JuiceFS is an open-source POSIX file system built on top of Redis and object storage (e.g. Amazon S3), designed and optimized for cloud native environment. By using the widely adopted Redis and S3 as the persistent storage, JuiceFS serves as a stateless middleware to enable many applications to share data easily.
The highlighted features are:
- Fully POSIX-compatible: JuiceFS is a fully POSIX-compatible file system. Existing applications can work with it without any change. See pjdfstest result below.
- Outstanding Performance: The latency can be as low as a few milliseconds and the throughput can be expanded to nearly unlimited. See benchmark result below.
- Cloud Native: By utilizing cloud object storage, you can scale storage and compute independently, a.k.a. disaggregated storage and compute architecture.
- Sharing: JuiceFS is a shared file storage that can be read and written by many clients.
- Global File Locks: JuiceFS supports both BSD locks (flock) and POSIX record locks (fcntl).
- Data Compression: By default JuiceFS uses LZ4 to compress all your data, you could also use Zstandard instead.
Architecture | Getting Started | Administration | POSIX Compatibility | Performance Benchmark | Supported Object Storage | Status | Roadmap | Reporting Issues | Contributing | Community | Usage Tracking | License | Credits | FAQ
JuiceFS relies on Redis to store file system metadata. Redis is a fast, open-source, in-memory key-value data store and very suitable for storing the metadata. All the data will store into object storage through JuiceFS client.
The storage format of one file in JuiceFS consists of three levels. The first level called "Chunk". Each chunk has fixed size, currently it is 64MiB and cannot be changed. The second level called "Slice". The slice size is variable. A chunk may have multiple slices. The third level called "Block". Like chunk, its size is fixed. By default one block is 4MiB and you could modify it when formatting a volume (see following section). At last, the block will be compressed and encrypted (optional) store into object storage.
You can download precompiled binaries from releases page.
Building from source
You need first installing Go 1.13+, then run following commands:
$ git clone https://github.com/juicedata/juicefs.git $ cd juicefs $ make
A Redis server (>= 2.2) is needed for metadata, please follow Redis Quick Start.
macFUSE is also needed for macOS.
The last one you need is object storage. There are many options for object storage, local disk is the easiest one to get started.
Format a volume
Assume you have a Redis server running locally, we can create a volume called
test using it to store metadata:
$ ./juicefs format localhost test
It will create a volume with default settings. If there Redis server is not running locally, the address could be specified using URL, for example,
redis://user:password@host:6379/1, the password can also be specified by environment variable
REDIS_PASSWORD to hide it from command line options.
As JuiceFS relies on object storage to store data, you can specify a object storage using
--secret-key. By default, it uses a local directory to serve as an object store, for all the options, please see
./juicefs format -h.
For the details about how to setup different object storage, please read the guide.
Mount a volume
Once a volume is formatted, you can mount it to a directory, which is called mount point.
$ ./juicefs mount -d localhost ~/jfs
After that you can access the volume just like a local directory.
To get all options, just run
./juicefs mount -h.
If you wanna mount JuiceFS automatically at boot, please read the guide.
There is a command reference to see all options of the subcommand.
There is a Kubernetes CSI driver to use JuiceFS in Kubernetes easily.
Hadoop Java SDK
If you wanna use JuiceFS in Hadoop, check Hadoop Java SDK.
JuiceFS passed all of the 8813 tests in latest pjdfstest.
All tests successful. Test Summary Report ------------------- /root/soft/pjdfstest/tests/chown/00.t (Wstat: 0 Tests: 1323 Failed: 0) TODO passed: 693, 697, 708-709, 714-715, 729, 733 Files=235, Tests=8813, 233 wallclock secs ( 2.77 usr 0.38 sys + 2.57 cusr 3.93 csys = 9.65 CPU) Result: PASS
Besides the things covered by pjdfstest, JuiceFS provides:
- Close-to-open consistency. Once a file is closed, the following open and read can see the data written before close. Within same mount point, read can see all data written before it.
- Rename and all other metadata operations are atomic guaranteed by Redis transaction.
- Open files remain accessible after unlink from same mount point.
- Mmap is supported (tested with FSx).
- Fallocate with punch hole support.
- Extended attributes (xattr).
- BSD locks (flock).
- POSIX record locks (fcntl).
It shows JuiceFS can provide 10X more throughput than the other two, read more details.
It shows JuiceFS can provide significantly more metadata IOPS than the other two, read more details.
There is a virtual file called
.accesslog in the root of JuiceFS to show all the operations and the time they takes, for example:
$ cat /jfs/.accesslog 2021.01.15 08:26:11.003330 [uid:0,gid:0,pid:4403] write (17669,8666,4993160): OK <0.000010> 2021.01.15 08:26:11.003473 [uid:0,gid:0,pid:4403] write (17675,198,997439): OK <0.000014> 2021.01.15 08:26:11.003616 [uid:0,gid:0,pid:4403] write (17666,390,951582): OK <0.000006>
The last number on each line is the time (in seconds) current operation takes. We can use this to debug and analyze performance issues. We will provide more tools to analyze it.
Supported Object Storage
- Amazon S3
- Google Cloud Storage
- Azure Blob Storage
- Alibaba Cloud Object Storage Service (OSS)
- Tencent Cloud Object Storage (COS)
- QingStor Object Storage
- Ceph RGW
- Local disk
For the detailed list, see this document.
It's considered as beta quality, the storage format is not stabilized yet. It's not recommended to deploy it into production environment. Please test it with your use cases and give us feedback.
- Stabilize storage format
- S3 gateway
- Windows client
- Encryption at rest
- Other databases for metadata
Thank you for your contribution! Please refer to the CONTRIBUTING.md for more information.
JuiceFS by default collects anonymous usage data. It only collects core metrics (e.g. version number), no user or any sensitive data will be collected. You could review related code here.
These data help us understand how the community is using this project. You could disable reporting easily by command line option
$ ./juicefs mount --no-usage-report
JuiceFS is open-sourced under GNU AGPL v3.0, see LICENSE.
Why doesn't JuiceFS support XXX object storage?
JuiceFS already supported many object storage, please check the list first. If this object storage is compatible with S3, you could treat it as S3. Otherwise, try reporting issue.
Can I use Redis cluster?
The simple answer is no. JuiceFS uses transaction to guarantee the atomicity of metadata operations, which is not well supported in cluster mode. Sentinal or other HA solution for Redis are needed.