SlideShare a Scribd company logo
1 of 24
Download to read offline
Bare-Metal Container
--- Direct execution of a container image on a
remote machine with an optimized kernel ---
1
National Institute of Advanced Industrial
Science and Technology(AIST)
Kuniyasu Suzaki, Hidetaka Koie, Ryousei Takano
IEEE International Conferences on High Performance Computing and Communications (HPCC) 2016, Sydney
Contents
• Background of BMC
– Drawbacks of container, general kernel, and
accounting.
• What is BMC?
• Current implementation
• Evaluation
• Conclusions
2
Background of BMC 1/3
Drawback of Container
• Container technology (Docker) becomes popular.
– Docker offers an environment to customize an application easily.
– It looks like to be good for an application, but it is a server centric.
• It does not allow to change the kernel.
– Kernel options passed through /sys are not effective because Docker
uses union file system (AUFS or DeviceMapper), which prevents
options from reaching to the kernel.
• Some applications cannot run on Docker.
– DPDK on Docker does not work on some machines, because it
depends on “igb_uio” and “rte_kni” kernel modules.
• Some provider offers the kernel which can treat DPDK on Docker,
but it is case by case solution. It is not fundamental solution.
3
Background of BMC 1/3
Drawback of Container
• Container technology (Docker) becomes popular.
– Docker offers an environment to customize an application easily.
– It looks like to be good for an application, but it is a server centric.
• It does not allow to change the kernel.
– Kernel options passed through /sys are not effective because Docker
uses union file system (AUFS or DeviceMapper), which prevents
options from reaching to the kernel.
• Some applications cannot run on Docker.
– DPDK on Docker does not work on some machines, because it
depends on “igb_uio” and “rte_kni” kernel modules.
• Some provider offers the kernel which can treat DPDK on Docker,
but it is case by case solution. It is not fundamental solution.
4
Container is a jail for a kernel optimizer.
Background of BMC 1/3
Drawback of Container
• Container technology (Docker) becomes popular.
– Docker offers an environment to customize an application easily.
– It looks like to be good for an application, but it is a server centric.
• It does not allow to change the kernel.
– Kernel options passed through /sys are not effective because Docker
uses union file system (AUFS or DeviceMapper), which prevents
options from reaching to the kernel.
• Some applications cannot run on Docker.
– DPDK on Docker does not work on some machines, because it
depends on “igb_uio” and “rte_kni” kernel modules.
• Some provider offers the kernel which can treat DPDK on Docker,
but it is case by case solution. It is not fundamental solution.
5
Container is a jail for a kernel optimizer.
HPC users want to optimize the kernel for their
applications. Kernel is a servant.
Container way is not fit for them.
Background of BMC 2/3
General kernel leads weak performance
• Arrakis[OSDI’14] showed that nearly 70% of network latency
was spent in the network stack in a Linux kernel.
• Many DB applications (e.g., Oracle, MongoDB) reduce the
performance by THP (Transparent Huge Pages) which is
enabled on most Linux distributions.
6
Background of BMC 2/3
General kernel leads weak performance
• Arrakis[OSDI’14] showed that nearly 70% of network latency
was spent in the network stack in a Linux kernel.
• Many DB applications (e.g., Oracle, MongoDB) reduce the
performance by THP (Transparent Huge Pages) which is
enabled on most Linux distributions.
7
It is not fundamental solution.
HPC users want to optimize the kernel for their
applications. Kernel is a servant.
Background of BMC 3/3
Power consumption for each application
• Current power measurement is coarse.
– PUE only shows usage of data-center scale.
– Current power consumption is theme for vender and
administrators
• Users have no incentive for low power.
– Current accounting is based on time consumption
8
Background of BMC 3/3
Power consumption for each application
• Current power measurement is coarse.
– PUE only shows usage of data-center scale.
– Current power consumption is theme for vender and
administrators
• Users have no incentive for low power.
– Current accounting is based on time consumption
9
There is no good method to measure power
consumption “for an application”.
No accounting which considers power consumption.
What is BMC?
• BMC(Bare-Metal Container) runs a container
(Docker) image with a suitable Linux kernel on a
remote physical machine.
– Application on Container can change kernel settings and
machine which fit for application and extract the full
performance.
– It means the power is almost used for an application.
10
Application Centric Architecture
machine
kernel
container manager
Server Centric Architecture
Traditional Style
(Ex: container)
Invoke app.
Power always up
Admin’s
Space
User’s
Space
app
container
app
container
app
container
Comparison
Pros:
• Multi Tenant
•Quick Response (No Rebooting)
Cons:
• Kernel is not replaced.
Pros:
• Apps can select a kernel & hardware.
• Apps occupy the machine and extract the
performance.
Cons:
• Set up overhead (Rebooting)
Boot the kernel & app.
BMC
machine machine machine
kernel
app
container
kernel kernel
Application Centric Architecture
Select a kernel
Select a physical
machine
BMC manager
Remote Machine
management
(WOL, AMT, IPMI)
network
bootloader
network
bootloader
network
bootloader
Power frequently up/down
app
container
app
container
Node-1
Docker
Hub
BMC
Hub
BMC Manager
client
