SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN: 2277 – 9043
              International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                          Volume 1, Issue 6, August 2012




   Gleaming the Cloud in the Virtualization
                   layer
                Janani.V.D,                                          Hari Baabu.V, Sajeev ram.A
                   M.E.                                                   Assistant Professor
      Computer Science and Engineering                             Computer Science and Engineering
              Vels University                                              Vels University


   Abstract-- Cloud Computing is a powerful and            physical machine. Similarly IaaS providers such as
flexible software environment, which delegates the         Amazon’s Elastic Computing Cloud (EC2) [2] are
material’s management and in which users pay as they       not        allowed to look inside the running VM
go. Rather than operating their own data centers, today    instances [7] because        of tenants’ business
cloud users run their applications on the remote cloud
infrastructures that are owned and managed by cloud
                                                           confidentiality and privacy.
providers. Cloud users create       virtual machine
instances to run their specific application logic                     In a local data center, operators usually
without       knowing the       underlying physical        need        the   context information from both
infrastructure. On the other side, cloud provider          applications and        infrastructures for effective
manage and operate their cloud infrastructures             problem determination. In commercial cloud
without knowing their customers’ applications.             environments, the decoupled ownership of
Due to the disjoint ownership of applications and          applications and infrastructures introduces new
infrastructures, if a problem occurs, there is no          challenges in system management. When users
visibility for either cloud users or providers to
understand the whole context of the incident
                                                           encounter problems in their VMs, they have little
and solve it quickly. To this end, we propose              visibility on the infrastructure layer for root cause
software solution Cloud Vision, to provide some            determination except trial-and-error troubleshooting
visibility through the middle virtualization layer for     [9]. It is not even clear who is responsible for fixing
both cloud users and providers to address their            such problems. To support end users, IaaS
problems quickly. Cloud Vision automatically tracks        providers often run an online support forum (e.g.,
each VM instance’s configuration status            and     Amazon EC2 online forum [3]) where users can
maintains their life-cycle configuration record in         report their problems and seek solutions. Cloud
configuration     management        database(CMDB).        operators often try to solve those problems by
When the user reports a problem, our algorithm
automatically analyze CMDB to              probabilistic
                                                           manually investigating the system settings of users’
determine the root cause and invoke a recovery             VMs. Since operators do not know tenants’
process by interacting with the cloud user                 specific applications, it is even hard for them to
                                                           solve problems only based on users’ problem
  Index Terms— Cloud Vision; Configuration                 reports.
management;      Virtualization layer; VM;
Troubleshooting;                                                    Most of VM problems [ 7 ] in a cloud
                                                           infrastructure (except those problems caused by
                 I. INTRODUCTION
                                                           applications running inside VM instances) can be
         Cloud       computing         provides     a      correlated to their configuration events. Examples
revolutionary new computing paradigm for                   of such configuration events include incorrect
deploying enterprise applications and Internet             update of Access Control List (ACL) in hypervisors,
services. There are many evolving cloud computing          blocking of access ports inside running VM
models, including Infrastructure-as-a-Service (IaaS),      instances, connection of virtual devices to
Platform-as-a-Service(PaaS), and Software- as-a-           unsupported OSes, migration of instances to a slow
Service(SaaS), which provide IT infrastructures,           machine, incorrect allocation of memory size,
platforms,     solution  stacks,     and    software       connection loss with underlying block storage and
applications from the cloud respectively [1]. Cloud        so on. For example, on average 28 problems were
infrastructures often employ a virtualization layer        reported daily to Amazon EC2 online forum in
[8] to ensure resource isolation and abstraction.          July 2010, complaining about VM unavailability,
They are designed to provide restricted visibility to      VM hang, Elastic Block Storage (EBS) [2] [7]
both users and IaaS providers. Users of                    crash or loose connectivity, performance problem
VirtualMachine (VM) instances [7] are blocked              and so on. Problems can occur at the time when
from looking down into the infrastructure layer            an instance is first created from its source image
since multiple tenants might share the same                or during running time if its configurations are

