netcdf-c/docs/nczarr.md
Dennis Heimbigner f6e25b695e Fix additional S3 support issues
re: https://github.com/Unidata/netcdf-c/issues/2117
re: https://github.com/Unidata/netcdf-c/issues/2119

* Modify libsrc to allow byte-range reading of netcdf-3 files in private S3 buckets; this required using the aws sdk. Also add a test case.
* The aws sdk can sometimes cause problems if the Awd::ShutdownAPI function is not called. So at optional atexit() support to ensure it is called. This is disabled for Windows.
* Add documentation to nczarr.md on how to build and use the aws sdk under windows. Currently it builds, but testing fails.
* Switch testing from stratus to the Unidata bucket on S3.
* Improve support for the s3: url protocol.
* Add a s3 specific utility code file: ds3util.c
* Modify NC_infermodel to attempt to read the magic number of byte-ranged files in S3.

## Misc.

* Move and rename the core S3 SDK wrapper code (libnczarr/zs3sdk.cpp) to libdispatch since it now used in libsrc as well as libnczarr.
* Add calls to nc_finalize in the utilities in case atexit is disabled.
* Add header only json parser to the distribution rather than as a built source.
2021-10-29 20:06:37 -06:00

36 KiB

The NetCDF NCZarr Implementation

The NetCDF NCZarr Implementation

\tableofcontents

NCZarr Introduction

Beginning with netCDF version 4.8.0, the Unidata NetCDF group has extended the netcdf-c library to provide access to cloud storage (e.g. Amazon S3 [1] ). This extension provides a mapping from a subset of the full netCDF Enhanced (aka netCDF-4) data model to a variant of the Zarr [4] data model. The NetCDF version of this storage format is called NCZarr [4].

A note on terminology in this document.

  1. The term "dataset" is used to refer to all of the Zarr objects constituting the meta-data and data.

There are some important "caveats" of which to be aware when using this software.

  1. NCZarr currently is not thread-safe. So any attempt to use it with parallelism, including MPIO, is likely to fail.

The NCZarr Data Model

NCZarr uses a data model [4] that, by design, extends the Zarr Version 2 Specification [6] to add support for the NetCDF-4 data model.

Note Carefully: a legal NCZarr dataset is also a legal Zarr dataset under a specific assumption. This assumption is that within Zarr meta-data objects, like ''.zarray'', unrecognized dictionary keys are ignored. If this assumption is true of an implementation, then the NCZarr dataset is a legal Zarr dataset and should be readable by that Zarr implementation. The inverse is true also. A legal Zarr dataset is also a legal NCZarr dataset, where "legal" means it conforms to the Zarr version 2 specification. In addition, certain non-Zarr features are allowed and used. Specifically the XArray ''_ARRAY_DIMENSIONS'' attribute is one such.

There are two other, secondary assumption:

  1. The actual storage format in which the dataset is stored -- a zip file, for example -- can be read by the Zarr implementation.
  2. The filters used by the dataset can be encoded/decoded by the implementation.

Briefly, the data model supported by NCZarr is netcdf-4 minus the user-defined types and the String type. As with netcdf-4 chunking is supported. Filters and compression are supported, but the companion document on filters should be consulted for the details.

Specifically, the model supports the following.

  • "Atomic" types: char, byte, ubyte, short, ushort, int, uint, int64, uint64.
  • Shared (named) dimensions
  • Attributes with specified types -- both global and per-variable
  • Chunking
  • Fill values
  • Groups
  • N-Dimensional variables
  • Per-variable endianness (big or little)
  • Filters (including compression)

With respect to full netCDF-4, the following concepts are currently unsupported.

  • String type
  • User-defined types (enum, opaque, VLEN, and Compound)
  • Unlimited dimensions
  • Contiguous or compact storage

Note that contiguous and compact are not actually supported because they are HDF5 specific. When specified, they are treated as chunked where the file consists of only one chunk. This means that testing for contiguous or compact is not possible; the nc_inq_var_chunking function will always return NC_CHUNKED and the chunksizes will be the same as the dimension sizes of the variable's dimensions.

