This document summarizes a framework called SALSA that provides dynamic configuration of cloud services. It captures information about cloud service structures and deployment across multiple levels. It orchestrates configuration tasks across different levels including VMs, containers, and applications. The framework was prototyped and tested on various cloud platforms and services to demonstrate its ability to automate complex configuration tasks.
Windows Azure: Verbinden, erweitern, integrieren Sie ihr Firmennetzwerk in di...CloudOps Summit
CloudOps Summit 2012, Frankfurt, 20.9.2012 Track 1 - Transition
by Heike Ritter, Technical Evangelist, Microsoft Deutschland
http://cloudops.de/sprecher/#heikeritter
Find the video of this talk at http://youtu.be/9kS9N3glx9U
CloudStack comes with a built-in SDN controller. One way of implementing SDN is to build overlay networks in the Data Center. This slideshow explains how CloudStack builds and maintains GRE tunnel overlays to provide scalable multi-tenant networking for cloud deployments
Windows Azure: Verbinden, erweitern, integrieren Sie ihr Firmennetzwerk in di...CloudOps Summit
CloudOps Summit 2012, Frankfurt, 20.9.2012 Track 1 - Transition
by Heike Ritter, Technical Evangelist, Microsoft Deutschland
http://cloudops.de/sprecher/#heikeritter
Find the video of this talk at http://youtu.be/9kS9N3glx9U
CloudStack comes with a built-in SDN controller. One way of implementing SDN is to build overlay networks in the Data Center. This slideshow explains how CloudStack builds and maintains GRE tunnel overlays to provide scalable multi-tenant networking for cloud deployments
Automated Web Service Change Management (AWSCM) A tool published at IEEE Clou...Animesh Chaturvedi
This is a presentation of publication on IEEE CloudCom 2014 http://doi.ieeecomputersociety.org/10.1109/CloudCom.2014.144
AWSCM https://sites.google.com/site/animeshchaturvedi07/research/awscm
Cloud Application Blueprints with Apache Brooklyn by Alex Henevaldbuildacloud
So you have your cloud running, what now? Extend the devops agility from infrastructure to applications by learning how to use Brooklyn, the Apache-incubating project for application management. Create blueprints for applications to enable one-click deployment into Cloudstack, Docker, localhost, or other targets. Leverage your favourite server management tools, from Bash to Chef. Automatically change the deployment after it's deployed. Attach policies to support scaling, failover, and alerting in the way your application needs.
In this session we'll show how with just a few lines of YAML, you can build powerful application blueprints by composing pre-existing components, from polyglot web stacks to big data tools such as Riak. We'll also cover defining new blueprints using custom scripts, configuring machine selection and runtime policies, and managing new locations such as Clocker -- the cloud of docker.
About Alex Henevald
Alex brings twenty years experience designing software solutions in the enterprise, start-up, and academic sectors. Most recently Alex was with Enigmatec Corporation where he led the development of what is now the Monterey® Middleware Platform™. Previous to that, he founded PocketWatch Systems, commercialising results from his doctoral research. Alex holds a PhD (Informatics) and an MSc (Cognitive Science) from the University of Edinburgh and an AB (Mathematics) from Princeton University. Alex was both a USA Today Academic All-Star and a Marshall Scholar.
Software Defined Networking is seeing a lot of momentum these days. With server virtualization solving the virtual machines problem, and large scale object storage solving the distributed storage challenge, SDN is seen as key in virtual networking.
In this talk we don't try to define SDN but rather dive straight into what in our opinion is the core enabled of SDN: the virtual switch OVS.
OVS can help manage VLAN for guest network isolation, it can re-route any traffic at L2-L4 by keeping forwarding tables controlled by a remote controller (Openfow controller). We show these few OVS capabilities and highlight how they are used in CloudStack and Xen.
Xen Summit presentation of CloudStack and Software Defined Networks. OpenVswitch is the default bridge in Xen and supported in XenServer and Xen Cloud Platform
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...LF Events
Fujitsu applies OpenStack for providing hybrid cloud service.
In this presentation, Miyashita will introduce learning from real practice of providing highly
available hybrid cloud service with OpenStack Neutron.
He will talk issues and solutions which Fujitsu faced through providing
hybrid(public/private) cloud service.
