SlideShare a Scribd company logo
1 of 49
Cloud Monitoring Overview
      Ramkumar Lakshminarayanan
Interoperability


Interoperability means easy migration and integration
of applications and data between different vendors’
clouds. Owing to different hypervisors (KVM, Hyper-V,
ESX, ESXi), VM technologies, storage, configuring
operating systems, various security standards and
management interfaces, many cloud systems are not
interoperable.
Interoperability


Many enterprises want interoperability between their
inhouse infrastructure and the cloud. The issue of
interoperability need to be addressed to allow
applications to be ported between clouds, or use
multiple cloud multiple cloud infrastructures, before
critical business applications are delivered from the
cloud. Most clouds are completely opaque to their
users .
Interoperability


Most of the time, users are fine until there is access
issue.
In such situations, frustration increase exponentially
with time, partly because of the opacity.
We need monitoring solution to avoid frustration.
Data Migration


Data migration between data centers or cloud
systems are important concerns of taxonomy.
While migrating data, some considerations should be
taken into account like no data loss, availability,
scalability, cost-efficiency, and load balancing.
User should be able to move their data and
applications any time from one to anther seamlessly,
without any one vendor controlling it.
Data Migration


Seamless transfer, as in mobile communication, is
required cloud computing to work.
Many enterprises do not move their mission critical
data and applications to the cloud because of vendor
lock-in, security, governance, and many more
complications.
Management Services


The management services contain deployment,
monitoring, reporting, service-level agreement, and
metering billing. We discuss these in detail.
Deployment and Configuration


To reduce the complexity and administrative burden
across the cloud deployment, we need the
automation process life cycle.
RightScale Cloud Management Platform addresses
three stages of the cloud application deployment
lifecycle, namely design, manage, and deploy.
Deployment and Configuration


Tools such as cfengine, Chef from Opscode-chef,
rPath, and Puppet are available as configuration
management frameworks.
These tools help software developers and engineers
to manage server and application configuration by
writing code, rather than running commands by hand.
Monitoring and Reporting


Developing, testing, debugging, and studying the
performance of cloud systems is quite complex.
Management cost increases significantly as the
number of sites increases.
To address such problems, we need monitoring and
reporting mechanisms.
Monitoring basically monitor the SLA lifecycle. It also
determines when an SLA completes and reports to
the building service.
There are some services that monitor the cloud and
reports to the billing services.
2.3.5.2 Monitoring and Reporting


There are some services that monitor the cloud
systems and produce health reports such as Hyperic
HQ.
Hyperic lets sysadmins find, fix and prevent
performance problems in custom web apps, whether
running on physical, virtual, or cloud infrastructure.
Service-Level Agreements (SLAs)
           Management


Users always want stable and reliable system
service. Cloud architecture is considered to be
highly available, up and running 24 h X 7 days.
Many cloud service providers have made huge
investments to make their system reliable.
However, most cloud vendors today do not
provide high availability assurance.
If a service goes down, for whatever reason, what
can a user do? How can users access their
documents stored in the cloud?
In such a case, the provider should pay a fine to
the consumer as compensation to meet SLAs.
Service-Level Agreements (SLAs)
           Management


An SLA specifies the measurement, evaluation, and
reporting of the agreed service level standards such
as:
Service-Level Agreements (SLAs)
              Management
Currently, Amazon offers a “99.9% Monthly Uptime
Percentage” SLA for Simple Storage Service
(Amazon S3) and credit is limited to 10%.
Amazon credits 25% of charges if the availability
drops is limited to 10%.
Amazon credits 25% of charges if the availability
drops below 99.0%, whereas 3Tear Virtual Private
Data Center (VPDC) service will include a 99.999%
availability SLA that is supposed to help assure
customers about putting mission-critical apps and
services in the cloud.
Metering and Billing


Transparent metering and billing will increase the
trust level of users towards cloud services.
Pay-as-you-go subscription or pay-as-you-consume
model of billing and metering are popular for cloud.
This service gets the status of the SLA, and invokes
the credit service, which debits the user credit card or
account and informs the user.
Metering and Billing