                                                                                                              24
                                      All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
             International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                         Volume 1, Issue 6, August 2012



changed by some events.                                 models require cloud users to report their problems
                                                        to operators, who manually investigate the
          We make two intuitive observations            problems to provide solutions. The premium
about cloud environments. First, multiple VM            support model guarantees a bounded problem
instances created from the same image source are        resolution time with service charges while the
likely to have similar             characteristics in   best effort model is free but might take 8 to 10
configurations.    Second,     some     configuration   days to solve user problems [1]. Hence, our
attributes have higher cardinality than others and      objective is to provide automated solutions for
hence they are less sensitive to configuration          cloud providers to address users’ problem quickly
changes. Based on those we present a solution           and also reduce the cost of manual operations. Our
(called CloudVision) for cloud providers to             experimental results show that CloudVision can
automate reasoning and troubleshooting [9] on user      effectively reduce the solution time to seconds.
reported problems under the restricted visibility.
CloudVision runs in the infrastructure layer and                 III. CLOUD VISION SYSTEM
tracks each VM instance as a standard object                            ARCHITECTURE
running in that infrastructure. In summary, we have
made the following contributions:                               The system architecture of CloudVision is
                                                        shown in Figure 1 and it consists of three major
Representation:       CloudVision      develops     a   components: Monitoring Agent, Cloud CMDB and
monitoring mechanism at the infrastructure layer to     Analysis Engine.
automatically capture the event history of all
running VM instances in cloud environments [7].
Such event data is further structured and stored in a
Configuration Management Database (CMDB).

Problem Reasoning: When users report a
problem, our solution          fetches   the related
information      from the CMDB and           further
identifies a list of suspect events. We then apply
statistical analysis to rank these events based on
their sensitivity to configuration changes.

Interactive Troubleshooting: Following the list
of ranked events, CloudVision takes predefined                    Figure 1: CloudVision Architecture
actions to check and solve problems. For each
specific event, operators define the predicates to
check whether this event is the root cause as well      Monitoring Agent: The Monitoring Agent
as the actions to remediate the problem                 monitors and tracks the configuration attributes
                                                        of VM instances and infrastructures continuously.
                II. MOTIVATION                          We assume that all PM clocks are loosely
                                                        synchronized. The agent sits in the hypervisor layer
                                                        so that it can be rolled out through the cloud
         In    a    typical   cloud      environment,
                                                        infrastructures as a standard management component.
Operators of the cloud provider monitor their
                                                        Section IV-A discusses the details of data
infrastructure stacks from the hardware layer such
                                                        collection.
as servers and network devices and up to the
hypervisor layer. While the cloud provider ensures
a highly available cloud infrastructure, it typically   Cloud      CMDB: CMDB Manager structures
does not guarantee the availability of individual VM    and stores configuration data sent by the
instances since it is not even aware of what is         monitoring      agent    into a     database      called
running inside those VM instances. Therefore, cloud     Configuration Management Database (CMDB).
users will occasionally encounter various problems      CMDB is often used for asset and configuration
with their VM instances [7].                            management in large data centers. In this paper,
                                                        we use a CMDB to track the                    life-cycle
         Cloud providers offer several options to       configuration information of VM instances. It is
address cloud users’ problems including a free best     a relational database and each row includes a
effort service with no Service Level Agreement          configuration change along with its timestamp and
(SLA) guarantee and a premium commercial grade          health status (sick or healthy). Initially all rows are
support with SLA guarantees [1]. Both support           marked as healthy. If a configuration change is
                                                        found to be the cause of a reported problem, the
                                                                                                             25
                                    All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
              International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                          Volume 1, Issue 6, August 2012