- How to build multiple OpenStack-based datacenters for public cloud with high availability
- How to build hybrid cloud environment(Connecting public cloud and on-premise datacenters)
- High available functionality spanning multiple datacenters(ex.loadbalancing service, security group)
This presentation was delivered at LinuxCon Japan 2016 by Kazuhiro Miyashita
Moonshot-enabled Federated Access to Cloud InfrastructureEduserv
Managing cloud infrastructure across many organisations can be complex. One area of complexity is in the management of identities. These include identities of people who build and provision cloud infrastructure, as well as the end consumers of the services running on it. Eduserv is building a cloud for the UK education community. This session shows how we are tackling the problems of identity provision to cloud infrastructure using federated login. Our approach uses traditional SAML login to a web-based console to manage infrastructure, as well as Moonshot-enabled login to infrastructure. This means we can achieve end-to-end management of cloud infrastructure from provisioning right through to access to services, using solely federated credentials. The result is the ability to rapidly scale infrastructure, while knowing that the right people can seamlessly gain access to it. The session discusses our experiences of building and managing clouds using VMWare vCloud, as well as how we are using Mooshot now, and its potential for the future.
Automated Web Service Change Management (AWSCM) A tool published at IEEE Clou...Animesh Chaturvedi
This is a presentation of publication on IEEE CloudCom 2014 http://doi.ieeecomputersociety.org/10.1109/CloudCom.2014.144
AWSCM https://sites.google.com/site/animeshchaturvedi07/research/awscm
Cloud Application Blueprints with Apache Brooklyn by Alex Henevaldbuildacloud
So you have your cloud running, what now? Extend the devops agility from infrastructure to applications by learning how to use Brooklyn, the Apache-incubating project for application management. Create blueprints for applications to enable one-click deployment into Cloudstack, Docker, localhost, or other targets. Leverage your favourite server management tools, from Bash to Chef. Automatically change the deployment after it's deployed. Attach policies to support scaling, failover, and alerting in the way your application needs.
In this session we'll show how with just a few lines of YAML, you can build powerful application blueprints by composing pre-existing components, from polyglot web stacks to big data tools such as Riak. We'll also cover defining new blueprints using custom scripts, configuring machine selection and runtime policies, and managing new locations such as Clocker -- the cloud of docker.
About Alex Henevald
Alex brings twenty years experience designing software solutions in the enterprise, start-up, and academic sectors. Most recently Alex was with Enigmatec Corporation where he led the development of what is now the Monterey® Middleware Platform™. Previous to that, he founded PocketWatch Systems, commercialising results from his doctoral research. Alex holds a PhD (Informatics) and an MSc (Cognitive Science) from the University of Edinburgh and an AB (Mathematics) from Princeton University. Alex was both a USA Today Academic All-Star and a Marshall Scholar.
Software Defined Networking is seeing a lot of momentum these days. With server virtualization solving the virtual machines problem, and large scale object storage solving the distributed storage challenge, SDN is seen as key in virtual networking.
In this talk we don't try to define SDN but rather dive straight into what in our opinion is the core enabled of SDN: the virtual switch OVS.
OVS can help manage VLAN for guest network isolation, it can re-route any traffic at L2-L4 by keeping forwarding tables controlled by a remote controller (Openfow controller). We show these few OVS capabilities and highlight how they are used in CloudStack and Xen.
Xen Summit presentation of CloudStack and Software Defined Networks. OpenVswitch is the default bridge in Xen and supported in XenServer and Xen Cloud Platform
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...LF Events
Fujitsu applies OpenStack for providing hybrid cloud service.
In this presentation, Miyashita will introduce learning from real practice of providing highly
available hybrid cloud service with OpenStack Neutron.
He will talk issues and solutions which Fujitsu faced through providing
hybrid(public/private) cloud service.
- How to build multiple OpenStack-based datacenters for public cloud with high availability
- How to build hybrid cloud environment(Connecting public cloud and on-premise datacenters)
- High available functionality spanning multiple datacenters(ex.loadbalancing service, security group)
This presentation was delivered at LinuxCon Japan 2016 by Kazuhiro Miyashita
Moonshot-enabled Federated Access to Cloud InfrastructureEduserv
Managing cloud infrastructure across many organisations can be complex. One area of complexity is in the management of identities. These include identities of people who build and provision cloud infrastructure, as well as the end consumers of the services running on it. Eduserv is building a cloud for the UK education community. This session shows how we are tackling the problems of identity provision to cloud infrastructure using federated login. Our approach uses traditional SAML login to a web-based console to manage infrastructure, as well as Moonshot-enabled login to infrastructure. This means we can achieve end-to-end management of cloud infrastructure from provisioning right through to access to services, using solely federated credentials. The result is the ability to rapidly scale infrastructure, while knowing that the right people can seamlessly gain access to it. The session discusses our experiences of building and managing clouds using VMWare vCloud, as well as how we are using Mooshot now, and its potential for the future.