There are many pricing strategies such as RAM
hours, CPU Capacity, Bandwidth
(Inbound/Outbound Data Transfer), Storage
(gigabytes of data), Software (License Fee), and
Subscription-Based Pricing.
There are some interesting new billing models
such GoGrid prepaid cloud hosting plan and IDC
cloud billing research, which are great examples
of moving cloud pricing models towards telecom
models.
Provisioning


Self-service application provisioning enables
application developers to set up application
infrastructure, such as Java application servers,
database, and messaging servers, without any
help or assistance from infrastructure teams.
Self-service application provisioning hides the
complexity of the enterprise cloud from
application developers and empower them to set
up and configure complex application
infrastructure with the click of a button.
Provisioning


By building a self-service portal for on-demand
provisioning, we can reduce process overheads.
Provisioning can help to manage resource
management, workload management, and
autorecovery and task and process automation.
Security


Cloud Providers provides security by

  Certifications and Accreditations.
  Physical Security.
  Secure Services.
  Data Privacy.
Security


Corporate information is not only a competitive asset,
but it often contains information of consumers and
employees that in the wrong hands, could create a
civil liability and possibly criminal charges.
The key challenges of cloud security are performance,
risk management, governance, design, and
deployability.
Encryption/Decryption


Customers who worry about the privacy of their
information should encrypt their data before moving
it to the cloud.
The provider should provide the utilities to simplify
the process of encrypting the files and storing them in
the cloud; similarly, for retrieval decryption will need.
Cloud provider use the Advanced Encryption
Standard (AES) that may be AES-128, AES-192, or AES-
256.
Privacy and Federated Identity


Federation is the act of combining data or identities
across multiple systems. Federation can be done by a
cloud provider or by a cloud broker.
Each user can subscribe to a portal and be given an
access card, which will be used to identify the
subscriber at this particular portal or other portal in
collaboration.
Authorization and Authentication


 In public cloud, safeguards must be placed on
 machines to ensure proper authentication and
 authorization.
 Within the private cloud environment, one can track,
 pinpoint, control, and manage users who try to access
 machines with improper credential.
 Single sign-on is the basic requirement for a customer
 who accesses multiple cloud services.
Fault Tolerance


In case of failure, there will be a hot backup instance
of the application, which is ready to take over without
disruption.
Cloud computing outages extend into the more
refined version of cloud service platform. Some
outages have been quite lengthy.
Fault Tolerance


The major problem for cloud computing is how to
minimize outage/failover to provide reliable services.
It is important to adopt the well-known Recovery-
Oriented Computing (ROC) paradigm in large data
center.
Google uses Google File System (GFS) or distributed
disk storage; every piece of data is replicated three
times. If one machine dies, a master redistributes the
data to a new server.
Classification and Comparison between
     Cloud Computing Ecosystems

This section provides a technical comparison of several
technologies and cloud providers. Table 2.2-2.3 compare
between different infrastructure technologies and solution
providers such as Amazon Web Service (AWS), GoGrid,
Flexiscale, and Moso.
Classification and Comparison between
     Cloud Computing Ecosystems
Classification and Comparison between
     Cloud Computing Ecosystems
2.4 Classification and Comparison
between Cloud Computing Ecosystems

Tables 2.4-2.6 compares different SaaS and PaaS service
providers such as Google AppEngine (GAE), GigaSpace,
Azure, RightScale, SunCloud, and Salesforce.com (SFDC)
2.4 Classification and Comparison
between Cloud Computing Ecosystems
Classification and Comparison between
     Cloud Computing Ecosystems
Classification and Comparison between
     Cloud Computing Ecosystems
Classification and Comparison between
     Cloud Computing Ecosystems

