersistence : Superblock is persistent\n\nIntent Bitmap : Internal\n\nUpdate Time : Sun Dec 2 01:00:53 2019\n\nState : clean\n\nActive Devices : 2\n\nWorking Devices : 2\n\nFailed Devices : 0\n\nSpare Devices : 0\n\nUUID : xxxxxxx:yyyyyy:zzzzzz:ffffff\n\nEvents : 987\n\nNumber Major Minor RaidDevice State\n\n0 8 1 0 active sync /dev/sda1\n\n1 8 49 1 active sync /dev/sdb1\n Incase of a missing disk in the above example, the State of the raid would be \u2018dirty\u2019 and Active Devices and Working Devices would be reduced to one. One of the entries(either /dev/sda1 or /dev/sdb1 depending on the missing disk) would have their RaidDevice changed to faulty.
"},{"location":"level102/linux_intermediate/storage_media/#lvm","title":"LVM","text":"LVM stands for Logical Volume Management. In the above section we saw how we can create FS and use individual disks according to our need the traditional way but using LVM we can achieve more flexibility in storage allocation like we can stitch three 2TB disks to make one single partition of 6TB, or we can attach another physical disk of 4TB to the server and add that disk to the logical volume group to make it 10TB in total.
Refer to know more about LVM: https://www.redhat.com/sysadmin/lvm-vs-partitioning
"},{"location":"level102/networking/conclusion/","title":"Conclusion","text":"This course would have given some background on deploying services in datacentre and various parameters to consider and available solutions. It has to be noted that, each of the solution discussed here have various pros and cons, so specific to the scenario/requirement, the right fit among these are to be identified and used. As we didnt go the depth of various technologies/solution in this course, it might have made the reader curious to know about some of the topics. Here are some of the reference or online training content, for further learning.
linked engineering blog : has information about how Linkedin datacentres are setup and some of the key problems are solved.
IPSpace blog : Has lot of articles about datacentre networking.
Networking Basics course in edx.
Happy learning !!
"},{"location":"level102/networking/infrastructure-features/","title":"Infrastructure Services","text":"Some of the aspects to consider are, whether the underlying data centre infrastructure supports ToR resiliency, i.e. features like link bundling (bonds), BGP, support for anycast service, load balancer, firewall, Quality of Service.
As seen in previous sections, to deploy applications at scale, it will need certain capabilities to be supported from the infrastructure. This section will cover different options available, and their suitability.
"},{"location":"level102/networking/infrastructure-features/#tor-connectivity","title":"ToR connectivity","text":"This being one of the most frequent points of failure (considering the scale of deployment), there are different options available to connect the servers to the ToR. We are going to see them in detail below,
"},{"location":"level102/networking/infrastructure-features/#single-tor","title":"Single ToR","text":"This is the simplest of all the options. Where a NIC of the server is connected to one ToR. The advantage of this approach is, there is a minimal number of switch ports used, allowing the DC fabric to support the rapid growth of server infrastructure (Note: Not only the ToR ports are used efficiently, but the upper switching layer in DC fabric as well, the port usage will be efficient). On the downside, the servers can be unreachable if there is an issue with the ToR, link or NIC. This will impact the stateful apps more, as the existing connections get abruptly disconnected.
Fig 4: Single ToR design
"},{"location":"level102/networking/infrastructure-features/#dual-tor","title":"Dual ToR","text":"In this option, each server is connected to two ToR, of the same cabinet. This can be set up in active/passive mode, thereby providing resiliency during ToR/link/NIC failures. The resiliency can be achieved either in layer 2 or in layer 3.
"},{"location":"level102/networking/infrastructure-features/#layer-2","title":"Layer 2","text":"In this case, both the links are bundled together as a bond on the server side (with one NIC taking the active role and the other being passive). On the switch side, these two links are made part of multi-chassis lag (similar to bonding, but spread across switches). The prerequisite here is, both the ToR should be part of the same layer 2 domain. The IP addresses are configured on the bond interface on the server and SVI on the switch side.
Note: In this, the ToR 2 role is only to provide resiliency.
Fig 5: Dual ToR layer 2 setup
"},{"location":"level102/networking/infrastructure-features/#layer-3","title":"Layer 3","text":"In this case, both the links are configured as separate layer 3 interfaces. The resiliency is achieved by setting up a routing protocol (like BGP). Wherein one link is given higher preference over the other. In this case, the two ToR's can be set up independently, in layer 3 mode. The servers would need a virtual address, to which the services have to be bound.
Note: In this, the ToR 2 role is only to provide resiliency.
Fig 6: Dual ToR layer 3 setup
Though the resiliency is better with dual ToR, the drawback is, the number of ports being used. As the access port in the ToR doubles up, the number of ports required in the Spine layer also doubles up, and this keeps cascading to higher layers.
Type Single ToR Dual ToR (layer 2) Dual ToR (layer 3) Resiliency1 No2 Yes Yes Port usage 1:1 1:2 1:2 Cabling Less More More Cost of DC fabric Low High High ToR features required Low High Medium1 Resiliency in terms of ToR/Link/NIC
2 As an alternative, resiliency can be addressed at the application layer.
Along with the above-mentioned ones, an application might need more capabilities out of the infrastructure to deploy at scale. Some of them are,
"},{"location":"level102/networking/infrastructure-features/#anycast","title":"Anycast","text":"As seen in the previous section, of deploying at scale, anycast is one of the means to have services distributed across cabinets and still have traffic flowing to each one of the servers. To achieve this, two things are required
Routing protocol between ToR and server (to announce the anycast address)
Support for ECMP (Equal Cost Multi-Path) load balancing in the infrastructure, to distribute the flows across the cabinets.
Similar to Anycast, another means to achieve load balancing across servers (host a particular app), is using load balancers. These could be implemented in different ways
Hardware load balancers: A LB device is placed inline of the traffic flow, and looks at the layer 3 and layer 4 information in an incoming packet. Then determine the set of real hosts, to which the connections are to be redirected. As covered in the Scale topic, these load balancers can be set up in two ways,
Single-arm mode: In this mode, the load balancer handles only the incoming requests to the VIP. The response from the server goes directly to the clients. There are two ways to implement this,
L2 DSR: Where the load balancer and the real servers remain in the same VLAN. Upon getting an incoming request, the load balancer identifies the real server to redirect the request and then modifies the destination mac address of that Ethernet frame. Upon processing this packet, the real server responds directly to the client.
L3 DSR: In this case, the load balancer and real servers need not be in the same VLAN (does away with layer 2 complexities like running STP, managing wider broadcast domain, etc). Upon incoming request, the load balancer redirects to the real server, by modifying the destination IP address of the packet. Along with this, the DSCP value of the packet is set to a predefined value (mapped for that VIP). Upon receipt of this packet, the real server uses the DSCP value to determine the loopback address (VIP address). The response again goes directly to the client.
Two arm mode: In this case, the load balancer is in line for incoming and outgoing traffic.
DNS based load balancer: Here the DNS servers keep a check of the health of the real servers and resolve the domain in such a way that the client can connect to different servers in that cluster. This part was explained in detail in the deployment at scale section.
IPVS based load balancing: This is another means, where an IPVS server presents itself as the service endpoint to the clients. Upon incoming request, the IPVS directs the request to the real servers. The IPVS can be set up to do health for the real servers.
Network Address Translation (NAT) will be required for hosts that need to connect to destinations on the Internet, but don't want to expose their configured NIC address. In this case, the address (of the internal server) is translated to a public address by a firewall. Few examples of this are proxy servers, mail servers, etc.
"},{"location":"level102/networking/infrastructure-features/#qos","title":"QoS","text":"Quality of Service is a means to provide, differentiate treatment to few packets over others. These could provide priority in forwarding queues, or bandwidth reservations. In the data centre scenario, depending upon the bandwidth subscription ratio, the need for QoS varies,
1:1 bandwidth subscription ratio: In this case, the server to ToR connectivity (all servers in that cabinet) bandwidth should be equivalent to the ToR to Spine switch connectivity. Similarly for the upper layers as well. In this design, congestion on a link is not going to happen, as enough bandwidth will always be available. In this case, the only difference QoS can bring, it provides priority treatment for certain packets in the forwarding queue. Note: Packet buffering happens, when the packet moves between ports of different speeds, like 100Gbps, 10Gbps.
Oversubscribed network: In this case, not all layers maintain a bandwidth subscription ratio, for example, the ToR uplink may be of lower bandwidth, compared to ToR to Server bandwidth (This is sometimes referred to as oversubscription ratio). In this case, there is a possibility of congestion. Here QoS might be required, to give priority as well as bandwidth reservation, for certain types of traffic flows.
It is recommended to have basic knowledge of network security, TCP and datacenter setup and the common terminologies used in them. Also, the readers are expected to go through the School of Sre contents -
Linux Networking
system design
security
This part will cover how a datacenter infrastructure is segregated for different application needs as well as the consideration of deciding where to place an application. These will be broadly based on, Security, Scale, RTT (latency), Infrastructure features.
Each of these topics will be covered in detail,
Security - Will cover threat vectors faced by services facing external/internal clients. Potential mitigation options to consider while deploying them. This will touch upon perimeter security, DDoS protection, Network demarcation and ring-fencing the server clusters.
Scale - Deploying large scale applications, require a better understanding of infrastructure capabilities, in terms of resource availability, failure domains, scaling options like using anycast, layer 4/7 load balancer, DNS based load balancing.
RTT (latency) - Latency plays a key role in determining the overall performance of the distributed service/application, where calls are made between hosts to serve the users.
Infrastructure features - Some of the aspects to consider are, whether the underlying data centre infrastructure supports ToR resiliency, i.e., features like link bundling (bonds), BGP (Border Gateway Protocol), support for anycast service, load balancer, firewall, Quality of Service.
"},{"location":"level102/networking/introduction/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"Though these parameters play a role in designing an application, we will not go into the details of the design. Each of these topics are vast, hence the objective is to introduce the terms and relevance of the parameters in them, and not to provide extensive details about each one of them.
"},{"location":"level102/networking/introduction/#course-contents","title":"Course Contents","text":"Before discussing each of the topics, it is important to get familiar with few commonly used terms
Cloud
This refers to hosted solutions from different providers like Azure, AWS, GCP. Wherein enterprises can host their applications for either public or private usage.
