NetCDF Users Guide
v1.1
|
Beginning with netCDF version 4.8.0, the Unidata NetCDF group has extended the netcdf-c library to provide access to cloud storage (e.g. Amazon S3 [1] ) by providing a mapping from a subset of the full netCDF Enhanced (aka netCDF-4) data model to a variant of the Zarr [4] data model that already has mappings to key-value pair cloud storage systems. The NetCDF version of this storage format is called NCZarr [4].
NCZarr uses a data model [4] that is, by design, a superset of the Zarr Version 2 Specification [6]. Note Carefully: an uncompressed legal Zarr dataset is also a legal NCZarr dataset. If the Zarr implementation ignores unrecognized objects whose name starts with a "." (e.g. ".nczarray" or ".nczattr"), then the NCZarr dataset is a legal Zarr dataset and should be readable by any Zarr implementation. This assumes, of course, that the actual storage format in which the dataset is stored – a zip file, for example – can be read by the Zarr implementation.
Briefly, the data model supported by NCZarr is netcdf-4 minus the user-defined types and the String type. As with netcdf-4 chunking is supported. Eventually it will also support filters in a manner similar to the way filters are supported in netcdf-4. When this is implemented, then many compressed Zarr datasets will be readable by NCZarr.
Specifically, the model supports the following.
With respect to full netCDF-4, the following concepts are currently unsupported.
Note that contiguous and compact are not actually supported because they are HDF5 specific. When specified, they are treated as chunked where the file consists of only one chunk. This means that testing for contiguous or compact is not possible, the nc_inq_var_chunking function will always return NC_CHUNKED and the chunksizes will be the same as the dimension sizes of the variable's dimensions.
NCZarr support is enabled if the –enable-nczarr option is used with './configure'. If NCZarr support is enabled, then a usable version of libcurl must be specified using the LDFLAGS environment variable (similar to the way that the HDF5 libraries are referenced). Refer to the installation manual for details. NCZarr support can be disabled using the –disable-dap.
In order to access a NCZarr data source through the netCDF API, the file name normally used is replaced with a URL with a specific format. Note specifically that there is no NC_NCZARR flag for the mode argument of nc_create or nc_open. In this case, it is indicated by the URL path.
The URL is the usual scheme:://host:port/path?query::fragment format. There are some details that are important.
The fragment part of a URL is used to specify information that is interpreted to specify what data format is to be used, as well as additional controls for that data format. For NCZarr support, the following key=value pairs are allowed.
The mode key specifies the particular format to be used by the netcdf-c library for interpreting the dataset specified by the URL.
Using mode=nczarr causes the URL to be interpreted as a reference to a dataset that is stored in NCZarr format.
The modes s3, file, and zip tell the library what storage driver to use.
Note that It should be the case that zipping a file format directory tree will produce a file readable by the zip storage format, and vice-versa.
The zarr mode tells the library to use NCZarr, but to restrict its operation to operate on pure Zarr Version 2 datasets.
The xarray mode tells the library to support the XArray __ARRAY_DIMENSIONS_ convention.
The netcdf-c library is capable of inferring additional mode flags based on the flags it finds. Currently we have the following inferences.
So for example: ...#mode=xarray,zip
is equivalent to ...#mode=nczarr,zarr,xarray,zip
`.
Internally, the nczarr implementation has a map abstraction that allows different storage formats to be used. This is closely patterned on the same approach used in the Python Zarr implementation, which relies on the Python MutableMap [5] class.
In NCZarr, the corresponding type is called zmap. The zmap API essentially implements a simplified variant of the Amazon S3 API.
As with Amazon S3, keys are utf8 strings with a specific structure: that of a path similar to those of a Unix path with '/' as the separator for the segments of the path.
As with Unix, all keys have this BNF syntax:
Obviously, one can infer a tree structure from this key structure. A containment relationship is defined by key prefixes. Thus one key is "contained" (possibly transitively) by another if one key is a prefix (in the string sense) of the other. So in this sense the key "/x/y/z" is contained by the key "/x/y".
In this model all keys "exist" but only some keys refer to objects containing content – content bearing. An important restriction is placed on the structure of the tree, namely that keys are only defined for content-bearing objects. Further, all the leaves of the tree are these content-bearing objects. This means that the key for one content-bearing object should not be a prefix of any other key.
There several other concepts of note.
The zmap API defined here isolates the key-value pair mapping code from the Zarr-based implementation of NetCDF-4. It wraps an internal C dispatch table manager for implementing an abstract data structure implementing the zmap key/object model.
Search: The search function has two purposes:
The search function takes a prefix path which has a key syntax (see above). The set of legal keys is the set of keys such that the key references a content-bearing object – e.g. /x/y/.zarray or /.zgroup. Essentially this is the set of keys pointing to the leaf objects of the tree of keys constituting a dataset. This set potentially limits the set of keys that need to be examined during search.