Similarly, Tables 2.7-2.8 compare open source cloud-based
services like Eucalyptus, Open Nebula, Nimbus, and Enomaly.
2.4 Classification and Comparison
between Cloud Computing Ecosystems
Classification and Comparison between
     Cloud Computing Ecosystems
Cloud Computing Infrastructure Technology
         and Solution Provider
 In EC2 architecture, users are able to monitor and
 control their applications as an instance but not as a
 service.
 To achieve manageability, the following capabilities
 are required: application-defined SLAs, such as
 workload capacity and concurrent computational
 tasks, dynamic provision of additional services to
 handle additional workload.
 AWS is becoming popular as a de facto standard;
 many cloud systems are using a similar API.
 Eucalyptus is an open-source implementation of the
 AWS APIs.
Cloud Computing Infrastructure Technology
         and Solution Provider
 The biggest concern of current cloud computing
 system is auditing of the security controls and
 mechanism in terms of user level.
 Amazon S3 lacks in access control that support
 delegation and auditing, and makes implicit trust
 assumptions between S3 and client.
 Amazon’s work towards Statement on Auditing
 Standard No. 70: Service Organizations, Type II
 (SAS70 type II) certification may be helpful for those
 concerned with widely varying levels of security
 competency.
Cloud Computing PaaS and SaaS Provider



   Google App Engine (GAE) provides a useful basis for
   people useful basis for people and companies to
   make web application from scratch without needing
   to worry about infrastructure.
   GAE provides for automatic scaling and load
   balancing.
Cloud Computing PaaS and SaaS Provider



   GigaSpaces use an In-Memory Data-Grid (IMDG)
   technique to manage state data in a database,
   which bridges the bottleneck of scalability.
   It provides all the basic features of a high-end
   Data Grid as well as unique features, such as
   continuous query and seamless integration with
   external data sources, and makes it extremely
   easy to deploy, modify, and ensure high
   availability for applications running on Amazon
   EC2.
Cloud Computing PaaS and SaaS Provider



   GIgaSpaces’s Space-Based Architecture (SBA)
   approaches are based on the Tuple Space model that
   can meet the challenge of running low-latency
   transactional applications in a highly distributed
   environment such as Amazon EC2.
Open Source Based Cloud Computing
               Services
The role of open source cloud computing is to build
mechanisms around digital identify management,
and outline technological building blocks that are
needed for controllable trust and identity verification.
Nimbus supports the OASIS WSRF standard that
defines a framework and uses we services to model
and access stateful resources.
Enomaly cloud is focusing on the issue of
interoperability, which is essential for enterprise
cloud system. Most of the open source clouds are
providing IaaS.
Comments on Issues and Opportunities



  There are some issues related to mechanism such as
  security, privacy, (erosion of) data integrity, load
  balancing, interoperability, and scalable storage.
  Cloud computing services often provide common
  business applications online that are accessed from a
  web browser, while the software and data are stored
  on the servers.
Comments on Issues and Opportunities



  Transmitting huge volumes of multimedia data across
  clouds will continue to be a challenge, and needs
  further research.
  Discovery and composition of the services between
  multiple clouds is also a promising arena for
  enterprise cloud.
Comments on Issues and Opportunities



  As the user requirement changes, functionality and
  privacy requirements may change, and so privacy
  requirements need to be reassessed at regular
  intervals.
  Policy design dynamic privacy design pattern may be
  a better technique for cloud computing.
  Cloud computing bring some novel attacks that have
  not figured in much of security discussion to date.
2. 6 Comments on Issues and
          Opportunities


Amazon AWS Import/Export support importing
and exporting data into and out of Amazon S3
buckets in the USA, but leaves complication in
migration of data between clouds.
A major challenge of moving applications to the
cloud is the need to master multiple
programming language and operating
environment.
Comments on Issues and Opportunities


  Special attention is needed for government
  agencies to integrate their data from tradition to
  PaaS, a need to learn some new programming
  models residing in the cloud.
  Interoperability is another important issue for
  cloud. There is a need for data access
  interoperability, which is a unique programming
  interface to access diverse database (such as
  JDBS, ODBC, Ado.NET).
  There are lots of standardization issues; in the
  race to standardization, many organization and
  forums are working, but need to leverage the
  collaboration and discussion between them.
Comments on Issues and Opportunities



  Armbrust et al. also identified many issues for
  future research. There are some complications
  with current programming frameworks and
  programming languages for cloud computing
  such as Google AppEngine with its SQL-like
  syntax called “GQL”. Select statements in GQL
  can be performed on one table only.
  GQL does not support a join statement. The cloud
  developers will need more flexible query-oriented
  and API-oriented programming in future.
Comments on Issues and Opportunities



  The complexity will be there for developers to apply
  the disciplines of development across multiple
  platform technologies and computational models.
  The alignment of user needs with business strategy is
  also a challenging job for CIOs.
Questions ?