BMC Command
#bmc run “docker-img” “kernel” “initrd” “command”
HTTPS (apache)
iPXE script
kernel & initrd
kernel & initrd
IP address
(bmc-ID)
NFS mount or download to RAM FS
docker image
Docker Image
ssh
ssh pub-key
cloud-init
+ bmc tools (heatbeat)
+ sshd
+ ssh pub-key
iPXE
Power On (WOL, AMT, IPMI)
Platform authentication
Authenticate
Download iPXE script
Download kernel & initrd
NFS mount or download to RAM FS
request ssh connection
①
②③
④
⑤
Power Off (shutdown command, AMT, IPMI)
⑥
⑦
⑧
iPXE
Kernel & initrd
(IP3)
(MAC or IP1)
(IP2)
(Linux or IP1)
Procedure to execute BMC command
Remote Machine Boot Procedure
1. Power-on a node machine with Remote Machine
Management (WOL, Intel AMT, IPMI)
2. Network Boot Loader (iPXE)
– Get kernel and intird from a HTTP/HTTPS server.
3. The downloaded initrd mounts a Docker image.
• NFS mode
• RAM FS mode
4. Boot procedure in a Docker image
– Fortunately, Docker image keeps boot procedure.
5. SSH is connected from BMC command
– Run an application.
13
Remote Machine Management
WOL Intel AMT IPMI
Protocol
Magic Packet
(MAC address)
HTTPS
(IP address)
RMPC
(IP address)
Power-On ✔ ✔ ✔
Power-Off × ✔ ✔
Security × Password Password
Comment
Most PCs
have WOL.
High level Intel
machine
Server Machine
(Slow BIOS)
14
Network Boot Loader
• PXE is the most famous, but it is limited for LAN,
because it depends on “magic packet” of Layer 2.
• BMC uses iPXE which download “kernel” and “initrd”
from HTTP/HTTPS.
• The iPXE downloads kernel and initrd.
15
#!ipxe
ifopen net0
set net0/ip 192.168.0.101
set net0/netmask 255.255.255.0
set net0/gateway 192.168.0.1
set dns 192.168.0.1
:loop
chain http://192.168.0.200/cgi-bin/baremetal.ipxe || goto waiting
exit
:waiting
sleep 1
goto loop
– iPXE is custimzed by its
scripting language. BMC
uses it.
How to boot OS (Linux)
• The downloaded “initrd” is customized to mount an Docker
image. It offers 2 mount methods.
– NFS mode
• Download necessary data only and fast boot, but it needs to download data
to run applications after boot.
– RAMFS mode
• Download full disk image and slow boot, but application runs fast after boot.
• Boot procedure in the Docker image.
– An Docker image keeps boot procedure for each application because
each application package designed to include them.
– BMC utilizes these boot procedures to rum daemons, such as the SSH,
because an application in the Docker image is executed by remote
procedure calls from BMC manager.
16
Current Implementation
• Current BMC Manager is implemented with
shell script.
– 4500 LOC.
• Power consumed on each node is measured
by WattChecker.
• We have tried several machines as BMC
nodes.
– From Atom to Xeon.
– Application can select machine considering power
consumption.
17
Spec of Test Machines
Remote
machine
manage
ment
CPU,Core/thread,
Clock (Burst time),
Power
Logical
performance
GFLOPS
(Burst time)
Issue
date
Memory NIC
(queue)
Low Power
Intel NUC 5CPYH
WOL Celeron (N3050),2/2, 1.6
(2.16)GHz,8W
6.4
(8.6)
2015 8GB RealTek r8169
(1)
NotePC
Lenovo ThinkPAD
T430s
Intel AMT i7 (3520M)2/4,
2.9(3.6)GHz, 35W
46.4
(57.6)
2012 16GB
Intel e1000
(1)
DesktopPC
Dell Optiplex 960
Intel AMT Core 2Quad (Q9400)
4 /4, 2.66GHz,95W
42.656 2008 16GB
Intel e1000
(1)
Server
Dell PowerEdge
T410
IPMI Xeon (X5650)
6/12,2.66(3.06)GHz,95W
63.984
(73.44)
2010 8GB
Broadcom
NeXtreme II(8)
18
Boot performance
19
Network PowerTime
NFSRamFS
• They are BMC’s overhead.
• The performance improved by optimization must surpass the overhead.
Tested Application and Optimization
• This presentation shows the result of Matrix
multiplication with/without Hyper Threading.
– The experiment measured the time for 10 times of matrix
multiplications on OpenBlas optimized for each machine.
20
Application Optimization
Matrix Multiplication with
OpenBlas
Hyper Threading off
Redis benchmark Transparent Huge Pages off
Apache benchmark Receive Flow Steering off
Performance Difference
10 times of matrix multiplications [12800:12800]
on OpenBlas optimized for each machine. .
21
Time (s) Power (j) GFLOPS
Power/
(GFLOPS
*time)
i7
HTT-on
961.4 55,315
43.8
(76.0%)
1.31
i7
HTT-off
827.1 45,364
50.9
(88.4%)
1.08
Xeon
HTT-on
945.6 211,908
44.6
(60.7%)
5.02
Xeon
HTT-off
698.9 151,760
60.5
(82.4%)
3.59
() shows the rate from
logical performance
• The results show no hyper threading were better.
Performance improvement which
compensates the boot overhead
Boot
overhead
Improvement
at [6400:6400]
Improvement
at [12800:12800]
Time (sec)
i7 35.4 15.9 134.3
Xeon 108.0 29.8 246.7
Power (joule)
i7 1,805.3 1,150 9,951
Xeon 11,274.5 6,792 60,148
22
• Overheads for time and power were compensated
before [12800:12800].
Related works
• Triton [Joyent’s product]
– Triton = Docker + SmartOS.
• In order to optimize, user needs to customize SmarOS.
• LinuxBIOS/BProc Cluster[HPCS’02]
– Testbed for kernel test. It is not so easy to implement
because it requires to replace BIOS.
• Shifter[Cray User Group’15]
– Translate Docker image for their environment.
– It does not allow to change the kernel.
• SLURM[ICDCN’14]
– Measure power consumption for an application. It
depends on function to measure power (Intel RAPL:
Running Average Power Limit, or CRAY machine).
23
Conclusions
• BMC (Bare-Metal Container) runs a container
(Docker) image with a suitable Linux kernel
on a remote physical machine.
• The overhead of BMC was compensated by
the improved performance of applications.
• Official HP: http://www.itri.aist.go.jp/cpc/research/bmc/
• Docker Image for BMC manager:
https://hub.docker.com/r/baremetalcontainer/
• Source Code: https://github.com/baremetalcontainer
24