On-prem
This term refers to physical Data Center(DC) infrastructure, built and managed by enterprises themselves. This can be used for private access as well as public (like users connecting over the Internet).
Leaf switch (ToR)
This refers to the switch, where the servers connect to, in a DC. They are called by many names, like access switch, Top of the Rack switch, Leaf switch.
The term leaf switch comes from the Spine-leaf architecture, where the access switches are called leaf switches. Spine-leaf architecture is commonly used in large/hyper-scale data centres, which brings very high scalability options for the DC switching layer and is also more efficient in building and implementing these switches. Sometimes these are referred to as Clos architecture.
Spine switch
Spine switches are the aggregation point of several leaf switches, they provide the inter-leaf communication and also connect to the upper layer of DC infrastructure.
DC fabric
As the data centre grows, multiple Clos networks need to be interconnected, to support the scale, and fabric switches help to interconnect them.
Cabinet
This refers to the rack, where the servers and ToR are installed. One cabinet refers to the entire rack.
BGP
It is the Border Gateway Protocol, used to exchange routing information between routers and switches. This is one of the common protocols used in the Internet and as well Data Centers as well. Other protocols are also used in place of BGP, like OSPF.
VPN
A Virtual Private Network is a tunnel solution, where two private networks (like offices, datacentres, etc) can be interconnected over a public network (internet). These VPN tunnels encrypt the traffic before sending over the Internet, as a security measure.
NIC
Network Interface Card refers to the module in Servers, which consists of the Ethernet port and the interconnection to the system bus. It is used to connect to the switches (commonly ToR switches).
Flow
Flows refer to a traffic exchange between two nodes (could be servers, switches, routers, etc), which has common parameters like source/destination IP address, source/destination port number, IP Protocol number. This helps in traffic a particular traffic exchange session, between two nodes (like a file copy session, or an HTTP connection, etc).
ECMP
Equal Cost Multi-Path means, a switch/router can distribute the traffic to a destination, among multiple exit interfaces. The flow information is used to build a hash value and based on that, exit interfaces are selected. Once a flow is mapped to a particular exit interface, all the packets of that flow exit via the same interface only. This helps in preventing out of order delivery of packets.
RTT
This is a measure of the time it takes for a packet from the source to reach the destination and return to the source. This is most commonly used in measuring network performance and also troubleshooting.
TCP throughput
This is the measure of the data transfer rate achieved between two nodes. This is impacted by many parameters like RTT, packet size, window size, etc.
Unicast
This refers to the traffic flow between a single source to a single destination (i.e.) like ssh sessions, where there is one to one communication.
Anycast
This refers to one-to-one traffic flow as above, but endpoints could be multiple (i.e.) a single source can send traffic to any one of the destination hosts in that group. This is achieved by having the same IP address configured in multiple servers and every new traffic flow is mapped to one of the servers.
Multicast
This refers to one-to-many traffic flow (i.e.) a single source can send traffic to multiple destinations. To make it feasible, the network routers replicate the traffic to different hosts (which register as members of that particular multicast group).
"},{"location":"level102/networking/rtt/","title":"RTT","text":"Latency plays a key role in determining the overall performance of the distributed service/application, where calls are made between hosts to serve the users.
RTT is a measure of time, it takes for a packet to reach B from A, and return to A. It is measured in milliseconds. This measure plays a role in determining the performance of the services. Its impact is seen in calls made between different servers/services, to serve the user, as well as the TCP throughput that can be achieved.
It is fairly common that service makes multiple calls to servers within its cluster or to different services like authentication, logging, database, etc, to respond to each user/client request. These servers can be spread across different cabinets, at times even between different data centres in the same region. Such cases are quite possible in cloud solutions, where the deployment spreads across different sites within a region. As the RTT increases, the response time for each of the calls gets longer and thereby has a cascading effect on the end response being sent to the user.
"},{"location":"level102/networking/rtt/#relation-of-rtt-and-throughput","title":"Relation of RTT and throughput","text":"RTT is inversely proportional to the TCP throughput. As RTT increases, it reduces the TCP throughput, just like packet loss. Below is a formula to estimate the TCP throughput, based on TCP mss, RTT and packet loss.
As within a data centre, these calculations are also, important for communication over the internet, where a client can connect to the DC hosted services, over different telco networks and the RTT is not very stable, due to the unpredictability of the Internet routing policies.
"},{"location":"level102/networking/scale/","title":"Scale","text":"Deploying large scale applications, require a better understanding of infrastructure capabilities, in terms of resource availability, failure domains, scaling options like using anycast, layer 4/7 load balancer, DNS based load balancing.
Building large scale applications is a complex activity, which should cover many aspects in design, development and as well as operationalisation. This section will talk about the considerations to look for while deploying them.
"},{"location":"level102/networking/scale/#failure-domains","title":"Failure domains","text":"In any infrastructure, failures due to hardware or software issues are common. Though these may be a pain from a service availability perspective, these failures do happen and a pragmatic goal would be to, try to keep these failures to the minimum. Hence while deploying any service, failures/non-availability of some of the nodes to be factored in.
"},{"location":"level102/networking/scale/#server-failures","title":"Server failures","text":"A server could fail, due to power or NIC or software bug. And at times it may not be a complete failure but could be an error in the NIC, which causes some packet loss. This is a very common scenario and will impact the stateful services more. While designing such services, it is important to accommodate some level of tolerance to such failures.
"},{"location":"level102/networking/scale/#tor-failures","title":"ToR failures","text":"This is one of the common scenarios, where the leaf switch connecting the servers goes down, along with it taking down the entire cabinet. There could be more than one server of the same service that can go down in this case. It requires planning to decide how much server loss can be handled without overloading other servers. Based on this, the service can be distributed across many cabinets. These calculations may vary, depending upon the resiliency in the ToR design, which will be covered in ToR connectivity section.
"},{"location":"level102/networking/scale/#site-failures","title":"Site failures","text":"Here site failure is a generic term, which could mean, a particular service is down in a site, maybe due to new version rollout, or failures of devices like firewall, load balancer, if the service depends on them, or loss of connectivity to remote sites (which might have limited options for resiliency) or issues with critical services like DNS, etc. Though these events may not be common, they can have a significant impact.
In summary, handling these failure scenarios has to be thought about while designing the application itself. That will provide the tolerance required within the application to recover from unexpected failures. This will help not only for failures, even for planned maintenance work, as it will be easier to take part of the infrastructure, out of service.
"},{"location":"level102/networking/scale/#resource-availability","title":"Resource availability","text":"The other aspect to consider while deploying applications at scale is the availability of the required infrastructure and the features the service is dependent upon. For example, for the resiliency of a cabinet, if one decides to distribute the service to 5 cabinets, but the service needs a load balancer (to distribute incoming connections to different servers), it may become challenging if load balancers are not supported in all cabinets. Or there could be a case that there are not enough cabinets available (that meet the minimum required specification for service to be set up). The best approach in these cases is to identify the requirements and gaps and then work with the Infrastructure team to best solve them.
"},{"location":"level102/networking/scale/#scaling-options","title":"Scaling options","text":"While distributing the application to different cabinets, the incoming traffic to these services has to be distributed across these servers. To achieve this, the following may be considered
"},{"location":"level102/networking/scale/#anycast","title":"Anycast","text":"This is one of the quickest ways to roll out traffic distribution across multiple cabinets. In this, each server, part of the cluster (where the service is set up), advertises a loopback address (/32 IPv4 or /128 IPv6 address), to the DC switch fabric (most commonly BGP is used for this purpose). The service has to be set up to be listening to this loopback address. When the clients try to connect to the service, get resolved to this virtual address and forward their queries. The DC switch fabric distributes each flow into different available next hops (eventually to all the servers in that service cluster).
Note: The DC switch computes a hash, based on the IP packet header, this could include any combination of source and destination addresses, source and destination port, mac address and IP protocol number. Based on this hash value, a particular next-hop is picked up. Since all the packets in a traffic flow, carry the same values for these headers, all the packets in that flow will be mapped to the same path.
Fig 1: Anycast setup
To achieve a proportionate distribution of flows across these servers, it is important to maintain uniformity in each of the cabinets and pods. But remember, the distribution happens only based on flows, and if there are any elephant (large) flows, some servers might receive a higher volume of traffic.
If there are any server or ToR failures, the advertisement of loopback address to the switches will stop, and thereby the new packets will be forwarded to the remaining available servers.
"},{"location":"level102/networking/scale/#load-balancer","title":"Load balancer","text":"Another common approach is to use a load balancer. A Virtual IP is set up in the load balancers, to which the client connects while trying to access the service. The load balancer, in turn, redirects these connections to, one of the actual servers, where the service is running. In order to, verify the server is in the serviceable state, the load balancer does periodic health checks, and if it fails, the LB stops redirecting the connection to these servers.
The load balancer can be deployed in single-arm mode, where the traffic to the VIP is redirected by the LB, and the return traffic from the server to the client is sent directly. The other option is the two-arm mode, where the return traffic is also passed through the LB.
Fig 2: Single-arm mode
Fig 3: Two-arm mode
One of the cons of this approach is, at a higher scale, the load balancer can become the bottleneck, to support higher traffic volumes or concurrent connections per second.
"},{"location":"level102/networking/scale/#dns-based-load-balancing","title":"DNS based load balancing","text":"This is similar to the above approach, with the only difference is instead of an appliance, the load balancing is done at the DNS. The clients get different IP's to connect when they query for the DNS records of the service. The DNS server has to do a health check, to know which servers are in a good state.
This approach alleviates the bottleneck of the load balancer solution. But require shorter TTL for the DNS records, so that problematic servers can be taken out of rotation quickly, which means, there will be far more DNS queries.
"},{"location":"level102/networking/security/","title":"Security","text":"This section will cover threat vectors faced by services facing external/internal clients. Potential mitigation options to consider while deploying them. This will touch upon perimeter security, DDoS protection, Network demarcation and operational practices.
"},{"location":"level102/networking/security/#security-threat","title":"Security Threat","text":"Security is one of the major considerations in any infrastructure. There are various security threats, which could amount to data theft, loss of service, fraudulent activity, etc. An attacker can use techniques like phishing, spamming, malware, Dos/DDoS, exploiting vulnerabilities, man-in-the-middle attack, and many more. In this section, we will cover some of these threats and possible mitigation. As there are numerous means to attack and secure the infrastructure, we will only focus on some of the most common ones.