More Related Content

What's hot

The 15 ITIL Steps to DBaaS in the Cloud
The 15 ITIL Steps to DBaaS in the CloudThe 15 ITIL Steps to DBaaS in the Cloud
The 15 ITIL Steps to DBaaS in the CloudJoaquin Marques
 
Virtualization and Automation: How Dynamic is Your Data Center
Virtualization and Automation: How Dynamic is Your Data CenterVirtualization and Automation: How Dynamic is Your Data Center
Virtualization and Automation: How Dynamic is Your Data CenterDavid Resnic
 
IBM Application Acceleration Data Sheet
IBM Application Acceleration Data SheetIBM Application Acceleration Data Sheet
IBM Application Acceleration Data Sheetcathylums
 
Paetec Data Center Colocation Presentation
Paetec Data Center Colocation PresentationPaetec Data Center Colocation Presentation
Paetec Data Center Colocation Presentationtbunten
 
ServiceNow Event Management
ServiceNow Event ManagementServiceNow Event Management
ServiceNow Event ManagementJade Global
 
[WSO2Con EU 2017] Integration Platform Strategy for Digital Transformation
[WSO2Con EU 2017] Integration Platform Strategy for Digital Transformation[WSO2Con EU 2017] Integration Platform Strategy for Digital Transformation
[WSO2Con EU 2017] Integration Platform Strategy for Digital TransformationWSO2
 
Cloud-Based Service Management
Cloud-Based Service ManagementCloud-Based Service Management
Cloud-Based Service ManagementCA Technologies
 
It infrastructure management services @ yash
It infrastructure management services @ yashIt infrastructure management services @ yash
It infrastructure management services @ yashYASH Technologies
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCaroline Hsieh
 
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpHybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpNicole Bray
 
Intoduction to mantech 2
Intoduction to mantech 2Intoduction to mantech 2
Intoduction to mantech 2libertychidzuu2
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld
 
IRJET- Cloud Based Warehouse Management Firm
IRJET- Cloud Based Warehouse Management FirmIRJET- Cloud Based Warehouse Management Firm
IRJET- Cloud Based Warehouse Management FirmIRJET Journal
 

What's hot (18)

SaaS.pptx
SaaS.pptxSaaS.pptx
SaaS.pptx
 
The 15 ITIL Steps to DBaaS in the Cloud
The 15 ITIL Steps to DBaaS in the CloudThe 15 ITIL Steps to DBaaS in the Cloud
The 15 ITIL Steps to DBaaS in the Cloud
 
Virtualization and Automation: How Dynamic is Your Data Center
Virtualization and Automation: How Dynamic is Your Data CenterVirtualization and Automation: How Dynamic is Your Data Center
Virtualization and Automation: How Dynamic is Your Data Center
 
IBM Application Acceleration Data Sheet
IBM Application Acceleration Data SheetIBM Application Acceleration Data Sheet
IBM Application Acceleration Data Sheet
 
Paetec Data Center Colocation Presentation
Paetec Data Center Colocation PresentationPaetec Data Center Colocation Presentation
Paetec Data Center Colocation Presentation
 
what is SaaS?
what is SaaS?what is SaaS?
what is SaaS?
 
ServiceNow Event Management
ServiceNow Event ManagementServiceNow Event Management
ServiceNow Event Management
 
[WSO2Con EU 2017] Integration Platform Strategy for Digital Transformation
[WSO2Con EU 2017] Integration Platform Strategy for Digital Transformation[WSO2Con EU 2017] Integration Platform Strategy for Digital Transformation
[WSO2Con EU 2017] Integration Platform Strategy for Digital Transformation
 
Cloud-Based Service Management
Cloud-Based Service ManagementCloud-Based Service Management
Cloud-Based Service Management
 
Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1
 
It infrastructure management services @ yash
It infrastructure management services @ yashIt infrastructure management services @ yash
It infrastructure management services @ yash
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service Management
 
