Multi Tenancy In The Cloud

15,718 views

Published on

A detailed presentation on the aspect of Multi-Tenancy in the Cloud Environment with 4 case studies

0 Comments
23 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
15,718
On SlideShare
0
From Embeds
0
Number of Embeds
32
Actions
Shares
0
Downloads
0
Comments
0
Likes
23
Embeds 0
No embeds

No notes for slide
  • This definition states that Clouds have five essential characteristics: on-demand self-service(real time), broad network access, resource pooling, rapid elasticity, and measured service.This definition by default assumes the Cloud services as Infrastructure as a Service (IaaS). IaaS could be very successful in development and testing environment, because those public Cloud offering cheap and instant infrastructure services could ease the reach to IT resources.
  • Multi-tenancyallows a single application to emulate multiple application instances.Enterprise IT infrastructure incurs many costs ranging from hardware costs and software licenses/maintenancecosts to the costs of monitoring, managing, and maintaining IT infrastructure.Tenant could be an Application owner. But from a cloud providers perspective, the application owner could be a cloud provider like SalesForce.comin the cloud the data is the only thing that matters: for SaaS, this is the data stored within the Cloud Application, for PaaS that could be the application written by the Tenant and the associated data, and for IaaS this will be the virtual machines, virtual networks, and other bits below the application. Our definition of Tenant must handle all these cases.The Tenant is the Legal Owner of the data that resides within the system.SMT ( Secure Multi Tenancy) for a cloudMulti Tenancy and PaaS:PaaS Generation I : Simply offer a Physical Machine or a Cluster as per user’s needPaas Generation II : Use OS level Virtualization to create Virtual Machines per customer that share a single server or a cluster of real servers. Amazon Relational data service, provides elasticity as wellPaas Generation III: Deploy multi tenancy, essentially virtualize the middleware servers and allow a single instance to be securely shared among tenants or different customers. IaaS : The definition presented in the first slide, by defaut assumes the Cloud Services as IaaS.The AppFabric Container provides base-level application infrastructure such as automatically ensuring scale out, availability, multi-tenancy and sandboxing of your application components.(Microsoft, Windows Azure)Cloud-enabling infrastructure to allow secure multi-tenant deployments, including fully integrated management, monitoring, metering and billing infrastructure (CloudBees)If you are running numerous applications/application instances, XAP’s fine-grained multi-tenancy allows you to share them across all available machines, instead of running only one instance per machine. This allows you to support more users on each machine. (GigaSpaces)Amazon’s EC2 is also a multi-tenant platformMulti-tenant components:  application code, operating system, data storage software, and computing resources.
  • Multi-tenancy can be applied at the database layer of a hosted service, where it can be very effective due to the high cost of provisioning and operating databases.multi-tenant databases are essential for hosted services to manage high traffic volumes at low cost.The administrative framework of a multi-tenant database should maintain metadata about customers, such astheir contact information, their location in the farm, and the features they are allowed to access. Certainadministrative operations will need to access this metadata alongside of customer data. For example, a serviceprovider might want to scan the metadata to find all customers in a given region and then determine which ofthose customers have more than a certain amount of data. To support such operations, the administrativeframework should offer a unified query language that obviates the need for a general-purpose programminglanguage with embedded queries. In addition to being easier to use, this approach makes it simpler to executeadministrative operations in bulk on individual databases in the farm.
  • Advantages: 1. Veryeasy to implement asit does not require modifying the implementation of the database.2. In addition, it does not substantially reduce customer isolation, particularly if each process is placed in its own virtual machine.3. Metadata associates each database with the correct tenant, and database security prevents any tenant from accidentally or maliciously accessing other tenants' data.4. Giving each tenant its own database process makes it easy to extend the application's data model to meet tenants' individual needs, and restoring a tenant's data from backups in the event of a failure is a relatively simple procedure.5. Restoring a single tenant's data means simply restoring the database from the most recent backup.6. Customer migration is straightforward, just move files from one server to another.Disadvantages:1. This approach tends to lead to higher costs for maintaining equipment and backing up tenant data. Hardware costs are also higher than they are under alternative approaches, as the number of tenants that can be housed on a given database server is limited by the number of databases that the server can support.2. Because isolation between customers is strong in this approach, executing administrative operations in bulk is not feasible: each database will execute queries on its own.3. providing seamless access to shared data requires a mechanism to access it remotely, otherwise it will end up being replicated multiple times on the same server.4.limitation of this approach is that each database requires its own connection pool on each application server, so sockets will not be shared among customers. To improve this situation, the implementation could be modified to share memory and sockets among co-located database processes, possibly at a level below those processes.Example, customers in fields such as banking or medical records managementAn example of this approach is CasJobs, which supports analysis of data in the Sloan DigitalSky Survey database
  • Advantages:1. it is useful if each customer gets their own physical table space so that customer migration entails simply moving files from one server to Another.2. it allows the system administrator to balance the I/O load by distributing customers across different backing disks.3. This approach is considerably better at pooling memory.4. Since there is only one database in this approach, customers can share connection pools.There is a well-known downside to connection pooling however: all connections must be associated with a fixed principal who can access everything. This means that both security and the management of resource contention have to be handled at the application layer. Thus errors in the application code could allow one customer to access another customer’s tables or prevent them from getting their fair share of resources. This problem could be mitigated by allowing the principal associated with a database connection to be picked up from the application server. Support for this feature is beginning to appear in databases today.5. This approach should easily scale up to thousands of active customers per server, a two orders of magnitude improvement over the shared machine approach.Disadvantages:1. Tenant data is harder to restore in the event of a failure. 2.With a separate-table application, restoring the entire database would mean overwriting the data of every tenant on the same database with backup data, regardless of whether each one has experienced any loss or not. Therefore, to restore a single customer's data, the database administrator may have to restore the database to a temporary server, and then import the customer's tables into the production server—a complicated and potentially time-consuming task.