row containing this change is marked as sick in           When a problem is reported, the analysis engine
the database during the troubleshooting step [9].         analyzes the related CMDB records of the reported
In Section IV-B, we discuss how CMDB is                   VM instance [ 7 ] to determine the suspect events
designed and populated in cloud infrastructures.          and then tries to check the root. cause and solve the
                                                          problem. The whole process is divided into three
                                                          steps: Identifying Suspect Events, Event Ranking
Analysis     Engine:     After users encounter a          and finally Interactive Troubleshooting.
problem with their VM instances [7], they report
the problem to CloudVision via a web interface.           1) Identifying Suspect Events: when a problem of
The Analysis Engine fetches the data related to           a VM instance occurs, it is most likely caused
the reported VM from the CMDB and compares its            by the recent events of that VM instance. As the
current configuration set with its historical             CMDB maintains the complete event history of
records to determine a list of suspect events. Then       VM instances, the analysis engine can determine
the engine employs statistical analysis to rank the       the list of suspect events from the CMDB. Each
list of suspect events and uses predefined predicates     event is associated with a change in the
and actions to check these events and resolve the         configuration attribute called suspect attribute.
problem. Not all problems can be automatically            CloudVision identifies the changes of the reported
resolved by CloudVision since some problems are           instance by comparing its current configuration to
beyond the management responsibility of cloud             the     latest known stable configuration. Any
providers. However, the suspected events are              configuration that persists longer than a specific
reported to end users with an interactive                 duration of time is considered as a stable
troubleshooting process [9] and its design details        configuration. Unstable configurations may arise
given in Section IV-C.                                    when users try to fix problems by trial and error
                                                          so that every configuration change only lasts for a
     IV. CLOUD VISION DESIGN A N D                        very short period of time.
           IM P LEME NTATION
                                                          2) Event Ranking: After determining the set of
A. DataCollection                                         suspect events, CloudVision ranks them based on
Cloud Vision runs an event-based monitoring               how likely an event could be the problem root
agent at the hypervisor layer of each physical            cause. As the set of suspect events can be large, we
machine. The agent collects system configuration          reduce the problem resolution time by checking the
data shell scripts. The shell scripts use virsh           events in their ranked order. An event is highly
management interface library to collect values of         suspected if it is very rare to occur. To measure
con- figuration attributes of running VM instances        this, we define a sensitivity metric and rank the
and it also collects IP addresses of running guests       set of suspect events according to their sensitivity,
by looking into the system. Collected information         i.e., the sensitivity of an attribute to change.
are     represented    using    an    XML format.         We define two types of event sensitivity: local
Configuration data is collected periodically but it is    sensitivity and global sensitivity. The local
not sent to the CMDB Manager unless there is a            sensitivity defines the probability of an event’s
change in the configuration data compared to the          occurrence using the event history of the
previous one, which indicates new events. Hence           instances originated from the same image source.
the data collection is event-based to reduce              Meantime the global sensitivity             defines the
network overhead.                                         probability of an event’s occurrence using the event
                                                          history of all VM instances regardless of their image
B. Populate CMDB                                          sources.
The central CMDB Manager node runs program
that collects event-based configuration data from         3)     Troubleshooting:    After determining and
monitoring agents. It parses collected XML                ranking suspect events, Cloud Vision performs
messages and uses a relational database to structure      troubleshooting actions, which include two major
and store all configuration data along with the           steps: Check and Solve. For each suspect event,
reported timestamp. Each row in the database              the check step checks whether it is the true root
indicates at least a single change in the set of          cause (or culprit event) of the problem. The solve
configuration attributes and it is also associated        step tries to solve the problem automatically if
with a status tag that defines whether the                the     solution   is within the management
configuration is sick or healthy. Initially all entries   responsibility of the cloud provider, otherwise
are set to be healthy and a configuration is changed      Cloud Vision recommends the solutions to the
to be sick only if it is proved to be faulty during the   cloud users. To identify the root cause, Cloud
troubleshooting process.                                  Vision uses a series of predefined predicates to
                                                          check each suspect event, starting from the top of
C. CMDB Analysis                                          the ranked suspect events. The suspect events are
                                                                                                             26
                                     All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
             International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                         Volume 1, Issue 6, August 2012



first classified into one or more problem classes.     fingerprinting. There also exist some literature on
Actions are defined for each individual problem        configuration man- agement. Whitaker et al. [6]
class and also include a series of predicates to       developed a tool named Chrouns to automatically
check the existence of the corresponding problem.      search for a configuration state change indicating
                                                       a failure. It stores local system config- urations at
                                                       each checkpoint along time. When a problem
                                                       occurs, Chronus takes user-provided probes to
                                                       identify the working and non-working configuration
                                                       state. This approach is quite similar to our check
                                                       and solve step.