The search function returns a limited set of names, where the set of names are immediate suffixes of a given prefix path. That is, if _<prefix>_ is the prefix path, then search returns all _<name>_ such that _<prefix>/<name>_ is itself a prefix of a "legal" key. This can be used to implement glob style searches such as "/x/y/*" or "/x/y/**"
This semantics was chosen because it appears to be the minimum required to implement all other kinds of search using recursion. It was also chosen to limit the number of names returned from the search. Specifically
As a side note, S3 supports this kind of search using common prefixes with a delimiter of '/', although the implementation is a bit tricky. For the file system zmap implementation, the legal search keys can be obtained one level at a time, which directly implements the search semantics. For the zip file implementation, this semantics is not possible, so the whole tree must be obtained and searched.
Issues:
A Note on Error Codes:
The zmap API returns two distinguished error code:
Note that NC_EEMPTY is a new error code to signal to that the caller asked for non-content-bearing key.
This does not preclude other errors being returned such NC_EACCESS or NC_EPERM or NC_EINVAL if there are permission errors or illegal function arguments, for example. It also does not preclude the use of other error codes internal to the zmap implementation. So zmap_file, for example, uses NC_ENOTFOUND internally because it is possible to detect the existence of directories and files. This does not propagate outside the zmap_file implementation.
The primary zmap implementation is s3 (i.e. mode=nczarr,s3) and indicates that the Amazon S3 cloud storage – or some related applicance – is to be used. Another storage format uses a file system tree of directories and files (mode=nczarr,file). A third storage format uses a zip file (mode=nczarr,zip). The latter two are used mostly for debugging and testing. However, the file and zip formats are important because they is intended to match corresponding storage formats used by the Python Zarr implementation. Hence it should serve to provide interoperability between NCZarr and the Python Zarr. This has not been tested.
Examples of the typical URL form for file and zip are as follows.
Note that the extension (e.g. ".file" in "testdata.file") is arbitraty, so this would be equally acceptable.
As with other URLS (e.g. DAP), these kind of URLS can be passed as the path argument to ncdump, for example.
The NCZARR format extends the pure Zarr format by adding extra objects such as _.nczarr_ and _.ncvar_. It is possible to suppress the use of these extensions so that the netcdf library can read and write a pure zarr formatted file. This is controlled by using mode=nczarr,zarr combination. The primary effects of using pure zarr are described in the Translation Section.
The NCZarr support has a trace facility. Enabling this can sometimes give important information. Tracing can be enabled by setting the environment variable NCTRACING=n, where n indicates the level of tracing. A good value of n is 9.
In order to use the zip storage format, the libzip [3] library must be installed. Note that this is different from zlib.
The Amazon AWS S3 storage driver currently uses the Amazon AWS S3 Software Development Kit for C++ (aws-s3-sdk-cpp). In order to use it, the client must provide some configuration information. Specifically, the ~/.aws/config
file should contain something like this.
The notion of "addressing style" may need some expansion. Amazon S3 accepts two forms for specifying the endpoint for accessing the data.
The NCZarr code will accept either form, although internally, it is standardized on path style. The reason for this is that the bucket name forms the initial segment in the keys.
The NCZarr storage format is almost identical to that of the the standard Zarr version 2 format. The data model differs as follows.
Consider both NCZarr and Zarr, and assume S3 notions of bucket and object. In both systems, Groups and Variables (Array in Zarr) map to S3 objects. Containment is modeled using the fact that the container's key is a prefix of the variable's key. So for example, if variable v1 is contained in top level group g1 – _/g1 – then the key for v1 is _/g1/v_. Additional information is stored in special objects whose name start with ".z".
In Zarr, the following special objects exist.
The NCZarr format uses the same group and variable (array) objects as Zarr. It also uses the Zarr special _.zXXX_ objects.
However, NCZarr adds some additional special objects.
_.nczgroup_ – this is a parallel object to _.zgroup_ and contains any netcdf specific group information. Specifically it contains the following.
These lists allow walking the NCZarr dataset without having to use the potentially costly S3 list operation.
* dimrefs -- the names of the shared dimensions referenced by the variable. * storage -- indicates if the variable is chunked vs contiguous in the netcdf sense.
With some constraints, it is possible for an nczarr library to read Zarr and for a zarr library to read the nczarr format. The latter case, zarr reading nczarr is possible if the zarr library is willing to ignore objects whose name it does not recognized; specifically anything beginning with _.ncz_.
The former case, nczarr reading zarr is also possible if the nczarr can simulate or infer the contents of the missing _.nczXXX_ objects. As a rule this can be done as follows.