Enabling NCZarr Support

NCZarr support is enabled by default. If the --disable-nczarr option is used with './configure', then NCZarr (and Zarr) support is disabled. If NCZarr support is enabled, then support for datasets stored as files in a directory tree is provided as the only guaranteed mechanism for storing datasets. However, several addition storage mechanisms are available if additional libraries are installed.

  1. Zip format -- if libzip is installed, then it is possible to directly read and write datasets stored in zip files.
  2. If the AWS C++ SDK is installed, and libcurl is installed, then it is possible to directly read and write datasets stored in the Amazon S3 cloud storage.

Accessing Data Using the NCZarr Prototocol

In order to access a NCZarr data source through the netCDF API, the file name normally used is replaced with a URL with a specific format. Note specifically that there is no NC_NCZARR flag for the mode argument of nc_create or nc_open. In this case, it is indicated by the URL path.

URL Format

The URL is the usual format.

scheme:://host:port/path?query#fragment format

There are some details that are important.

  • Scheme: this should be https or s3,or file. The s3 scheme is equivalent to "https" plus setting "mode=nczarr,s3" (see below). Specifying "file" is mostly used for testing, but is used to support directory tree or zipfile format storage.
  • Host: Amazon S3 defines three forms: Virtual, Path, and S3
    • Virtual: the host includes the bucket name as in bucket.s3.<region>.amazonaws.com
    • Path: the host does not include the bucket name, but rather the bucket name is the first segment of the path. For example s3.<region>.amazonaws.com/bucket
    • S3: the protocol is "s3:" and if the host is a single name, then it is interpreted as the bucket. The region is determined using the algorithm in Appendix E.
    • Other: It is possible to use other non-Amazon cloud storage, but that is cloud library dependent.
  • Query: currently not used.
  • Fragment: the fragment is of the form key=value&key=value&.... Depending on the key, the value part may be left out and some default value will be used.

Client Parameters

The fragment part of a URL is used to specify information that is interpreted to specify what data format is to be used, as well as additional controls for that data format. For NCZarr support, the following key=value pairs are allowed.

  • mode=nczarr|zarr|noxarray|file|zip|s3

Typically one will specify two mode flags: one to indicate what format to use and one to specify the way the dataset is to be stored. For example, a common one is "mode=zarr,file"

Using mode=nczarr causes the URL to be interpreted as a reference to a dataset that is stored in NCZarr format. The zarr mode tells the library to use NCZarr, but to restrict its operation to operate on pure Zarr Version 2 datasets.

The modes s3, file, and zip tell the library what storage driver to use.

  • The s3 driver is the default and indicates using Amazon S3 or some equivalent.
  • The file format stores data in a directory tree.
  • The zip format stores data in a local zip file.

Note that It should be the case that zipping a file format directory tree will produce a file readable by the zip storage format, and vice-versa.

By default, mode=zarr also supports the XArray _ARRAY_DIMENSIONS convention. The noxarray mode tells the library to disable the XArray support.

The netcdf-c library is capable of inferring additional mode flags based on the flags it finds. Currently we have the following inferences.

  • xarray => zarr
  • noxarray => zarr
  • zarr => nczarr

So for example: ...#mode=noxarray,zip is equivalent to this.

NCZarr Map Implementation

Internally, the nczarr implementation has a map abstraction that allows different storage formats to be used. This is closely patterned on the same approach used in the Python Zarr implementation, which relies on the Python MutableMap [5] class.

In NCZarr, the corresponding type is called zmap. The zmap API essentially implements a simplified variant of the Amazon S3 API.

As with Amazon S3, keys are utf8 strings with a specific structure: that of a path similar to those of a Unix path with '/' as the separator for the segments of the path.

As with Unix, all keys have this BNF syntax:

key: '/' | keypath ;
keypath: '/' segment | keypath '/' segment ;
segment: <sequence of UTF-8 characters except control characters and '/'>

Obviously, one can infer a tree structure from this key structure. A containment relationship is defined by key prefixes. Thus one key is "contained" (possibly transitively) by another if one key is a prefix (in the string sense) of the other. So in this sense the key "/x/y/z" is contained by the key "/x/y".

In this model all keys "exist" but only some keys refer to objects containing content -- aka content bearing. An important restriction is placed on the structure of the tree, namely that keys are only defined for content-bearing objects. Further, all the leaves of the tree are these content-bearing objects. This means that the key for one content-bearing object should not be a prefix of any other key.