  • Every application query is expected to specify a single value for theTenantIDTo allow customers to extend the base schema, each table is given a fixed set of additional generic columns. These columns might be of type VARCHAR,Adv:1.This approach is clearly the best at pooling resources.2. Its ability to scale up is limited only by the number of rows the database can hold, which should offer several orders of magnitude improvement over the shared process approach.3. Administrative operations can be executed in bulk simply by executing queries that range over the TenantId column.4. since there is only one database, customers can share connection pools. DisAdv:since files on the disk have intermingled data from multiple customers, migration requires executing queries against the operational systemsuch intermingling can impact the performance of accessing a customer’s data, since it may be spread out across many pagessecurity can be pushed down into the database only if different access privileges can be assigned to different rows in the same table.the use of generic columns is feasible only if the database has a compact representation for sparse tablesif typing of the generic columns has been abandoned, it will be hard to use column-oriented features such as indexes and integrity constraintsqueries intended for a single customer have to contend with data from all customers, which compromises query optimization.
  • A service is a well-defined, self-contained unit of functionality, independent of the state of other services.Concept of SOA comes into picture.Integration between two or more applications running on different platforms would require a middle component-dependent intercommunication layerservices can be used to create distributed applications, integrate component-based applications, and make them communicate with each otherTypically services reside on different machines. They are exposed to the outside world by service interfaces. A service provider provides its functionality using the service interfaces that are used or consumed by the service consumers. A service consumer sends a service request to a service interface and receives a service response.Software as a Service (SaaS) is a model of software deployment whereby a provider licenses an application tocustomers for use as a service on demand.“On-demand” licensing and use alleviates the customer's burden of equipping a device with everyconceivable application. It also reduces traditional End User License Agreement (EULA) software maintenance, ongoingoperation patches, and patch support complexity in an organization.SaaS – old concept, gained momentum in around 2001
  • In the hosted service a service provider develops an application and operates the system that hosts it. Customers access the application over the Internet using industry-standard web browsers or Web Services clients.Evolution: Started with the Application Service ProviderAdv:1. reduce the total cost of ownership of an application by aggregating customers together and leveraging economy of scale.2. This principle applies to both capital expenditures, e.g., for hardware and software, and operational expenditures, e.g., for bandwidth and personnel. Because a hosted service is focused on one application, the infrastructure and the procedures for managing it can be highly optimized:Multi-tenancy is an optimization for hosted services in which multiple customers are consolidated onto the same operational system, a technique pioneered by salesforce.com.Multi-tenancy allows pooling of resources, which improves utilization by eliminating the need to provision each customer for their maximum load.Multi-tenancy can also improve management efficiencies by providing a uniform framework for administering the systemA multi-tenant system should support both scale up and scale out, scale up by consolidating multiple customers onto the same server and scale out by having the administrative framework span a farm of such servers. Scale out is required because it is not cost effective to scale up a single server IndefinitelyThe administrative framework of a multi-tenant system should support the ability to migrate a customer from one server to another within the farm.For example, a customer might start out on a server that manages trial accounts, be moved to a server that manages small production accounts, and grow until it is moved to a dedicated server that manages only one account.Migration should also be possible between farms, for example, to allow customers to be moved from one data center to another.The administrative framework should also support rolling upgrade, where the servers in a farm are upgraded to a new version of the application one at a time
  • Multi-tenant is appropriate for business tasks that are common across many customers or divisions of a company.Multi-tenant architectures for ERP
  • Virtualization: ability to run a high number of virtual machines than what is physically available as hardware servers.H/W Virtualization deals with creation of Virtual Machines.S/W Virtualization: Operating system-level virtualization, a type of server virtualization technology which works at the OS layer. The physical server & single instance of the operating system is virtualized into multiple isolated partitions where each partition replicates a real server. The OS Kernel will run a single Operating System and provide that Operating System functionality to each of the partitions.Operating system-level virtualization is a server virtualization method where the kernel of an operating system allows for multiple isolated user-space instances, instead of just one. These instances are called containers. So, the software installed needs to be complaint with the Operating System. This leads to a loss in Operating System flexibility. This is an acceptable tradeoff if you consider Web Applications only.H/W Virtualization: serious limitations when it comes to scaling to large numbers of concurrent virtual machinesThis results in a higher per virtual machine instance cost compared to a traditional shared hosting solution.
