Go to file
Christian Ebner 5ba351bac7 verify: handle manifest update errors as non-fatal
Since commit 8ea00f6e ("allow to abort verify jobs") errors
propagated up to the verify jobs worker call side are interpreted as
job aborts.

The manifest update did not honor this, leading to the verify job
being aborted with the misleading log entry:
`verification failed - job aborted`

Instead, handle the manifest update error non-fatal just like any
other verification related error, log it including the error message
and continue verification with the next item.

Signed-off-by: Christian Ebner <c.ebner@proxmox.com>
2025-01-30 13:36:03 +01:00
.cargo cargo config: add debug=true 2024-06-25 14:21:58 +02:00
debian docs: add synopsis and basic docs for prune job configuration 2025-01-28 14:34:47 +01:00
docs man: verification: Fix config file name 2025-01-28 14:49:23 +01:00
etc add auto-mounting for removable datastores 2024-11-25 21:34:22 +01:00
examples cargo: drop direct http crate dependency, tree-wide namespace fix 2025-01-24 09:43:35 +01:00
pbs-buildcfg use new apt/apt-api-types crate 2024-07-08 15:28:59 +02:00
pbs-client pxar: extract: Follow overwrite_flags when opening file 2025-01-27 13:22:34 +01:00
pbs-config replace match statements with ? operator 2025-01-14 08:57:24 +01:00
pbs-datastore remove create & truncate when create_new is used 2025-01-27 11:53:23 +01:00
pbs-fuse-loop fuse-loop: remove lazy_static dependency 2024-08-14 12:08:01 +02:00
pbs-key-config move pbs_config::key_config to pbs-key-config 2022-12-12 14:19:52 +01:00
pbs-pxar-fuse clippy: elide more lifetimes 2024-12-02 11:34:05 +01:00
pbs-tape sg_pt_changer: remove needless call to as_bytes() 2025-01-14 08:57:08 +01:00
pbs-tools tools: remove unused dependencies 2024-08-14 12:13:50 +02:00
proxmox-backup-banner switch regular dependencies to workspace ones 2022-12-12 09:07:12 +01:00
proxmox-backup-client remove create & truncate when create_new is used 2025-01-27 11:53:23 +01:00
proxmox-file-restore file-restore: fix -blockdev regression with namespaces or encryption 2024-12-10 11:44:18 +01:00
proxmox-restore-daemon cargo: drop direct http crate dependency, tree-wide namespace fix 2025-01-24 09:43:35 +01:00
pxar-bin api types: replace PathPatterns with Vec<PathPattern> 2024-11-25 12:28:40 +01:00
src verify: handle manifest update errors as non-fatal 2025-01-30 13:36:03 +01:00
templates server: notifications: send tape notifications via notification system 2024-04-23 23:14:46 +02:00
tests client/server: use dedicated api type for all archive names 2024-11-22 13:47:05 +01:00
www ui: check that store is set before trying to select in GCJobView 2024-12-03 18:09:30 +01:00
zsh-completions zsh: fix completions 2021-09-03 10:29:48 +02:00
.gitignore gitignore: generally ignore generated systemd service files 2024-03-08 08:00:30 +01:00
Cargo.toml cargo: drop direct http crate dependency, tree-wide namespace fix 2025-01-24 09:43:35 +01:00
defines.mk docs: add datastore.cfg.5 man page 2021-02-10 11:05:02 +01:00
Makefile make: add deb-nostrip target 2024-06-28 13:52:52 +02:00
README.rst readme: clarify when one needs to adjust the rustup config 2024-12-16 13:54:59 +01:00
rustfmt.toml bump edition in rustfmt.toml 2022-10-13 15:01:11 +02:00
TODO.rst tape: add/use rust scsi changer implementation using libsgutil2 2021-01-25 13:14:07 +01:00

Build & Release Notes
*********************

``rustup`` Toolchain
====================

We normally want to build with the ``rustc`` Debian package (see below). If you
still want to use ``rustup`` for other reasons (e.g. to easily switch between
the official stable, beta, and nightly compilers), you should set the following
``rustup`` configuration to use the Debian-provided ``rustc`` compiler
by default:

    # rustup toolchain link system /usr
    # rustup default system


Versioning of proxmox helper crates
===================================

To use current git master code of the proxmox* helper crates, add::

   git = "git://git.proxmox.com/git/proxmox"

or::

   path = "../proxmox/proxmox"

to the proxmox dependency, and update the version to reflect the current,
pre-release version number (e.g., "0.1.1-dev.1" instead of "0.1.0").


