SlideShare a Scribd company logo
1 of 14
Towards Runtime Verification via Event
Stream Processing in Cloud Computing
Infrastructures
Domenico Cotroneo, Luigi De Simone, Pietro Liguori,
Roberto Natella, and Angela Scibelli
DIETI, Università degli Studi di Napoli Federico II, Italy
{cotroneo, luigi.desimone, pietro.liguori, roberto.natella}@unina.it
ang.scibelli@studenti.unina.it
International Workshop on Artificial Intelligence for IT Operations
AIOPS, 14 December 2020 pietro.liguori@unina.it - 2
Problem: The fragility of cloud
computing infrastructure software
Gunawi et al., 2016. “Why Does the Cloud Stop Computing?
Lessons from Hundreds of Service Outages”. In Proc. SoCC
AIOPS, 14 December 2020 pietro.liguori@unina.it - 3
Cloud Computing Infrastructure
 Adopted in critical domains (telecom, healthcare, etc.)
 Strict availability requirements ("five nines")
 High complexity, non-determinism
 At risk due to undetected failures (long MTTR, poor QoS, etc.)
X
Faults
Storage, network,
software, ...
Sys. admins
Failures
(data loss, resource
unavailable, etc.)
IaaSService
requests
Clients
Lack of
failure
notifications
AIOPS, 14 December 2020 pietro.liguori@unina.it - 4
Our case study: OpenStack
Nova
Horizon
Cinder NeutronGlance
Keystone
Swift
instance
creation
request
Silent failures occur as
omissions, delays, or out-of-
order events in these workflows
auth-token
validation
get image id
get IP
address
volume
attachment
AIOPS, 14 December 2020 pietro.liguori@unina.it - 5
Contribution
Generalizable approach for runtime detection of
failures in cloud computing systems
• Black-box tracing
• Stream-based Runtime Verification
• Lightweight Monitoring Rules
Evaluation of the approach in OpenStack
• Fault-injection campaign (481 experiments with a failure)
• Intensive workload stressing the three most important
OpenStack subsystems (Nova, Cinder, Neutron)
• Evaluation of the monitoring rules, in terms of Failure
Detection Coverage (FDC), in both single user and multi-
user scenarios
AIOPS, 14 December 2020 pietro.liguori@unina.it - 6
Ideal Tracing
 Invariants: properties that hold
over events in an execution
• E.g., "buy" from client must be
preceded by "available" from server
 Difficult to apply in practice
• Needs the happened-before relation
between events, using vector clocks
or by propagating a session ID
A(id=1)  B(id=1)
A(id=2)  B(id=2)
…
A1
A2 B2
B1
AIOPS, 14 December 2020 pietro.liguori@unina.it - 7
Black box tracing
Nova
Horizon
Cinder NeutronGlance
Keystone
Swift
User 1 User 2
Event A
Event A
Event B
Event B
Timeline
Communication APIs
(REST APIs, Message Queues)
∀ 𝒂 ∈ 𝑨 ⇒ ∃ 𝒃 ∈ 𝑩: 𝒂 → 𝒃
A A B B
AIOPS, 14 December 2020 pietro.liguori@unina.it - 8
Black box tracing (cont.)
Nova
Horizon
Cinder NeutronGlance
Keystone
Swift
A C C C
Communication APIs
(REST APIs, Message Queues)
Timeline
Event A
Event C
Event C
Event C
𝑪 < 𝒎𝒂𝒙𝑪𝒐𝒖𝒏𝒕 𝑪
AIOPS, 14 December 2020 pietro.liguori@unina.it - 9
Approach Overview
Node 1
Node 3
Node 2
Communication APIs
(REST APIs, MQs)
Stream
Processor
RV Process
Instrumentation
Fault-free
traces
Lightweight
Monitoring Rules
Monitor
Synthesis
Analysis
Collection of
correct executions
1
2
3
4
5
A A B B
Events
AIOPS, 14 December 2020 pietro.liguori@unina.it - 10
Ordering-based Rules
 Add_Volume1: event A (name="compute_reserve_block_device_name") is
eventually followed by event B (name="compute_attach_volume");
 Add_Volume2: event A (name="compute_attach_volume") is eventually
followed by event B (name="cinder-
volume.localhost.localdomain@lvm_initialize_connection")
 Add_Volume3: event sequence of Rule Add_Volume2 is eventually
followed by event C (name="cinder-
volume.localhost.localdomain@lvm_attach_volume")
Rule FDC %
Add_Volume1 26.67
Add_Volume2 11.66
Add_Volume3 51.67
Total 90.00
AIOPS, 14 December 2020 pietro.liguori@unina.it - 11
Counting-based Rules
type = C?
|C| >
maxCount(C)
?
Failure Detection
Message
Events from
System under test
Events type C
Rule FDC %
SSH_Failure1 27.07
SSH_Failure2 15.38
SSH_Failure3 7.69
Total 38.46
YES
YES
AIOPS, 14 December 2020 pietro.liguori@unina.it - 12
Comparison with API Errors Coverage
Target
System
Failure
Type
OpenStack
FDC%
RV
FDC%
Cinder Volume Creation Fail 29.67 28.57
Cinder Volume Attachment Fail 25.33 92.00
Cinder Volume Deletion Fail 100 100
Nova Instance Creation Fail 0.00 90.96
Neutron SSH Connection Fail 0.00 38.46
OpenStack Total 23.96 79.38
AIOPS, 14 December 2020 pietro.liguori@unina.it - 13
Multi-user scenario
Failure Type
Avg FDC
%
Std Dev
%
Volume Creation Fail 32.00 12.42
Volume Attachment Fail 45.33 13.82
Volume Deletion Fail 36.00 12.20
Total 37.78 13.88
5 Fault-free
Traces
5 Faulty
Traces
Trace Mix
RV
Approach
Evaluation
AIOPS, 14 December 2020 pietro.liguori@unina.it - 14
Conclusion
 Generalizable approach for runtime detection of
failures in cloud computing systems
• Portable, low intrusiveness
 Evaluation of the approach in OpenStack
• Definition of lightweight failure detection rules for Nova,
Cinder and Neutron subsystems
• RV failure detection coverage >> OpenStack API Errors
coverage
 Future work
• Algorithm to identify patterns using statistical analysis
techniques
• Evaluation in a real multi-user scenario