                                                                      VI. CONCLUSION

                                                                 In this paper, we present Cloud Vision, a
                                                       novel      solution    for    automated     problem
                                                       troubleshooting in cloud environments. Cloud
                                                       Vision monitors and tracks the configuration
                                                       attributes of VM instances [ 7 ] and infrastructure,
                                                       and uses the historical event records to determine
                                                       the root cause of problematic VM instances, and
                                                       further provides a check-and-solve troubleshooting
                                                       process to resolve user reported           problems
                                                       automatically. In our future work, we plan to
      Figure 2: Check-and-solve flow chart             monitor more configuration attributes from cloud
                                                       infrastructure and design new predicates and actions
The check-and-solve troubleshooting process is         to cover more problem classes.
done interactively with users. After each solve
step, users are asked to provide feedbacks. If the                       REFERENCES
problem is solved, the troubleshooting process
ends; otherwise the       check-and-solve    steps     [1] T. Benson, S. Sahu, A. Akella, and A.
continue for the next suspected event. This            Shaikh, “A first look at problems in the cloud,” in
process is very similar to the troubleshooting         Proc. of HotCloud, 2010.
support for desktop printing or networking in          [2] Amazon EC2, “http://aws.amazon.com/ec2/.”
Windows OS. Sometimes the check-and-solve              [3] Amazon EC2 Forum,
steps need to shutdown or restart a instances to       [4] M. Goldszmidt, A. Fox, I. Cohen, J.
solve the problem, which has to get user’s             Symons, S. Zhang, and T. Kelly, “Capturing,
confirmation. If some users want to run their          indexing, clustering, and retrieving system history,”
instances without any interruption, Cloud Vision       in Proc. of SOSP’05, 2005.
sends the solution back to the users for their         [5] P. Bodik, M. Goldszmidt, A. Fox,
own decision. After a problem is reported,             D.B.Woodard, and H.Andersen, “Fingerprinting the
Cloud Vision automatically invokes problem             datacenter:    automated     clas- sification    of
reasoning and uses the same web interface to           performance crises,” in Proc. of EuroSys, 2010.
interact with users        and     acquire    their    [6] A. Whitaker, R. S. Cox, and S. D.Gribble,
confirmation and permission for actions. Figure 2      “Configuration debugging as search: Finding the
shows the complete flow chart of our check-and-        needle in the haystack,” in Proc. of OSDI, 2004.
solve troubleshooting algorithm [9].                   [7] Chunyi Peng, Minkyong Kim ; Zhe Zhang ;
                                                       Hui Lei , “VDN: Virtual machine image distribution
                                                       network for cloud data centers” 2012
             V. RELATED WORK                           [8] HyogunYoon , Hanku Lee, “An Intelligence
                                                       Virtualization Rule Based on Multi-layer to Support
          Much work has applied statistical learning   Social-Media Cloud Service”,2011
methods to detect and diagnose problems in large-      [9] Shufen Zhang ; Xuebin Chen ; Xiuzhen Huo,
scale computer systems. Cohen et al., [4] used a       “Cloud Computing Research and Development
tree-augmented naive (TAN) bayesian network to         Trend”, 2010
learn the probabilistic relationship between SLA       [10] Jackson, K.R. Ramakrishnan, L. ; Muriki, K. ;
violations and system resource usages. They used       Canon, S. ; Cholia, S. ; Shalf, J. ; Wasserman, H.J.
this learned bayesian network to identify              ;Wright, N.J. , ” Performance Analysis of High
performance bottlenecks. Bodik et al. [5]              Performance Computing Applications on the
proposed     a   “Fingerprint” approach,      which    Amazon Web Services Cloud ”, 2010
identifies   the   problem      with    performance
                                                                                                         27
                                   All Rights Reserved © 2012 IJARCSEE

More Related Content

What's hot

SMARCOS CNR Paper Engineering
SMARCOS CNR Paper EngineeringSMARCOS CNR Paper Engineering
SMARCOS CNR Paper EngineeringSmarcos Eu
 
The Computer Aided Design Concept in the Concurrent Engineering Context.
The Computer Aided Design Concept in the Concurrent Engineering Context.The Computer Aided Design Concept in the Concurrent Engineering Context.
The Computer Aided Design Concept in the Concurrent Engineering Context.Nareshkumar Kannathasan
 
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningData Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningIDES Editor
 
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...IDES Editor
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
ZORA MDE Short Presentation 3.2
ZORA MDE Short Presentation 3.2ZORA MDE Short Presentation 3.2
ZORA MDE Short Presentation 3.2Momir Boskovic
 
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)IRJET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Next Generation Automation Final
Next Generation Automation FinalNext Generation Automation Final
Next Generation Automation Finalimpodgirl
 
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...impodgirl
 
Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resourcecsandit
 
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...ijujournal
 

What's hot (18)

L1802028184
L1802028184L1802028184
L1802028184
 
SMARCOS CNR Paper Engineering
SMARCOS CNR Paper EngineeringSMARCOS CNR Paper Engineering
SMARCOS CNR Paper Engineering
 
The Computer Aided Design Concept in the Concurrent Engineering Context.
The Computer Aided Design Concept in the Concurrent Engineering Context.The Computer Aided Design Concept in the Concurrent Engineering Context.
The Computer Aided Design Concept in the Concurrent Engineering Context.
 