Phishing is mostly done via email (and other mass communication methods), where an attacker provides links to fake websites/URLs. Upon accessing that, victim's sensitive information like login credentials or personal data is collected and can be misused.
Spamming is also similar to phishing, but the attacker doesn't collect data from users but tries to spam a particular website and probably overwhelm them (to cause slowness) and well use that opportunity to, compromise the security of the attacked website.
Malware is like a trojan horse, where an attacker manages to install a piece of code on the secured systems in the infrastructure. Using this, the hacker can collect sensitive data and as well infect the critical services of the target company.
Exploiting vulnerabilities is another method an attacker can gain access to the systems. These could be bugs or misconfiguration in web servers, internet-facing routers/switches/firewalls, etc.
DoS/DDoS is one of the common attacks seen on internet-based services/solutions, especially those businesses based on eyeball traffic. Here the attacker tries to overwhelm the resources of the victim by generating spurious traffic to the external-facing services. By this, primarily the services turn slow or non-responsive, during this time, the attacker could try to hack into the network, if some of the security mechanism fails to filter through the attack traffic due to overload.
"},{"location":"level102/networking/security/#securing-the-infrastructure","title":"Securing the infrastructure","text":"The first and foremost aspect for any infrastructure administration is to identify the various security threats that could affect the business running over this infrastructure. Once different threats are known, the security defence mechanism has to be designed and implemented. Some of the common means to securing the infrastructure are
"},{"location":"level102/networking/security/#perimeter-security","title":"Perimeter security","text":"This is the first line of defence in any infrastructure, where unwanted/unexpected traffic flows into the infrastructure are filtered/blocked. These could be filters in the edge routers, that allow expected services (like port 443 traffic for web service running on HTTPS), or this filter can be set up to block unwanted traffic, like blocking UDP ports, if the services are not dependent on UDP.
Similar to the application traffic entering the network, there could be other traffic like BGP messages for Internet peers, VPN tunnels traffic, as well other services like email/DNS, etc. There are means to protect every one of these, like using authentication mechanisms (password or key-based) for peers of BGP, VPN, and whitelisting these specific peers to make inbound connections (in perimeter filters). Along with these, the amount of messages/traffic can be rate-limited to known scale or expected load, so the resources are not overwhelmed.
"},{"location":"level102/networking/security/#ddos-mitigation","title":"DDoS mitigation","text":"Protecting against a DDoS attack is another important aspect. The attack traffic will look similar to the genuine users/client request, but with the intention to flood the externally exposed app, which could be a web server, DNS, etc. Therefore it is essential to differentiate between the attack traffic and genuine traffic, for this, there are different methods to do at the application level, one such example using Captcha on a web service, to catch traffic originating from bots.
For these methods to be useful, the nodes should be capable of handling both the attack traffic and genuine traffic. It may be possible in cloud-based infrastructure to dynamically add more virtual machines/resources, to handle the sudden spike in volume of traffic, but on-prem, the option to add additional resources might be challenging.
To handle a large volume of attack traffic, there are solutions available, which can inspect the packets/traffic flows and identify anomalies (i.e.) traffic patterns that don't resemble a genuine connection, like client initiating TCP connection, but fail to complete the handshake, or set of sources, which have abnormally huge traffic flow. Once this unwanted traffic is identified, these are dropped at the edge of the network itself, thereby protecting the resources of app nodes. This topic alone can be discussed more in detail, but that will be beyond the scope of this section.
"},{"location":"level102/networking/security/#network-demarcation","title":"Network Demarcation","text":"Network demarcation is another common strategy deployed in different networks when applications are grouped based on their security needs and vulnerability to an attack. Some common demarcations are, the external/internet facing nodes are grouped into a separate zone, whereas those nodes having sensitive data are segregated into a separate zone. And any communication between these zones is restricted with the help of security tools to limit exposure to unwanted hosts/ports. These inter-zone communication filters are sometimes called ring-fencing. The number of zones to be created, varies for different deployments, for example, there could be a host which should be able to communicate to the external world as well as internal servers, like proxy, email, in this case, these can be grouped under one zone, say De-Militarized Zones (DMZ). The main advantage of creating zones is that, even if there is a compromised host, that doesn't act as a back door entry for the rest of the infrastructure.
"},{"location":"level102/networking/security/#node-protection","title":"Node protection","text":"Be it server, router, switches, load balancers, firewall, etc, each of these devices come with certain capabilities to secure themselves, like support for filters (e.g. Access-list, Iptables) to control what traffic to process and what to drop, anti-virus software can be used in servers to check on the software installed in them.
"},{"location":"level102/networking/security/#operational-practices","title":"Operational practices","text":"There are numerous security threats for infrastructure, and there are different solutions to defend them. The key part to the defence, is not only identifying the right solution and the tools for it but also making sure there are robust operational procedures in place, to respond promptly, decisively and with clarity, for any security incident.
"},{"location":"level102/networking/security/#standard-operating-procedures-sop","title":"Standard Operating Procedures (SOP)","text":"SOP need to be well defined and act as a reference for on-call to follow during a security incident. This SoP should cover things like,
When a security incident happens, how it will be alerted, to whom it will be alerted.
Identify the scale and severity of the security incident.
Who are the points of escalation and the threshold/time to intimate them, there could be other concerned teams or to the management or even to the security operations in-charge.
Which solutions to use (and the procedure to follow in them) to mitigate the security incident.
Also the data about the security incident has to be collated for further analysis.
Many organisations have a dedicated team focused on security, and they drive most of the activities, during an attack and even before, to come up with best practices, guidelines and compliance audits. It is the responsibility of respective technical teams, to ensure the infrastructure meets these recommendations and gaps are fixed.
"},{"location":"level102/networking/security/#periodic-review","title":"Periodic review","text":"Along with defining SoP's, the entire security of the infrastructure has to be reviewed periodically. This review should include,
Identifying any new/improved security threat that could potentially target the infrastructure.
The SoP's have to be reviewed periodically, depending upon new security threats or changes in the procedure (to implement the solutions)
Ensuring software upgrades/patches are done in a timely manner.
Audit the infrastructure for any non-compliance of the security standards.
Review of recent security incidents and find means to improvise the defence mechanisms.
One of the main goals of a SRE is to improve the reliability of high scale systems. Inorder to achieve this, a basic understanding of the internal workings of a system is necessary.
Getting to know about how signals work is important since they play a big role in the lifecycle of processes. We see the use of signals in a range of operations on processes : from creating a process to killing a process. Knowledge of signals is important especially when handling them in programs. If you anticipate an event that causes signals, you can define a handler function and tell the operating system to run it when that particular type of signal arrives.
Understanding system calls is especially useful to SRE's while debugging any Linux process. System calls provide precise knowledge of the internal functionalities of an operating system. It gives an in-depth understanding for programmers about C library functions which implement system calls at a lower level. With the use of strace command, one may easily debug slow or hung processes.
"},{"location":"level102/system_calls_and_signals/conclusion/#further-reading","title":"Further Reading","text":"https://www.oreilly.com/library/view/understanding-the-linux/0596002130/ch01s06.html
https://jvns.ca/blog/2021/04/03/what-problems-do-people-solve-with-strace/
https://medium.com/@akhandmishra/important-system-calls-every-programmer-should-know-8884381ceadb
https://www.brendangregg.com/blog/2014-05-11/strace-wow-much-syscall.html
"},{"location":"level102/system_calls_and_signals/intro/","title":"System Calls and Signals","text":""},{"location":"level102/system_calls_and_signals/intro/#prerequisites","title":"Prerequisites","text":"The course covers a fundamental understanding of signals and system calls. It sheds light on how the knowledge of signals and system calls can be helpful for an SRE.
"},{"location":"level102/system_calls_and_signals/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"The course does not discuss any other interrupts or interrupt handling apart from signals. The course will not deep dive into signal handler and GNU C library.
"},{"location":"level102/system_calls_and_signals/intro/#course-contents","title":"Course Contents","text":"An interrupt is an event that alters the normal execution flow of a program and can be generated by hardware devices or even by the CPU itself. When an interrupt occurs the current flow of execution is suspended and the interrupt handler runs. After the interrupt handler runs the previous execution flow is resumed. There are three types of events that can cause the CPU to interrupt: hardware interrupts, software interrupts, and exceptions.
Signals are nothing but software interrupts that notifies a process that an event has occurred. These events might be requests from users or indications that a system problem (such as a memory access error) has occurred. Every signal has a signal number and a default action defined. A process can react to them in any of the following ways:
Signals fall into two broad categories. The first set constitutes the traditional or standard signals, which are used by the kernel to notify processes of events. On Linux, the standard signals are numbered from 1 to 31. The other set of signals consists of the realtime signals. Linux supports both POSIX reliable signals (hereinafter \"standard signals\") and POSIX real-time signals.
"},{"location":"level102/system_calls_and_signals/signals/#realtime-signals","title":"Realtime Signals","text":"Realtime signals were defined in POSIX.1b to remedy a number of limitations of standard signals. They have the following advantages over standard signals:
The standard signals are the classical signals that have been there since the early days of Unix. Further here, we will be discussing about standard signals.
"},{"location":"level102/system_calls_and_signals/signals/#signal-overview","title":"Signal Overview","text":"A signal is said to be generated by some event. Once generated, a signal is later delivered to a process, which then takes some action in response to the signal. Between the time it is generated and the time it is delivered, a signal is said to be pending.
Normally, a pending signal is delivered to a process as soon as it is next scheduled to run, or immediately if the process is already running (e.g., if the process sent a signal to itself). Sometimes, however, we need to ensure that a segment of code is not interrupted by the delivery of a signal. To do this, we can add a signal to the process\u2019s signal mask - a set of signals whose delivery is currently blocked. If a signal is generated while it is blocked, it remains pending until it is later unblocked (removed from the signal mask). Various system calls allow a process to add and remove signals from its signal mask.