  • Hardware based virtualization has a serious limitation when it comes to scaling of large number of concurrent virtual machines running on a given physical server. This results in a higher per virtual machine instance cost compared to a traditional shared hosting solution. There are lots of opinions running around about Virtualization – some say that it is a part of Cloud Computing, some say that it is not important and adds extra complexity to cloud computing , vendors say that Virtualization is inherently a cloud infrastructure, some even say that Virtualization & cloud computing are one and the same.
  • Next generation multi-tenant virtualization cloud computing platform - they call it Uranus
  • Uranus focuses on increased scalability and security and remaining flexible by not requiring applications to be modified in any special way in order to support multi tenancy.Used for web applications. The platform is built on popular Linux, Mysql, Apache, PHP with the aim of supporting around 1000 existing LAMP based applications.LAMP is an acronym for a solution stack of free, open source software, referring to the first letters of Linux (operating system), Apache HTTP Server, MySQL (database software) and PHP (or sometimes Perl or Python), principal components to build a viable general purpose web server.Another surprising thing about a typical LAMP server (for example one you might rent in the cloud or as a dedicated server) is that they do not actually have the AMP components installed (only the L, that is, the Linux is actually there)LAMP based web sites or applications appear to be thousands of pages but these pages are actually assembled at the moment of request from just a few templates. When you click the "Find" button on Ebay, for example, the web server execute program code that does the lookup by calling the SQL server and assembles a page showing the items it found. Likewise, when one of these links is clicked the web server executes program code to lookup the details of the item. In a LAMP system the SQL database product employed is MySQL and the program code woven into the pages is written in a language named PHP (more information below).The SQL server, like Apache, runs all the time waiting for database requests. However unlike Apache, SQL only accepts SQL requests from programs written in a language like PHP. When a web page contains a PHP program the PHP interpreter is launched on the server and it interprets the PHP instructions on the page and carries them out. It is thus the PHP program code that interacts with MySQL and ApacheThousands of new companies have sprung up to provide services to those adopting LAMP, making it easier, more scalable, cheaper, fault tolerant, etcCloud computing is an example, now with an account at a cloud provider like Amazon, Rackspace you can create a virtual server and install Linux (with a choice of a dozen different distributions) in less than a minute. Your virtual server can be connected to a URL, backed up, templated to create others and removed quickly. And these virtual servers scale to meet traffic demands, have load balancing and integrate with specialized database servers.Reverse Proxy Layer: This is where the users HTTP request first encounters the system. This layer consists of one or more reverse proxy servers that route the users HTTP Calls to the corresponding back end LAMP server found in the virtualization layer.These servers are implemented using Apache Web server running in a reverse proxy mode.
  • The ProxyPass Port: 9101 is the port of the Apache server within the Virtualization layer to which the HTTP request is being handed over toa reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client as though it originated from the reverse proxy itself
  • Each tenant exists as a separate system user with a dedicated home directory which is shared by the tenants own Apache & Mysql processes.This is unlike H/W virtualization where each VM has a complete copy of an OS image including all applications. In this implementation they share the systems application files.They don’t share the same application process but they share the physical executable binary files and therefore benefit from being able to update just one system and have all the virtual systems take advantage of it as opposed to having to update several VM’s separately.Process & Data isolation The dedicated home directory of the tenant is accessible only to that specific tenant’s processes and all data such as websites, databases , log files are completely isolated in a sand box like environment. Thus Uranus provides Process & Data isolation for a high level of security.
  • Apache Virtualization:Each Apache process of a tenant runs on its own unprivileged port as the tenant user. This gives process isolation. Thus each process instance can be customized based on the required resources as well as being able to prioritize its CPU allocation in a much more granular manner.The system also provides PHP level customization using a custom php.ini file for each tenant.Mysql Virtualization:Usedmysqld_multi tool for launching multiple mysql instances.Functionally similar to Apache in the sense that a separate Mysql process is started for each tenant running on its own mysql port and having its own database.Mysql process is started using a common system user called mysql and requires a common database user account and password within each tenants mysql database.Ex: user = multi_adminPassword = aim3Mer6This common database account is required by the mysqld_multi script to have control over shutting down the database instance.Does sound like a security risk, however this database account does not have any permissions other than to shut down the database server. So it cannot be used to access the tenants application data. Its not absolutely required, but it offers convenience to managing Mysql instances centrally & can be shut off.
  • a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers, untrusted users and untrusted websitesa sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers, untrusted users and untrusted websites
  • http://www.ibm.com/developerworks/webservices/library/ws-multitenantpart2/index.htmlFoundation of SaaS multi-tenancyIsolation & customization of web applicationsSeparation of concern of diff rolesIntroduction of Multi-tenancy should not bother other roles.Ex: A developer does not need ot learn multi-tenancy but should focus on the applicationMT should be like a plugin, the middleware provider would like to have an add on without maintaining two editions.The SaaS cloud platform operator would like to minimize the effort of deploying and provisioning the multi-tenant application without additional deployment and administration effort.