In order to accomodate existing implementations, certain mode tags are provided to tell the NCZarr code to look for information used by specific implementations.
XArray support is introduced in netCDF-C version
4.8.1
.
The Xarray [7] Zarr implementation uses its own mechanism for specifying shared dimensions. It uses a special attribute named ''_ARRAY_DIMENSIONS''. The value of this attribute is a list of dimension names (strings). An example might be ["time", "lon", "lat"]
. It is essentially equivalent to the
ncgen -4 -lb -o "file:///home/user/dataset.file#mode=nczarr,file" dataset.cdl ```
[1] Amazon Simple Storage Service Documentation
[2] Amazon Simple Storage Service Library
[3] The LibZip Library
[4] NetCDF ZARR Data Model Specification
[5] Python Documentation: 8.3. collections — High-performance container datatypes
[6] Zarr Version 2 Specification
[7] XArray Zarr Encoding Specification
Currently the following build cases are known to work.
Operating System | Build System | NCZarr | S3 Support |
Linux | Automake | yes | yes |
Linux | CMake | yes | yes |
Cygwin | Automake | yes | no |
OSX | Automake | unknown | unknown |
OSX | CMake | unknown | unknown |
Visual Studio | CMake | yes | tests fail |
Note: S3 support includes both compiling the S3 support code as well as running the S3 tests.
There are several options relevant to NCZarr support and to Amazon S3 support. These are as follows.
A note about using S3 with Automake. If S3 support is desired, and using Automake, then LDFLAGS must be properly set, namely to this.
The above assumes that these libraries were installed in '/usr/local/lib', so the above requires modification if they were installed elsewhere.
Note also that if S3 support is enabled, then you need to have a C++ compiler installed because part of the S3 support code is written in C++.
The necessary CMake flags are as follows (with defaults)
Note that unlike Automake, CMake can properly locate C++ libraries, so it should not be necessary to specify -laws-cpp-sdk-s3 assuming that the aws s3 libraries are installed in the default location. For CMake with Visual Studio, the default location is here:
It is possible to install the sdk library in another location. In this case, one must add the following flag to the cmake command.
where "awssdkdir" is the path to the sdk installation. For example, this might be as follows.
This can be useful if blanks in path names cause problems in your build environment.
The relevant tests for S3 support are in nczarr_test__. They will be run if __–enable-nczarr-s3-tests is on.
Currently, by default, testing of S3 with NCZarr is supported only for Unidata members of the NetCDF Development Group. This is because it uses a specific bucket on a specific internal S3 appliance that is inaccessible to the general user.
However, an untested mechanism exists by which others may be able to run the tests. If someone else wants to attempt these tests, then they need to define the following environment variables:
This assumes a Path Style address (see above) where
Example:
If anyone tries to use this mechanism, it would be appreciated it any difficulties were reported to Unidata as a Github issue.
In order to use the S3 storage driver, it is necessary to install the Amazon aws-sdk-cpp library.
As a starting point, here are the CMake options used by Unidata to build that library. It assumes that it is being executed in a build directory, build
say, and that build/../CMakeLists.txt exists
.
The expected set of installed libraries are as follows:
This library depends on libcurl, so you may to install that before building the sdk library.
The Amazon S3 cloud storage imposes some significant limits that are inherited by NCZarr (and Zarr also, for that matter).
Some of the relevant limits are as follows:
The NetCDF-C library contains an alternate mechanism for accessing data store in Amazon S3: The byte-range mechanism. The idea is to treat the remote data as if it was a big file. This remote "file" can be randomly accessed using the HTTP Byte-Range header.
In the Amazon S3 context, a copy of a dataset, a netcdf-3 or netdf-4 file, is uploaded into a single object in some bucket. Then using the key to this object, it is possible to tell the netcdf-c library to treat the object as a remote file and to use the HTTP Byte-Range protocol to access the contents of the object. The dataset object is referenced using a URL with the trailing fragment containing the string #mode=bytes
.
An examination of the test program nc_test/test_byterange.sh shows simple examples using the ncdump program. One such test is specified as follows:
Note that for S3 access, it is expected that the URL is in what is called "path" format where the bucket, noaa-goes16 in this case, is part of the URL path instead of the host.
The _::mode=byterange_ mechanism generalizes to work with most servers that support byte-range access.
Specifically, Thredds servers support such access using the HttpServer access method as can be seen from this URL taken from the above test program.
If using byte-range access, it may be necessary to tell the netcdf-c library about the so-called secretid and accessid values. These are usually stored in the file ~/.aws/config
and/or ~/.aws/credentials
. In the latter file, this might look like this.
Author: Dennis Heimbigner
Email: dmh at ucar dot edu
Initial Version: 4/10/2020
Last Revised: 2/22/2021