More Related Content

What's hot

Under-reported Security Defects in Kubernetes Manifests
Under-reported Security Defects in Kubernetes ManifestsUnder-reported Security Defects in Kubernetes Manifests
Under-reported Security Defects in Kubernetes ManifestsAkond Rahman
 
What Questions Do Programmers Ask About Configuration as Code?
What Questions Do Programmers Ask About Configuration as Code?What Questions Do Programmers Ask About Configuration as Code?
What Questions Do Programmers Ask About Configuration as Code?Akond Rahman
 
SFScon 21 - Luigi Gubello - Security metrics for open-source projects
SFScon 21 - Luigi Gubello - Security metrics for open-source projectsSFScon 21 - Luigi Gubello - Security metrics for open-source projects
SFScon 21 - Luigi Gubello - Security metrics for open-source projectsSouth Tyrol Free Software Conference
 
A tool suite for prototyping internet of things applications
A tool suite for prototyping internet of  things applicationsA tool suite for prototyping internet of  things applications
A tool suite for prototyping internet of things applicationsPankesh Patel
 
IoTSuite: A Framework to Design, Implement, and Deploy IoT Applications
IoTSuite: A Framework to Design, Implement, and Deploy IoT ApplicationsIoTSuite: A Framework to Design, Implement, and Deploy IoT Applications
IoTSuite: A Framework to Design, Implement, and Deploy IoT ApplicationsPankesh Patel
 
Predicting bugs using antipatterns
Predicting bugs using antipatternsPredicting bugs using antipatterns
Predicting bugs using antipatternsFoutse Khomh
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...Mahmud Hossain
 
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...Joel W. King
 
Automated Program Repair Keynote talk
Automated Program Repair Keynote talkAutomated Program Repair Keynote talk
Automated Program Repair Keynote talkAbhik Roychoudhury
 
Shhh!: Secret Management Practices for Infrastructure as Code
Shhh!: Secret Management Practices for Infrastructure as Code Shhh!: Secret Management Practices for Infrastructure as Code
Shhh!: Secret Management Practices for Infrastructure as Code Akond Rahman
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
 
The Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined NetworksThe Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined NetworksPriyanka Aash
 
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...DC2711 - DEF CON GROUP - Johannesburg
 
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksObject Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksVaidas Brundza
 
Scalable communication networks - dissertation slides
Scalable communication networks - dissertation slidesScalable communication networks - dissertation slides
Scalable communication networks - dissertation slidesGopika Premsankar
 
