Enviar pesquisa
Carregar
24 27
•
0 gostou
•
233 visualizações
Ijarcsee Journal
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 4
Baixar agora
Baixar para ler offline
Recomendados
99 103
99 103
Ijarcsee Journal
7 13
7 13
Ijarcsee Journal
51 59
51 59
Editor IJARCET
Cloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industry
Studying
347 352
347 352
Editor IJARCET
Cloud security cam ready
Cloud security cam ready
Hai Nguyen
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Thesis presentation: Middleware for Ubicomp - A Model Driven Development Appr...
Thesis presentation: Middleware for Ubicomp - A Model Driven Development Appr...
Till Riedel
Recomendados
99 103
99 103
Ijarcsee Journal
7 13
7 13
Ijarcsee Journal
51 59
51 59
Editor IJARCET
Cloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industry
Studying
347 352
347 352
Editor IJARCET
Cloud security cam ready
Cloud security cam ready
Hai Nguyen
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Thesis presentation: Middleware for Ubicomp - A Model Driven Development Appr...
Thesis presentation: Middleware for Ubicomp - A Model Driven Development Appr...
Till Riedel
L1802028184
L1802028184
IOSR Journals
SMARCOS CNR Paper Engineering
SMARCOS CNR Paper Engineering
Smarcos Eu
The Computer Aided Design Concept in the Concurrent Engineering Context.
The Computer Aided Design Concept in the Concurrent Engineering Context.
Nareshkumar Kannathasan
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity Mining
IDES Editor
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
IDES Editor
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
iosrjce
ZORA MDE Short Presentation 3.2
ZORA MDE Short Presentation 3.2
Momir Boskovic
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
IRJET Journal
20 74-1-pb
20 74-1-pb
Mahendra Sisodia
55 60
55 60
Editor IJARCET
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
Núcleo de Electrónica e Informática da Universidade do Algarve
Next Generation Automation Final
Next Generation Automation Final
impodgirl
Adm Workshop Program
Adm Workshop Program
Emmanuel Fuchs
Chap1
Chap1
None Theless
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
impodgirl
Towards enhancing resource
Towards enhancing resource
csandit
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
ijujournal
12 15
12 15
Ijarcsee Journal
31 34
31 34
Ijarcsee Journal
46 51
46 51
Ijarcsee Journal
122 129
122 129
Ijarcsee Journal
Mais conteúdo relacionado
Mais procurados
L1802028184
L1802028184
IOSR Journals
SMARCOS CNR Paper Engineering
SMARCOS CNR Paper Engineering
Smarcos Eu
The Computer Aided Design Concept in the Concurrent Engineering Context.
The Computer Aided Design Concept in the Concurrent Engineering Context.
Nareshkumar Kannathasan
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity Mining
IDES Editor
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
IDES Editor
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
iosrjce
ZORA MDE Short Presentation 3.2
ZORA MDE Short Presentation 3.2
Momir Boskovic
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
IRJET Journal
20 74-1-pb
20 74-1-pb
Mahendra Sisodia
55 60
55 60
Editor IJARCET
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
Núcleo de Electrónica e Informática da Universidade do Algarve
Next Generation Automation Final
Next Generation Automation Final
impodgirl
Adm Workshop Program
Adm Workshop Program
Emmanuel Fuchs
Chap1
Chap1
None Theless
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
impodgirl
Towards enhancing resource
Towards enhancing resource
csandit
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
ijujournal
Mais procurados
(18)
L1802028184
L1802028184
SMARCOS CNR Paper Engineering
SMARCOS CNR Paper Engineering
The Computer Aided Design Concept in the Concurrent Engineering Context.
The Computer Aided Design Concept in the Concurrent Engineering Context.
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity Mining
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
ZORA MDE Short Presentation 3.2
ZORA MDE Short Presentation 3.2
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
20 74-1-pb
20 74-1-pb
55 60
55 60
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
Next Generation Automation Final
Next Generation Automation Final
Adm Workshop Program
Adm Workshop Program
Chap1
Chap1
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
Red Hat, Green Energy Corp & Magpie - Open Source Smart Grid Plataform - ...
Towards enhancing resource
Towards enhancing resource
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous E...