More Related Content

What's hot

BMC: Bare Metal Container @Open Source Summit Japan 2017
BMC: Bare Metal Container @Open Source Summit Japan 2017BMC: Bare Metal Container @Open Source Summit Japan 2017
BMC: Bare Metal Container @Open Source Summit Japan 2017Kuniyasu Suzaki
 
6 profiling tools
6 profiling tools6 profiling tools
6 profiling toolsvideos
 
Building, deploying and testing an industrial linux platform @ Open source su...
Building, deploying and testing an industrial linux platform @ Open source su...Building, deploying and testing an industrial linux platform @ Open source su...
Building, deploying and testing an industrial linux platform @ Open source su...SZ Lin
 
Breaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisorsBreaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisorsPriyanka Aash
 
y2038 issue
y2038 issuey2038 issue
y2038 issueSZ Lin
 
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CanSecWest
 
Chap 4 lesson02emsysnewinterruptbasedi_os
Chap 4 lesson02emsysnewinterruptbasedi_osChap 4 lesson02emsysnewinterruptbasedi_os
Chap 4 lesson02emsysnewinterruptbasedi_osMontassar BEN ABDALLAH
 
Early Software Development through Palladium Emulation
Early Software Development through Palladium EmulationEarly Software Development through Palladium Emulation
Early Software Development through Palladium EmulationRaghav Nayak
 
Building Embedded Linux Full Tutorial for ARM
Building Embedded Linux Full Tutorial for ARMBuilding Embedded Linux Full Tutorial for ARM
Building Embedded Linux Full Tutorial for ARMSherif Mousa
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018The Linux Foundation
 
HKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootLinaro
 
LCA14: LCA14-502: The way to a generic TrustZone® solution
LCA14: LCA14-502: The way to a generic TrustZone® solutionLCA14: LCA14-502: The way to a generic TrustZone® solution
LCA14: LCA14-502: The way to a generic TrustZone® solutionLinaro
 
Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)k33a
 
Porting linux on ARM
Porting linux on ARMPorting linux on ARM
Porting linux on ARMSatpal Parmar
 

What's hot (20)

BMC: Bare Metal Container @Open Source Summit Japan 2017
BMC: Bare Metal Container @Open Source Summit Japan 2017BMC: Bare Metal Container @Open Source Summit Japan 2017
BMC: Bare Metal Container @Open Source Summit Japan 2017
 
6 profiling tools
6 profiling tools6 profiling tools
6 profiling tools
 
Building, deploying and testing an industrial linux platform @ Open source su...
Building, deploying and testing an industrial linux platform @ Open source su...Building, deploying and testing an industrial linux platform @ Open source su...
Building, deploying and testing an industrial linux platform @ Open source su...
 
Breaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisorsBreaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisors
 
y2038 issue
y2038 issuey2038 issue
y2038 issue
 
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
 
Embedded Virtualization applied in Mobile Devices
Embedded Virtualization applied in Mobile DevicesEmbedded Virtualization applied in Mobile Devices
Embedded Virtualization applied in Mobile Devices
 
Construct an Efficient and Secure Microkernel for IoT
Construct an Efficient and Secure Microkernel for IoTConstruct an Efficient and Secure Microkernel for IoT
Construct an Efficient and Secure Microkernel for IoT
 
Defense
DefenseDefense
Defense
 
Trusted Computing Base
Trusted Computing BaseTrusted Computing Base
Trusted Computing Base
 
Chap 4 lesson02emsysnewinterruptbasedi_os
Chap 4 lesson02emsysnewinterruptbasedi_osChap 4 lesson02emsysnewinterruptbasedi_os
Chap 4 lesson02emsysnewinterruptbasedi_os
 
Tos tutorial
Tos tutorialTos tutorial
Tos tutorial
 
Early Software Development through Palladium Emulation
Early Software Development through Palladium EmulationEarly Software Development through Palladium Emulation
Early Software Development through Palladium Emulation
 
Building Embedded Linux Full Tutorial for ARM
Building Embedded Linux Full Tutorial for ARMBuilding Embedded Linux Full Tutorial for ARM
Building Embedded Linux Full Tutorial for ARM
 
Implement Runtime Environments for HSA using LLVM
Implement Runtime Environments for HSA using LLVMImplement Runtime Environments for HSA using LLVM
Implement Runtime Environments for HSA using LLVM
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018
 
HKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted boot
 
LCA14: LCA14-502: The way to a generic TrustZone® solution
LCA14: LCA14-502: The way to a generic TrustZone® solutionLCA14: LCA14-502: The way to a generic TrustZone® solution
LCA14: LCA14-502: The way to a generic TrustZone® solution
 
Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)
 
Porting linux on ARM
Porting linux on ARMPorting linux on ARM
Porting linux on ARM
 

Viewers also liked

SCALE13x: Next Generation of the Cloud - Rise of the Unikernel
SCALE13x: Next Generation of the Cloud - Rise of the UnikernelSCALE13x: Next Generation of the Cloud - Rise of the Unikernel
SCALE13x: Next Generation of the Cloud - Rise of the UnikernelThe Linux Foundation
 
Io t security-suzki-20170224
Io t security-suzki-20170224Io t security-suzki-20170224
Io t security-suzki-20170224Kuniyasu Suzaki
 
OSAC16: Unikernel-powered Transient Microservices: Changing the Face of Softw...
OSAC16: Unikernel-powered Transient Microservices: Changing the Face of Softw...OSAC16: Unikernel-powered Transient Microservices: Changing the Face of Softw...
OSAC16: Unikernel-powered Transient Microservices: Changing the Face of Softw...Russell Pavlicek
 
Improving Scalability of Xen: The 3,000 Domains Experiment
Improving Scalability of Xen: The 3,000 Domains ExperimentImproving Scalability of Xen: The 3,000 Domains Experiment
Improving Scalability of Xen: The 3,000 Domains ExperimentThe Linux Foundation
 
XPDS13: Enabling Fast, Dynamic Network Processing with ClickOS - Joao Martins...
XPDS13: Enabling Fast, Dynamic Network Processing with ClickOS - Joao Martins...XPDS13: Enabling Fast, Dynamic Network Processing with ClickOS - Joao Martins...
XPDS13: Enabling Fast, Dynamic Network Processing with ClickOS - Joao Martins...The Linux Foundation
 
ASPLOS10&Vee10 report-suzaki
ASPLOS10&Vee10 report-suzakiASPLOS10&Vee10 report-suzaki
ASPLOS10&Vee10 report-suzakiKuniyasu Suzaki
 
The HaLVM: A Simple Platform for Simple Platforms
The HaLVM: A Simple Platform for Simple PlatformsThe HaLVM: A Simple Platform for Simple Platforms
The HaLVM: A Simple Platform for Simple PlatformsThe Linux Foundation
 
XPDS14 - Towards Massive Server Consolidation - Filipe Manco, NEC
XPDS14 - Towards Massive Server Consolidation - Filipe Manco, NECXPDS14 - Towards Massive Server Consolidation - Filipe Manco, NEC
XPDS14 - Towards Massive Server Consolidation - Filipe Manco, NECThe Linux Foundation
 
Docker and the Container Ecosystem
Docker and the Container EcosystemDocker and the Container Ecosystem
Docker and the Container Ecosystempsconnolly
 

Viewers also liked (10)

SCALE13x: Next Generation of the Cloud - Rise of the Unikernel
SCALE13x: Next Generation of the Cloud - Rise of the UnikernelSCALE13x: Next Generation of the Cloud - Rise of the Unikernel
SCALE13x: Next Generation of the Cloud - Rise of the Unikernel
 
Io t security-suzki-20170224
Io t security-suzki-20170224Io t security-suzki-20170224
Io t security-suzki-20170224
 
OSAC16: Unikernel-powered Transient Microservices: Changing the Face of Softw...
OSAC16: Unikernel-powered Transient Microservices: Changing the Face of Softw...OSAC16: Unikernel-powered Transient Microservices: Changing the Face of Softw...
OSAC16: Unikernel-powered Transient Microservices: Changing the Face of Softw...
 
Improving Scalability of Xen: The 3,000 Domains Experiment
Improving Scalability of Xen: The 3,000 Domains ExperimentImproving Scalability of Xen: The 3,000 Domains Experiment
Improving Scalability of Xen: The 3,000 Domains Experiment
 
XPDS13: Enabling Fast, Dynamic Network Processing with ClickOS - Joao Martins...
XPDS13: Enabling Fast, Dynamic Network Processing with ClickOS - Joao Martins...XPDS13: Enabling Fast, Dynamic Network Processing with ClickOS - Joao Martins...
XPDS13: Enabling Fast, Dynamic Network Processing with ClickOS - Joao Martins...
 
ASPLOS10&Vee10 report-suzaki
ASPLOS10&Vee10 report-suzakiASPLOS10&Vee10 report-suzaki
ASPLOS10&Vee10 report-suzaki
 
The HaLVM: A Simple Platform for Simple Platforms
The HaLVM: A Simple Platform for Simple PlatformsThe HaLVM: A Simple Platform for Simple Platforms
The HaLVM: A Simple Platform for Simple Platforms
 
XPDS14 - Towards Massive Server Consolidation - Filipe Manco, NEC
XPDS14 - Towards Massive Server Consolidation - Filipe Manco, NECXPDS14 - Towards Massive Server Consolidation - Filipe Manco, NEC
XPDS14 - Towards Massive Server Consolidation - Filipe Manco, NEC
 
NFV & Openstack
NFV & OpenstackNFV & Openstack
NFV & Openstack
 
Docker and the Container Ecosystem
Docker and the Container EcosystemDocker and the Container Ecosystem
Docker and the Container Ecosystem
 