DevNet Study Group: Using a SDK
DevNet Study Group: Using a SDKDevNet Study Group: Using a SDK
DevNet Study Group: Using a SDKJoel W. King
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity InnovationPete Burnap
 

What's hot (20)

Under-reported Security Defects in Kubernetes Manifests
Under-reported Security Defects in Kubernetes ManifestsUnder-reported Security Defects in Kubernetes Manifests
Under-reported Security Defects in Kubernetes Manifests
 
Binary Analysis - Luxembourg
Binary Analysis - LuxembourgBinary Analysis - Luxembourg
Binary Analysis - Luxembourg
 
What Questions Do Programmers Ask About Configuration as Code?
What Questions Do Programmers Ask About Configuration as Code?What Questions Do Programmers Ask About Configuration as Code?
What Questions Do Programmers Ask About Configuration as Code?
 
SFScon 21 - Luigi Gubello - Security metrics for open-source projects
SFScon 21 - Luigi Gubello - Security metrics for open-source projectsSFScon 21 - Luigi Gubello - Security metrics for open-source projects
SFScon 21 - Luigi Gubello - Security metrics for open-source projects
 
A tool suite for prototyping internet of things applications
A tool suite for prototyping internet of  things applicationsA tool suite for prototyping internet of  things applications
A tool suite for prototyping internet of things applications
 
IoTSuite: A Framework to Design, Implement, and Deploy IoT Applications
IoTSuite: A Framework to Design, Implement, and Deploy IoT ApplicationsIoTSuite: A Framework to Design, Implement, and Deploy IoT Applications
IoTSuite: A Framework to Design, Implement, and Deploy IoT Applications
 
Qualifying exam-2015-final
Qualifying exam-2015-finalQualifying exam-2015-final
Qualifying exam-2015-final
 
Predicting bugs using antipatterns
Predicting bugs using antipatternsPredicting bugs using antipatterns
Predicting bugs using antipatterns
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
 
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...
 
Automated Program Repair Keynote talk
Automated Program Repair Keynote talkAutomated Program Repair Keynote talk
Automated Program Repair Keynote talk
 
Ieee 2013 projects download
Ieee 2013 projects downloadIeee 2013 projects download
Ieee 2013 projects download
 
Shhh!: Secret Management Practices for Infrastructure as Code
Shhh!: Secret Management Practices for Infrastructure as Code Shhh!: Secret Management Practices for Infrastructure as Code
Shhh!: Secret Management Practices for Infrastructure as Code
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
The Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined NetworksThe Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined Networks
 
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...
 
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksObject Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area Networks
 
Scalable communication networks - dissertation slides
Scalable communication networks - dissertation slidesScalable communication networks - dissertation slides
Scalable communication networks - dissertation slides
 
DevNet Study Group: Using a SDK
DevNet Study Group: Using a SDKDevNet Study Group: Using a SDK
DevNet Study Group: Using a SDK
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 

Similar to Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures

Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection BotIRJET Journal
 
SC7 Workshop 3: Big Data Europe Project
SC7 Workshop 3: Big Data Europe ProjectSC7 Workshop 3: Big Data Europe Project
SC7 Workshop 3: Big Data Europe ProjectBigData_Europe
 
BDE SC3.3 Workshop - BDE review: Scope and Opportunities
 BDE SC3.3 Workshop -  BDE review: Scope and Opportunities BDE SC3.3 Workshop -  BDE review: Scope and Opportunities
BDE SC3.3 Workshop - BDE review: Scope and OpportunitiesBigData_Europe
 
Scalable Web Technology for the Internet of Things
Scalable Web Technology for the Internet of ThingsScalable Web Technology for the Internet of Things
Scalable Web Technology for the Internet of ThingsMatthias Kovatsch
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
 
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...a001
 
Prospective of LwM2M for Smart City Use Cases (IoT World 2017 Workshop)
Prospective of LwM2M for Smart City Use Cases (IoT World 2017 Workshop)Prospective of LwM2M for Smart City Use Cases (IoT World 2017 Workshop)
Prospective of LwM2M for Smart City Use Cases (IoT World 2017 Workshop)Open Mobile Alliance
 
AGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative securityAGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative securityRoberto Baldoni
 
Secure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceSecure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceCSCJournals
 
FIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
FIWARE Global Summit - FogFlow GE: Intent-based Edge ProgrammingFIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
FIWARE Global Summit - FogFlow GE: Intent-based Edge ProgrammingFIWARE
 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)ijwmn
 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)ijccsa
 
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...ijgca
 
Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...
Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...
Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...IJNSA Journal
 
StreamSight - Query-Driven Descriptive Analytics for IoT and Edge Computing
StreamSight - Query-Driven Descriptive Analytics for IoT and Edge ComputingStreamSight - Query-Driven Descriptive Analytics for IoT and Edge Computing
StreamSight - Query-Driven Descriptive Analytics for IoT and Edge ComputingDemetris Trihinas
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
 
Synopsis viva presentation
Synopsis viva presentationSynopsis viva presentation
Synopsis viva presentationkirubavenkat
 
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...IRJET Journal
 
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...ijcsit
 

Similar to Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures (20)

Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection Bot
 
SC7 Workshop 3: Big Data Europe Project
SC7 Workshop 3: Big Data Europe ProjectSC7 Workshop 3: Big Data Europe Project
SC7 Workshop 3: Big Data Europe Project
 
BDE SC3.3 Workshop - BDE review: Scope and Opportunities
 BDE SC3.3 Workshop -  BDE review: Scope and Opportunities BDE SC3.3 Workshop -  BDE review: Scope and Opportunities
BDE SC3.3 Workshop - BDE review: Scope and Opportunities
 
Scalable Web Technology for the Internet of Things
Scalable Web Technology for the Internet of ThingsScalable Web Technology for the Internet of Things
Scalable Web Technology for the Internet of Things
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...
 
Dealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient IntelligenceDealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient Intelligence
 
Prospective of LwM2M for Smart City Use Cases (IoT World 2017 Workshop)
Prospective of LwM2M for Smart City Use Cases (IoT World 2017 Workshop)Prospective of LwM2M for Smart City Use Cases (IoT World 2017 Workshop)
Prospective of LwM2M for Smart City Use Cases (IoT World 2017 Workshop)
 
AGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative securityAGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative security
 
Secure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceSecure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
Secure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
 
FIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
FIWARE Global Summit - FogFlow GE: Intent-based Edge ProgrammingFIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
FIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
 
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
 
Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...
Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...
Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...
 
StreamSight - Query-Driven Descriptive Analytics for IoT and Edge Computing
StreamSight - Query-Driven Descriptive Analytics for IoT and Edge ComputingStreamSight - Query-Driven Descriptive Analytics for IoT and Edge Computing
StreamSight - Query-Driven Descriptive Analytics for IoT and Edge Computing
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
 
Synopsis viva presentation
Synopsis viva presentationSynopsis viva presentation
Synopsis viva presentation
 
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
 
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
 

Recently uploaded

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 

Recently uploaded (20)