Jacopo Nardiello - Monitoring Cloud-Native applications with Prometheus - Cod...Codemotion
We are going to talk about Prometheus and how to use to monitor micro-services "Cloud-Native" application s. We are going to dive deep into the Prometheus monitoring model, we will see what are the components be hind this system and how they integrate with each others to provide an efficient and modern monitoring sy stem. We will also have a glance on Prometheus native integrations for cloud-native environments such as Kubernetes.
To facilitate a variety of usage scenarios and gradually scale to larger number of users, Galaxy supports deployment on systems ranging from a laptop to a supercomputer to clouds. In this talk, real-world examples of two different models for harnessing a variety of resources will be presented: (1) a centralized Galaxy utilizing a set of geographically distributed resources in support of a large user base, and (2) a model of easily deploying multiple standalone instances of Galaxy to support high resource demands or customizations by a smaller groups. Together, these models showcase the capacity of Galaxy to support a variety of usage scenarios and a variable number of users with a variety of needs.
Paper presentation with title "Building and Operating Distributed SDN-CloudTestbed with Hyper-convergent SmartX Boxes" in EAI Cloud Computing Conference in Daejeon Seoul Korea.
Presentation on OSGi Cloud Ecosystems (RFC 183) as given at EclipseCon Boston 2013. The RFC itself is available at http://www.osgi.org/Download/File?url=/download/osgi-early-draft-2013-03.pdf
Presentation on OSGi Cloud Ecosystems as presented during EclipseCon Europe 2012 (http://www.eclipsecon.org/europe2012/sessions/osgi-and-cloud-computing)
Couchbase Server on Azure Cloud - best practices for deploying a development or production environment with Couchbase Server on Microsoft's Azure Cloud Platform.
Modern Cloud-Native Streaming Platforms: Event Streaming Microservices with K...confluent
Microservices, events, containers, and orchestrators are dominating our vernacular today. As operations teams adapt to support these technologies in production, cloud-native platforms like Cloud Foundry and Kubernetes have quickly risen to serve as force multipliers of automation, productivity and value. Kafka is providing developers a critically important component as they build and modernize applications to cloud-native architecture. This talk will explore:
• Why cloud-native platforms and why run Kafka on Kubernetes?
• What kind of workloads are best suited for this combination?
• Tips to determine the path forward for legacy monoliths in your application portfolio
• Running Kafka as a Streaming Platform on Container Orchestration
What aspects must a developer be aware of when a Web Services will be run in clustered environment such as a server farm?
Do Web Services implementations need to be \"cluster aware\", or can this be handled transparently by the runtime platform?
We revisit the subject of why keeping Web Services implementations as stateless as possible really helps in these circumstances, and the effect of using session-based facilities on scalability.
Azure Networking: Innovative Features and Multi-VNet TopologiesMarius Zaharia
Are you looking to deploy a more complex structure of resources in Azure, all secured and segregated by precise boundaries while closely communicating with each other? Following the arrival of the advanced IaaS networking features in Azure (network security groups, routing, multi-NIC, …) and their maturation in the last months, here is the moment for you to find a modern architectural vision of networking in Azure, with focus on multi-VNET / VPN topologies, and based on ARM deployment model.
Similar to SALSA: A Framework for Dynamic Configuration of Cloud Services (20)
Azure Networking: Innovative Features and Multi-VNet Topologies
SALSA: A Framework for Dynamic Configuration of Cloud Services
1. SALSA: A Framework for Dynamic
Configuration of Cloud Services
Duc-Hung Le, Hong-Linh Truong, Georgiana Copil,
Stefan Nastic and Schahram Dustdar
Distributed Systems Group, Vienna University of Technology
http://www.infosys.tuwien.ac.at/research/viecom/
6th International Conference on Cloud Computing Technology and Science
Singapore, 15-18 December 2014
2. Overview
Scenario
Research issues
Framework for dynamic configuration
Demo
Conclusions and future work
CloudCom 2014 2
3. Scenario - Complexity of configuration
(1) Interact
via web
interface
Service
developer
(3) Configure
CloudCom 2014 3
(I) Interact via
cloud API
(2) Access to
each VM by
SSH/VNC
> apt-get update
> vim configure.conf
> make clean install
Error !