  • Web Application Server has a Servlet Container as well as an EJB containerAt the Application Server tier the tenant content information will be carried by a thread and be used to route to tenant specific application server classes throughout the life cycle of the thread.
  • Isolation & Customization are the foundations of SaaS Multi-tenancy
  • Security Isolation:one also needs to consider additional potential security risk introduced by other tenants who share the same application instance and resourcesPerformance Isolation:The tenants as well as the system administrators are naturally concerned about how to prevent one tenant’s behaviors from affecting the performance of other tenants. In addition, the tenants have the rights to receive the service levels that they have paid for.Availability Isolation:When many tenants share the same application instance, it is critical for the environment to detect any faults and stop the propagation of the faults at the earliest possible time.
  • General Application model that can be applied to all Web based modelsParameters for the AppNodeParameters for the DBNodeParameters for the Link
  • A topology model is an aggregation of definition of all nodes that make up the cluster built with virtual images.
  • After the Topology file is parsed the ImageID and Image location as well as parts of the information will be derived. The files will be retrieved from storage and will be installed on the base image.
  • An offering management application may cover many functions such as creating a new offering, updating an offering, etc. When creating a new offering, some compulsory information must be filled or selected such as the name of the offering, types of SLA this offering supports, whether this offering needs to be activated immediately, entry point of provisioning service (to be used to make the tenants onboarding).
  • The contents shown in the UI in Fig. 10 vary from applications to applications. The contents will be automatically generated based on the metadata of the multi-tenant application which is derived from the application transformation phase
  • Multi tenancy:Every tenant’s monitoring information flows through the same stream management system, but the information is only to be seen by its intended recipient(s). The system therefore has to make sure that information about the intended recipient(s) is transferred with the messages and that messages are appropriately filtered before being passed to user applications. Isolation in terms of tenant visibility is thereby achieved.Such filtering is performed by the message propagation system before delivering messages to their recipients. The data format as described before contains a field that denotes the intended recipients. This field is stripped from the notification before delivery to the recipients in order to avoid recipients being able to learn about other recipients of a particular message. The handling of tenant information is therefore completely shielded from the tenants, making the multi-tenancy property invisible to the tenants.
  • A main building block of the architecture is a generic event notification propagation system, called a “message bus”.Filtering and aggregation engine: As the name suggests, it filters event notifications based on certain criteria and in particular aggregates notifications.The aggregation facility is mostly used to aggregate streams of individual notifications over time, meaning that it creates coarse-grained streams of notifications from finer grained ones. For example, it can be used to create notifications of CPU utilization with a granularity of one minute from a stream of CPU utilization measurements with the granularity of one second.Similarly, it is used to aggregate streams of measurements of the same type originating from different agents into one aggregated stream. For example, CPU utilization measurements from different servers can be accumulated into one stream expressing the aggregated CPU utilization of the server farm.Every monitorable resource in the data center has one or more agents attached to it. The agents are the source of all monitoring information.They measure certain parameters and periodically or on-demand pass this information on to the message bus. Once on the message bus, the notifications are filtered and aggregated and, depending on the configuration, they are propagated to specific monitoring and control applications and are stored for later use in a data store. The monitoring and control applications are external to the monitoring infrastructure and are supplied and operated by either the data center operator (SaaS Operator) or the tenants.Both agents and monitoring applications are decoupled from the message bus by an adaptation layer – adapterit abstracts from the actual core monitoring system implementation and thereby insulates the agents and applications from the particular implementation technology used for the message bus and aggregation engine.Agents announce their capabilities and the resources they monitor to the configuration system. The information about the agents is stored in a Configuration Management Database (CMDB). Applications can query the CMDB, e.g., to find out which agents are available for a certain tenant. the agents have no information about their own location or about the tenant(s) they are associated with.The monitoring system, on the other hand, needs to associate each data message with the sending agent as well as with the corresponding tenants.Longer-term storage of events (e.g. longer than one hour) happens in a data store, which can be a regular data base or a cloud-like storage infrastructure, such as BigTable.
  • The SLA for this application requires that a request to the application needs to be returned within 2 secondsAt a certain snapshot, suppose15 requests are sent the application per second. <Case 1>:Twice as many intermediate requests are generated for B as C: RB= 2 Rc. After A, 10 RB are sent to B, and 5 RC are sent to C, therefore, the application can return these requests within 2 seconds successfully. The application is at the optimal condition, since all of its components are working at the maximal capacity. <Case 2>: if twice as many intermediate request are generated for C as B: RC= 2 RB. After A, 10 RC are sent to C, 5 RB are sent to B. All the requests to B can be processed in one second. Because C’s throughput is 5, it takes 2 seconds to process these 10 intermediate requests, or it can only process 5 of them in 1 second. Therefore, only 10 RAPP are successfully returned in 2 seconds. In this situation, B is under loaded, and C is overloaded.