There several other concepts of note.

  1. Dataset - a dataset is the complete tree contained by the key defining the root of the dataset. Technically, the root of the tree is the key /.zgroup, where .zgroup can be considered the superblock of the dataset.
  2. Object - equivalent of the S3 object; Each object has a unique key and "contains" data in the form of an arbitrary sequence of 8-bit bytes.

The zmap API defined here isolates the key-value pair mapping code from the Zarr-based implementation of NetCDF-4. It wraps an internal C dispatch table manager for implementing an abstract data structure implementing the zmap key/object model. Of special note is the "search" function of the API.

Search: The search function has two purposes:

  1. Support reading of pure zarr datasets (because they do not explicitly track their contents).
  2. Debugging to allow raw examination of the storage. See zdump for example.

The search function takes a prefix path which has a key syntax (see above). The set of legal keys is the set of keys such that the key references a content-bearing object -- e.g. /x/y/.zarray or /.zgroup. Essentially this is the set of keys pointing to the leaf objects of the tree of keys constituting a dataset. This set potentially limits the set of keys that need to be examined during search.

The search function returns a limited set of names, where the set of names are immediate suffixes of a given prefix path. That is, if <prefix> is the prefix path, then search returnsnall <name> such that <prefix>/<name> is itself a prefix of a "legal" key. This can be used to implement glob style searches such as "/x/y/*" or "/x/y/**"

This semantics was chosen because it appears to be the minimum required to implement all other kinds of search using recursion. It was also chosen to limit the number of names returned from the search. Specifically

  1. Avoid returning keys that are not a prefix of some legal key.
  2. Avoid returning all the legal keys in the dataset because that set may be very large; although the implementation may still have to examine all legal keys to get the desired subset.
  3. Allow for use of partial read mechanisms such as iterators, if available. This can support processing a limited set of keys for each iteration. This is a straighforward tradeoff of space over time.

As a side note, S3 supports this kind of search using common prefixes with a delimiter of '/', although its use is a bit tricky. For the file system zmap implementation, the legal search keys can be obtained one level at a time, which directly implements the search semantics. For the zip file implementation, this semantics is not possible, so the whole tree must be obtained and searched.

Issues:

  1. S3 limits key lengths to 1024 bytes. Some deeply nested netcdf files will almost certainly exceed this limit.
  2. Besides content, S3 objects can have an associated small set of what may be called tags, which are themselves of the form of key-value pairs, but where the key and value are always text. As far as it is possible to determine, Zarr never uses these tags, so they are not included in the zmap data structure.

A Note on Error Codes:

The zmap API returns some distinguished error code:

  1. NC_NOERR if a operation succeeded
  2. NC_EEMPTY is returned when accessing a key that has no content.
  3. NC_EOBJECT is returned when an object is found which should not exist
  4. NC_ENOOBJECT is returned when an object is not found which should exist

This does not preclude other errors being returned such NC_EACCESS or NC_EPERM or NC_EINVAL if there are permission errors or illegal function arguments, for example. It also does not preclude the use of other error codes internal to the zmap implementation. So zmap_file, for example, uses NC_ENOTFOUND internally because it is possible to detect the existence of directories and files. But this does not propagate outside the zmap_file implementation.

Zmap Implementatons

The primary zmap implementation is s3 (i.e. mode=nczarr,s3) and indicates that the Amazon S3 cloud storage -- or some related applicance -- is to be used. Another storage format uses a file system tree of directories and files (mode=nczarr,file). A third storage format uses a zip file (mode=nczarr,zip). The latter two are used mostly for debugging and testing. However, the file and zip formats are important because they are intended to match corresponding storage formats used by the Python Zarr implementation. Hence it should serve to provide interoperability between NCZarr and the Python Zarr, although this interoperability has not been tested.

Examples of the typical URL form for file and zip are as follows.

file:///xxx/yyy/testdata.file#mode=nczarr,file
file:///xxx/yyy/testdata.zip#mode=nczarr,zip

Note that the extension (e.g. ".file" in "testdata.file") is arbitraty, so this would be equally acceptable.

file:///xxx/yyy/testdata.anyext#mode=nczarr,file

As with other URLS (e.g. DAP), these kind of URLS can be passed as the path argument to, for example, ncdump.