Similar to ”Bare-Metal Container" presented at HPCC2016

Docker and kubernetes
Docker and kubernetesDocker and kubernetes
Docker and kubernetesDongwon Kim
 
[Draft] Fast Prototyping with DPDK and eBPF in Containernet
[Draft] Fast Prototyping with DPDK and eBPF in Containernet[Draft] Fast Prototyping with DPDK and eBPF in Containernet
[Draft] Fast Prototyping with DPDK and eBPF in ContainernetAndrew Wang
 
Introductio to Docker and usage in HPC applications
Introductio to Docker and usage in HPC applicationsIntroductio to Docker and usage in HPC applications
Introductio to Docker and usage in HPC applicationsRichie Varghese
 
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV Cluster
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV ClusterMethod of NUMA-Aware Resource Management for Kubernetes 5G NFV Cluster
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV Clusterbyonggon chun
 
Latest (storage IO) patterns for cloud-native applications
Latest (storage IO) patterns for cloud-native applications Latest (storage IO) patterns for cloud-native applications
Latest (storage IO) patterns for cloud-native applications OpenEBS
 
XPDDS17: Keynote: Shared Coprocessor Framework on ARM - Oleksandr Andrushchen...
XPDDS17: Keynote: Shared Coprocessor Framework on ARM - Oleksandr Andrushchen...XPDDS17: Keynote: Shared Coprocessor Framework on ARM - Oleksandr Andrushchen...
XPDDS17: Keynote: Shared Coprocessor Framework on ARM - Oleksandr Andrushchen...The Linux Foundation
 
Porting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_GriffinPorting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_GriffinPeter Griffin
 
Introducing Container Technology to TSUBAME3.0 Supercomputer
Introducing Container Technology to TSUBAME3.0 SupercomputerIntroducing Container Technology to TSUBAME3.0 Supercomputer
Introducing Container Technology to TSUBAME3.0 SupercomputerAkihiro Nomura
 
(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep Dive(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep DiveAmazon Web Services
 
Container & kubernetes
Container & kubernetesContainer & kubernetes
Container & kubernetesTed Jung
 
DPDK Integration: A Product's Journey - Roger B. Melton
DPDK Integration: A Product's Journey - Roger B. MeltonDPDK Integration: A Product's Journey - Roger B. Melton
DPDK Integration: A Product's Journey - Roger B. Meltonharryvanhaaren
 
Real-World Docker: 10 Things We've Learned
Real-World Docker: 10 Things We've Learned  Real-World Docker: 10 Things We've Learned
Real-World Docker: 10 Things We've Learned RightScale
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDKKernel TLV
 
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...OpenStack Korea Community
 
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageWebinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageMayaData Inc
 
Container Attached Storage (CAS) with OpenEBS - Berlin Kubernetes Meetup - Ma...
Container Attached Storage (CAS) with OpenEBS - Berlin Kubernetes Meetup - Ma...Container Attached Storage (CAS) with OpenEBS - Berlin Kubernetes Meetup - Ma...
Container Attached Storage (CAS) with OpenEBS - Berlin Kubernetes Meetup - Ma...OpenEBS
 
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...WebCamp
 
Evolution of containers to kubernetes
Evolution of containers to kubernetesEvolution of containers to kubernetes
Evolution of containers to kubernetesKrishna-Kumar
 
DevOps Supercharged with Docker on Exadata
DevOps Supercharged with Docker on ExadataDevOps Supercharged with Docker on Exadata
DevOps Supercharged with Docker on ExadataMarketingArrowECS_CZ
 

Similar to ”Bare-Metal Container" presented at HPCC2016 (20)

Docker and kubernetes
Docker and kubernetesDocker and kubernetes
Docker and kubernetes
 
[Draft] Fast Prototyping with DPDK and eBPF in Containernet
[Draft] Fast Prototyping with DPDK and eBPF in Containernet[Draft] Fast Prototyping with DPDK and eBPF in Containernet
[Draft] Fast Prototyping with DPDK and eBPF in Containernet
 
Introductio to Docker and usage in HPC applications
Introductio to Docker and usage in HPC applicationsIntroductio to Docker and usage in HPC applications
Introductio to Docker and usage in HPC applications
 
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV Cluster
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV ClusterMethod of NUMA-Aware Resource Management for Kubernetes 5G NFV Cluster
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV Cluster
 
docker
dockerdocker
docker
 
Latest (storage IO) patterns for cloud-native applications
Latest (storage IO) patterns for cloud-native applications Latest (storage IO) patterns for cloud-native applications
Latest (storage IO) patterns for cloud-native applications
 
XPDDS17: Keynote: Shared Coprocessor Framework on ARM - Oleksandr Andrushchen...
XPDDS17: Keynote: Shared Coprocessor Framework on ARM - Oleksandr Andrushchen...XPDDS17: Keynote: Shared Coprocessor Framework on ARM - Oleksandr Andrushchen...
XPDDS17: Keynote: Shared Coprocessor Framework on ARM - Oleksandr Andrushchen...
 