Upon delivery of a signal, a process carries out one of the following default actions, depending on the signal:
Instead of accepting the default for a particular signal, a program can change the action that occurs when the signal is delivered. This is known as setting the disposition of the signal. To read more about disposition, refer here. A program can set one of the following dispositions for a signal:
A signal handler is a function, written by the programmer, that performs appropriate tasks in response to the delivery of a signal. For example, the shell has a handler for the SIGINT signal (generated by the interrupt character, Control-C) that causes it to stop what it is currently doing and return control to the main input loop, so that the user is once more presented with the shell prompt. Notifying the kernel that a handler function should be invoked is usually referred to as installing or establishing a signal handler. When a signal handler is invoked in response to the delivery of a signal, we say that the signal has been handled or, synonymously, caught.
Note that it isn\u2019t possible to set the disposition of a signal to terminate or dump core (unless one of these is the default disposition of the signal). The nearest we can get to this is to install a handler for the signal that then calls either exit() or abort(). The abort() function generates a SIGABRT signal for the process, which causes it to dump core and terminate.
"},{"location":"level102/system_calls_and_signals/signals/#types-of-signals","title":"Types of signals","text":"To list available signals in a Linux system, you can use the command kill -l . The table below lists the signals 1 to 20. To get a full list of signals, you can refer here.
There are three different ways to send signals to processes:
Kill command can be used to send signals to process. By default a SIGTERM signal is sent but a different type of signal can be sent to the process by defining the signal number(or signal name). For example, the command kill -9 367 sends SIGKILL to the process with PID 367
Signals can be sent to a running process by pressing some specific keys. For example, holding Ctrl+C sends SIGINT to the process which terminates it.
A process can send a signal to another process via the kill() system call. In this use, signals can be employed as a synchronization technique, or even as a primitive form of interprocess communication (IPC). It is also possible for a process to send a signal to itself. int kill(pid_t pid, int sig) system call takes 2 arguments, pid of the process you wish to send the signal to and the signal number of the desired signal.
Referring to the table of signals in the previous section, you can see that there are default handlers attached to all signals when the program is started. When we invoke signal to attach our own handler, we are over-riding the default behaviour of the program in response to that signal. Specifically, if we attach a handler to SIGINT, the program will no longer terminate when you press +C (or send the program a SIGINT by any other means); rather, the function specified as the handler will be invoked instead which will define the behaviour of the program in response to that signal.
Let\u2019s take an example of handling SIGINT signal and terminating a program. We will use Python\u2019s signal library to achieve this.
When we press Ctrl+C, SIGINT signal is sent. From the signals table, we see that the default action for SIGINT is to terminate the process. To illustrate how the process reacts to the default action and a signal handler, let us consider the below example.
Default Action of SIGINT:
Let us first run the below lines in a python environment:
while 1:\n continue\n Now let us press \"Ctrl+C\".
On pressing \"Ctrl+C\" , a SIGINT interrupt is sent to the process and the default action for SIGINT as per the table we saw in the previous section is to terminate the process. We see that the while loop is terminated and we get the below on our console:
^CTraceback (most recent call last):\n File \"<stdin>\", line 2, in <module>\n KeyboardInterrupt\n The process terminated(default action) since it received a SIGINT(Keyboard Interrupt) when we pressed Ctrl+C.
Signal Handler for SIGINT:
Let us run the below lines of code in the Python environment.
import signal\nimport sys\n\n#Start of signal_handler function\n\ndef signal_handler(signal, frame):\n print ('You pressed Ctrl+C!')\n\n# End of signal_handler function\n\nsignal.signal(signal.SIGINT, signal_handler)\n\n This is an example of a program that defines its own signal handler for SIGINT , overriding the default action.
Now let us run the while and continue statement as we did previously.
while 1:\n continue\n Do we see any changes when Ctrl+C is pressed? Does the program terminate? We see the below output:
^CYou pressed Ctrl+C!\n Everytime we press Ctrl+C, we just the see the above message and the program does not terminate. Inorder to terminate the program, you can press Ctrl+Z which sends the SIGSTOP signal whose default action is to stop the process.
In the case of the signal handler, we define a function signal_handler() which prints \u201cYou pressed Ctrl+C!\u201d and does not terminate the program. The handler is called with two arguments, the signal number and the current stack frame (None or a frame object). signal.signal() allows defining custom handlers to be executed when a signal is received. Its two arguments are the signal number(name) you want to trap and the name of the signal handler.
"},{"location":"level102/system_calls_and_signals/signals/#role-of-signals-in-system-calls-with-the-example-of-wait","title":"Role of signals in system calls with the example of wait()","text":"The wait() system call waits for one of the children of the calling process to terminate and returns the termination status of that child in the buffer pointed to by statusPtr.
If the parent decides not to wait for the child\u2019s termination and it executes its subsequent task, or fails to read the exit status of the child, there remains an entry in the process table even after the termination of the child. This state of the child process is known as the Zombie state. In order to avoid long-lasting zombies, we need to have code that calls wait() after the child process is created. It is generally good to create a signal handler for the SIGCHLD signal, calling one of the wait-family functions in a loop, until no uncollected child data remains.
A child process becomes orphaned, if its parent process terminates before the child .The orphaned child is adopted by init/systemd, the ancestor of all processes, whose process ID is 1. Further calls to fetch the parent pid of this process returns 1.
"},{"location":"level102/system_calls_and_signals/system_calls/","title":"System Calls","text":""},{"location":"level102/system_calls_and_signals/system_calls/#introduction","title":"Introduction","text":"A system call is a controlled entry point into the kernel, allowing a process to request the kernel to perform some action on the process\u2019s behalf. The kernel makes a range of services accessible to programs via the system call application programming interface (API). Application developers often do not have direct access to the system calls, but can access them through this API. These services include, for example, creating a new process, performing I/O, and creating a pipe for interprocess communication. The set of system calls is fixed. Each system call is identified by a unique number. The list of different system calls can be found here.
A system call changes the processor state from user mode to kernel mode, so that the CPU can access protected kernel memory. Each system call may have a set of arguments that specify information to be transferred from user space (i.e., the process\u2019s virtual address space) to kernel space and vice versa. From a programming point of view, invoking a system call looks much like calling a C function.
"},{"location":"level102/system_calls_and_signals/system_calls/#types-of-system-calls","title":"Types of system calls","text":"There are mainly 5 types of different system calls. They are :
Modern processor architectures typically allow the CPU to operate in at least two different modes: user mode and kernel mode . Correspondingly, areas of virtual memory can be marked as being part of user space or kernel space. When running in user mode, the CPU can access only memory that is marked as being in user space; attempts to access memory in kernel space result in a hardware exception.
At any given time, a process may be executing in either user mode or kernel mode. The type of instructions that can be executed depends on the mode and this is enforced at the hardware level. CPU modes (also called processor modes, CPU states, CPU privilege levels) are operating modes for the central processing unit of some computer architectures that place restrictions on the type and scope of operations that can be performed by certain processes being run by the CPU. The kernel itself is not a process but a process manager. The kernel model assumes that processes that require a kernel service use specific programming constructs called system calls.
When a program is executed in user mode, it cannot directly access the kernel data structures or the kernel programs. When an application executes in kernel mode, however, these restrictions no longer apply. A program usually executes in user mode and switches to kernel mode only when requesting a service provided by the kernel. If an application needs access to hardware resources on the system(like peripherals,memory,disks), it must issue a system call, which causes a context switch from user mode to kernel mode. This procedure is followed when reading/writing from/to files, etc. It is only the system call itself which runs in kernel mode, not the application code. When the system call is complete, the process returns to the user mode with the return value using an inverse context switch. Apart from system calls, kernel routines can be activated in the below ways as well:
In the above diagram, Process 1 in User Mode issues a system call, after which the process switches to Kernel Mode and the system call is serviced. Process 1 then resumes execution in User Mode until a timer interrupt occurs and the scheduler is activated in Kernel Mode. A process switch takes place and Process 2 starts its execution in User Mode until a hardware device raises an interrupt. As a consequence of the interrupt, Process 2 switches to Kernel Mode and services the interrupt.
"},{"location":"level102/system_calls_and_signals/system_calls/#working-of-write-system-call","title":"Working of write() system call","text":"The write() system call writes data to an open file.
# include <unistd.h>\n\nssize_t write(int fd, void *buffer, size_t count);\n buffer is the address of the data to be written; count is the number of bytes to write from buffer; and fd is a file descriptor referring to the file to which data is to be written.
write() call writes up to count bytes from buffer to the open file referred to by fd. On success, write() call returns the number of bytes actually written, which may be less than count and returns -1 on error. When performing I/O on a disk file, a successful return from write() doesn\u2019t guarantee that the data has been transferred to disk, because the kernel performs buffering of disk I/O in order to reduce disk activity and expedite write() calls. It simply copies data between a user-space buffer and a buffer in the kernel buffer cache. At some later point, the kernel writes (flushes) its buffer to the disk.
If, in the interim, another process attempts to read these bytes of the file, then the kernel automatically supplies the data from the buffer cache, rather than from (the outdated contents of) the file. The aim of this design is to allow write() to be fast, since they don\u2019t need to wait on a (slow) disk operation. This design is also efficient, since it reduces the number of disk transfers that the kernel must perform.
"},{"location":"level102/system_calls_and_signals/system_calls/#debugging-in-linux-with-strace","title":"Debugging in Linux with strace","text":"strace is a tool used to trace the transition between user processes and the Linux kernel. Inorder to use the tool, we need ensure that it is installed in the system by running the command:
$ rpm -qa | grep -i strace\n\nstrace-4.12-9.el7.x86_64\n If the above command does not give any output, you can install the tool via:
$ yum install strace
The functions which are a part of standard C library are known as library functions. The purposes of these functions are very diverse, including such tasks as opening a file, converting a time to a human-readable format, and comparing two character strings. Some library functions are layered on top of system calls. Often, library functions are designed to provide a more caller-friendly interface than the underlying system call. For example, the printf() function provides output formatting and data buffering, whereas the write() system call just outputs a block of bytes.The most commonly used implementation of the standard C library on Linux is the GNU C library glibc.