NCZarr versus Pure Zarr.

The NCZARR format extends the pure Zarr format by adding extra keys such as ''_NCZARR_ARRAY'' inside the ''.zarray'' object. It is possible to suppress the use of these extensions so that the netcdf library can read and write a pure zarr formatted file. This is controlled by using ''mode=zarr'', which is an alias for the ''mode=nczarr,zarr'' combination. The primary effects of using pure zarr are described in the [Translation Section](@ref nczarr_translation).

There are some constraints on the reading of Zarr datasets using the NCZarr implementation.

  1. Zarr allows some primitive types not recognized by NCZarr. Over time, the set of unrecognized types is expected to diminish. Examples of currently unsupported types are as follows:
  • "c" -- complex floating point
  • "m" -- timedelta
  • "M" -- datetime
  1. The Zarr dataset may reference filters and compressors unrecognized by NCZarr.
  2. The Zarr dataset may store data in column-major order instead of row-major order. The effect of encountering such a dataset is to output the data in the wrong order.

Again, this list should diminish over time.

Notes on Debugging NCZarr Access

The NCZarr support has a trace facility. Enabling this can sometimes give important, but voluminous information. Tracing can be enabled by setting the environment variable NCTRACING=n, where n indicates the level of tracing. A good value of n is 9.

Zip File Support

In order to use the zip storage format, the libzip [3] library must be installed. Note that this is different from zlib.

Amazon S3 Storage

The Amazon AWS S3 storage driver currently uses the Amazon AWS S3 Software Development Kit for C++ (aws-s3-sdk-cpp). In order to use it, the client must provide some configuration information. Specifically, the ''~/.aws/config'' file should contain something like this.

[default]
output = json
aws_access_key_id=XXXX...
aws_secret_access_key=YYYY...

See Appendix E for additional information.

Addressing Style

The notion of "addressing style" may need some expansion. Amazon S3 accepts two forms for specifying the endpoint for accessing the data.

  1. Virtual -- the virtual addressing style places the bucket in the host part of a URL. For example:
https://<bucketname>.s2.<region>.amazonaws.com/
  1. Path -- the path addressing style places the bucket in at the front of the path part of a URL. For example:
https://s2.<region>.amazonaws.com/<bucketname>/

The NCZarr code will accept either form, although internally, it is standardized on path style. The reason for this is that the bucket name forms the initial segment in the keys.

Zarr vs NCZarr

Data Model

The NCZarr storage format is almost identical to that of the the standard Zarr version 2 format. The data model differs as follows.

  1. Zarr only supports anonymous dimensions -- NCZarr supports only shared (named) dimensions.
  2. Zarr attributes are untyped -- or perhaps more correctly characterized as of type string.

Storage Format

Consider both NCZarr and Zarr, and assume S3 notions of bucket and object. In both systems, Groups and Variables (Array in Zarr) map to S3 objects. Containment is modeled using the fact that the dataset's key is a prefix of the variable's key. So for example, if variable v1 is contained in top level group g1 -- _/g1 -- then the key for v1 is /g1/v. Additional meta-data information is stored in special objects whose name start with ".z".

In Zarr, the following special objects exist.

  1. Information about a group is kept in a special object named .zgroup; so for example the object /g1/.zgroup.
  2. Information about an array is kept as a special object named .zarray; so for example the object /g1/v1/.zarray.
  3. Group-level attributes and variable-level attributes are stored in a special object named .zattr; so for example the objects /g1/.zattr and /g1/v1/.zattr.
  4. Chunk data is stored in objects named "<n1>.<n2>...,<nr>" where the ni are positive integers representing the chunk index for the ith dimension.

The first three contain meta-data objects in the form of a string representing a JSON-formatted dictionary. The NCZarr format uses the same objects as Zarr, but inserts NCZarr specific key-value pairs in them to hold NCZarr specific information The value of each of these keys is a JSON dictionary containing a variety of NCZarr specific information.