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpHybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
 
Intoduction to mantech 2
Intoduction to mantech 2Intoduction to mantech 2
Intoduction to mantech 2
 
Software as a Service
Software as a ServiceSoftware as a Service
Software as a Service
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services
 
SaaS: Introduction
SaaS: IntroductionSaaS: Introduction
SaaS: Introduction
 
IRJET- Cloud Based Warehouse Management Firm
IRJET- Cloud Based Warehouse Management FirmIRJET- Cloud Based Warehouse Management Firm
IRJET- Cloud Based Warehouse Management Firm
 

Similar to Cloud Monitoring Overview: Interoperability, Data Migration, Management Services

Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud services.pdf
Cloud services.pdfCloud services.pdf
Cloud services.pdfAsif Ali
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEcscpconf
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudCloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudSourabh Saxena
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noidataramandal
 
Cloud computing architecture
Cloud computing architectureCloud computing architecture
Cloud computing architecturemeenalkakkar
 
How Cloud Infrastructure Automation Benefits Organizations.pdf
How Cloud Infrastructure Automation Benefits Organizations.pdfHow Cloud Infrastructure Automation Benefits Organizations.pdf
How Cloud Infrastructure Automation Benefits Organizations.pdfSolviosTechnology
 

Similar to Cloud Monitoring Overview: Interoperability, Data Migration, Management Services (20)

Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
Cloud services.pdf
Cloud services.pdfCloud services.pdf
Cloud services.pdf
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudCloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloud
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
 
Cloud computing architecture
Cloud computing architectureCloud computing architecture
Cloud computing architecture
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
Introducing cloud computing
Introducing cloud computingIntroducing cloud computing
Introducing cloud computing
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
How Cloud Infrastructure Automation Benefits Organizations.pdf
How Cloud Infrastructure Automation Benefits Organizations.pdfHow Cloud Infrastructure Automation Benefits Organizations.pdf
How Cloud Infrastructure Automation Benefits Organizations.pdf
 

More from Dr. Ramkumar Lakshminarayanan

More from Dr. Ramkumar Lakshminarayanan (20)

IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
IT Security Awareness Posters
IT Security Awareness PostersIT Security Awareness Posters
IT Security Awareness Posters
 
Normalisation revision
Normalisation revisionNormalisation revision
Normalisation revision
 
Windows mobile programming
Windows mobile programmingWindows mobile programming
Windows mobile programming
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
Web technology today
Web technology todayWeb technology today
Web technology today
 
Php Tutorial
Php TutorialPhp Tutorial
Php Tutorial
 
Phonegap for Android
Phonegap for AndroidPhonegap for Android
Phonegap for Android
 
Create and Sell Android App (in tamil)
Create and Sell Android App (in tamil)Create and Sell Android App (in tamil)
Create and Sell Android App (in tamil)
 
Android app - Creating Live Wallpaper (tamil)
Android app - Creating Live Wallpaper (tamil)Android app - Creating Live Wallpaper (tamil)
Android app - Creating Live Wallpaper (tamil)
 
Android Tips (Tamil)
Android Tips (Tamil)Android Tips (Tamil)
Android Tips (Tamil)
 
Android Animation (in tamil)
Android Animation (in tamil)Android Animation (in tamil)
Android Animation (in tamil)
 
Creating List in Android App (in tamil)
Creating List in Android App (in tamil)Creating List in Android App (in tamil)
Creating List in Android App (in tamil)
 
Single Touch event view in Android (in tamil)
Single Touch event view in Android (in tamil)Single Touch event view in Android (in tamil)
Single Touch event view in Android (in tamil)
 
Android Application using seekbar (in tamil)
Android Application using seekbar (in tamil)Android Application using seekbar (in tamil)
Android Application using seekbar (in tamil)
 
Rating Bar in Android Example
Rating Bar in Android ExampleRating Bar in Android Example
Rating Bar in Android Example
 
Creating Image Gallery - Android app (in tamil)
Creating Image Gallery - Android app (in tamil)Creating Image Gallery - Android app (in tamil)
Creating Image Gallery - Android app (in tamil)
 