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningData Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity Mining
 
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
ZORA MDE Short Presentation 3.2
ZORA MDE Short Presentation 3.2ZORA MDE Short Presentation 3.2
ZORA MDE Short Presentation 3.2
 
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
 
20 74-1-pb
20 74-1-pb20 74-1-pb
20 74-1-pb
 
55 60
55 6055 60
55 60
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N..."Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
 
Next Generation Automation Final
Next Generation Automation FinalNext Generation Automation Final
Next Generation Automation Final
 
Adm Workshop Program
Adm Workshop ProgramAdm Workshop Program
Adm Workshop Program
 
Chap1
Chap1Chap1
Chap1
 
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
 
Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resource
 
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
 

Viewers also liked

Viewers also liked (6)

12 15
12 1512 15
12 15
 
31 34
31 3431 34
31 34
 
46 51
46 5146 51
46 51
 
122 129
122 129122 129
122 129
 
114 120
114 120114 120
114 120
 
ภารกิจระดับครูผู้ช่วย
ภารกิจระดับครูผู้ช่วยภารกิจระดับครูผู้ช่วย
ภารกิจระดับครูผู้ช่วย
 

Similar to 24 27

Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetMicrosoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetDavid J Rosenthal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Vmm level distributed transparency provisioning using cloud infrastructure te...
Vmm level distributed transparency provisioning using cloud infrastructure te...Vmm level distributed transparency provisioning using cloud infrastructure te...
Vmm level distributed transparency provisioning using cloud infrastructure te...ritwik999
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformsPrabhat gangwar
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingijccsa
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingneirew J
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxvrickens
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformspurplesea
 
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWAREPRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWAREIBM India Smarter Computing
 
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareAnalyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareIBM India Smarter Computing
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxbudabrooks46239
 
Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)vvmenon22
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAlessandro Iudica
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxResearch ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxaudeleypearl
 

Similar to 24 27 (20)

Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetMicrosoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheet
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Vmm level distributed transparency provisioning using cloud infrastructure te...
Vmm level distributed transparency provisioning using cloud infrastructure te...Vmm level distributed transparency provisioning using cloud infrastructure te...
Vmm level distributed transparency provisioning using cloud infrastructure te...
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWAREPRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
 
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareAnalyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and Software
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
 
Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
 
F1034047
F1034047F1034047
F1034047
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxResearch ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
 

More from Ijarcsee Journal (20)

130 133
130 133130 133
130 133
 
116 121
116 121116 121
116 121
 
109 115
109 115109 115
109 115
 
104 108
104 108104 108
104 108
 
93 98
93 9893 98
93 98
 
88 92
88 9288 92
88 92
 
82 87
82 8782 87
82 87
 
78 81
78 8178 81
78 81
 
73 77
73 7773 77
73 77
 
65 72
65 7265 72
65 72
 
58 64
58 6458 64
58 64
 
52 57
52 5752 57
52 57
 
41 45
41 4541 45
41 45
 
36 40
36 4036 40
36 40
 
28 35
28 3528 35
28 35
 
19 23
19 2319 23
19 23
 
16 18
16 1816 18
16 18
 
6 11
6 116 11
6 11
 
1 5
1 51 5
1 5
 
134 138
134 138134 138
134 138
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