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 

Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures

  • 1. Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures Domenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella, and Angela Scibelli DIETI, Università degli Studi di Napoli Federico II, Italy {cotroneo, luigi.desimone, pietro.liguori, roberto.natella}@unina.it ang.scibelli@studenti.unina.it International Workshop on Artificial Intelligence for IT Operations
  • 2. AIOPS, 14 December 2020 pietro.liguori@unina.it - 2 Problem: The fragility of cloud computing infrastructure software Gunawi et al., 2016. “Why Does the Cloud Stop Computing? Lessons from Hundreds of Service Outages”. In Proc. SoCC
  • 3. AIOPS, 14 December 2020 pietro.liguori@unina.it - 3 Cloud Computing Infrastructure  Adopted in critical domains (telecom, healthcare, etc.)  Strict availability requirements ("five nines")  High complexity, non-determinism  At risk due to undetected failures (long MTTR, poor QoS, etc.) X Faults Storage, network, software, ... Sys. admins Failures (data loss, resource unavailable, etc.) IaaSService requests Clients Lack of failure notifications
  • 4. AIOPS, 14 December 2020 pietro.liguori@unina.it - 4 Our case study: OpenStack Nova Horizon Cinder NeutronGlance Keystone Swift instance creation request Silent failures occur as omissions, delays, or out-of- order events in these workflows auth-token validation get image id get IP address volume attachment
  • 5. AIOPS, 14 December 2020 pietro.liguori@unina.it - 5 Contribution Generalizable approach for runtime detection of failures in cloud computing systems • Black-box tracing • Stream-based Runtime Verification • Lightweight Monitoring Rules Evaluation of the approach in OpenStack • Fault-injection campaign (481 experiments with a failure) • Intensive workload stressing the three most important OpenStack subsystems (Nova, Cinder, Neutron) • Evaluation of the monitoring rules, in terms of Failure Detection Coverage (FDC), in both single user and multi- user scenarios
  • 6. AIOPS, 14 December 2020 pietro.liguori@unina.it - 6 Ideal Tracing  Invariants: properties that hold over events in an execution • E.g., "buy" from client must be preceded by "available" from server  Difficult to apply in practice • Needs the happened-before relation between events, using vector clocks or by propagating a session ID A(id=1)  B(id=1) A(id=2)  B(id=2) … A1 A2 B2 B1
  • 7. AIOPS, 14 December 2020 pietro.liguori@unina.it - 7 Black box tracing Nova Horizon Cinder NeutronGlance Keystone Swift User 1 User 2 Event A Event A Event B Event B Timeline Communication APIs (REST APIs, Message Queues) ∀ 𝒂 ∈ 𝑨 ⇒ ∃ 𝒃 ∈ 𝑩: 𝒂 → 𝒃 A A B B
  • 8. AIOPS, 14 December 2020 pietro.liguori@unina.it - 8 Black box tracing (cont.) Nova Horizon Cinder NeutronGlance Keystone Swift A C C C Communication APIs (REST APIs, Message Queues) Timeline Event A Event C Event C Event C 𝑪 < 𝒎𝒂𝒙𝑪𝒐𝒖𝒏𝒕 𝑪
  • 9. AIOPS, 14 December 2020 pietro.liguori@unina.it - 9 Approach Overview Node 1 Node 3 Node 2 Communication APIs (REST APIs, MQs) Stream Processor RV Process Instrumentation Fault-free traces Lightweight Monitoring Rules Monitor Synthesis Analysis Collection of correct executions 1 2 3 4 5 A A B B Events
  • 10. AIOPS, 14 December 2020 pietro.liguori@unina.it - 10 Ordering-based Rules  Add_Volume1: event A (name="compute_reserve_block_device_name") is eventually followed by event B (name="compute_attach_volume");  Add_Volume2: event A (name="compute_attach_volume") is eventually followed by event B (name="cinder- volume.localhost.localdomain@lvm_initialize_connection")  Add_Volume3: event sequence of Rule Add_Volume2 is eventually followed by event C (name="cinder- volume.localhost.localdomain@lvm_attach_volume") Rule FDC % Add_Volume1 26.67 Add_Volume2 11.66 Add_Volume3 51.67 Total 90.00
  • 11. AIOPS, 14 December 2020 pietro.liguori@unina.it - 11 Counting-based Rules type = C? |C| > maxCount(C) ? Failure Detection Message Events from System under test Events type C Rule FDC % SSH_Failure1 27.07 SSH_Failure2 15.38 SSH_Failure3 7.69 Total 38.46 YES YES
  • 12. AIOPS, 14 December 2020 pietro.liguori@unina.it - 12 Comparison with API Errors Coverage Target System Failure Type OpenStack FDC% RV FDC% Cinder Volume Creation Fail 29.67 28.57 Cinder Volume Attachment Fail 25.33 92.00 Cinder Volume Deletion Fail 100 100 Nova Instance Creation Fail 0.00 90.96 Neutron SSH Connection Fail 0.00 38.46 OpenStack Total 23.96 79.38
  • 13. AIOPS, 14 December 2020 pietro.liguori@unina.it - 13 Multi-user scenario Failure Type Avg FDC % Std Dev % Volume Creation Fail 32.00 12.42 Volume Attachment Fail 45.33 13.82 Volume Deletion Fail 36.00 12.20 Total 37.78 13.88 5 Fault-free Traces 5 Faulty Traces Trace Mix RV Approach Evaluation
  • 14. AIOPS, 14 December 2020 pietro.liguori@unina.it - 14 Conclusion  Generalizable approach for runtime detection of failures in cloud computing systems • Portable, low intrusiveness  Evaluation of the approach in OpenStack • Definition of lightweight failure detection rules for Nova, Cinder and Neutron subsystems • RV failure detection coverage >> OpenStack API Errors coverage  Future work • Algorithm to identify patterns using statistical analysis techniques • Evaluation in a real multi-user scenario