  • Access Control:implicit filter: when one tenant requests to access shared resources, a common platform level account is delegated to handle this request. The delegated account is shared by all tenants and has the privileges to access resources of all tenants. explicit permission : In this pattern, access privileges for the resources have been explicitly pre-assigned to the corresponding tenant accounts by using the Access Control List (ACL) mechanism. In essence, how can I protect my data from those who are not allowed access to the data. In other words: a trust no one model specifically the cloud administrator(s).a level of auditing and monitoring of  administrator actions, to see if they have touched the data. Auditing is after the fact, what we need here is preventionExample:The current SMT design from Cisco-VMware-NetApp (CVN) looks to be all about availability of storage IO and ignores Data Integrity and Confidentiality. Cisco even claimed “we did not think about security” when designing the initial solution. Cisco is worried about Quality of Service, I.E. Bandwidth through out the system to the disk. Furthermore
  • the goal of tenant oriented fault isolation is to reduce X/N, the ratio of fault propagation among tenants, as much as possible.
  • Multi Tenancy In The Cloud

    1. 1. “Cloud Computing is a computingcapability that provides an abstractionbetween the computing resource and itsunderlying technical architecture, enablingconvenient, on-demand network access to ashared pool of configurable computingresources that can be rapidly provisionedand released with minimal managementeffort or service provider interaction.” -Hong Cai, IEEE Senior Member; Ning Wang, Ming Jun Zhou
    2. 2. A non-technical Analogy to the concept of Multi- tenancy • Customers have to Effective use of land install & update their own software Privacy • Customers manage Infrastructure / their own data • Every Customer needs Sharing Maintenance Cost his own server for General Maintenance deployment  Freedom • Customizations are easy • High initial costs
    3. 3. Multi-tenancy Multi-tenancy is a critical technology to allow one instance of application to serve multiple customers by sharing resources.  multi- multiple, independent customers are served  tenant is any legal entity responsible for data and is provided on a contractual basis. Tenant is the contract signee Applications : IaaS, PaaS, SaaS
    4. 4. Cloud Computing Service Models
    5. 5. Multi-tenancy in Databases [7] What is the most important asset of any business ? Trust between customer & vendor is a key factor Tenant database is the cornerstone of tenant management. Data architecture for a multi-tenant system should be  Robust  Secure  Efficient  Cost- effective Three approaches to managing multi-tenant data (Database layer)  Separate Database Process, Shared Machine  Shared Database Process, Separate Tables  Shared Table
    6. 6. Each tenant gets theirown database processand multiple tenantsshare the samemachine.Computing resourcesand application code aregenerally sharedbetween all the tenantson a server, but eachtenant has its own setof data that remainslogically isolated fromdata that belongs to allother tenants.• Advantages Separate Database Process, Shared• Disadvantages Machine
    7. 7. Each tenant gets theirown tables and multipletenants share the samedatabase process.It involves housingmultiple tenants in thesame database, witheach tenant having itsown set of tables that aregrouped into a schemacreated specifically forthe tenant.• Advantages• Disadvantages Shared Database Process, Separate Tables
    8. 8. It involves using thesame database and thesame set of tables to hostmultiple tenants data.A given table caninclude records frommultiple tenants storedin any order; a TenantID column associatesevery record with theappropriate tenant.• Advantages• Disadvantages Shared Table
    9. 9. Applications optimizedfor a shared approachtend to require a largerdevelopment effortthan applicationsdesigned using a moreisolated approach(because of the relativecomplexity of developinga shared architecture),resulting in higher initialcosts. Because they cansupport more tenantsper server, however,their ongoingoperational costs tend tobe lower. Choosing an approach – Economic considerations
    10. 10. Memory Memory Disk Disk 10,000 10,000 1 instance instances 1 instance InstancesPostgreSql 55 79 4 4,488MaxDB 80 80 3 1,168Commercial 171 616 200 414,2101Commercial 74 2061 3 6932Commercial 273 359 1 13,6303 Storage Requirements for Schema instances
    11. 11. From Multi-tenant database to a Multi-tenant SaaS
    12. 12. What was the SaaS Vision What is a Service ?  Intangible & insubstantial commodity, no ownership  A service is a set of one time consumable and perishable benefits delivered from the accountable service provider How does Software classify as a Service ? OR What is the difference between Software as a Product and Software as a Service ?  On-demand software What are the Advantages of SaaS, in terms of economic impacts?  On demand licensing  Low cost user provisioning (setting up a user)
    13. 13. Hosted Services & Multi-Tenancy What is a Hosted Service Model ?  In the hosted service a service provider develops an application and operates the system that hosts it. What are its advantages ?  1. reduce the total cost of ownership of an application by aggregating customers together and leveraging economy of scale.  2. This principle applies to both capital expenditures, e.g., for hardware and software, and operational expenditures How does multi-tenancy help here ?  Multi-tenancy is an optimization for hosted services in which multiple customers are consolidated onto the same operational system What are the characteristics of such a multi-tenant system ?  Multi-tenancy allows pooling of resources, which improves utilization by eliminating the need to provision each customer for their maximum load.  Multi-tenancy can also improve management efficiencies by providing a uniform framework for administering the system Multi-tenancy at different layers of hosted service