(II) Configure
remotely via
SSH/JSch
> service X start
> ./decommiss.sh
> ./register.sh
Warning !
Multiple IaaS
cloud providers
Elasticity
controller
4. Scenario - Complexity of the cloud
service configuration
Load balancer Data node
CloudCom 2014 4
M2MDaaS topology
IoT topology Topology 1 Topology 2
Data controller
Event Processing
MOM
Sensor Gateway
Application
level
Legends:
Connect via network
5. Scenario - Complexity of the cloud
service configuration
Java
Load balancer Data node
OS/ Java
docker
Linux
Java
Linux
Java
Linux
CloudCom 2014 5
Tomcat
docker
Linux
Java
Linux
Linux
Container
level
Legends:
Connect via network
Placed on
M2MDaaS topology
IoT topology Topology 1 Topology 2
Data controller
Event Processing
MOM
Sensor Gateway
Application
level
6. Scenario - Complexity of the cloud
service configuration
Java
Load balancer Data node
OS/ Java
docker
Linux
Java
Linux
Java
Linux
m1.medium
instance
CloudCom 2014 6
Tomcat
docker
Linux
Java
Linux
Linux
Container
level
Virtual
machine
level
m1.small
instance
m1.small
instance
c1.medium
instance
Cloud infrastructure 1
Public
network
c1.medium
snapshot
instance
m1.large
instance
m1.medium
instance
Cloud infrastructure 2
Legends:
Connect via network
Placed on
M2MDaaS topology
IoT topology Topology 1 Topology 2
Data controller
Event Processing
MOM
Sensor Gateway
Application
level
7. Scenario - Complexity of the cloud
service configuration
Java
Load balancer Data node
OS/ Java
docker
Linux
Java
Linux
Java
Linux
m1.medium
instance
CloudCom 2014 7
Tomcat
docker
Linux
Java
Linux
Linux
Container
level
Virtual
machine
level
m1.small
instance
m1.small
instance
c1.medium
instance
Public
network
c1.medium
snapshot
instance
m1.large
instance
m1.medium
instance
Quick startup VMs
High compute
intensive VMs
Low price VMs High data
intensive VMs
M2MDaaS topology
IoT topology Topology 1 Topology 2
Data controller
Event Processing
MOM
Sensor Gateway
Application
level
8. Requirements
Elasticity controllers
– Fine-grained actions.
– Control all service levels.
– Manage the whole service.
Well-known tools
- Chef, Puppet, Ansible…
- Google CDM, Slipstream,
Brooklyn, Juju …
- OpenTOSCA
Service developers
Limitations
- Support single configuration level.
- Need human interaction.
- Not support runtime configuration.
Multi-cloud environment
- Diversity
- Dynamicity
CloudCom 2014 8
– Automate complex tasks.
– Manage only application level.
– Semantic service management.
9. Research issues and Approach
Research questions
- Full automated configuration for complex cloud services.
- Support multiple cloud infrastructures.
- Configure multiple software stacks: VM, container, webapp.
Approach
– Capture information of multiple configuration levels:
• Cloud service structure
• Deployment information
– Coordinate of the configuration tasks by orchestration.
– Support many types of configuration on different levels.
CloudCom 2014 9
10. Service configuration flow
CloudCom 2014 10
Preprocess
SALSA
Framework
Cloud systems
Configuration
plan
VM
Orchestrate
configuration
tasks
Bootstrap VM
Artifact
deployment
Configure cloud
resources
Lifecycle
management
Configure VM
environment
Setup
configuration
environment
PUT [service_structure]
Configured service
Developer
POST [unit_ID, scaleout]
Controller
DELETE [instance_ID]
GET [serviceID]
11. SALSA Framework architecture
Information services
– Provide services
information, e.g.
artifact, relationships
– Link to cloud
providers and external
repositories.
– Enable third parties
add configuration
capabilities to the
existing services.
CloudCom 2014 11
Central service
– Orchestrate the
configuration tasks
– Interface with multiple
cloud providers.
– Plug-in configuration
algorithms
Local configurator
– Configure artifacts on VM.
– Interface with multiple
configuration tools.