These keys are as follows:

_NCZARR_SUPERBLOCK_ -- this is in the top level group -- key /.zarr. It is in effect the "superblock" for the dataset and contains any netcdf specific dataset level information. It is also used to verify that a given key is the root of a dataset. Currently it contains the following key(s):

  • "version" -- the NCZarr version defining the format of the dataset.

_NCZARR_GROUP_ -- this key appears in every .zgroup object. It contains any netcdf specific group information. Specifically it contains the following keys:

  • "dims" -- the name and size of shared dimensions defined in this group.
  • "vars" -- the name of variables defined in this group.
  • "groups" -- the name of sub-groups defined in this group. These lists allow walking the NCZarr dataset without having to use the potentially costly search operation.

_NCZARR_ARRAY_ -- this key appears in every .zarray object. It contains netcdf specific array information. Specifically it contains the following keys:

  • dimrefs -- the names of the shared dimensions referenced by the variable.
  • storage -- indicates if the variable is chunked vs contiguous in the netcdf sense.

_NCZARR_ATTR_ -- this key appears in every .zattr object. This means that technically, it is attribute, but one for which access is normally surpressed . Specifically it contains the following keys:

  • types -- the types of all of the other attributes in the .zattr object.

Translation

With some constraints, it is possible for an nczarr library to read Zarr and for a zarr library to read the nczarr format. The latter case, zarr reading nczarr is possible if the zarr library is willing to ignore keys whose name it does not recognize; specifically anything beginning with _NCZARR_.

The former case, nczarr reading zarr is also possible if the nczarr can simulate or infer the contents of the missing _NCZARR_XXX objects. As a rule this can be done as follows.

  1. _NCZARR_GROUP_ -- The list of contained variables and sub-groups can be computed using the search API to list the keys "contained" in the key for a group. The search looks for occurrences of .zgroup, .zattr, .zarray to infer the keys for the contained groups, attribute sets, and arrays (variables). Constructing the set of "shared dimensions" is carried out by walking all the variables in the whole dataset and collecting the set of unique integer shapes for the variables. For each such dimension length, a top level dimension is created named ".zdim_" where len is the integer length.
  2. _NCZARR_ARRAY_ -- The dimrefs are inferred by using the shape in .zarray and creating references to the simulated shared dimension. netcdf specific information.
  3. _NCZARR_ATTR_ -- The type of each attribute is inferred by trying to parse the first attribute value string.

Compatibility

In order to accomodate existing implementations, certain mode tags are provided to tell the NCZarr code to look for information used by specific implementations.

XArray

The Xarray [7] Zarr implementation uses its own mechanism for specifying shared dimensions. It uses a special attribute named ''_ARRAY_DIMENSIONS''. The value of this attribute is a list of dimension names (strings). An example might be ["time", "lon", "lat"]. It is essentially equivalent to the _NCZARR_ARRAY "dimrefs" list, except that the latter uses fully qualified names so the referenced dimensions can be anywhere in the dataset.

As of netcdf-c version 4.8.1, The Xarray ''_ARRAY_DIMENSIONS'' attribute is supported. This attribute will be read/written by default, but can be suppressed if the mode value "noxarray" is specified. If detected, then these dimension names are used to define shared dimensions. Note that "noxarray" or "xarray" implies pure zarr format.

Examples

Here are a couple of examples using the ncgen and ncdump utilities.

  1. Create an nczarr file using a local directory tree as storage.
    ncgen -4 -lb -o "file:///home/user/dataset.file#mode=nczarr,file" dataset.cdl
    
  2. Display the content of an nczarr file using a zip file as storage.
    ncdump "file:///home/user/dataset.zip#mode=nczarr,zip"
    
  3. Create an nczarr file using S3 as storage.
    ncgen -4 -lb -o "s3://s3.us-west-1.amazonaws.com/datasetbucket" dataset.cdl
    
  4. Create an nczarr file using S3 as storage and keeping to the pure zarr format.
    ncgen -4 -lb -o "s3://s3.uswest-1.amazonaws.com/datasetbucket#mode=zarr" dataset.cdl
    
  5. Create an nczarr file using the s3 protocol with a specific profile
    ncgen -4 -lb -o "s3://datasetbucket/rootkey#mode=nczarr,awsprofile=unidata" dataset.cdl
    
    Note that the URLis internally translated to this
    https://s2.<region>.amazonaws.com/datasetbucket/rootkey#mode=nczarr,awsprofile=unidata" dataset.cdl
    
    The region is from the algorithm described in Appendix E1.