Porting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_GriffinPorting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_Griffin
 
Introducing Container Technology to TSUBAME3.0 Supercomputer
Introducing Container Technology to TSUBAME3.0 SupercomputerIntroducing Container Technology to TSUBAME3.0 Supercomputer
Introducing Container Technology to TSUBAME3.0 Supercomputer
 
(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep Dive(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep Dive
 
Container & kubernetes
Container & kubernetesContainer & kubernetes
Container & kubernetes
 
DPDK Integration: A Product's Journey - Roger B. Melton
DPDK Integration: A Product's Journey - Roger B. MeltonDPDK Integration: A Product's Journey - Roger B. Melton
DPDK Integration: A Product's Journey - Roger B. Melton
 
Real-World Docker: 10 Things We've Learned
Real-World Docker: 10 Things We've Learned  Real-World Docker: 10 Things We've Learned
Real-World Docker: 10 Things We've Learned
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDK
 
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
[OpenStack Day in Korea 2015] Track 1-6 - 갈라파고스의 이구아나, 인프라에 오픈소스를 올리다. 그래서 보이...
 
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageWebinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
 
Container Attached Storage (CAS) with OpenEBS - Berlin Kubernetes Meetup - Ma...
Container Attached Storage (CAS) with OpenEBS - Berlin Kubernetes Meetup - Ma...Container Attached Storage (CAS) with OpenEBS - Berlin Kubernetes Meetup - Ma...
Container Attached Storage (CAS) with OpenEBS - Berlin Kubernetes Meetup - Ma...
 
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...
 
Evolution of containers to kubernetes
Evolution of containers to kubernetesEvolution of containers to kubernetes
Evolution of containers to kubernetes
 
DevOps Supercharged with Docker on Exadata
DevOps Supercharged with Docker on ExadataDevOps Supercharged with Docker on Exadata
DevOps Supercharged with Docker on Exadata
 

More from Kuniyasu Suzaki

RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)Kuniyasu Suzaki
 
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)Kuniyasu Suzaki
 
IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告Kuniyasu Suzaki
 
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)Kuniyasu Suzaki
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiKuniyasu Suzaki
 
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?Kuniyasu Suzaki
 
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)Kuniyasu Suzaki
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Kuniyasu Suzaki
 
RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiKuniyasu Suzaki
 
USENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory DisaggregationUSENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory DisaggregationKuniyasu Suzaki
 
Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)Kuniyasu Suzaki
 
OSセキュリティチュートリアル
OSセキュリティチュートリアルOSセキュリティチュートリアル
OSセキュリティチュートリアルKuniyasu Suzaki
 
Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies Kuniyasu Suzaki
 
Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護Kuniyasu Suzaki
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
 
仮想化技術によるマルウェア対策とその問題点
仮想化技術によるマルウェア対策とその問題点仮想化技術によるマルウェア対策とその問題点
仮想化技術によるマルウェア対策とその問題点Kuniyasu Suzaki
 
Technology Used in Virtual Machine (Jan 2008)
Technology Used in Virtual Machine (Jan 2008)Technology Used in Virtual Machine (Jan 2008)
Technology Used in Virtual Machine (Jan 2008)Kuniyasu Suzaki
 
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...Kuniyasu Suzaki
 
ACM SOSP11 & SOCC11 & PLOS11 Report
ACM SOSP11 & SOCC11 & PLOS11 ReportACM SOSP11 & SOCC11 & PLOS11 Report
ACM SOSP11 & SOCC11 & PLOS11 ReportKuniyasu Suzaki
 
私立大学情報教育協会大学 情報セキュリティ研究講習会
私立大学情報教育協会大学 情報セキュリティ研究講習会私立大学情報教育協会大学 情報セキュリティ研究講習会
私立大学情報教育協会大学 情報セキュリティ研究講習会Kuniyasu Suzaki
 

More from Kuniyasu Suzaki (20)

RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
 
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
 
IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告
 
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
 
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
 
RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzaki
 
USENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory DisaggregationUSENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory Disaggregation
 
Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)
 
OSセキュリティチュートリアル
OSセキュリティチュートリアルOSセキュリティチュートリアル
OSセキュリティチュートリアル
 
Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies
 
Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
仮想化技術によるマルウェア対策とその問題点
仮想化技術によるマルウェア対策とその問題点仮想化技術によるマルウェア対策とその問題点
仮想化技術によるマルウェア対策とその問題点
 
Technology Used in Virtual Machine (Jan 2008)
Technology Used in Virtual Machine (Jan 2008)Technology Used in Virtual Machine (Jan 2008)
Technology Used in Virtual Machine (Jan 2008)
 
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...
 
ACM SOSP11 & SOCC11 & PLOS11 Report
ACM SOSP11 & SOCC11 & PLOS11 ReportACM SOSP11 & SOCC11 & PLOS11 Report
ACM SOSP11 & SOCC11 & PLOS11 Report
 
私立大学情報教育協会大学 情報セキュリティ研究講習会
私立大学情報教育協会大学 情報セキュリティ研究講習会私立大学情報教育協会大学 情報セキュリティ研究講習会
私立大学情報教育協会大学 情報セキュリティ研究講習会
 

Recently uploaded

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 

Recently uploaded (20)