12. Capturing configuration information
Configuration
capability
categorized
Primitive
Add/remove
Cloud service
consist of consist of
Service topology
depend-on consist of
Service unit
consist of
Service instance
CloudCom 2014 12
associated
at runtime
Complex
Start/stop
Reconfigure
Scale in/out
Migrate
Redeploy
associate
Deployment stack
Web service
App container
Executable
OS container
Virtual machine
…
Cloud 1 Cloud N
Multiple service levels
Complex configuration capability
Multiple deployment stacks
[1] G. Copil, D. Moldovan, H.-L.
Truong, and S. Dustdar, “Multi-level
elasticity control of cloud
services,”, ICSOC 2013
13. Generating deployment information
Enrich missing information
– Different service types.
– Based on many criteria.
Service unit eco-system
– Connect to clouds
– Service relationships
Plugin-able enrichment
algorithms
– Enrich based on
configuration capabilities.
– Determine the relationship
between service units.
• Hosted-on relationship
• Connect-to relationship
CloudCom 2014 13
14. Orchestrate configuration tasks
Service unit
orchestrator
Service unit
orchestrator
..
Service unit
orchestrator
actuate
actions
update
states
Cloud service
orchestrator
task
Topology of
service units
task
task
Maintain the dependencies and the order of tasks.
– Tasks can be executed in parallel.
– Forward tasks to the right configurator module to execute.
Plugin-able module for develop different algorithms
– Distributed orchestration.
– Workflow, plan-based.
CloudCom 2014 14
Web app.
configurator
Container
configurator
System service
configurator
Virtual machine
configurator
Interface for
applications
configuration
Interface for
cloud systems
configuration
Environment
configurator
15. Service placement at runtime
Placement
– Decide where to place the service unit.
– Automatic manage the configuration of container and infrastructure.
Placement algorithms:
– Optimal for resource usage or
performance.
– Multi-tenant problem.
Plugin-able module
– Instance number based.
– Resource threshold based.
CloudCom 2014 15
16. Managing configuration states
Configuration states information
– Manage the dependencies between configuration tasks.
– Represent service lifecycle
– Feed-back to users.
Collecting state information
– States from many configuration levels
– States of service structure
Aggregating states on multiple
levels and stacks
– A configuration task exposed its state.
– State of cloud service and topology
are collected from service units.
CloudCom 2014 16
CloudService
Allocating
FrontEnd topo
Allocating
Tomcat
allocating
Docker
configuring
VM
deployed
BackEnd topo
Running
Webapp 1
Allocating
App 1
Running
App 2
deployed
Aggregated
configuration
states
Actual
configuration
states
17. SALSA Prototype
Interface with multiple cloud providers
– OpenStack: by Jclouds
– Flexiant: by Flexiant JADE API
– StratusLab: by StratusLab client command line
– Non-providers: configure existing machine
Interface with multiple configuration tools
– Script-based: bash
– Unix like packages: apt-get, yum, gem
– Chef enterprise and chef-solo
Specific containers and artifact support
– Tomcat, Docker
– Web application in .war artifact
CloudCom 2014 17
TOSCA
service
definition
SALSA
• Set of VMs running.
• Cloud service
runtime structure.
• Unit configuration.
18. Tested services
EventProcessing DataEnd
DataNode
Controller
LB MOM
EventProcessor
MQTT
CloudCom 2014 18
Market Place
+ database
Iot.eclipse.org
Data customer
Sensor
Sensors
- ~3000 lightweight instances
- On 3 clouds and normal servers
- Dynamic add/remove
M2MDaaS
- Complexity: 8 units, 3 topologies
- Running on 2 cloud systems
DSG OpenStack
- Private cloud
- Vienna
Flexiant
- Public cloud
- Commercial
- London
StratusLab
- Public cloud
- For research
- Paris
Marsa
- Connect with external services
- Distributed sites: Euro and Asia
Normal servers
- Hanoi and HCM
city, Vietnam
- Vienna
Gateway
GW
Sensor
Internet
Sensor
Iot.eclipse.org MQTT Gateway
Scalable unit Static unit External service
19. Examples and demo
Demo 1: Simplify complex configuration management
– M2MDaaS: 3 topologies, 7 service units.
– Multiple clouds:
• OpenStack private cloud
• Flexiant public cloud.
– Connect sensors into the running M2MDaaS.
– Maintain service units dependencies.
Demo 2: Enable dynamic and multiple levels configuration
– Focus on one topology of the M2MDaaS
– Enable complex operations at runtime: scale in, scale out.
– Enable configuration at infrastructure and application level.
CloudCom 2014 19
20. Conclusions and future work
Conclusion
– Introduce a framework for developing and experimenting
advanced configuration functionalities.