References

[1] Amazon Simple Storage Service Documentation
[2] Amazon Simple Storage Service Library
[3] The LibZip Library
[4] NetCDF ZARR Data Model Specification
[5] Python Documentation: 8.3. collections — High-performance dataset datatypes
[6] Zarr Version 2 Specification
[7] XArray Zarr Encoding Specification
[8] Dynamic Filter Loading
[9] Officially Registered Custom HDF5 Filters
[10] C-Blosc Compressor Implementation [11] [Conda-forge / packages / aws-sdk-cpp] (https://anaconda.org/conda-forge/aws-sdk-cpp)

Appendix A. Building NCZarr Support

Currently the following build cases are known to work.

Operating SystemBuild SystemNCZarrS3 Support
Linux Automake yes yes
Linux CMake yes yes
Cygwin Automake yes no
OSX Automake unknown unknown
OSX CMake unknown unknown
Visual Studio CMake yes tests fail

Note: S3 support includes both compiling the S3 support code as well as running the S3 tests.

Automake

There are several options relevant to NCZarr support and to Amazon S3 support. These are as follows.

  1. --disable-nczarr -- disable the NCZarr support. If disabled, then all of the following options are disabled or irrelevant.
  2. --enable-nczarr-s3 -- Enable NCZarr S3 support.
  3. --enable-nczarr-s3-tests -- the NCZarr S3 tests are currently only usable by Unidata personnel, so they are disabled by default.

A note about using S3 with Automake. If S3 support is desired, and using Automake, then LDFLAGS must be properly set, namely to this.

LDFLAGS="$LDFLAGS -L/usr/local/lib -laws-cpp-sdk-s3"

The above assumes that these libraries were installed in '/usr/local/lib', so the above requires modification if they were installed elsewhere.

Note also that if S3 support is enabled, then you need to have a C++ compiler installed because part of the S3 support code is written in C++.

CMake

The necessary CMake flags are as follows (with defaults)

-DENABLE_NCZARR=off -- equivalent to the Automake --disable-nczarr option. 2. -DENABLE_NCZARR_S3=off -- equivalent to the Automake --enable-nczarr-s3 option. 3. -DENABLE_NCZARR_S3_TESTS=off -- equivalent to the Automake --enable-nczarr-s3-tests option.

Note that unlike Automake, CMake can properly locate C++ libraries, so it should not be necessary to specify -laws-cpp-sdk-s3 assuming that the aws s3 libraries are installed in the default location. For CMake with Visual Studio, the default location is here:

C:/Program Files (x86)/aws-cpp-sdk-all

It is possible to install the sdk library in another location. In this case, one must add the following flag to the cmake command.

cmake ... -DAWSSDK_DIR=\<awssdkdir\>

where "awssdkdir" is the path to the sdk installation. For example, this might be as follows.

cmake ... -DAWSSDK_DIR="c:\tools\aws-cpp-sdk-all"

This can be useful if blanks in path names cause problems in your build environment.

Testing S3 Support

The relevant tests for S3 support are in the nczarr_test directory. Currently, by default, testing of S3 with NCZarr is supported only for Unidata members of the NetCDF Development Group. This is because it uses a Unidata-specific bucket is inaccessible to the general user.

Appendix B. Building aws-sdk-cpp

In order to use the S3 storage driver, it is necessary to install the Amazon aws-sdk-cpp library.

Building this package from scratch has proven to be a formidable task. This appears to be due to dependencies on very specific versions of, for example, openssl.

nix Build

For linux, the following context works. Of course your mileage may vary.