Destaque
12 15
12 15
Ijarcsee Journal
31 34
31 34
Ijarcsee Journal
46 51
46 51
Ijarcsee Journal
122 129
122 129
Ijarcsee Journal
114 120
114 120
Ijarcsee Journal
ภารกิจระดับครูผู้ช่วย
ภารกิจระดับครูผู้ช่วย
Beeby Bicky
Destaque
(6)
12 15
12 15
31 34
31 34
46 51
46 51
122 129
122 129
114 120
114 120
ภารกิจระดับครูผู้ช่วย
ภารกิจระดับครูผู้ช่วย
Semelhante a 24 27
Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheet
David J Rosenthal
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Vmm level distributed transparency provisioning using cloud infrastructure te...
Vmm level distributed transparency provisioning using cloud infrastructure te...
ritwik999
Cloud models and platforms
Cloud models and platforms
Prabhat gangwar
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
ijccsa
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
neirew J
Private Cloud With System Center Project
Private Cloud With System Center Project
Abhijit Kundu
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
vrickens
Cloud models and platforms
Cloud models and platforms
purplesea
Cloud computing
Cloud computing
Sammer Qader
Cloud computing
Cloud computing
sumitsonone
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
IBM India Smarter Computing
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and Software
IBM India Smarter Computing
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
budabrooks46239
Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)
vvmenon22
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
F1034047
F1034047
IJERD Editor
Introduction to Cloud Computing
Introduction to Cloud Computing
Alessandro Iudica
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
IJCNCJournal
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
audeleypearl
Semelhante a 24 27
(20)
Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheet
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Vmm level distributed transparency provisioning using cloud infrastructure te...
Vmm level distributed transparency provisioning using cloud infrastructure te...
Cloud models and platforms
Cloud models and platforms
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Private Cloud With System Center Project
Private Cloud With System Center Project
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
Cloud models and platforms
Cloud models and platforms
Cloud computing
Cloud computing
Cloud computing
Cloud computing
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and Software
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
F1034047
F1034047
Introduction to Cloud Computing
Introduction to Cloud Computing
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Mais de Ijarcsee Journal
130 133
130 133
Ijarcsee Journal
116 121
116 121
Ijarcsee Journal
109 115
109 115
Ijarcsee Journal
104 108
104 108
Ijarcsee Journal
93 98
93 98
Ijarcsee Journal
88 92
88 92
Ijarcsee Journal
82 87
82 87
Ijarcsee Journal
78 81
78 81
Ijarcsee Journal
73 77
73 77
Ijarcsee Journal
65 72
65 72
Ijarcsee Journal
58 64
58 64
Ijarcsee Journal
52 57
52 57
Ijarcsee Journal
41 45
41 45
Ijarcsee Journal
36 40
36 40
Ijarcsee Journal
28 35
28 35
Ijarcsee Journal
19 23
19 23
Ijarcsee Journal
16 18
16 18
Ijarcsee Journal
6 11
6 11
Ijarcsee Journal
1 5
1 5
Ijarcsee Journal
134 138
134 138
Ijarcsee Journal
Mais de Ijarcsee Journal
(20)
130 133
130 133
116 121
116 121
109 115
109 115
104 108
104 108
93 98
93 98
88 92
88 92
82 87
82 87
78 81
78 81
73 77
73 77
65 72
65 72
58 64
58 64
52 57
52 57
41 45
41 45
36 40
36 40
28 35
28 35
19 23
19 23
16 18
16 18
6 11
6 11
1 5
1 5
134 138
134 138
Último
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Último
(20)
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
24 27
1.