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 

”Bare-Metal Container" presented at HPCC2016

  • 1. Bare-Metal Container --- Direct execution of a container image on a remote machine with an optimized kernel --- 1 National Institute of Advanced Industrial Science and Technology(AIST) Kuniyasu Suzaki, Hidetaka Koie, Ryousei Takano IEEE International Conferences on High Performance Computing and Communications (HPCC) 2016, Sydney
  • 2. Contents • Background of BMC – Drawbacks of container, general kernel, and accounting. • What is BMC? • Current implementation • Evaluation • Conclusions 2
  • 3. Background of BMC 1/3 Drawback of Container • Container technology (Docker) becomes popular. – Docker offers an environment to customize an application easily. – It looks like to be good for an application, but it is a server centric. • It does not allow to change the kernel. – Kernel options passed through /sys are not effective because Docker uses union file system (AUFS or DeviceMapper), which prevents options from reaching to the kernel. • Some applications cannot run on Docker. – DPDK on Docker does not work on some machines, because it depends on “igb_uio” and “rte_kni” kernel modules. • Some provider offers the kernel which can treat DPDK on Docker, but it is case by case solution. It is not fundamental solution. 3
  • 4. Background of BMC 1/3 Drawback of Container • Container technology (Docker) becomes popular. – Docker offers an environment to customize an application easily. – It looks like to be good for an application, but it is a server centric. • It does not allow to change the kernel. – Kernel options passed through /sys are not effective because Docker uses union file system (AUFS or DeviceMapper), which prevents options from reaching to the kernel. • Some applications cannot run on Docker. – DPDK on Docker does not work on some machines, because it depends on “igb_uio” and “rte_kni” kernel modules. • Some provider offers the kernel which can treat DPDK on Docker, but it is case by case solution. It is not fundamental solution. 4 Container is a jail for a kernel optimizer.
  • 5. Background of BMC 1/3 Drawback of Container • Container technology (Docker) becomes popular. – Docker offers an environment to customize an application easily. – It looks like to be good for an application, but it is a server centric. • It does not allow to change the kernel. – Kernel options passed through /sys are not effective because Docker uses union file system (AUFS or DeviceMapper), which prevents options from reaching to the kernel. • Some applications cannot run on Docker. – DPDK on Docker does not work on some machines, because it depends on “igb_uio” and “rte_kni” kernel modules. • Some provider offers the kernel which can treat DPDK on Docker, but it is case by case solution. It is not fundamental solution. 5 Container is a jail for a kernel optimizer. HPC users want to optimize the kernel for their applications. Kernel is a servant. Container way is not fit for them.
  • 6. Background of BMC 2/3 General kernel leads weak performance • Arrakis[OSDI’14] showed that nearly 70% of network latency was spent in the network stack in a Linux kernel. • Many DB applications (e.g., Oracle, MongoDB) reduce the performance by THP (Transparent Huge Pages) which is enabled on most Linux distributions. 6
  • 7. Background of BMC 2/3 General kernel leads weak performance • Arrakis[OSDI’14] showed that nearly 70% of network latency was spent in the network stack in a Linux kernel. • Many DB applications (e.g., Oracle, MongoDB) reduce the performance by THP (Transparent Huge Pages) which is enabled on most Linux distributions. 7 It is not fundamental solution. HPC users want to optimize the kernel for their applications. Kernel is a servant.
  • 8. Background of BMC 3/3 Power consumption for each application • Current power measurement is coarse. – PUE only shows usage of data-center scale. – Current power consumption is theme for vender and administrators • Users have no incentive for low power. – Current accounting is based on time consumption 8
  • 9. Background of BMC 3/3 Power consumption for each application • Current power measurement is coarse. – PUE only shows usage of data-center scale. – Current power consumption is theme for vender and administrators • Users have no incentive for low power. – Current accounting is based on time consumption 9 There is no good method to measure power consumption “for an application”. No accounting which considers power consumption.
  • 10. What is BMC? • BMC(Bare-Metal Container) runs a container (Docker) image with a suitable Linux kernel on a remote physical machine. – Application on Container can change kernel settings and machine which fit for application and extract the full performance. – It means the power is almost used for an application. 10 Application Centric Architecture
  • 11. machine kernel container manager Server Centric Architecture Traditional Style (Ex: container) Invoke app. Power always up Admin’s Space User’s Space app container app container app container Comparison Pros: • Multi Tenant •Quick Response (No Rebooting) Cons: • Kernel is not replaced. Pros: • Apps can select a kernel & hardware. • Apps occupy the machine and extract the performance. Cons: • Set up overhead (Rebooting) Boot the kernel & app. BMC machine machine machine kernel app container kernel kernel Application Centric Architecture Select a kernel Select a physical machine BMC manager Remote Machine management (WOL, AMT, IPMI) network bootloader network bootloader network bootloader Power frequently up/down app container app container