Local cargo config
==================

This repository ships with a ``.cargo/config.toml`` that replaces the crates.io
registry with packaged crates located in ``/usr/share/cargo/registry``.

A similar config is also applied building with dh_cargo. Cargo.lock needs to be
deleted when switching between packaged crates and crates.io, since the
checksums are not compatible.

To reference new dependencies (or updated versions) that are not yet packaged,
the dependency needs to point directly to a path or git source (e.g., see
example for proxmox crate above).


Build
=====
on Debian 12 Bookworm

Setup:
  1. # echo 'deb http://download.proxmox.com/debian/devel/ bookworm main' | sudo tee /etc/apt/sources.list.d/proxmox-devel.list
  2. # sudo wget https://enterprise.proxmox.com/debian/proxmox-release-bookworm.gpg -O /etc/apt/trusted.gpg.d/proxmox-release-bookworm.gpg
  3. # sudo apt update
  4. # sudo apt install devscripts debcargo clang
  5. # git clone git://git.proxmox.com/git/proxmox-backup.git
  6. # cd proxmox-backup; sudo mk-build-deps -ir

Note: 2. may be skipped if you already added the PVE or PBS package repository

You are now able to build using the Makefile or cargo itself, e.g.::

  # make deb
  # # or for a non-package build
  # cargo build --all --release

Design Notes
************

Here are some random thought about the software design (unless I find a better place).


Large chunk sizes
=================

It is important to notice that large chunk sizes are crucial for performance.
We have a multi-user system, where different people can do different operations
on a datastore at the same time, and most operation involves reading a series
of chunks.

So what is the maximal theoretical speed we can get when reading a series of
chunks? Reading a chunk sequence need the following steps:

- seek to the first chunk's start location
- read the chunk data
- seek to the next chunk's start location
- read the chunk data
- ...

Lets use the following disk performance metrics:

:AST: Average Seek Time (second)
:MRS: Maximum sequential Read Speed (bytes/second)
:ACS: Average Chunk Size (bytes)

The maximum performance you can get is::

  MAX(ACS) = ACS /(AST + ACS/MRS)

Please note that chunk data is likely to be sequential arranged on disk, but
this it is sort of a best case assumption.

For a typical rotational disk, we assume the following values::

  AST: 10ms
  MRS: 170MB/s

  MAX(4MB)  = 115.37 MB/s
  MAX(1MB)  =  61.85 MB/s;
  MAX(64KB) =   6.02 MB/s;
  MAX(4KB)  =   0.39 MB/s;
  MAX(1KB)  =   0.10 MB/s;

Modern SSD are much faster, lets assume the following::

  max IOPS: 20000 => AST = 0.00005
  MRS: 500Mb/s

  MAX(4MB)  = 474 MB/s
  MAX(1MB)  = 465 MB/s;
  MAX(64KB) = 354 MB/s;
  MAX(4KB)  =  67 MB/s;
  MAX(1KB)  =  18 MB/s;


Also, the average chunk directly relates to the number of chunks produced by
a backup::

  CHUNK_COUNT = BACKUP_SIZE / ACS

Here are some staticics from my developer worstation::

  Disk Usage:       65 GB
  Directories:   58971
  Files:        726314
  Files < 64KB: 617541

As you see, there are really many small files. If we would do file
level deduplication, i.e. generate one chunk per file, we end up with
more than 700000 chunks.

Instead, our current algorithm only produce large chunks with an
average chunks size of 4MB. With above data, this produce about 15000
chunks (factor 50 less chunks).