Create Android App using web view (in tamil)
Create Android App using web view (in tamil)Create Android App using web view (in tamil)
Create Android App using web view (in tamil)
 
Hardware Interface in Android (in tamil)
Hardware Interface in Android (in tamil)Hardware Interface in Android (in tamil)
Hardware Interface in Android (in tamil)
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Cloud Monitoring Overview: Interoperability, Data Migration, Management Services

  • 1. Cloud Monitoring Overview Ramkumar Lakshminarayanan
  • 2. Interoperability Interoperability means easy migration and integration of applications and data between different vendors’ clouds. Owing to different hypervisors (KVM, Hyper-V, ESX, ESXi), VM technologies, storage, configuring operating systems, various security standards and management interfaces, many cloud systems are not interoperable.
  • 3. Interoperability Many enterprises want interoperability between their inhouse infrastructure and the cloud. The issue of interoperability need to be addressed to allow applications to be ported between clouds, or use multiple cloud multiple cloud infrastructures, before critical business applications are delivered from the cloud. Most clouds are completely opaque to their users .
  • 4. Interoperability Most of the time, users are fine until there is access issue. In such situations, frustration increase exponentially with time, partly because of the opacity. We need monitoring solution to avoid frustration.
  • 5. Data Migration Data migration between data centers or cloud systems are important concerns of taxonomy. While migrating data, some considerations should be taken into account like no data loss, availability, scalability, cost-efficiency, and load balancing. User should be able to move their data and applications any time from one to anther seamlessly, without any one vendor controlling it.
  • 6. Data Migration Seamless transfer, as in mobile communication, is required cloud computing to work. Many enterprises do not move their mission critical data and applications to the cloud because of vendor lock-in, security, governance, and many more complications.
  • 7. Management Services The management services contain deployment, monitoring, reporting, service-level agreement, and metering billing. We discuss these in detail.
  • 8. Deployment and Configuration To reduce the complexity and administrative burden across the cloud deployment, we need the automation process life cycle. RightScale Cloud Management Platform addresses three stages of the cloud application deployment lifecycle, namely design, manage, and deploy.
  • 9. Deployment and Configuration Tools such as cfengine, Chef from Opscode-chef, rPath, and Puppet are available as configuration management frameworks. These tools help software developers and engineers to manage server and application configuration by writing code, rather than running commands by hand.
  • 10. Monitoring and Reporting Developing, testing, debugging, and studying the performance of cloud systems is quite complex. Management cost increases significantly as the number of sites increases. To address such problems, we need monitoring and reporting mechanisms. Monitoring basically monitor the SLA lifecycle. It also determines when an SLA completes and reports to the building service. There are some services that monitor the cloud and reports to the billing services.
  • 11. 2.3.5.2 Monitoring and Reporting There are some services that monitor the cloud systems and produce health reports such as Hyperic HQ. Hyperic lets sysadmins find, fix and prevent performance problems in custom web apps, whether running on physical, virtual, or cloud infrastructure.
  • 12. Service-Level Agreements (SLAs) Management Users always want stable and reliable system service. Cloud architecture is considered to be highly available, up and running 24 h X 7 days. Many cloud service providers have made huge investments to make their system reliable. However, most cloud vendors today do not provide high availability assurance. If a service goes down, for whatever reason, what can a user do? How can users access their documents stored in the cloud? In such a case, the provider should pay a fine to the consumer as compensation to meet SLAs.
  • 13. Service-Level Agreements (SLAs) Management An SLA specifies the measurement, evaluation, and reporting of the agreed service level standards such as:
  • 14. Service-Level Agreements (SLAs) Management Currently, Amazon offers a “99.9% Monthly Uptime Percentage” SLA for Simple Storage Service (Amazon S3) and credit is limited to 10%. Amazon credits 25% of charges if the availability drops is limited to 10%. Amazon credits 25% of charges if the availability drops below 99.0%, whereas 3Tear Virtual Private Data Center (VPDC) service will include a 99.999% availability SLA that is supposed to help assure customers about putting mission-critical apps and services in the cloud.