    14. 14. 1. Single ApplicationInstance2. Multiple ApplicationInstances, SharedAddress Space.3. Multiple ApplicationInstances, SeparateAddress Space4. Multiple VirtualImages Five Major Approaches for enabling5. Multiple Instances on multi-tenancy [2]Separate Hardware
    15. 15. Multi-tenancy & Virtualization
    16. 16. Multi-tenant Virtualization platform Define Virtualization Hardware Virtualization v/s Software Virtualization Multi-tenant virtualization is cost-effective. Multi-tenant virtualization provides a high degree of concurrent virtual environments by sharing hardware / software platform securely to provide isolation between instances. Requires applications to be modified or developed from scratch to target a specific multi-tenant virtualization platform. (inflexible, ex. Salesforce.com – CRM)
    17. 17. Towards building a complete Multi-tenant cloud1. Next generation multi-tenant virtualization cloudcomputing platform [3]2. A Transparent Approach of Enabling SaaS Multi-Tenancy in the Cloud [4]3. Towards Holistic multi-tenant monitoring ofVirtual Data Centers [6]4. Two tier multi-tenancy scaling and loadbalancing [5]
    18. 18. 1. Next generation multi-tenantvirtualization cloud computing platform[3] Multi-tenant virtualization platform – Uranus Increased scalability & security maintaining flexibility
    19. 19. Functional Layers • Reverse Proxy Layer • Virtualization Layer • DNS Layer Multi-tenant virtualization cloud computing platform
    20. 20. UranusReverse Proxy Layer
    21. 21. The users’ HTTP requestsfirst encounter the systemhere.This layer consists of oneor more reverse proxyservers that route theHTTP call to the LAMPserver in the VirtualizationlayerOne or many Apache webservers running onstandard HTTP port (80)but using a reverse proxyconfigurationApache caching modules– cache & mem_cache toenhance performance &scalability. This reducesthe no. of HTTP requests Apache Configuration for Reverseto the back-endVirtualization layer by Proxycaching hot objects
    22. 22. UranusVirtualization Layer
    23. 23. Components Consists of several LAMP components, each consisting of a separate Apache & Mysql instance. These servers implement the LAMP stack to which individual LAMP applications would be deployed It’s a multi-tenant Virtualization layer Each tenant exists as a separate system user with a dedicated home directory which is shared by the tenants own Apache & Mysql processes Process & Data isolation Apache Virtualization Mysql Virtualization
    24. 24. ConfigurationsApache config for tenants Mysql config setup
    25. 25. The base OS directorystructure was replicatedas shown in the snippeton the rightEach Tenant is capable frunning multiple LAMPand static websiteswithin their allocateddirectory.The snippet depicts atypical tenants sand-boxed file system.This file is shared by the Tenant ‘s sand-boxed filesystem
    26. 26. Proxy Server: Should bea powerful one withmoderate amount ofmemory/CPU in order tohandle the manythousands of concurrentconnections and cachingof hot objects.DNS server has beenexcluded under theassumption that thisfeature is alreadypresent in the network Deployment Diagram
    27. 27. UranusTesting
    28. 28. Threshold for Single Apache withno other load
    29. 29. Regardless of whetherwe are running a singleapache/mysql or 40 idleapache/mysql there ishardly a differenceThe performance hit byusing their virtualizationmethod does not impactthe system performance Threshold for Single Apache with 40 idle tenants
    30. 30. Threshold for single Apache with 40loaded tenants
    31. 31. In this and the previousthe system is put underconstant load .They get a similarthreshold value whetherthey are benchmarking asingle apache instancebeing constantly loadedor where there are 40instances where the loadis equally spread Threshold for Single Apache while being constantly loaded
    32. 32. 2. A Transparent Approach ofEnabling SaaS Multi-tenancy in the Cloud [4] Foundations of SaaS multi-tenancy Separation of concern of different roles Integration of SaaS multi-tenancy with cloud virtualization
    33. 33. The Conceptual Model of SaaS Multi-tenancy TOPOLOGY OF MODERN WEB APPLICATIONS
    34. 34. Web Application isdeployed on a WebApplication ServerDatabase Server isusually installed on aseparate machinedevoted to databaseprocessingA remote LDAP servermay provide directoryaccess serviceA remote MessageQueue server mayprovide messagingservice Topology of a production stage Web application deployment
    35. 35. Foundations of SaaS Multi- tenancyIsolation and Customization
    36. 36. An isolation pointmeans a specific Webapplication artifact(class, method, field) etc.that has its tenantspecific behavior orvalue.The isolation pointscould be identified at theapplication migrationphase & stored in ametadata repositorySaaS applications canprovide customizations& configurations only onthe basis of the isolationpoints Concept of Isolation & Isolation points
    37. 37. Tooling for the Application Development Team SaaS multi-tenancy tooling as an Eclipse based plug- in Adds a new isolation point view to the traditional Eclipse IDE Helps identify all the candidate isolation points for the application developer. Isolation points could be  Application level  Resource level
    38. 38. Customization Handled during tenant on-boarding phase. Ex: visitor counter on the home page of a Web application When a new tenant subscribes to this application the tenant administrator could customize this counter’s label through setting a tenant specific string.