24 27

  • 1. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 Gleaming the Cloud in the Virtualization layer Janani.V.D, Hari Baabu.V, Sajeev ram.A M.E. Assistant Professor Computer Science and Engineering Computer Science and Engineering Vels University Vels University Abstract-- Cloud Computing is a powerful and physical machine. Similarly IaaS providers such as flexible software environment, which delegates the Amazon’s Elastic Computing Cloud (EC2) [2] are material’s management and in which users pay as they not allowed to look inside the running VM go. Rather than operating their own data centers, today instances [7] because of tenants’ business cloud users run their applications on the remote cloud infrastructures that are owned and managed by cloud confidentiality and privacy. providers. Cloud users create virtual machine instances to run their specific application logic In a local data center, operators usually without knowing the underlying physical need the context information from both infrastructure. On the other side, cloud provider applications and infrastructures for effective manage and operate their cloud infrastructures problem determination. In commercial cloud without knowing their customers’ applications. environments, the decoupled ownership of Due to the disjoint ownership of applications and applications and infrastructures introduces new infrastructures, if a problem occurs, there is no challenges in system management. When users visibility for either cloud users or providers to understand the whole context of the incident encounter problems in their VMs, they have little and solve it quickly. To this end, we propose visibility on the infrastructure layer for root cause software solution Cloud Vision, to provide some determination except trial-and-error troubleshooting visibility through the middle virtualization layer for [9]. It is not even clear who is responsible for fixing both cloud users and providers to address their such problems. To support end users, IaaS problems quickly. Cloud Vision automatically tracks providers often run an online support forum (e.g., each VM instance’s configuration status and Amazon EC2 online forum [3]) where users can maintains their life-cycle configuration record in report their problems and seek solutions. Cloud configuration management database(CMDB). operators often try to solve those problems by When the user reports a problem, our algorithm automatically analyze CMDB to probabilistic manually investigating the system settings of users’ determine the root cause and invoke a recovery VMs. Since operators do not know tenants’ process by interacting with the cloud user specific applications, it is even hard for them to solve problems only based on users’ problem Index Terms— Cloud Vision; Configuration reports. management; Virtualization layer; VM; Troubleshooting; Most of VM problems [ 7 ] in a cloud infrastructure (except those problems caused by I. INTRODUCTION applications running inside VM instances) can be Cloud computing provides a correlated to their configuration events. Examples revolutionary new computing paradigm for of such configuration events include incorrect deploying enterprise applications and Internet update of Access Control List (ACL) in hypervisors, services. There are many evolving cloud computing blocking of access ports inside running VM models, including Infrastructure-as-a-Service (IaaS), instances, connection of virtual devices to Platform-as-a-Service(PaaS), and Software- as-a- unsupported OSes, migration of instances to a slow Service(SaaS), which provide IT infrastructures, machine, incorrect allocation of memory size, platforms, solution stacks, and software connection loss with underlying block storage and applications from the cloud respectively [1]. Cloud so on. For example, on average 28 problems were infrastructures often employ a virtualization layer reported daily to Amazon EC2 online forum in [8] to ensure resource isolation and abstraction. July 2010, complaining about VM unavailability, They are designed to provide restricted visibility to VM hang, Elastic Block Storage (EBS) [2] [7] both users and IaaS providers. Users of crash or loose connectivity, performance problem VirtualMachine (VM) instances [7] are blocked and so on. Problems can occur at the time when from looking down into the infrastructure layer an instance is first created from its source image since multiple tenants might share the same or during running time if its configurations are 24 All Rights Reserved © 2012 IJARCSEE
  • 2. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 changed by some events. models require cloud users to report their problems to operators, who manually investigate the We make two intuitive observations problems to provide solutions. The premium about cloud environments. First, multiple VM support model guarantees a bounded problem instances created from the same image source are resolution time with service charges while the likely to have similar characteristics in best effort model is free but might take 8 to 10 configurations. Second, some configuration days to solve user problems [1]. Hence, our attributes have higher cardinality than others and objective is to provide automated solutions for hence they are less sensitive to configuration cloud providers to address users’ problem quickly changes. Based on those we present a solution and also reduce the cost of manual operations. Our (called CloudVision) for cloud providers to experimental results show that CloudVision can automate reasoning and troubleshooting [9] on user effectively reduce the solution time to seconds. reported problems under the restricted visibility. CloudVision runs in the infrastructure layer and III. CLOUD VISION SYSTEM tracks each VM instance as a standard object ARCHITECTURE running in that infrastructure. In summary, we have made the following contributions: The system architecture of CloudVision is shown