  • 15. Metering and Billing Transparent metering and billing will increase the trust level of users towards cloud services. Pay-as-you-go subscription or pay-as-you-consume model of billing and metering are popular for cloud. This service gets the status of the SLA, and invokes the credit service, which debits the user credit card or account and informs the user.
  • 16. Metering and Billing There are many pricing strategies such as RAM hours, CPU Capacity, Bandwidth (Inbound/Outbound Data Transfer), Storage (gigabytes of data), Software (License Fee), and Subscription-Based Pricing. There are some interesting new billing models such GoGrid prepaid cloud hosting plan and IDC cloud billing research, which are great examples of moving cloud pricing models towards telecom models.
  • 17. Provisioning Self-service application provisioning enables application developers to set up application infrastructure, such as Java application servers, database, and messaging servers, without any help or assistance from infrastructure teams. Self-service application provisioning hides the complexity of the enterprise cloud from application developers and empower them to set up and configure complex application infrastructure with the click of a button.
  • 18. Provisioning By building a self-service portal for on-demand provisioning, we can reduce process overheads. Provisioning can help to manage resource management, workload management, and autorecovery and task and process automation.
  • 19. Security Cloud Providers provides security by Certifications and Accreditations. Physical Security. Secure Services. Data Privacy.
  • 20. Security Corporate information is not only a competitive asset, but it often contains information of consumers and employees that in the wrong hands, could create a civil liability and possibly criminal charges. The key challenges of cloud security are performance, risk management, governance, design, and deployability.
  • 21. Encryption/Decryption Customers who worry about the privacy of their information should encrypt their data before moving it to the cloud. The provider should provide the utilities to simplify the process of encrypting the files and storing them in the cloud; similarly, for retrieval decryption will need. Cloud provider use the Advanced Encryption Standard (AES) that may be AES-128, AES-192, or AES- 256.
  • 22. Privacy and Federated Identity Federation is the act of combining data or identities across multiple systems. Federation can be done by a cloud provider or by a cloud broker. Each user can subscribe to a portal and be given an access card, which will be used to identify the subscriber at this particular portal or other portal in collaboration.
  • 23. Authorization and Authentication In public cloud, safeguards must be placed on machines to ensure proper authentication and authorization. Within the private cloud environment, one can track, pinpoint, control, and manage users who try to access machines with improper credential. Single sign-on is the basic requirement for a customer who accesses multiple cloud services.
  • 24. Fault Tolerance In case of failure, there will be a hot backup instance of the application, which is ready to take over without disruption. Cloud computing outages extend into the more refined version of cloud service platform. Some outages have been quite lengthy.
  • 25. Fault Tolerance The major problem for cloud computing is how to minimize outage/failover to provide reliable services. It is important to adopt the well-known Recovery- Oriented Computing (ROC) paradigm in large data center. Google uses Google File System (GFS) or distributed disk storage; every piece of data is replicated three times. If one machine dies, a master redistributes the data to a new server.
  • 26. Classification and Comparison between Cloud Computing Ecosystems This section provides a technical comparison of several technologies and cloud providers. Table 2.2-2.3 compare between different infrastructure technologies and solution providers such as Amazon Web Service (AWS), GoGrid, Flexiscale, and Moso.
  • 27. Classification and Comparison between Cloud Computing Ecosystems
  • 28. Classification and Comparison between Cloud Computing Ecosystems
  • 29. 2.4 Classification and Comparison between Cloud Computing Ecosystems Tables 2.4-2.6 compares different SaaS and PaaS service providers such as Google AppEngine (GAE), GigaSpace, Azure, RightScale, SunCloud, and Salesforce.com (SFDC)
  • 30. 2.4 Classification and Comparison between Cloud Computing Ecosystems
  • 31. Classification and Comparison between Cloud Computing Ecosystems
  • 32. Classification and Comparison between Cloud Computing Ecosystems
  • 33. Classification and Comparison between Cloud Computing Ecosystems Similarly, Tables 2.7-2.8 compare open source cloud-based services like Eucalyptus, Open Nebula, Nimbus, and Enomaly.
  • 34. 2.4 Classification and Comparison between Cloud Computing Ecosystems
  • 35. Classification and Comparison between Cloud Computing Ecosystems