ISSN: 2277 –
9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 Gleaming the Cloud in the Virtualization layer Janani.V.D, Hari Baabu.V, Sajeev ram.A M.E. Assistant Professor Computer Science and Engineering Computer Science and Engineering Vels University Vels University Abstract-- Cloud Computing is a powerful and physical machine. Similarly IaaS providers such as flexible software environment, which delegates the Amazon’s Elastic Computing Cloud (EC2) [2] are material’s management and in which users pay as they not allowed to look inside the running VM go. Rather than operating their own data centers, today instances [7] because of tenants’ business cloud users run their applications on the remote cloud infrastructures that are owned and managed by cloud confidentiality and privacy. providers. Cloud users create virtual machine instances to run their specific application logic In a local data center, operators usually without knowing the underlying physical need the context information from both infrastructure. On the other side, cloud provider applications and infrastructures for effective manage and operate their cloud infrastructures problem determination. In commercial cloud without knowing their customers’ applications. environments, the decoupled ownership of Due to the disjoint ownership of applications and applications and infrastructures introduces new infrastructures, if a problem occurs, there is no challenges in system management. When users visibility for either cloud users or providers to understand the whole context of the incident encounter problems in their VMs, they have little and solve it quickly. To this end, we propose visibility on the infrastructure layer for root cause software solution Cloud Vision, to provide some determination except trial-and-error troubleshooting visibility through the middle virtualization layer for [9]. It is not even clear who is responsible for fixing both cloud users and providers to address their such problems. To support end users, IaaS problems quickly. Cloud Vision automatically tracks providers often run an online support forum (e.g., each VM instance’s configuration status and Amazon EC2 online forum [3]) where users can maintains their life-cycle configuration record in report their problems and seek solutions. Cloud configuration management database(CMDB). operators often try to solve those problems by When the user reports a problem, our algorithm automatically analyze CMDB to probabilistic manually investigating the system settings of users’ determine the root cause and invoke a recovery VMs. Since operators do not know tenants’ process by interacting with the cloud user specific applications, it is even hard for them to solve problems only based on users’ problem Index Terms— Cloud Vision; Configuration reports. management; Virtualization layer; VM; Troubleshooting; Most of VM problems [ 7 ] in a cloud infrastructure (except those problems caused by I. INTRODUCTION applications running inside VM instances) can be Cloud computing provides a correlated to their configuration events. Examples revolutionary new computing paradigm for of such configuration events include incorrect deploying enterprise applications and Internet update of Access Control List (ACL) in hypervisors, services. There are many evolving cloud computing blocking of access ports inside running VM models, including Infrastructure-as-a-Service (IaaS), instances, connection of virtual devices to Platform-as-a-Service(PaaS), and Software- as-a- unsupported OSes, migration of instances to a slow Service(SaaS), which provide IT infrastructures, machine, incorrect allocation of memory size, platforms, solution stacks, and software connection loss with underlying block storage and applications from the cloud respectively [1]. Cloud so on. For example, on average 28 problems were infrastructures often employ a virtualization layer reported daily to Amazon EC2 online forum in [8] to ensure resource isolation and abstraction. July 2010, complaining about VM unavailability, They are designed to provide restricted visibility to VM hang, Elastic Block Storage (EBS) [2] [7] both users and IaaS providers. Users of crash or loose connectivity, performance problem VirtualMachine (VM) instances [7] are blocked and so on. Problems can occur at the time when from looking down into the infrastructure layer an instance is first created from its source image since multiple tenants might share the same or during running time if its configurations are 24 All Rights Reserved © 2012 IJARCSEE
2.
ISSN: 2277 –
9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 changed by some events. models require cloud users to report their problems to operators, who manually investigate the We make two intuitive observations problems to provide solutions. The premium about cloud environments. First, multiple VM support model guarantees a bounded problem instances created from the same image source are resolution time with service charges while the likely to have similar characteristics in best effort model is free but might take 8 to 10 configurations. Second, some configuration days to solve user problems [1]. Hence, our attributes have higher cardinality than others and objective is to provide automated solutions for hence they are less sensitive to configuration cloud providers to address users’ problem quickly changes. Based on those we present a solution and also reduce the cost of manual operations. Our (called CloudVision) for cloud providers to experimental results show that CloudVision can automate reasoning and troubleshooting [9] on user effectively reduce the solution time to seconds. reported problems under the restricted visibility. CloudVision runs in the infrastructure layer and III. CLOUD VISION SYSTEM tracks each VM instance as a standard object ARCHITECTURE running in that infrastructure. In summary, we have made the following contributions: The system architecture of CloudVision is shown in Figure 1 and it consists of three major Representation: CloudVision develops a components: Monitoring Agent, Cloud CMDB and monitoring mechanism at the infrastructure layer to Analysis Engine. automatically capture the event history of all running VM instances in cloud environments [7]. Such event data is further structured and stored in a Configuration Management Database (CMDB). Problem Reasoning: When users report a problem, our solution fetches the related information from the CMDB and further identifies a list of suspect events. We then apply statistical analysis to rank these events based on their sensitivity to configuration changes. Interactive Troubleshooting: Following the list of ranked events, CloudVision takes predefined Figure 1: CloudVision Architecture actions to check and solve problems. For each specific event, operators define the predicates to check whether this event is the root cause as well Monitoring Agent: The Monitoring Agent as the actions to remediate the problem monitors and tracks the configuration attributes of VM instances and infrastructures continuously. II. MOTIVATION We assume that all PM clocks are loosely synchronized. The agent sits in the hypervisor layer so that it can be rolled out through the cloud In a typical cloud environment, infrastructures as a standard management component. Operators of the cloud provider monitor their Section IV-A discusses the details of data infrastructure stacks from the hardware layer such collection. as servers and network devices and up to the hypervisor layer. While the cloud provider ensures a highly available cloud infrastructure, it typically Cloud CMDB: CMDB Manager structures does not guarantee the availability of individual VM and stores configuration data sent by the instances since it is not even aware of what is monitoring agent into a database called running inside those VM instances. Therefore, cloud Configuration Management Database (CMDB). users will occasionally encounter various problems CMDB is often used for asset and configuration with their VM instances [7]. management in large data centers. In this paper, we use a CMDB to track the life-cycle Cloud providers offer several options to configuration information of VM instances. It is address cloud users’ problems including a free best a relational database and each row includes a effort service with no Service Level Agreement configuration change along with its timestamp and (SLA) guarantee and a premium commercial grade health status (sick or healthy). Initially all rows are support with SLA guarantees [1]. Both support marked as healthy. If a configuration change is found to be the cause of a reported problem, the 25 All Rights Reserved © 2012 IJARCSEE
3.