in Figure 1 and it consists of three major Representation: CloudVision develops a components: Monitoring Agent, Cloud CMDB and monitoring mechanism at the infrastructure layer to Analysis Engine. automatically capture the event history of all running VM instances in cloud environments [7]. Such event data is further structured and stored in a Configuration Management Database (CMDB). Problem Reasoning: When users report a problem, our solution fetches the related information from the CMDB and further identifies a list of suspect events. We then apply statistical analysis to rank these events based on their sensitivity to configuration changes. Interactive Troubleshooting: Following the list of ranked events, CloudVision takes predefined Figure 1: CloudVision Architecture actions to check and solve problems. For each specific event, operators define the predicates to check whether this event is the root cause as well Monitoring Agent: The Monitoring Agent as the actions to remediate the problem monitors and tracks the configuration attributes of VM instances and infrastructures continuously. II. MOTIVATION We assume that all PM clocks are loosely synchronized. The agent sits in the hypervisor layer so that it can be rolled out through the cloud In a typical cloud environment, infrastructures as a standard management component. Operators of the cloud provider monitor their Section IV-A discusses the details of data infrastructure stacks from the hardware layer such collection. as servers and network devices and up to the hypervisor layer. While the cloud provider ensures a highly available cloud infrastructure, it typically Cloud CMDB: CMDB Manager structures does not guarantee the availability of individual VM and stores configuration data sent by the instances since it is not even aware of what is monitoring agent into a database called running inside those VM instances. Therefore, cloud Configuration Management Database (CMDB). users will occasionally encounter various problems CMDB is often used for asset and configuration with their VM instances [7]. management in large data centers. In this paper, we use a CMDB to track the life-cycle Cloud providers offer several options to configuration information of VM instances. It is address cloud users’ problems including a free best a relational database and each row includes a effort service with no Service Level Agreement configuration change along with its timestamp and (SLA) guarantee and a premium commercial grade health status (sick or healthy). Initially all rows are support with SLA guarantees [1]. Both support marked as healthy. If a configuration change is found to be the cause of a reported problem, the 25 All Rights Reserved © 2012 IJARCSEE
  • 3. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 row containing this change is marked as sick in When a problem is reported, the analysis engine the database during the troubleshooting step [9]. analyzes the related CMDB records of the reported In Section IV-B, we discuss how CMDB is VM instance [ 7 ] to determine the suspect events designed and populated in cloud infrastructures. and then tries to check the root. cause and solve the problem. The whole process is divided into three steps: Identifying Suspect Events, Event Ranking Analysis Engine: After users encounter a and finally Interactive Troubleshooting. problem with their VM instances [7], they report the problem to CloudVision via a web interface. 1) Identifying Suspect Events: when a problem of The Analysis Engine fetches the data related to a VM instance occurs, it is most likely caused the reported VM from the CMDB and compares its by the recent events of that VM instance. As the current configuration set with its historical CMDB maintains the complete event history of records to determine a list of suspect events. Then VM instances, the analysis engine can determine the engine employs statistical analysis to rank the the list of suspect events from the CMDB. Each list of suspect events and uses predefined predicates event is associated with a change in the and actions to check these events and resolve the configuration attribute called suspect attribute. problem. Not all problems can be automatically CloudVision identifies the changes of the reported resolved by CloudVision since some problems are instance by comparing its current configuration to beyond the management responsibility of cloud the latest known stable configuration. Any providers. However, the suspected events are configuration that persists longer than a specific reported to end users with an interactive duration of time is considered as a stable troubleshooting process [9] and its design details configuration. Unstable configurations may arise given in Section IV-C. when users try to fix problems by trial and error so that every configuration change only lasts for a IV. CLOUD VISION DESIGN A N D very short period of time. IM P LEME NTATION 2) Event Ranking: After determining the set of A. DataCollection suspect events, CloudVision ranks them based on Cloud Vision runs an event-based monitoring how likely an event could be the problem root agent at the hypervisor layer of each physical cause. As the set of suspect events can be large, we machine. The agent collects system configuration reduce the problem resolution time by checking the data shell scripts. The shell scripts use virsh events in their ranked order. An event is highly management interface library to collect values of suspected if it is very rare to occur. To measure con- figuration attributes of running VM instances this, we define a sensitivity metric and rank the and it also collects IP addresses of running guests set of suspect events according to their sensitivity, by looking into the system. Collected information i.e., the sensitivity of an attribute to change. are represented using an XML format. We define two types of event sensitivity: local Configuration data is collected periodically but