  • OS: ubuntu 21
  • aws-sdk-cpp version 1.9.96 (or later?)
  • Required installed libraries: openssl, libcurl, cmake, ninja (ninja-build in apt)

AWS-SDK-CPP Build Recipe

git clone --recurse-submodules https://www.github.com/aws/aws-sdk-cpp
pushd aws-sdk-cpp
mkdir build
cd build
PREFIX=/usr/local
FLAGS="-DCMAKE_INSTALL_PREFIX=${PREFIX} \
       -DCMAKE_INSTALL_LIBDIR=lib \
       -DCMAKE_MODULE_PATH=${PREFIX}/lib/cmake \
       -DCMAKE_POLICY_DEFAULT_CMP0075=NEW \
       -DBUILD_ONLY=s3 \
       -DENABLE_UNITY_BUILD=ON \
       -DENABLE_TESTING=OFF \
       -DCMAKE_BUILD_TYPE=$CFG \
       -DSIMPLE_INSTALL=ON"
cmake -GNinja $FLAGS ..
ninja all
ninja install
cd ..
popd

NetCDF Build

In order to build netcdf-c with S3 sdk support, the following options must be specified for ./configure.

--enable-nczarr-s3

If you have access to the Unidata bucket on Amazon, then you can also test S3 support with this option.

--enable-nczarr-s3-tests

Windows build

It is possible to build and install aws-sdk-cpp. It is also possible to build netcdf-c using cmake. Unfortunately, testing currently fails.

For Windows, the following context work. Of course your mileage may vary.

  • OS: Windows 10 64-bit with Visual Studio community edition 2019.
  • aws-sdk-cpp version 1.9.96 (or later?)
  • Required installed libraries: openssl, libcurl, cmake

AWS-SDK-CPP Build Recipe

This command-line build assumes one is using Cygwin or Mingw to provide tools such as bash.

git clone --recurse-submodules https://www.github.com/aws/aws-sdk-cpp
pushd aws-sdk-cpp
mkdir build
cd build
CFG="Release"
PREFIX="c:/tools/aws-sdk-cpp"

FLAGS="-DCMAKE_INSTALL_PREFIX=${PREFIX} \
       -DCMAKE_INSTALL_LIBDIR=lib" \
       -DCMAKE_MODULE_PATH=${PREFIX}/cmake \
       -DCMAKE_POLICY_DEFAULT_CMP0075=NEW \
       -DBUILD_ONLY=s3 \
       -DENABLE_UNITY_BUILD=ON \
       -DCMAKE_BUILD_TYPE=$CFG \
       -DSIMPLE_INSTALL=ON"

rm -fr build
mkdir -p build
cd build
cmake -DCMAKE_BUILD_TYPE=${CFG} $FLAGS ..
cmake --build . --config ${CFG}
cmake --install . --config ${CFG}
cd ..
popd

Notice that the sdk is being installed in the directory "c:\tools\aws-sdk-cpp" rather than the default location "c:\Program Files (x86)/aws-sdk-cpp-all" This is because when using a command line, an install path that contains blanks may not work.

NetCDF CMake Build

Enabling S3 support is controlled by these two cmake options:

-DENABLE_NCZARR_S3=ON
-DENABLE_NCZARR_S3_TESTS=OFF

However, to find the aws sdk libraries, the following environment variables must be set:

AWSSDK_ROOT_DIR="c:/tools/aws-sdk-cpp"
AWSSDKBIN="/cygdrive/c/tools/aws-sdk-cpp/bin"
PATH="$PATH:${AWSSDKBIN}"

Then the following options must be specified for cmake.

-DAWSSDK_ROOT_DIR=${AWSSDK_ROOT_DIR}
-DAWSSDK_DIR=${AWSSDK_ROOT_DIR}/lib/cmake/AWSSDK"

Appendix C. Amazon S3 Imposed Limits

The Amazon S3 cloud storage imposes some significant limits that are inherited by NCZarr (and Zarr also, for that matter).

Some of the relevant limits are as follows:

  1. The maximum object size is 5 Gigabytes with a total for all objects limited to 5 Terabytes.
  2. S3 key names can be any UNICODE name with a maximum length of 1024 bytes. Note that the limit is defined in terms of bytes and not (Unicode) characters. This affects the depth to which groups can be nested because the key encodes the full path name of a group.

Appendix D. Alternative Mechanisms for Accessing Remote Datasets

The NetCDF-C library contains an alternate mechanism for accessing traditional netcdf-4 files stored in Amazon S3: The byte-range mechanism. The idea is to treat the remote data as if it was a big file. This remote "file" can be randomly accessed using the HTTP Byte-Range header.