ISSN: 2277 –
9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 row containing this change is marked as sick in When a problem is reported, the analysis engine the database during the troubleshooting step [9]. analyzes the related CMDB records of the reported In Section IV-B, we discuss how CMDB is VM instance [ 7 ] to determine the suspect events designed and populated in cloud infrastructures. and then tries to check the root. cause and solve the problem. The whole process is divided into three steps: Identifying Suspect Events, Event Ranking Analysis Engine: After users encounter a and finally Interactive Troubleshooting. problem with their VM instances [7], they report the problem to CloudVision via a web interface. 1) Identifying Suspect Events: when a problem of The Analysis Engine fetches the data related to a VM instance occurs, it is most likely caused the reported VM from the CMDB and compares its by the recent events of that VM instance. As the current configuration set with its historical CMDB maintains the complete event history of records to determine a list of suspect events. Then VM instances, the analysis engine can determine the engine employs statistical analysis to rank the the list of suspect events from the CMDB. Each list of suspect events and uses predefined predicates event is associated with a change in the and actions to check these events and resolve the configuration attribute called suspect attribute. problem. Not all problems can be automatically CloudVision identifies the changes of the reported resolved by CloudVision since some problems are instance by comparing its current configuration to beyond the management responsibility of cloud the latest known stable configuration. Any providers. However, the suspected events are configuration that persists longer than a specific reported to end users with an interactive duration of time is considered as a stable troubleshooting process [9] and its design details configuration. Unstable configurations may arise given in Section IV-C. when users try to fix problems by trial and error so that every configuration change only lasts for a IV. CLOUD VISION DESIGN A N D very short period of time. IM P LEME NTATION 2) Event Ranking: After determining the set of A. DataCollection suspect events, CloudVision ranks them based on Cloud Vision runs an event-based monitoring how likely an event could be the problem root agent at the hypervisor layer of each physical cause. As the set of suspect events can be large, we machine. The agent collects system configuration reduce the problem resolution time by checking the data shell scripts. The shell scripts use virsh events in their ranked order. An event is highly management interface library to collect values of suspected if it is very rare to occur. To measure con- figuration attributes of running VM instances this, we define a sensitivity metric and rank the and it also collects IP addresses of running guests set of suspect events according to their sensitivity, by looking into the system. Collected information i.e., the sensitivity of an attribute to change. are represented using an XML format. We define two types of event sensitivity: local Configuration data is collected periodically but it is sensitivity and global sensitivity. The local not sent to the CMDB Manager unless there is a sensitivity defines the probability of an event’s change in the configuration data compared to the occurrence using the event history of the previous one, which indicates new events. Hence instances originated from the same image source. the data collection is event-based to reduce Meantime the global sensitivity defines the network overhead. probability of an event’s occurrence using the event history of all VM instances regardless of their image B. Populate CMDB sources. The central CMDB Manager node runs program that collects event-based configuration data from 3) Troubleshooting: After determining and monitoring agents. It parses collected XML ranking suspect events, Cloud Vision performs messages and uses a relational database to structure troubleshooting actions, which include two major and store all configuration data along with the steps: Check and Solve. For each suspect event, reported timestamp. Each row in the database the check step checks whether it is the true root indicates at least a single change in the set of cause (or culprit event) of the problem. The solve configuration attributes and it is also associated step tries to solve the problem automatically if with a status tag that defines whether the the solution is within the management configuration is sick or healthy. Initially all entries responsibility of the cloud provider, otherwise are set to be healthy and a configuration is changed Cloud Vision recommends the solutions to the to be sick only if it is proved to be faulty during the cloud users. To identify the root cause, Cloud troubleshooting process. Vision uses a series of predefined predicates to check each suspect event, starting from the top of C. CMDB Analysis the ranked suspect events. The suspect events are 26 All Rights Reserved © 2012 IJARCSEE
4.