– Provide initial features for full automatic and dynamic
configuration of cloud services.
– Support single cloud and multiple clouds.
Future work: Focus more on the configuration of
application level
– Understand more configuration relationships of multiple levels
and application structure.
– Optimize the configuration at application level.
CloudCom 2014 20
21. THANK YOU !
Duc-Hung Le
d.le@dsg.tuwien.ac.at
http://dsg.tuwien.ac.at/staff/dle/
Prototypes available http://tuwiendsg.github.io
Distributed Systems Group
Vienna University of Technology
Austria
Editor's Notes
In this presentation, we refer the cloud service as applications which are running on clouds and the service unit as application components.
Let us consider a simple case with two stakeholders who want to configuring a service on several cloud infrastructure.
By traditional way, firstly they need to connect with cloud providers to configure the infrastructure, either by using web interface or cloud API. After, they must connect to the VM and configure the application manually.
These steps take many efforts if they only use services that clouds provided.
Moreover, configuration of a cloud service is more complex with many service units that connect with each other via network, and the cloud service can be structured by several topology.
Here we consider cloud service as an application running on the cloud and service units are application components.
It becomes complex while the cloud service can also be structured by grouping units into topology.
For running, each service unit also need a specific environments such as appropriate container or libraries.
And all of them will be hosted by various types of infrastructure that are provided by clouds.
User can also select appropriate configuration of the infrastructures that suitable for the services runtime.
From the complexity of the configuration and cloud service, we observe the requirement for both stakeholders when configuring the cloud service.
The elasticity controllers need to interact with all the level of the service structure and require the support in as much detail level as possible. Is there any mechanism to deal with all of them in a single endpoint.
The service developer want to automate complex tasks and semantically managing the service. In this case, many additional information and automatic mechanisms are need to simplify their tasks.
There are several well-known tools
For these motivation, raise some research questions;
- full automatic solution for configuring complex services: automate all the human involvement at runtime, manage cloud infrastructure which requires much of efforts, automatic connect and configure distributed units of the service.
- also how to support multiple provider with: different API, capabilities, performance.
our approach is firstly to capture the information at multiple levels, then design a central orchestration of the configuration tasks.
Last by not least, in order to support configuring different types of service unit, we reuse as much as possible the existing configuration tools.
So, going to more detail of the approach, firstly we investigate a general flow of configuration a cloud service. Starting from the user viewpoint, they will provide a document that describe the cloud service and the request for a configuration at initiation time or runtime.
Then, they want to receive the feedback about the configuration progress.
Internally, there are two phases. Firstly we pre process the user input to generate a configuration plan, and then a set of configuration tasks will be orchestrated to execute in right order and at right place.
Following the configuration flow, we design the SALSA framework and defined functionalities which allow us to develop and plug-in more features into the framework.
There are three main blocks in the architecture that follow traditional client-server pattern. We have one public central service and multiple local configurator to manage the distributed configuration tasks. The needed information will be provided by the information services
For the service developers that need to automate most of the complex configurations, they only want to specify as less information as possible, which then their specification about the service would miss some details, and need to be enriched at the preprocess.
When we aim to provide
After this step, we have a full cloud service specification or need to reconfigure at runtime, many the configuration tasks need to be executed at right orders
We start with the topology of service unit, which can be running or starting to be deployed.
Some request for execute configuration tasks are called and need to be orchestrate by mean of execution these task in an proper orders to fulfill the dependencies between these service unit.
To do that, we cooperate one center orch. and a set of SU orch.
Unit orchestrator:
Runs independently
Handle multiple deployment stacks.
Cloud service orchestrator:
Maintains configuration states
Maintains shared information
At runtime, when user want to configure the application level without knowing about the container or infrastructure, we need to decide where to put the new service either on an existing container or on a new one.
This feature enable the transparent between deployment stacks and simplify the service management while hiding the lower levels from the user.
We plug into the framework two simple mechanisms, to place a service based on the instance number and based on resource threshold, which can be define by user.
Lastly, we need to manage the configuration state in order to support the orchestration process and feedback to stakeholders.
Above features was implemented in the SALSA prototype, which now can interact with multiple cloud providers and reuse common configuration tools to maximize the capability to execute complex configuration. We use TOSCA for describing the cloud service.
For testing the feature to manage complex cloud service, we tested with the M2MDaaS cloud service with many service unit and relationship
Demo 1 – service developer.
Demo 2 – elasticity controller.