In the Amazon S3 context, a copy of a dataset, a netcdf-3 or netdf-4 file, is uploaded into a single object in some bucket. Then using the key to this object, it is possible to tell the netcdf-c library to treat the object as a remote file and to use the HTTP Byte-Range protocol to access the contents of the object. The dataset object is referenced using a URL with the trailing fragment containing the string #mode=bytes.

An examination of the test program nc_test/test_byterange.sh shows simple examples using the ncdump program. One such test is specified as follows:

https://s3.us-east-1.amazonaws.com/noaa-goes16/ABI-L1b-RadC/2017/059/03/OR_ABI-L1b-RadC-M3C13_G16_s20170590337505_e20170590340289_c20170590340316.nc#mode=bytes

Note that for S3 access, it is expected that the URL is in what is called "path" format where the bucket, noaa-goes16 in this case, is part of the URL path instead of the host.

The #mode=bytes mechanism generalizes to work with most servers that support byte-range access.

Specifically, Thredds servers support such access using the HttpServer access method as can be seen from this URL taken from the above test program.

https://thredds-test.unidata.ucar.edu/thredds/fileServer/irma/metar/files/METAR_20170910_0000.nc#bytes

Appendix E. AWS Selection Algorithms.

If byterange support is enabled, the netcdf-c library will parse the files

${HOME}/.aws/config
and
${HOME}/.aws/credentials

to extract profile names plus a list of key=value pairs. This example is typical.

[default]
    aws_access_key_id=XXXXXXXXXXXXXXXXXXXX
    aws_secret_access_key=YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY
    aws_region=ZZZZZZZZZ

The keys in the profile will be used to set various parameters in the library

Profile Selection

The algorithm for choosing the active profile to use is as follows:

  1. If the "aws.profile" fragment flag is defined in the URL, then it is used. For example, see this URL.
https://...#mode=nczarr,s3&aws.profile=xxx
  1. If the "AWS.PROFILE" entry in the .rc file (i.e. .netrc or .dodsrc) is set, then it is used.
  2. Otherwise the profile "default" is used.

The profile named "none" is a special profile that the netcdf-c library automatically defines. It should not be defined anywhere else. It signals to the library that no credentialas are to used. It is equivalent to the "--no-sign-request" option in the AWS CLI. Also, it must be explicitly specified by name. Otherwise "default" will be used.

Region Selection

If the specified URL is of the form

s3://<bucket>/key

Then this is rebuilt to this form:

s3://s2.<region>.amazonaws.com>/key

However this requires figuring out the region to use. The algorithm for picking an region is as follows.

  1. If the "aws.region" fragment flag is defined in the URL, then it is used.
  2. The active profile is searched for the "aws_region" key.
  3. If the "AWS.REGION" entry in the .rc file (i.e. .netrc or .dodsrc) is set, then it is used.
  4. Otherwise use "us-east-1" region.

Authorization Selection

Picking an access-key/secret-key pair is always determined by the current active profile. To choose to not use keys requires that the active profile must be "none".

Appendix F. NCZarr Version 1 Meta-Data Representation

In NCZarr Version 1, the NCZarr specific metadata was represented using new objects rather than as keys in existing Zarr objects. Due to conflicts with the Zarr specification, that format is deprecated in favor of the one described above. However the netcdf-c NCZarr support can still read the version 1 format.

The version 1 format defines three specific objects: .nczgroup, .nczarray,.nczattr. These are stored in parallel with the corresponding Zarr objects. So if there is a key of the form "/x/y/.zarray", then there is also a key "/x/y/.nczarray". The content of these objects is the same as the contents of the corresponding keys. So the value of the ''_NCZARR_ARRAY'' key is the same as the content of the ''.nczarray'' object. The list of connections is as follows:

  • ''.nczarr'' <=> ''NCZARR_SUPERBLOCK''
  • ''.nczgroup <=> ''NCZARR_GROUP''
  • ''.nczarray <=> ''NCZARR_ARRAY''
  • ''.nczattr <=> ''NCZARR_ATTR''

Point of Contact

Author: Dennis Heimbigner
Email: dmh at ucar dot edu
Initial Version: 4/10/2020
Last Revised: 7/16/2021