  • 36. Cloud Computing Infrastructure Technology and Solution Provider In EC2 architecture, users are able to monitor and control their applications as an instance but not as a service. To achieve manageability, the following capabilities are required: application-defined SLAs, such as workload capacity and concurrent computational tasks, dynamic provision of additional services to handle additional workload. AWS is becoming popular as a de facto standard; many cloud systems are using a similar API. Eucalyptus is an open-source implementation of the AWS APIs.
  • 37. Cloud Computing Infrastructure Technology and Solution Provider The biggest concern of current cloud computing system is auditing of the security controls and mechanism in terms of user level. Amazon S3 lacks in access control that support delegation and auditing, and makes implicit trust assumptions between S3 and client. Amazon’s work towards Statement on Auditing Standard No. 70: Service Organizations, Type II (SAS70 type II) certification may be helpful for those concerned with widely varying levels of security competency.
  • 38. Cloud Computing PaaS and SaaS Provider Google App Engine (GAE) provides a useful basis for people useful basis for people and companies to make web application from scratch without needing to worry about infrastructure. GAE provides for automatic scaling and load balancing.
  • 39. Cloud Computing PaaS and SaaS Provider GigaSpaces use an In-Memory Data-Grid (IMDG) technique to manage state data in a database, which bridges the bottleneck of scalability. It provides all the basic features of a high-end Data Grid as well as unique features, such as continuous query and seamless integration with external data sources, and makes it extremely easy to deploy, modify, and ensure high availability for applications running on Amazon EC2.
  • 40. Cloud Computing PaaS and SaaS Provider GIgaSpaces’s Space-Based Architecture (SBA) approaches are based on the Tuple Space model that can meet the challenge of running low-latency transactional applications in a highly distributed environment such as Amazon EC2.
  • 41. Open Source Based Cloud Computing Services The role of open source cloud computing is to build mechanisms around digital identify management, and outline technological building blocks that are needed for controllable trust and identity verification. Nimbus supports the OASIS WSRF standard that defines a framework and uses we services to model and access stateful resources. Enomaly cloud is focusing on the issue of interoperability, which is essential for enterprise cloud system. Most of the open source clouds are providing IaaS.
  • 42. Comments on Issues and Opportunities There are some issues related to mechanism such as security, privacy, (erosion of) data integrity, load balancing, interoperability, and scalable storage. Cloud computing services often provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers.
  • 43. Comments on Issues and Opportunities Transmitting huge volumes of multimedia data across clouds will continue to be a challenge, and needs further research. Discovery and composition of the services between multiple clouds is also a promising arena for enterprise cloud.
  • 44. Comments on Issues and Opportunities As the user requirement changes, functionality and privacy requirements may change, and so privacy requirements need to be reassessed at regular intervals. Policy design dynamic privacy design pattern may be a better technique for cloud computing. Cloud computing bring some novel attacks that have not figured in much of security discussion to date.
  • 45. 2. 6 Comments on Issues and Opportunities Amazon AWS Import/Export support importing and exporting data into and out of Amazon S3 buckets in the USA, but leaves complication in migration of data between clouds. A major challenge of moving applications to the cloud is the need to master multiple programming language and operating environment.
  • 46. Comments on Issues and Opportunities Special attention is needed for government agencies to integrate their data from tradition to PaaS, a need to learn some new programming models residing in the cloud. Interoperability is another important issue for cloud. There is a need for data access interoperability, which is a unique programming interface to access diverse database (such as JDBS, ODBC, Ado.NET). There are lots of standardization issues; in the race to standardization, many organization and forums are working, but need to leverage the collaboration and discussion between them.
  • 47. Comments on Issues and Opportunities Armbrust et al. also identified many issues for future research. There are some complications with current programming frameworks and programming languages for cloud computing such as Google AppEngine with its SQL-like syntax called “GQL”. Select statements in GQL can be performed on one table only. GQL does not support a join statement. The cloud developers will need more flexible query-oriented and API-oriented programming in future.
  • 48. Comments on Issues and Opportunities The complexity will be there for developers to apply the disciplines of development across multiple platform technologies and computational models. The alignment of user needs with business strategy is also a challenging job for CIOs.