    39. 39. Separation of Concerns of Different Roles1. Application Developer2. Cloud/SaaS Operator3. Tenant Administrator4. Tenant User
    40. 40. 1. Application Developer Web Application Developers are responsible for developing UI, Business logic & Database of the application Developer team is responsible for identifying the isolation points and export those isolation points to the metadata repository This is the linkage between SaaS multi-tenant application & the Cloud Platform. These Application Developers are not aware of MT concepts. MT non-awareness developers. [1]
    41. 41. 2. Cloud Operator Responsible for deploying applications to the Cloud platform Registering the application as an offering so that customers could subscribe to it Defining the charging policy ( matching different payment with different SLA) and policy for allocating remote resource pools ( database) Responsible for approving the request from a Tenant Administrator
    42. 42. 3. Tenant Administrator Responsible for subscribing to the SaaS multi-tenant application by agreeing to the terms & conditions of the service. Responsible for making tenant specific simple & high level Configurations & Customizations. Upload tenant specific data to the SaaS platform Create account for the end users of the tenant. At the end of TA’s operations a URL to the entry point of the application will be provided
    43. 43. 4. Tenant User End User of a multi-tenant web application
    44. 44. Integration of SaaS multi-tenancy with cloud virtualization
    45. 45. Create Virtual Images for Multi-tenant Application Server & Database Server Setting up multi-tenancy runtime from scratch is time consuming For App Server : installation of original app server + multi-tenancy add-on pack + configuration of app server to connect to db For db Server :installation of original db server, initialization of multi-tenancy system db To streamline the process, create virtual images for app & db servers using VMware, KVM, Xen
    46. 46. Topology model is abridge between anabstract Applicationmodel & Cloudinfrastructure servicesbased on VirtualMachines.Topology model is anaggregation of definitionof all nodes that makeup the cluster built withVirtual Images Application model to Topology model
    47. 47. Example of Topology model for multi-tenancy enabled cloud"topology_vms" : [{"id" : "vm_App","image" : {"location" : "http://imagestore/.../images/AppImage/","type" : "m1.small","parts" : [{"part" : "http:// imagestore /.../AppNode.zip"},{"part" : "http:// imagestore /.../App2DBLink.zip"},{"part" : "http:// imagestore /.../AppMulti-tenancy.zip"}]},}{"id" : "vm_DB","image" : {"location" : "http://imagestore/.../images/DBImage/","type" : "m1.small","parts" : [{"part" : "http:// imagestore /.../DBNode.zip"},{"part" : "http:// imagestore /.../DBMulti-tenancy.zip"}]},}
    48. 48. Parse the topologyInvoke the IaaS layerAPI’s and initialize theVirtual Images and startthe base imageAssign dynamic IP to theVirtual ImageStart the Virtual Imageinto a Virtual Machinebased on the “type”attribute specified in thetopology fileAdditional activationcodes need to beexecuted as system Instantiate the Virtual Images onservices of the base OS the cloud platform
    49. 49. Offering contains anSLA and a matchingpriceApplication, SLA, pricemakes up a SaaS billingpolicyDifferent types of SLA’s  Economic (shared table)  Intermediate (separate schema)  Advanced (separate database)  Deluxe (separate database instance) (Subscriber) Making the New Multi- tenant Application into an Offering
    50. 50. Tenant AdministratorSubscribing to a Multi-tenant Customizing the Multi-tenantOffering Application for the Tenant
    51. 51. SaaS Operator
    52. 52. Conclusion This paper describes the core SaaS multi-tenancy models consisting of tenant interceptor, tenant context,tenant map, tenant propagation, remote resources. This paper also introduces the end to end process of making an existing Web application to be multi- tenancy enabled, and separating concerns of different roles involved. This paper puts the SaaS multi-tenancy operation in the complete life cycle of Cloud platform services.