it is sensitivity and global sensitivity. The local not sent to the CMDB Manager unless there is a sensitivity defines the probability of an event’s change in the configuration data compared to the occurrence using the event history of the previous one, which indicates new events. Hence instances originated from the same image source. the data collection is event-based to reduce Meantime the global sensitivity defines the network overhead. probability of an event’s occurrence using the event history of all VM instances regardless of their image B. Populate CMDB sources. The central CMDB Manager node runs program that collects event-based configuration data from 3) Troubleshooting: After determining and monitoring agents. It parses collected XML ranking suspect events, Cloud Vision performs messages and uses a relational database to structure troubleshooting actions, which include two major and store all configuration data along with the steps: Check and Solve. For each suspect event, reported timestamp. Each row in the database the check step checks whether it is the true root indicates at least a single change in the set of cause (or culprit event) of the problem. The solve configuration attributes and it is also associated step tries to solve the problem automatically if with a status tag that defines whether the the solution is within the management configuration is sick or healthy. Initially all entries responsibility of the cloud provider, otherwise are set to be healthy and a configuration is changed Cloud Vision recommends the solutions to the to be sick only if it is proved to be faulty during the cloud users. To identify the root cause, Cloud troubleshooting process. Vision uses a series of predefined predicates to check each suspect event, starting from the top of C. CMDB Analysis the ranked suspect events. The suspect events are 26 All Rights Reserved © 2012 IJARCSEE
  • 4. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 first classified into one or more problem classes. fingerprinting. There also exist some literature on Actions are defined for each individual problem configuration man- agement. Whitaker et al. [6] class and also include a series of predicates to developed a tool named Chrouns to automatically check the existence of the corresponding problem. search for a configuration state change indicating a failure. It stores local system config- urations at each checkpoint along time. When a problem occurs, Chronus takes user-provided probes to identify the working and non-working configuration state. This approach is quite similar to our check and solve step. VI. CONCLUSION In this paper, we present Cloud Vision, a novel solution for automated problem troubleshooting in cloud environments. Cloud Vision monitors and tracks the configuration attributes of VM instances [ 7 ] and infrastructure, and uses the historical event records to determine the root cause of problematic VM instances, and further provides a check-and-solve troubleshooting process to resolve user reported problems automatically. In our future work, we plan to Figure 2: Check-and-solve flow chart monitor more configuration attributes from cloud infrastructure and design new predicates and actions The check-and-solve troubleshooting process is to cover more problem classes. done interactively with users. After each solve step, users are asked to provide feedbacks. If the REFERENCES problem is solved, the troubleshooting process ends; otherwise the check-and-solve steps [1] T. Benson, S. Sahu, A. Akella, and A. continue for the next suspected event. This Shaikh, “A first look at problems in the cloud,” in process is very similar to the troubleshooting Proc. of HotCloud, 2010. support for desktop printing or networking in [2] Amazon EC2, “http://aws.amazon.com/ec2/.” Windows OS. Sometimes the check-and-solve [3] Amazon EC2 Forum, steps need to shutdown or restart a instances to [4] M. Goldszmidt, A. Fox, I. Cohen, J. solve the problem, which has to get user’s Symons, S. Zhang, and T. Kelly, “Capturing, confirmation. If some users want to run their indexing, clustering, and retrieving system history,” instances without any interruption, Cloud Vision in Proc. of SOSP’05, 2005. sends the solution back to the users for their [5] P. Bodik, M. Goldszmidt, A. Fox, own decision. After a problem is reported, D.B.Woodard, and H.Andersen, “Fingerprinting the Cloud Vision automatically invokes problem datacenter: automated clas- sification of reasoning and uses the same web interface to performance crises,” in Proc. of EuroSys, 2010. interact with users and acquire their [6] A. Whitaker, R. S. Cox, and S. D.Gribble, confirmation and permission for actions. Figure 2 “Configuration debugging as search: Finding the shows the complete flow chart of our check-and- needle in the haystack,” in Proc. of OSDI, 2004. solve troubleshooting algorithm [9]. [7] Chunyi Peng, Minkyong Kim ; Zhe Zhang ; Hui Lei , “VDN: Virtual machine image distribution network for cloud data centers” 2012 V. RELATED WORK [8] HyogunYoon , Hanku Lee, “An Intelligence Virtualization Rule Based on Multi-layer to Support Much work has applied statistical learning Social-Media Cloud Service”,2011 methods to detect and diagnose problems in large- [9] Shufen Zhang ; Xuebin Chen ; Xiuzhen Huo, scale computer systems. Cohen et al., [4] used a “Cloud Computing Research and Development tree-augmented naive (TAN) bayesian network to Trend”, 2010 learn the probabilistic relationship between SLA [10] Jackson, K.R. Ramakrishnan, L. ; Muriki, K. ; violations and system resource usages. They used Canon, S. ; Cholia, S. ; Shalf, J. ; Wasserman, H.J. this learned bayesian network to identify ;Wright, N.J. , ” Performance Analysis of High performance bottlenecks. Bodik et al. [5] Performance Computing Applications on the proposed a “Fingerprint” approach, which Amazon Web Services Cloud ”, 2010 identifies the problem with performance 27 All Rights Reserved © 2012 IJARCSEE