The C programming language gives printf() that lets the user write data in many different formats. So printf() as a function converts your data into a formatted sequence of bytes and that calls write() to write those bytes onto the output. Let us examine what happens when a printf() statement is executed with the use of strace command : strace printf %s \u201cHello world\u201d
~]$ strace printf %s \"Hello world\"\nexecve(\"/usr/bin/printf\", [\"printf\", \"%s\", \"Hello world\"], [/* 47 vars */]) = 0\nbrk(NULL) = 0x90d000\nmmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f8fc672f000\naccess(\"/etc/ld.so.preload\", R_OK) = -1 ENOENT (No such file or directory)\nopen(\"/etc/ld.so.cache\", O_RDONLY|O_CLOEXEC) = 3\nfstat(3, {st_mode=S_IFREG|0644, st_size=98854, ...}) = 0\nmmap(NULL, 98854, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f8fc6716000\nclose(3) = 0\nopen(\"/lib64/libc.so.6\", O_RDONLY|O_CLOEXEC) = 3\nread(3, \"\\177ELF\\2\\1\\1\\3\\0\\0\\0\\0\\0\\0\\0\\0\\3\\0>\\0\\1\\0\\0\\0\\20&\\2\\0\\0\\0\\0\\0\"..., 832) = 832\nfstat(3, {st_mode=S_IFREG|0755, st_size=2156160, ...}) = 0\nmmap(NULL, 3985888, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f8fc6141000\nmprotect(0x7f8fc6304000, 2097152, PROT_NONE) = 0\nmmap(0x7f8fc6504000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1c3000) = 0x7f8fc6504000\nmmap(0x7f8fc650a000, 16864, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f8fc650a000\nclose(3) = 0\nmmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f8fc6715000\nmmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f8fc6713000\narch_prctl(ARCH_SET_FS, 0x7f8fc6713740) = 0\nmprotect(0x7f8fc6504000, 16384, PROT_READ) = 0\nmprotect(0x60a000, 4096, PROT_READ) = 0\nmprotect(0x7f8fc6730000, 4096, PROT_READ) = 0\nmunmap(0x7f8fc6716000, 98854) = 0\nbrk(NULL) = 0x90d000\nbrk(0x92e000) = 0x92e000\nbrk(NULL) = 0x92e000\nopen(\"/usr/lib/locale/locale-archive\", O_RDONLY|O_CLOEXEC) = 3\nfstat(3, {st_mode=S_IFREG|0644, st_size=106075056, ...}) = 0\nmmap(NULL, 106075056, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f8fbfc17000\nclose(3) = 0\nopen(\"/usr/share/locale/locale.alias\", O_RDONLY|O_CLOEXEC) = 3\nfstat(3, {st_mode=S_IFREG|0644, st_size=2502, ...}) = 0\nmmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f8fc672e000\nread(3, \"# Locale name alias data base.\\n#\"..., 4096) = 2502\nread(3, \"\", 4096) = 0\nclose(3) = 0\nmunmap(0x7f8fc672e000, 4096) = 0\nopen(\"/usr/lib/locale/UTF-8/LC_CTYPE\", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)\nfstat(1, {st_mode=S_IFCHR|0620, st_rdev=makedev(136, 1), ...}) = 0\nmmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f8fc672e000\nwrite(1, \"Hello world\", 11Hello world) = 11\nclose(1) = 0\nmunmap(0x7f8fc672e000, 4096) = 0\nclose(2) = 0\nexit_group(0) = ?\n+++ exited with 0 +++\n execve(\"/usr/bin/printf\", [\"printf\", \"%s\", \"Hello world\"], [/ 47 vars /]) = 0
The first system call made is execve() and does three things:
The first word of the line, execve, is the name of the system call being executed. The first parameter must be the path of a binary executable or a script. The second is an array of argument strings passed to the new program. By convention, the first of these strings should contain the filename associated with the file being executed. The third parameter must be an environment variable. The number after the = sign (which is 0 in this case) is a value returned by the execve system call which indicates that the call was successful.
open(\"/usr/lib/locale/UTF-8/LC_CTYPE\", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
In this line, the program tried to open() file /usr/lib/locale/UTF-8/LC_CTYPE. However the system call failed (with -1 status) with the descriptive error message No such file or directory, as the file wasn\u2019t found (ENOENT).
brk(NULL) = 0x90d000
brk(0x92e000) = 0x92e000
brk(NULL) = 0x92e000
The system call brk() is used to increase or decrease the process\u2019s data segment. It returns the new address where the data segment of the process is to end.
open(\"/lib64/libc.so.6\", O_RDONLY|O_CLOEXEC) = 3
read(3, \"\\177ELF\\2\\1\\1\\3\\0\\0\\0\\0\\0\\0\\0\\0\\3\\0>\\0\\1\\0\\0\\0\\20&\\2\\0\\0\\0\\0\\0\"..., 832) = 832
In the above lines of the console output, we see that a successful open() call is made, followed by read() system call.
In open(), the first parameter is the path to file which you want to use and the second parameter defines the permissions. In this example, O_RDONLY which means the file is read only and O_CLOEXEC which enables the close-on-exec flag for the opened file. This is useful to avoid race conditions in multithreaded programs where one thread opens a file descriptor at the same time as another thread. 3 indicates the file descriptor used to open the file. Since fd 0, 1, 2 are already taken by stdin, stdout and stderr. So first unused file descriptor is 3 in file descriptor table.
If open()
In read(), the first parameter is the file descriptor which is 3(the file was opened using this file descriptor by open(). The second parameter is the buffer to read data from and the third parameter is the length of the buffer. The return value is 832 which is the number of bytes read.
close(3) = 0
A close system call is used to close a file descriptor by the kernel. For most file systems, a program terminates access to a file in a filesystem using the close system call. 0 after the = sign indicates that the system call was successful.
write(1, \"Hello world\", 11Hello world) = 11
In the previous section, we described the write() system call and the arguments that it takes. Whenever we see any output to the video screen, it\u2019s from the file named /dev/tty and written to stdout on screen through fd 1. The first parameter is the file descriptor , second parameter is the buffer containing the information to be written and the last parameter contains the count of characters. On success, the number of bytes written are returned (zero indicates nothing was written) which is 11 in this example.
+++ exited with 0 +++
This indicates that the program exited successfully with exit code 0. An exit code of 0 generally indicates successful execution and termination in Linux programs.
You don't need to memorize all the system calls or what they do, because you can refer to documentation when you need to. Ensure the following package is installed before running the man command:
$ rpm -qa | grep -i man-pages\n\nman-pages-3.53-5.el7.noarch\n Run the following man command with the system call name to see the documentation for that system call(for eg, execve):
man 2 execve
Apart from system calls, strace can be used to detect the files that are being accessed by the program. In the above trace, we have a system call open(\"/lib64/libc.so.6\", O_RDONLY|O_CLOEXEC) = 3 which is opening the libc shared object /lib64/libc.so.6 which is the C implementation of various standard functions. It is the file where we see the printf() definition needed for printing Hello World.
Strace can also be used to check if a program is hanging or stuck. When we have the trace, we can observe at which operation the program is stuck as well. Furthermore, as we go through the trace, we can also find errors(if there are any) to point out why the program is hung/stuck. Strace can be very helpful in finding the reason behind slow performance of a program.
Alhough strace has the aforementioned uses to it, if you're running a trace in a production environment, strace is not a good choice. It introduces a substantial amount of overhead. According to a performance test conducted by Arnaldo Carvalho de Melo, a senior software engineer at Red Hat, the process traced using strace ran 173 times slower, which can be disastrous for a production environment.
"},{"location":"level102/system_design/conclusion/","title":"Conclusion","text":"We have looked at designing a sytem from the scratch, scaling it up from a single server to multiple datacenters and hundreds of thousands of users. However, you might have (rightly!) guessed that there is a lot more to system design than what we have covered so far. This course should give you a sweeping glance at the things that are fundamental to any system design process. Specific solutions implemented, frameworks and orchestration systems used evolve rapidly. However, the guiding principles remain the same. We hope you this course helped in getting you started along the right direction and that you have fun designing systems and solving interesting problems.
"},{"location":"level102/system_design/intro/","title":"System Design","text":""},{"location":"level102/system_design/intro/#prerequisites","title":"Prerequisites","text":"The aim is to empower the reader to understand the building blocks of a well-designed system, evaluate existing systems, understand the trade-offs, come up with their own design, and to explore the various tools available to implement such a system. In phase one of this module, we talked about the fundamentals of system design including concepts like scalability, availability and reliability. We continue to build on those fundamentals in this phase.
Throughout the course, there are callout sections that appear like this, and talk about things that are closely related to the system design process, but don\u2019t form a part of the system itself. They also have information about some common issues that crop up in system design. Watch out for them."},{"location":"level102/system_design/intro/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"While this course covers many aspects of system design, it does not cover the most fundamental concepts. For such topics, it is advised to go through the prerequisites.
In general, this module will not go into actually implementing the architecture - we will not talk about choosing a hosting/cloud provider or an orchestration setup or a CI/CD system. Instead, we try to focus on the fundamental considerations that need to go into system design.
"},{"location":"level102/system_design/intro/#course-contents","title":"Course Contents","text":"We talked about building a basic photo sharing application in the previous phase of this course. Our basic requirements for the application were that
In other words, we wanted to build a system that was available, scalable and fault tolerant. We will continue designing that application, and cover additional concepts in the course of doing so.
The photo sharing application is a web application that will handle everything from user sign up, log in, uploads, feed generation, user interaction and interaction with uploaded content. Also a database to store this information. In the simplest design, both the web app and the database can run on the same server. Recall this initial design from Phase 1.
Building on that, we will talk about performance elements in system design - setting the right performance measurement metrics and using them to drive our design decisions, improving performance using caching, Content Delivery Networks (CDNs), etc. We will also talk about how to design for resilience by looking at some system design patterns - graceful degradation, time-outs and circuit breakers.