    53. 53. 3. Towards Holistic multi-tenant monitoring of Virtual Data Centers[6] Requirements for a cloud monitoring system
    54. 54. Main requirements •Deal with monitoring information belonging to all tenants of one data center Multi-tenancy •Isolation based on data privacy laws •Some info however needs to be propagated to all tenants – a problem with a physical server that affects all the Virtual Machines Scalability • Scale to large numbers of monitoring agents, event notifications, tenants, resources • Inherent in multi-tenant data centers Dynamism • Quick & frequent addition/removal of tenants to/from data center • Assignment of resources to tenants • Interface to the monitoring system should be easy to understand, use, code Simplicity against • System must be easy to install and maintain for DC operator and tenant.Comprehensiveness • One single monitoring system should be usable for all kinds of monitoring information
    55. 55. Monitoring System FunctionalArchitecture
    56. 56. 4. Two Tier Multi-TenancyScaling and Load Balancing[5] A two-tier SaaS scaling and scheduling architecture at both service and application level A Resource allocation algorithm that selects suitable server nodes to run application/service duplicates Two duplication time strategies, lazy and pro-active are provided to be chosen according to application Requirements
    57. 57. Application Request (R)Component Throughput(thr)Overloaded ComponentUnder loadedComponent Duplication Strategies
    58. 58. Duplication Strategies Duplication of Application  Assuming that the application is built using SOA, the application instance with all of its service instances is duplicated.  It’s the coarsest granularity duplication. Used by GAE Duplication of Services  New service instances will be created and deployed to servers if all existing instances of this service are overloaded. Duplication at a Mixture Application/Service  duplication can happen at both application and service levels  each load balancer then might have fewer instances to manage, thus the balancing workload is further distributed on the application level.
    59. 59. Two Tier SaaS Scaling &Scheduling Architecture Components
    60. 60. Application/ServiceContainer:Re-deployable ServicePackage:ServiceReplica/Instance:Monitoring Service:Service Load Balancer:Tenant ConfigurationFiles: Two Tier SaaS Scaling and Scheduling Architecture
    61. 61. Cluster based Resource Allocation Algorithm
    62. 62. Resource Allocation Algorithm
    63. 63. Security Issues in a Native Multi-tenant System[1] Security Isolation  Authentication Isolation  Access Control Isolation  Information Protection Isolation Performance Isolation:  prevent the (potentially bad) behaviors of one tenant from adversely affecting the usage performance of other tenants in an unpredictable manner.  Secondly, avoid the unfairness among tenants in terms of usage performance  Resource Allocation for better System Performance:  By Tenant Resource Reservation  By Tenant Resource Admission Control  Tenant Oriented Resource Partition Information Protection Isolation:  protect the integrity and confidentiality of each tenant’s critical information, prevent the critical information of one tenant from being read or modified by other unauthorized tenants and users via hacking attempts
    64. 64. Fault (Availability Isolation) [1] In traditional single tenant system, the availability is usually measured by following formula: ST-Availability = MTTF /(MTTF +MTTR) The availability of the multitenant system can be defined as follows: MT-Availability =1−MTTR /(MTTF +MTTR)* X / N Fault Detection & Diagnosis:  quickly identify the currently infected tenant  each tenant should have the ability to monitor the states of its own running instance, and report to the service platform in a timely manner via the mechanisms like heart-beating and periodical simulations. Fault Propagation Prevention: On-Line Repair:
    65. 65. Conclusion Multi-tenant databases Migration of SaaS multi-tenant application to a cloud Multi-tenant cloud monitoring system Multi-tenancy 2 tier scaling and load balancing Security Issues in a Native Multi-tenant System
    66. 66. References …11. A Framework for Native Multi-Tenancy ApplicationDevelopment and Management, Chang Jie Guo1, Wei Sun1,Ying Huang2, Zhi Hu Wang1, Bo Gao1 IBM China ResearchLaboratory, Beijing, 2IBM T.J. Watson Research Center, NewYorkhttp://ieeexplore.ieee.org.gate.lib.buffalo.edu/stamp/stamp.jsp?tp=&arnumber=42852712.http://www.ibm.com/developerworks/webservices/library/ws-multitenantpart2/index.html3. Next generation multi-tenant virtualization cloud computingplatform,http://ieeexplore.ieee.org.gate.lib.buffalo.edu/stamp/stamp.jsp?tp=&arnumber=5745841
    67. 67. References …24. A Transparent Approach of Enabling SaaS Multi-tenancy in the Cloud, Hong Cai, IEEE Senior Member,Ning Wang, Ming Jun Zhou IBM China SoftwareDevelopment laboratory,http://ieeexplore.ieee.org.gate.lib.buffalo.edu/stamp/stamp.jsp?tp=&arnumber=55757735. Two-Tier Multi-Tenancy Scaling and Load Balancing , Wei-Tek Tsai*, Xin Sun, Qihong Shao, Guanqiu Qihttp://ieeexplore.ieee.org.gate.lib.buffalo.edu/stamp/stamp.jsp?tp=&arnumber=57043036. Towards Holistic Multi-Tenant Monitoring for VirtualData Centers, Peer Hasselmeyer, Nico d’HeureuseNECLaboratories Europe, NEC Europe, Ltd. 69115 Heidelberg,Germany,http://ieeexplore.ieee.org.gate.lib.buffalo.edu/stamp/stamp.jsp?tp=&arnumber=5486528
    68. 68. References …37. Ruminations on Multi-Tenant Databases, Dean Jacobs,Stefan Aulbach Technische Universität München Institutfür Informatik - Lehrstuhl III (I3) Boltzmannstr. 3 D-85748 Garching bei München,http://www3.in.tum.de/research/publications/conferences/BTW2007-mtd.pdf
    69. 69. Questions
    70. 70. The End! THANK YOU !

    ×