ISSN: 2277 –
9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 first classified into one or more problem classes. fingerprinting. There also exist some literature on Actions are defined for each individual problem configuration man- agement. Whitaker et al. [6] class and also include a series of predicates to developed a tool named Chrouns to automatically check the existence of the corresponding problem. search for a configuration state change indicating a failure. It stores local system config- urations at each checkpoint along time. When a problem occurs, Chronus takes user-provided probes to identify the working and non-working configuration state. This approach is quite similar to our check and solve step. VI. CONCLUSION In this paper, we present Cloud Vision, a novel solution for automated problem troubleshooting in cloud environments. Cloud Vision monitors and tracks the configuration attributes of VM instances [ 7 ] and infrastructure, and uses the historical event records to determine the root cause of problematic VM instances, and further provides a check-and-solve troubleshooting process to resolve user reported problems automatically. In our future work, we plan to Figure 2: Check-and-solve flow chart monitor more configuration attributes from cloud infrastructure and design new predicates and actions The check-and-solve troubleshooting process is to cover more problem classes. done interactively with users. After each solve step, users are asked to provide feedbacks. If the REFERENCES problem is solved, the troubleshooting process ends; otherwise the check-and-solve steps [1] T. Benson, S. Sahu, A. Akella, and A. continue for the next suspected event. This Shaikh, “A first look at problems in the cloud,” in process is very similar to the troubleshooting Proc. of HotCloud, 2010. support for desktop printing or networking in [2] Amazon EC2, “http://aws.amazon.com/ec2/.” Windows OS. Sometimes the check-and-solve [3] Amazon EC2 Forum, steps need to shutdown or restart a instances to [4] M. Goldszmidt, A. Fox, I. Cohen, J. solve the problem, which has to get user’s Symons, S. Zhang, and T. Kelly, “Capturing, confirmation. If some users want to run their indexing, clustering, and retrieving system history,” instances without any interruption, Cloud Vision in Proc. of SOSP’05, 2005. sends the solution back to the users for their [5] P. Bodik, M. Goldszmidt, A. Fox, own decision. After a problem is reported, D.B.Woodard, and H.Andersen, “Fingerprinting the Cloud Vision automatically invokes problem datacenter: automated clas- sification of reasoning and uses the same web interface to performance crises,” in Proc. of EuroSys, 2010. interact with users and acquire their [6] A. Whitaker, R. S. Cox, and S. D.Gribble, confirmation and permission for actions. Figure 2 “Configuration debugging as search: Finding the shows the complete flow chart of our check-and- needle in the haystack,” in Proc. of OSDI, 2004. solve troubleshooting algorithm [9]. [7] Chunyi Peng, Minkyong Kim ; Zhe Zhang ; Hui Lei , “VDN: Virtual machine image distribution network for cloud data centers” 2012 V. RELATED WORK [8] HyogunYoon , Hanku Lee, “An Intelligence Virtualization Rule Based on Multi-layer to Support Much work has applied statistical learning Social-Media Cloud Service”,2011 methods to detect and diagnose problems in large- [9] Shufen Zhang ; Xuebin Chen ; Xiuzhen Huo, scale computer systems. Cohen et al., [4] used a “Cloud Computing Research and Development tree-augmented naive (TAN) bayesian network to Trend”, 2010 learn the probabilistic relationship between SLA [10] Jackson, K.R. Ramakrishnan, L. ; Muriki, K. ; violations and system resource usages. They used Canon, S. ; Cholia, S. ; Shalf, J. ; Wasserman, H.J. this learned bayesian network to identify ;Wright, N.J. , ” Performance Analysis of High performance bottlenecks. Bodik et al. [5] Performance Computing Applications on the proposed a “Fingerprint” approach, which Amazon Web Services Cloud ”, 2010 identifies the problem with performance 27 All Rights Reserved © 2012 IJARCSEE
Baixar agora