Cost System design considerations like availability, scalability cannot exist in isolation. When operating outside the lab, we have other considerations / the existing considerations take on a different hue. One such consideration is cost. Real world systems almost always have budget constraints. System design, implementation and continued operation needs to have predictable costs per unit output. The output is usually the business problem you are trying to solve. Striking a balance between the two is very important. Understanding the capabilities of your system A well designed system requires understanding the building blocks intimately in terms of their capabilities. Not all components are created equal, and understanding what a single component can do is very important - for e.g., in the photo upload application it is important to know what a single database instance is capable of, in terms of read or write transactions per second and what would be a reasonable expectation be. This helps in building systems that are appropriately weighted - and will eliminate obvious sources of bottlenecks. On a lower level, even understanding the capabilities of the underlying hardware (or a VM instance if you are on cloud) is important. For eg., all disks don\u2019t perform the same, and all disks don\u2019t perform the same per dollar. If we are planning to have an API that is expected to return a response in 100ms under normal circumstances, then it is important to know how much of it will be spent in which parts of the system. The following link will help in getting a sense of each component\u2019s performance, all the way from the CPU cache to the network link to our end user. Numbers every programmer should know"},{"location":"level102/system_design/large-system-design/","title":"Large System Design","text":"Designing a system usually starts out to be abstract - we have large functional blocks that need to work together and are abstracted away into frontend, backend and database layers. However, when it is time to implement the system, especially as an SRE we have no other choice but to think in specific terms. Servers have a fixed amount of memory, storage capacity and processing power. So we need to think about the realistic expectations from our system, assess the requirements, translate them into specific requirements from each component of the system like network, storage and compute. This is typically how almost all large scale systems are built. The folks over at Google have formalized this approach to designing systems as \u2018Non abstract large system design\u2019 (NALSD). According to the Google site reliability workbook,
\u201cPractically, NALSD combines elements of capacity planning, component isolation, and graceful system degradation that are crucial to highly available production systems.\u201d
We will be using an approach similar to this to build our system.
"},{"location":"level102/system_design/large-system-design/#application-requirements","title":"Application requirements","text":"Let us define our application requirements in more concrete terms i.e., specific functions:
Our photo sharing application must let the user
Sign up to become a member, and login to the application
Upload photographs, and optionally add a description and tag location and/or people
Follow other users on the platform
See a feed comprising of photos from other users that they follow
View their own profile page, and manage who they follow
Let us define expectations for the application\u2019s performance for a better user experience. We also need to define the health of the system. SLIs and SLOs help us do just that.
"},{"location":"level102/system_design/large-system-design/#slis-and-slos","title":"SLIs and SLOs","text":"The Google SRE book defines service level indicator(SLI) as \u201ca carefully defined quantitative measure of some aspect of the level of service that is provided.\u201d For our application, we can define multiple SLIs. One indicator can be the response time for loading the feed for our photo sharing application. Picking the right set of SLIs is very important since they essentially help us define the health of the system as a whole using concrete data. SLIs for an application are defined by the owners of the service, in consultation with the SREs.
Service level objective (SLO) is defined as \u201ca target value or range of values for a service level that is measured by an SLI\u201d. SLO is a way for us to anchor ourselves to an optimal user experience by defining SLI boundaries. If our application takes a long time to load the feed, users might not open it very often. As a result, an example of SLO can be that at least 99% of the users should see their feed loaded within 1 second.
Now that we have defined SLIs and SLOs, let us define the application\u2019s scalability, reliability and performance characteristics in terms of specific SLI and SLO levels.
"},{"location":"level102/system_design/large-system-design/#defining-application-requirements-in-terms-of-slis-and-slos","title":"Defining application requirements in terms of SLIs and SLOs","text":"The following can be some of the expectations for our application:
Once the user successfully uploads the image, it should be accessible to the user and their followers 100% of the time, barring user elected deletion.
At least 50000 unique visitors should be able to visit the site at any given time and view their feed.
99% of the users should be able to view their feeds in less than 1 second.
Upon uploading a new image, it should show up in the feed of the user\u2019s followers within 15 minutes.
Users should be able to upload potentially thousands of images. (as long as they are not abusing the service)
Since our ultimate aim is to learn system design, we will arbitrarily limit the functionalities of the system. This will help us keep sight of our aim, and keep us focussed.
Having defined the functionalities and expectations for our system, let us quickly sketch an initial design.
As of now, all the functionalities are residing on a single server, which has endpoints for all of these functions. We will attempt to build a system that satisfies our SLOs, is able to serve 50k concurrent users, and about a million total users. In the course of this attempt, we will discuss a string of concepts, some of which we have already seen in Phase 1 of this course.
Caution Note that the numbers we have picked in the following sections are completely arbitrary. They have been chosen to demonstrate thinking about system design in a non-abstract manner. They have not been benchmarked, and bear no real world resemblance. Do not use them in any real world systems that you may be designing. You should come up with your own numbers, using the guiding principles we have relied upon here."},{"location":"level102/system_design/large-system-design/#estimating-resource-requirements","title":"Estimating resource requirements","text":"Single Computer
If we wished to run the application on a single server, we would need to perform all the above functionalities from the diagram on this server itself. Let us perform some calculations to figure out what kind of resources we will need.
Before anything else, we need to store the data about users, their uploads, follower information and any other metadata. We will choose a relational DB to store this information, like MySQL. Do note that we can also choose to use a NOSQL solution here. That would require a similar approach to calculate the requirements. Let us represent the users like so:
UserID(int)\nUserName(varchar)\nDisplayName(varchar)\nYearOfBirth(year)\nEmail(varchar)\n Photos can be represented like this:
PhotoID(int)\nPhotoHash(varchar)\nUploadtime(datetime)\nLocation(varchar)\nOptionalFlag(varchar)\n Followers can be represented like this:
Follower(int)\nFollowee(int)\n Let us quickly estimate the storage needed for a hundred million total users. A single user would need 4B + 32B + 32B + 4B + 32B = 104 bytes. A hundred million users would need 10.4 GB storage. A single photo would need about 4B + 20B + 4B + 32B + 4B = 64 bytes of storage to store the metadata related to the photo. Assuming a million photos uploaded in one day, we would need about 64 MB of storage per day, just for the metadata. For the photo storage itself, we will need about 300GB per day, assuming 300KB average photo size.
A single visitor opening our application simply hits our /get_feed endpoint upon logging in to the application. Let us quickly calculate the resources needed to serve this request. Assuming the initial feed loads 5 images (of 300 KB size on an average) and then does lazy loading to infinitely scroll, we will need to send about 1.5 megabytes of images to the user for his initial call. With a 1000 Mbps* network link to the server, we can send only about (1000/8)/1.5 or about 83 users all loading the feed at the same time, before we saturate the network link. If we needed to serve 50k concurrent users every second, we would need 1.5*50000*8 = 600000 Mbps network throughput needed for every 5 images sent, assuming we send out all 5 images in a single second. If we are reading all of it from disk, we would likely hit disk throughput limits far before approaching anywhere near this amount of traffic.
So in order to meet our application requirements, we would need a server that has ~310GB storage for the database and the images of one day, and about 600 Gbps link to serve 50k users concurrently, along with CPU required to perform all this. Clearly not the task for a single server.
And do note that we have severely limited the information we are storing in the database. We would likely need an order of magnitude more information to be stored.
While we clearly do not have any real world server that has the resources we calculated above, this exercise provides us some valuable data points about what the resource cost is. Armed with this information, let us work on scaling our system through system design to get us as close as possible to our goals for the application.
* Modern servers even have multi-gigabit links, but it is highly unlikely that such a huge server will be serving our application alone. Modern cloud providers have VMs that also boast several gigabits of bandwidth, but they usually end up being throttled after certain limits.
"},{"location":"level102/system_design/large-system-design/#references","title":"References:","text":"A resilient system is one that can keep functioning in the face of adversity. With our application, there can be numerous failures that act as adversities. There can be network level failures that take out entire data centres, there might be issues at the rack level or at the server level, or there might be something wrong with the cloud provider. We may also run out of capacity, or there might be a wrong code push that breaks the system. We will talk about a couple of such issues, and understand how we might design a system to work around such things. In some cases, a workaround might not be possible. However it is still valuable to know potential vulnerabilities to the system stability.
Resilient architectures leverage system design patterns such as graceful degradation, quotas, timeouts and circuit breakers. Let us look at some of them in this section.
"},{"location":"level102/system_design/resiliency/#quotas","title":"Quotas","text":"A system may have a component or an endpoint that is consumed by multiple components and endpoints. It is important to have something in place that will prevent one consumer or client from overwhelming such a system. Quotas are one way to do this - we simply assign a specific quota for each component - by way of specifying requests per unit time. Anyone who breaches the quota is either warned or dropped, depending on the implementation. This way, one of our own systems misbehaving cannot result in denial of service to others. Quotas also help us prevent cascading failures.
"},{"location":"level102/system_design/resiliency/#graceful-degradation","title":"Graceful Degradation","text":"When a system with multiple dependencies encounters failure in one of the dependencies, gracefully degrading to minimum viable functionality would be a lot better than grinding the entire system to a halt. For example, let us assume there is an endpoint (an URL for a service or a specific function) in our application whose responsibility is to parse the location information in an user uploaded image from the image's metadata and provide suggestions for location tagging to the user. Rather than failing the entire upload, it is much better to skip over this functionality and still give the user an option to manually tag a location. Gracefully degrading is always better compared to total failures.
"},{"location":"level102/system_design/resiliency/#timeouts","title":"Timeouts","text":"We sometimes call other services or resources like databases or API endpoints in our application. When calling such a resource from our application, it is important to always have a reasonable timeout. It doesn\u2019t necessarily even have to be that the resource will fail for all requests. It just might be that a specific request falls in the high tail latency category. A reasonable time out is helpful to keep the user experience consistent - it is better to fail rather than to have frustratingly long delays, in some cases.
"},{"location":"level102/system_design/resiliency/#exponential-back-offs","title":"Exponential back-offs","text":"When a service endpoint fails, retries are one way to see if it was a momentary failure. However, if the retry is also going to fail, there is no point in endlessly retrying. At large enough scale, the retries can compete with the new requests (which might very well be served as expected) and saturate the system. To avoid this, we can look at exponential back-off for retries. This essentially decreases the rate at which the clients retry, upon encountering consecutive failures on retries.
"},{"location":"level102/system_design/resiliency/#circuit-breakers","title":"Circuit breakers","text":"While exponential back off is one way to deal with retry storms, circuit breakers can be another. Circuit breakers can help failures from percolating the entire system. Else, an unmitigated failure that flows through the system may result in false alerts, worsening the mean time to detection(MTTD) and mean time to resolution(MTTR). For example, in case one of the in-memory cache nodes fails resulting in requests reaching the database post the initial timeouts for cache, it might end up overloading the database. If the initial connection between cache node failure and DB node failure is not made, then it might result in increased MTTD of the actual cause and consequently the MTTR.