  • 12. Node-1 Docker Hub BMC Hub BMC Manager client BMC Command #bmc run “docker-img” “kernel” “initrd” “command” HTTPS (apache) iPXE script kernel & initrd kernel & initrd IP address (bmc-ID) NFS mount or download to RAM FS docker image Docker Image ssh ssh pub-key cloud-init + bmc tools (heatbeat) + sshd + ssh pub-key iPXE Power On (WOL, AMT, IPMI) Platform authentication Authenticate Download iPXE script Download kernel & initrd NFS mount or download to RAM FS request ssh connection ① ②③ ④ ⑤ Power Off (shutdown command, AMT, IPMI) ⑥ ⑦ ⑧ iPXE Kernel & initrd (IP3) (MAC or IP1) (IP2) (Linux or IP1) Procedure to execute BMC command
  • 13. Remote Machine Boot Procedure 1. Power-on a node machine with Remote Machine Management (WOL, Intel AMT, IPMI) 2. Network Boot Loader (iPXE) – Get kernel and intird from a HTTP/HTTPS server. 3. The downloaded initrd mounts a Docker image. • NFS mode • RAM FS mode 4. Boot procedure in a Docker image – Fortunately, Docker image keeps boot procedure. 5. SSH is connected from BMC command – Run an application. 13
  • 14. Remote Machine Management WOL Intel AMT IPMI Protocol Magic Packet (MAC address) HTTPS (IP address) RMPC (IP address) Power-On ✔ ✔ ✔ Power-Off × ✔ ✔ Security × Password Password Comment Most PCs have WOL. High level Intel machine Server Machine (Slow BIOS) 14
  • 15. Network Boot Loader • PXE is the most famous, but it is limited for LAN, because it depends on “magic packet” of Layer 2. • BMC uses iPXE which download “kernel” and “initrd” from HTTP/HTTPS. • The iPXE downloads kernel and initrd. 15 #!ipxe ifopen net0 set net0/ip 192.168.0.101 set net0/netmask 255.255.255.0 set net0/gateway 192.168.0.1 set dns 192.168.0.1 :loop chain http://192.168.0.200/cgi-bin/baremetal.ipxe || goto waiting exit :waiting sleep 1 goto loop – iPXE is custimzed by its scripting language. BMC uses it.
  • 16. How to boot OS (Linux) • The downloaded “initrd” is customized to mount an Docker image. It offers 2 mount methods. – NFS mode • Download necessary data only and fast boot, but it needs to download data to run applications after boot. – RAMFS mode • Download full disk image and slow boot, but application runs fast after boot. • Boot procedure in the Docker image. – An Docker image keeps boot procedure for each application because each application package designed to include them. – BMC utilizes these boot procedures to rum daemons, such as the SSH, because an application in the Docker image is executed by remote procedure calls from BMC manager. 16
  • 17. Current Implementation • Current BMC Manager is implemented with shell script. – 4500 LOC. • Power consumed on each node is measured by WattChecker. • We have tried several machines as BMC nodes. – From Atom to Xeon. – Application can select machine considering power consumption. 17
  • 18. Spec of Test Machines Remote machine manage ment CPU,Core/thread, Clock (Burst time), Power Logical performance GFLOPS (Burst time) Issue date Memory NIC (queue) Low Power Intel NUC 5CPYH WOL Celeron (N3050),2/2, 1.6 (2.16)GHz,8W 6.4 (8.6) 2015 8GB RealTek r8169 (1) NotePC Lenovo ThinkPAD T430s Intel AMT i7 (3520M)2/4, 2.9(3.6)GHz, 35W 46.4 (57.6) 2012 16GB Intel e1000 (1) DesktopPC Dell Optiplex 960 Intel AMT Core 2Quad (Q9400) 4 /4, 2.66GHz,95W 42.656 2008 16GB Intel e1000 (1) Server Dell PowerEdge T410 IPMI Xeon (X5650) 6/12,2.66(3.06)GHz,95W 63.984 (73.44) 2010 8GB Broadcom NeXtreme II(8) 18
  • 19. Boot performance 19 Network PowerTime NFSRamFS • They are BMC’s overhead. • The performance improved by optimization must surpass the overhead.
  • 20. Tested Application and Optimization • This presentation shows the result of Matrix multiplication with/without Hyper Threading. – The experiment measured the time for 10 times of matrix multiplications on OpenBlas optimized for each machine. 20 Application Optimization Matrix Multiplication with OpenBlas Hyper Threading off Redis benchmark Transparent Huge Pages off Apache benchmark Receive Flow Steering off
  • 21. Performance Difference 10 times of matrix multiplications [12800:12800] on OpenBlas optimized for each machine. . 21 Time (s) Power (j) GFLOPS Power/ (GFLOPS *time) i7 HTT-on 961.4 55,315 43.8 (76.0%) 1.31 i7 HTT-off 827.1 45,364 50.9 (88.4%) 1.08 Xeon HTT-on 945.6 211,908 44.6 (60.7%) 5.02 Xeon HTT-off 698.9 151,760 60.5 (82.4%) 3.59 () shows the rate from logical performance • The results show no hyper threading were better.
  • 22. Performance improvement which compensates the boot overhead Boot overhead Improvement at [6400:6400] Improvement at [12800:12800] Time (sec) i7 35.4 15.9 134.3 Xeon 108.0 29.8 246.7 Power (joule) i7 1,805.3 1,150 9,951 Xeon 11,274.5 6,792 60,148 22 • Overheads for time and power were compensated before [12800:12800].
  • 23. Related works • Triton [Joyent’s product] – Triton = Docker + SmartOS. • In order to optimize, user needs to customize SmarOS. • LinuxBIOS/BProc Cluster[HPCS’02] – Testbed for kernel test. It is not so easy to implement because it requires to replace BIOS. • Shifter[Cray User Group’15] – Translate Docker image for their environment. – It does not allow to change the kernel. • SLURM[ICDCN’14] – Measure power consumption for an application. It depends on function to measure power (Intel RAPL: Running Average Power Limit, or CRAY machine). 23
  • 24. Conclusions • BMC (Bare-Metal Container) runs a container (Docker) image with a suitable Linux kernel on a remote physical machine. • The overhead of BMC was compensated by the improved performance of applications. • Official HP: http://www.itri.aist.go.jp/cpc/research/bmc/ • Docker Image for BMC manager: https://hub.docker.com/r/baremetalcontainer/ • Source Code: https://github.com/baremetalcontainer 24