"},{"location":"level102/system_design/resiliency/#self-healing-systems","title":"Self healing systems","text":"A traditionally load-balanced application with multiple instances might fail when more than a threshold of instances stop responding to requests - either because they are down, or suddenly there is a huge influx of requests, resulting in degraded performance. A self-healing system adds more instances in this scenario to replace the failed instances. Auto-scaling like this can also help when there is a sudden spike in query. If our application runs on a public cloud, it might simply be a matter of spinning up more virtual machines. If we are running on-premise out of our data center, then we will want to think about capacity planning much more carefully. Regardless of how we handle adding additional capacity - simply addition may not be enough. We should also think about additional potential failure modes that might be encountered. For example, the load balancing layer itself might need scaling up, to handle the influx of new backends.
"},{"location":"level102/system_design/resiliency/#continuous-deployment-and-integration","title":"Continuous Deployment and Integration","text":"A well designed system also needs to take into account the need for a proper staging setup that can mimic the production environment as closely as possible. There should also be a way for us to replay production traffic in the staging environment to test changes to production thoroughly.
"},{"location":"level102/system_design/scaling-beyond-the-datacenter/","title":"Scaling Beyond the Data Center","text":""},{"location":"level102/system_design/scaling-beyond-the-datacenter/#caching-static-assets","title":"Caching static assets","text":"Extending the existing caching solution a bit, we arrive at Content Delivery Networks(CDNs). CDNs are the caching layer that is closest to the user. A significant chunk of resources served in a webpage, may not be changing on an hourly or even a daily basis. In those cases, we would want to cache these at the CDN level, reducing our load. CDNs not only help reduce the load on our servers by removing the burden of serving static / bandwidth intensive resources, they also let us be present closer to our users, by way of points of presence(POPs). CDNs also let us do geo-load balancing, in case we have multiple data centres around the world, and would want to serve from the closest data center (DC) possible.
Taking it a step further
With the addition of caching and distributing our application into simpler services, we have solved the problem of scaling to 50000 users. However, our users may be geographically distributed locations and may not be at the same distance from our data centre or our cloud region. Consistency in user experience is important, else we are excluding users who are far away from our location, potentially eliminating a significant chunk of potential users. However, it is not impractical to have data centers all over the world, or even in more than a couple of locations in the world. This is where CDNs and POPs come into picture.
"},{"location":"level102/system_design/scaling-beyond-the-datacenter/#points-of-presence","title":"Points of Presence","text":"CDN POPs are geographically distributed data centers aimed at being close to users. POPs reduce the round trip time by delivering content from a location that is nearest to the user. POPs typically may not have all the content, but have caching servers that cache the static assets, and fetch the rest of the content from the origin server where the application actually resides. Their main function is to reduce round trip time by bringing the content closer to the website\u2019s visitor. POPs can also route traffic to one of the multiple origin DCs possible. This way, POPs can be leveraged to add resiliency as well as load-balancing.
Now, with our image sharing application becoming more popular by the day, let us assume that we have hit 100,000 concurrent users. And we have built another data center, predicting this increase in traffic. Now we need to be able to route the service to both of these data centers in a reliable manner, while also retaining the ability to fall back to a single data center in case there is an issue with one of the two DCs. This is where sticky routing comes into play.
"},{"location":"level102/system_design/scaling-beyond-the-datacenter/#sticky-routing","title":"Sticky Routing","text":"When an user sends a request, there are cases in which we might want to serve a specific user\u2019s requests from a DC if we have multiple DCs, or a specific server inside a DC. We may also wish to serve all requests from a specific POP by a single data center. Sticky routing helps us do exactly that. It might be simply pinning all users to a specific DC or pinning specific users to specific servers. This is typically done from the POP, so that as soon as the user enters reaches our servers, we can route them to the nearest DC possible.
"},{"location":"level102/system_design/scaling-beyond-the-datacenter/#geo-dns","title":"Geo DNS","text":"When a user opens the application, the user can be directed to one of the multiple globally distributed POPs. This can be done using GeoDNS, which simply put, gives out a different IP address(which are distributed geographically), depending on the location of the user making the DNS request. GeoDNS is the first step in distributing users to different locations - it is not 100% accurate, and typically makes use of IP address allotment information for guessing the location of the user. However, it works well enough for >90% of the users. After this, we can have a sticky routing service that assigns each user to a specific DC, which we can use to assign a DC to this user, and set a cookie. When the user next visits, the cookie can be read at the POP to decide which data center the user\u2019s traffic must be directed to.
Having multiple DCs and leveraging sticky routing has not only scaling benefits, but also adds to the resiliency of the service, albeit at the cost of additional complexity.
Let us consider another use case in which an user uploads a new profile picture for themselves. If we have multiple data centres or POPs which are not synced in real time - not all of them might have the newer picture. In such a case, it would make sense to tie that user to a specific DC/region until the update has propagated to all regions. Sticky routing would enable us to do this.
"},{"location":"level102/system_design/scaling-beyond-the-datacenter/#references","title":"References","text":"In the Phase 1 of this course, we had seen AKF scale cube and how it can help in segmenting services, defining microservices and scaling the overall application. We will use a similar strategy to scale our application - while using the estimates from the previous section, so that we can have a data driven design rather than arbitrarily choosing scaling patterns.
"},{"location":"level102/system_design/scaling/#splitting-the-application","title":"Splitting the application","text":"Considering the huge volume of traffic that might be generated by our application, and the related resource requirements in terms of memory and CPU, let us split the application into smaller chunks. One of the simplest ways to do this would be to simply divide the application along the endpoints, and spin them up as separate instances. In reality, this decision would probably be a little more complicated, and you might end up having multiple endpoints running from the same instance.
The images can be stored in an object store that can be scaled independently, rather than locating it on the servers where the application or the database resides. This would reduce the resource requirements for the servers.
"},{"location":"level102/system_design/scaling/#stateful-vs-stateless-services","title":"Stateful vs Stateless services","text":"A stateless process or service doesn\u2019t rely on stored data of it\u2019s past invocations. A stateful service on the other hand stores its state in a datastore, and typically uses the state on every call or transaction. In some cases, there are options for us to design services in such a way that certain components can be made stateless and this helps in multiple ways. Applications can be containerized easily if they are stateless. Containerized applications are also easier to scale. Stateful services require you to scale the datastore with the state as well. However, containerizing databases or scaling databases is out of the scope of this module.The resulting design after such distribution of workloads might look something like this.
You might notice that the diagram also has multiple databases. We will see more about this in the following sharding section.
Now that we have split the application into smaller services, we need to look at scaling up the capacity of each of these endpoints. The popular Pareto principle states that \u201c80% of consequences come from 20% of the causes\u201d. Modifying it slightly, we can say that 80% of the traffic will be for 20% of images. The no. of images uploaded vs the no. of images seen by the user is going to be similarly skewed. An user is much more likely to view images on a daily basis than they are to upload new ones.
In our simple design, generating the feed page with initial 5 images will be a matter of choosing 5 recently uploaded images from fellow users whom this user follows. While we can dynamically fetch the images from the database and generate the page on the fly once the user logs on, we might soon overwhelm the database in case a large number of users choose to login at the same time and load their feeds. There are two things we can do here, one is caching, and the other one is ahead of time generation of user feeds.
An user with a million followers can potentially lead to hundreds of thousands of calls to the DB, simply to fetch the latest photoID that the user has uploaded. This can quickly overwhelm any DB, and can potentially bring down the DB itself.
"},{"location":"level102/system_design/scaling/#sharding","title":"Sharding","text":"One way to solve the problem of DB limitation is scaling up the DB write and reads. Sharding is one way to scale the DB writes, where the DB would be split into parts that reside in different instances of the DB running on separate machines. DB reads can be scaled up similarly by using read replicas as we had seen in Phase 1 of this module.
Compared to the number of images the popular user uploads, the number of views generated would be massive. In that case, we should cache the photoIDs of the user\u2019s uploads, to be returned without having to perform a potentially expensive call to the DB.
Let us consider another endpoint in our application named /get_user_details. It simply returns the page an user would see upon clicking another user\u2019s name. This endpoint will return a list of posts that the user has created. Normally, a call to that endpoint will involve the application talking to the DB, fetching a list of all the posts by the user and returning the result. If someone\u2019s profile is viewed thousands of times that means there are thousands of calls to the DB - which may result in issues like hot keys and hot partitions. As with all other systems, an increase in load may result in worsening response times, resulting in inconsistent and potentially bad user experience. A simple solution here would be a cache layer - one that would return the user\u2019s profile with posts without having to call the DB everytime.
A cache is used for the temporary storage of data that is likely to be accessed again, often repetitively. When the data requested is found in the cache, it is termed as a `cache hit\u2019. A \u2018cache miss\u2019 is the obvious complement. A well positioned cache can greatly reduce the query response time as well as improve the scalability of a system. Caches can be placed at multiple levels between the user and the application. In Phase 1, we saw how we could use caches / CDNs to service static resources of the application, resulting in quicker response times as well as lesser burden on the application servers. Let us look at more situations where caching can play a role.
"},{"location":"level102/system_design/scaling/#in-memory-caching","title":"In-memory caching:","text":"In memory caching is when the information to be cached is kept in the main memory of the server, allowing it to be retrieved much faster than a DB residing on a disk. We cache arbitrary text (which can be HTML fragments or may be JSON objects) and fetch it back really fast. An in memory cache is the quickest way to add a layer of fast cache that can optionally be persisted to disk as well.
While caching can aid significantly in scaling up and improving performance, there are situations where cache is suddenly not in place. It might be that the cache was accidentally wiped, leading to all the queries falling through to the DB layer, often multiple calls for the same piece of information. It is important to be aware of this potential \u2018thundering herd\u2019 problem and design your system accordingly.Caching proxies:
There are cases where you may want to cache entire webpages / responses of other upstream resources that you need to respond to requests. There are also cases where you want to let your upstream tell you what to cache and how long to cache it for. In such cases, it might be a good idea to have a caching solution that understands Cache related HTTP headers. One example for our usecase can be when users search for a specific term in our application - if there is a frequent enough search for a user or a term, it might be more efficient to cache the responses for some duration rather than performing the search anew everytime.
Let\u2019s recap one of the goals - Atleast 50000 unique visitors should be able to visit the site at any given time and view their feed. With the implementation of caching, we have removed one potential bottleneck - the DB. We also decomposed the monolith into smaller chunks that provide individual services. Another step closer to our goal is to simply horizontally scale the services needed for feed viewing and putting them behind a load balancer. Please recall the scaling concepts discussed in Phase 1 of this module.
"},{"location":"level102/system_design/scaling/#cache-managment","title":"Cache managment","text":"While caching sounds like a simple, easy solution for a hard problem, an even harder problem is to manage the cache efficiently. Like most things in your system, the cache layer is not infinite. Effective cache management means removing things from the cache at the right time, to ensure the cache hit rate remains high. There are many strategies to invalidate cache after a certain time period or below certain usage thresholds. It is important to keep an eye on cache-hit rate and fine tune your caching strategy accordingly."},{"location":"level102/system_design/scaling/#references","title":"References","text":"Complex systems have many factors which can go wrong. It can be a bad design & architecture, poorly managed code, poor policies around different caches, bad DB queries or architecture, improper use of resources, or bad OS version, poorly monitored system, datacenter issues, network faults, and many more, Any of these can go wrong.
As an SRE, Knowing important tools/commands, best practices, profiling, benchmarking and scaling can help you with faster troubleshooting and performance improvement of the overall system.
"},{"location":"level102/system_troubleshooting_and_performance/conclusion/#further-readings","title":"Further readings","text":"Here are some links from the LinkedIn Engineering Blog, as written by LinkedIn engineers, about firefighting they did, ensuring site up 24x7x365.
Having knowledge of following commands will help find issues faster. Elaborating each command in detail is out of scope, please look for man pages or online for more information and examples around the same.
In case of distributed systems, some good third party tools can help to execute commands/instructions on many hosts at once, like:
These can help in writing SQL type queries for parsing, analysing logs and provide an easy UI interface to create dashboards which can render various types of charts based on defined queries.
This brief course tries to provide a general introduction on how to troubleshoot system issues, like analysing api failures, resource utilization, network issues, hardware and OS issues. Course also briefs on profiling and benchmarking to measure overall system performance.
"},{"location":"level102/system_troubleshooting_and_performance/introduction/#what-is-not-covered-under-this-course","title":"What is not covered under this course","text":"This course does not cover following -:
Troubleshooting is an important part of operations & development. It can\u2019t be learned by just reading one article or completing a course online, Its a continuous learning process, one learns it during :-
From an SRE\u2019s perspective, It is expected that they are aware of certain topics upfront to be able to troubleshoot problems around single or distributed systems.
There was a famous quote by HP founders - \u201cWhat gets measured gets fixed\u201d
If system components and performance metrics are captured thoroughly then there is a high chance of success in troubleshooting an issue, at its earliest.
"},{"location":"level102/system_troubleshooting_and_performance/introduction/#scope","title":"Scope","text":"There is no common approach to troubleshoot different types of applications or services, the failure can occur at any layer of it. We will keep the scope of this work to a web api service type only.
Note -: Linux ecosystem is wide, there are hundreds of tools and utilities which can help with system troubleshooting, each comes with its own set of benefits and functionalities. We will cover some of the known tools, either already available with Linux or are available in the open source world. Detailed explanation of mentioned tools in this doc is out of scope, please explore the internet or man pages for more examples and documentation around the same.
"},{"location":"level102/system_troubleshooting_and_performance/performance-improvements/","title":"Performance Improvements","text":"Performance tools are an important part of development/operations lifecycle, Its highly important for understanding application behavior. SRE generally uses such tools to evaluate how well service will perform and make/suggest improvements accordingly.
"},{"location":"level102/system_troubleshooting_and_performance/performance-improvements/#performance-analysis-commands","title":"Performance analysis commands","text":"Most of these commands are a must to know for doing performance analysis of a system or service.
Profiling is an important part of performance analysis of the service. There are various profiler tools available, which can help figure most frequent code-paths, debugging, memory profiling, etc. These can generate the heatmap to understand the code performance when under load.
To know how LinkedIn performs On-Demand Profiling on its services, Read LinkedIn blog ODP: An Infrastructure for On-Demand Service Profiling
"},{"location":"level102/system_troubleshooting_and_performance/performance-improvements/#benchmarking","title":"Benchmarking","text":"It is a process of measuring the best performance of the service. Like how much QPS service can handle, its latency when load is increasing, host resource utilization, loadavg etc etc. The regression testing (i.e load testing) is a must before deploying the service to production.
Some of known tools -:
Limitation -:
Above tools help in synthetic load or stress testing, but such does not measure actual end user experience, It can\u2019t see how end user resources will affect application performance, it is due to lack of memory, CPU, or poor connectivity to the internet.
To know how LinkedIn performs load testing across its fleet. Read : Eliminating toil with fully automated load testing
And to know how LinkedIn makes use of Real Time Monitoring (RUM) data to overcome the limitations of load testing, and help improve overall experience for end users. Read : Monitor and Improve Web Performance Using RUM Data Visualization
"},{"location":"level102/system_troubleshooting_and_performance/performance-improvements/#scaling","title":"Scaling","text":"System designed optimally can perform up to a certain limit only, based on availability of resources. Continuous optimization is always needed to ensure optimum use of resources at its peak. With increasing QPS, Systems need to scale up. We can either scale vertically or horizontally. Vertical scalability has its limits as one can increase cpu, memory, disk, GPU and other specifications to certain limit only, whereas horizontal scalability can grow easily and infinitely given limitations imposed by application design and environment attributes.
Scaling a web application will require some or all of the following -:
Here\u2019s a good read how LinkedIn scaled its application stack A Brief History of Scaling LinkedIn
"},{"location":"level102/system_troubleshooting_and_performance/troubleshooting-example/","title":"Troubleshooting Example","text":"In this section we will see an example of an issue and try to troubleshoot it, and at the end a few famous troubleshooting stories are shared, which were shared by LinkedIn engineers earlier.
"},{"location":"level102/system_troubleshooting_and_performance/troubleshooting-example/#example-memory-leak","title":"Example - Memory leak :","text":"Often memory leak issues go unnoticed until the service becomes unresponsive after running for some time (days, week or even month) until service is restarted or bug is fixed, In such cases, service memory usage will reflect in increasing order in the metric graph, something like this graph.
Memory leak is mismanagement of memory allocations by application, where unneeded memory is not released, over the period of time objects continue to pile up in memory resulting in service crash. Generally such non-released objects get sorted by garbage collector automatically, but sometimes due to a bug it fails. Debugging helps in figuring where much of the application storage memory is being applied. Then, you start tracking and filter everything based on usage. In case, you find objects that aren\u2019t in use, but are referenced, you can get rid of them by deleting them to avoid memory leaks. In the case of python applications, it comes with inbuilt features like tracemalloc. This module can help pinpoint where an object was allocated first. Almost every language comes with a set of tools/libraries (inbuilt or external) which helps find memory issues. Similarly for Java there is a famous memory leak detection tool called Java VisualVM.
Let\u2019s see how a dummy flask based web app with a memory leak bug, with every request its memory usage keeps increasing, and how we can use tracemalloc to capture the leak.
Assumption -: A python virtual environment is created, and flask is installed in it.
A bare minimum flask code with bug, read comments for more info
Starting flask app
On start, Its memory usage is around 26576 kb, i.e approx 26MB
Now with every subsequent GET request, We can notice that process memory usage continues to increase slowly.
Now lets try 10000 requests, to see if memory usage increases heavily. To hit a high number of requests, we use an Apache benchmarking tool called \u201cab\u201d. After 10000 hits, we can notice memory usage of flask app is jumped almost 15 times, i.e from initial 26576 KB to 419316 KB, i.e from roughly 26 MB to 419 MB, That\u2019s a huge jump for such a small webapp.
Lets try the python tracemalloc module to try to understand the application memory allocations. Tracemalloc takes memory snapshots at a particular point, performing various statistics on the same.
Adding a bare minimum code to our app.py file, no change in fetchuserdata.py file, it will allow us to capture tracemalloc snapshots whenever we will hit /capture uri.
After restart of app.py (flask run), we will - First hit http://127.0.0.1:5000/capture - Then hit http://127.0.0.1:5000/ 10000 times, for memory leak/s to take place. - Finally hit http://127.0.0.1:5000/capture again to take a snapshot to know which line has the most allocation.
In the final snapshot, we noticed the exact module and lineno where most allocation happened. I.e fetchuserdata.py, line no 6, after 10000 hits, it is holding 419 MB of memory.
Summary
Above example shows how a bug can lead to memory leak, and how we can use tracemalloc to understand where it is. In real world applications are way more complex than the above dummy example, you must understand that using tracemalloc might degrade application performance somebit, due to tracemalloc own overheads. Be mindful about its use in production environments.
If you are interested in digging deeper into Python Object Memory Allocation Internals and debugging memory leak, have a look at an Interesting talk by Sanket Patel in PyCon India 2019, Debug Memory Leak In Python Flask | Python Object Memory Allocation Internals
"},{"location":"level102/system_troubleshooting_and_performance/troubleshooting/","title":"Troubleshooting","text":"Troubleshooting system failures can be tricky or tedious at times. In this practice we need to examine the end-to-end flow of a service, all its downstreams, analysing logs, memory leak, CPU usage, disk IO, network failures, hosts issues, etc. Knowing certain practices and tools can help figure & mitigate failures faster. Here\u2019s the high level troubleshooting flowchart -:
"},{"location":"level102/system_troubleshooting_and_performance/troubleshooting/#troubleshooting-flowchart","title":"Troubleshooting Flowchart","text":""},{"location":"level102/system_troubleshooting_and_performance/troubleshooting/#general-practices","title":"General Practices","text":"Different systems require different approaches for finding issues. Scope of this is limited and given a problem, there can be many more points which can be looked into. Following points will look at some high level practices towards finding webapp failures and finding fixes for the same.
Reproduce problem
Gather Information
Understand the problem
Find a solution and apply a fix
Verify complete request flow
To Know if host health is fine or not, look for any hardware failures or its performance issues, one can try following -: