SLA-Aware Adaptive Mapping Scheme in Bigdata Distributed Storage Systems

Total Page:16

File Type:pdf, Size:1020Kb

SLA-Aware Adaptive Mapping Scheme in Bigdata Distributed Storage Systems SMA 2020, September 17-19, Jeju, Republic of Korea, S. Chum et al. SLA-Aware Adaptive Mapping Scheme in Bigdata Distributed Storage Systems Sopanhapich Chum Jerry Li Department of Computer Science Memory Solutions Lab. Dankook University Samsung Semiconductor Inc. Yongin, Korea San Jose, CA, USA [email protected] [email protected] Heekwon Park Jongmoo Choi Memory Solutions Lab. Department of Computer Science Samsung Semiconductor Inc. Dankook University San Jose, CA, USA Yongin, Korea [email protected] [email protected] ABSTRACT by 2025, with a compounded annual growth rate of 61% [23]. In As data are processed by diverse clients ranging from urgent time- addition, these data are processed instantly to extract information critical to best-effort, supporting different QoS (Quality of Service) for decision making, recommendation and autonomous control becomes a vital component in a distributed storage system. In this using various analytic models and frameworks [1, 8, 11, 20, 27, 30]. paper, we propose a novel SLA (Service Level Agreement)-aware We indeed live in Bigdata era [24]. adaptive mapping scheme that can differentiate between urgent Distributed storage (also called as Cloud storage) plays a key and normal clients based on their I/O requirements. The scheme ba- role in Bigdata era. There are various distributed storage systems sically divides storage into two regions, normal and urgent, which including GFS [14], HDFS [26], Ceph [2, 33], Azure Storage [16], makes it feasible to isolate urgent clients from normal ones. In Amazon S3 [22], Openstack Swift [18], Haystack [6], Lustre [35], addition, it changes the size of the isolated region in an adaptive GlusterFS [17] and so on. The typical architecture of distributed manner so that it can provide better performance to normal clients. storage systems consists of three components: client nodes, stor- Besides, we devise two techniques, called logical cluster and nor- age nodes and master nodes. A data object generated by a client mal inclusion, to prevent interference caused by adaptability. We is mapped into storage nodes, where master nodes take care of implement our scheme using the CRUSH (Controlled Replication placement, replication and recovery. Under Scalable Hashing) mapping algorithm in Ceph, a well-known As distributed storage systems are utilized by diverse clients, distributed storage system. Evaluation results demonstrate that our it becomes indispensable to provide QoS (Quality of Service) in proposal can comply with SLA requirements while providing better accordance with different requirements of clients. For instance, a performance than the fixed mapping scheme. traffic monitoring client needs to analyze road congestion data until a pre-specified time. A stock trading client who needs to CCS CONCEPTS inspect previous transaction data before the next trading time is another example of time-critical service. On the contrary, batch • Information systems → Information storage systems; Dis- processing and data backup are non time-critical services that can tributed storage; Hierarchical storage management; • Software be conducted in a best-effort way, without interfering with urgent and its engineering → Software system structures. clients. Such different requirements are contracted as SLA (Service KEYWORDS Level Agreement) in terms of performance, availability and cost between clients and storage providers [3, 28, 29, 36]. Bigdata, Cloud storage, Service Level Agreement, Performance In this paper, we propose a novel SLA-aware adaptive mapping scheme for distributed storage systems. It makes use of mapping 1 INTRODUCTION between clients and storage nodes. Basically, it classifies clients These days, data are generated from various sources including into two types: normal and urgent clients. Also, it divides storage on-line transactions, SNSs (Social Network Services), autonomous nodes into two regions, one for normal clients and the other for vehicles and smart infrastructures [7]. According to IDC article, urgent ones. The number of storage nodes for the urgent region world data will grow from 33 ZB (ZettaByte) in 2018 to 175 ZB is determined by SLA. Then, a data object requested by a normal client is mapped into the normal region while that requested by Permission to make digital or hard copies of part or all of this work for personal or an urgent client mapped into the urgent region. This isolation can classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation prevent urgent clients from being interfered by normal clients. on the first page. Copyrights for third-party components of this work must be honored. However, this fixed isolation suffers from performance degrada- For all other uses, contact the owner/author(s). tion due to the low storage bandwidth utilization especially when SMA 2020, September 17-19, Jeju, Republic of Korea, © 2020 Copyright held by the owner/author(s). the active number of urgent clients becomes small. To overcome SLA-Aware Adaptive Mapping Scheme in Bigdata Distributed Storage Systems SMA 2020, September 17-19, Jeju, Republic of Korea, this problem, we design our scheme to work adaptively so that it can adjust the urgent region size according to the activity of urgent clients. When the activity of urgent clients becomes low, it reduces the urgent resign, which eventually allows to boost the performance of normal clients. By the way, this adaptability raises two issues. One issue is about mapping. In our adaptive scheme, a data object generated by a normal user can be mapped either the normal region or the urgent Figure 1: Logical structure of Ceph. region adaptively. To tackle this situation, we devise a technique, called logical cluster, that abstracts storage nodes differently based on different cluster maps, which is further discussed in Section 3. The second core component is the CRUSH (Controlled Replica- The second issue is about SLA guarantee. Once a data object of tion Under Scalable Hashing) algorithm [34]. CRUSH is responsible a normal client is written into the urgent region, the client reads for data placement, that is the mapping between a data object and that data from the urgent region even though the activity of urgent an OSD. Figure 2 illustrates how CRUSH works. When a file is clients becomes high, which may cause SLA violation. To miti- created by a client, it is split into multiple data objects according gate this problem, we suggest a technique, called normal inclusion, to the object size configuration. Then, each object is assigned into which assures that at least one replica of a data object is stored a pool using a simple hash function with the >1 942C83 as a hash in the normal region. The cooperation of logical cluster and nor- key. A pool can be considered as a logical partition. Within a pool, mal inclusion can prevent normal clients from interrupting urgent objects are sharded among units, called PGs (Placement Groups). clients while not hurting the normal client performance, We implement our proposal by modifying the CRUSH (Con- trolled Replication Under Scalable Hashing) algorithm in Ceph [34]. Ceph is a widely-used open-source based distributed storage sys- tem, deployed various cloud platforms including Hadoop, AWS and Openstack [2]. Evaluation results show that our scheme can im- prove performance by up to 18% while guaranteeing SLA required by urgent clients. The rest of this paper is organized as follows. Section 2 intro- duces background and related work. In Section 3, we explain our design. Experiments and evaluations are discussed in Section 4. The conclusion and future work are summarized in Section 5 Figure 2: Mapping scheme in Ceph. 2 BACKGROUND Each PG is mapped into OSDs using CRUSH. CRUSH is a pseudo- In this section, we first explain the architecture of Ceph and its random data distribution function that maps each PG into multiple mapping scheme. Then, we survey related work. OSDs based on the Ceph’s placement rules. The rules define the replication factor and any constraints on placement. By default, the replication factor is 3, meaning that each PG is mapped into 2.1 Ceph: Distributed Storage Cluster 3 OSDs, one as primary and the other two as replicas. During Figure 1 presents the logical structure of Ceph [2, 33]. It is a uni- mapping, CRUSH makes use of a map, called cluster map, that is a fied, distributed, object-based storage cluster designed for excellent compact and hierarchical description of OSDs, machines and racks performance, reliability and scalability. It consists of clients and in a storage cluster. By changing this cluster map, we can add new storage nodes, where a storage node is called as OSD (Object Stor- OSDs or remove failed OSDs. age Device) in Ceph. Each OSD takes charge of data manipulation Note that other distributed storage systems such as GFS [14] such as storing, retrieval and storage management. In the initial and HDFS [26] employ a master node to manage the mapping version of Ceph, an OSD is governed by a Ceph OSD daemon and between objects and OSDs. Using hash-based mapping scheme kernel-level local file systems such as Ext4 and XFS[33]. But, in instead of the dedicated master node gives several benefits. First, recent version, it is controlled by a key value store and user-level this algorithmic approach can improve performance by accessing file system, called BlueStore and BlueFS, respectively [2]. OSDs directly from clients without checking the master node to There are two core components in Ceph. One is the RADOS lookup mapping information. Second, it can avoid a single point of (Reliable Autonomic Distributed Object Store) framework [5]. It failure, enhancing reliability. Finally, the pseudo-random property supports several features including self-healing, self-managing, of CRUSH can distribute objects uniformly across OSDs, giving a strong consistency and dynamic cluster expansion.
Recommended publications
  • Ceph: Distributed Storage for Cloud Infrastructure
    ceph: distributed storage for cloud infrastructure sage weil msst – april 16, 2012 outline ● motivation ● practical guide, demo ● overview ● hardware ● ● how it works installation ● failure and recovery ● architecture ● rbd ● data distribution ● libvirt ● rados ● ● rbd project status ● distributed file system storage requirements ● scale ● terabytes, petabytes, exabytes ● heterogeneous hardware ● reliability and fault tolerance ● diverse storage needs ● object storage ● block devices ● shared file system (POSIX, coherent caches) ● structured data time ● ease of administration ● no manual data migration, load balancing ● painless scaling ● expansion and contraction ● seamless migration money ● low cost per gigabyte ● no vendor lock-in ● software solution ● commodity hardware ● open source ceph: unified storage system ● objects ● small or large ● multi-protocol Netflix VM Hadoop ● block devices radosgw RBD Ceph DFS ● snapshots, cloning RADOS ● files ● cache coherent ● snapshots ● usage accounting open source ● LGPLv2 ● copyleft ● free to link to proprietary code ● no copyright assignment ● no dual licensing ● no “enterprise-only” feature set distributed storage system ● data center (not geo) scale ● 10s to 10,000s of machines ● terabytes to exabytes ● fault tolerant ● no SPoF ● commodity hardware – ethernet, SATA/SAS, HDD/SSD – RAID, SAN probably a waste of time, power, and money architecture ● monitors (ceph-mon) ● 1s-10s, paxos ● lightweight process ● authentication, cluster membership, critical cluster state ● object storage daemons (ceph-osd)
    [Show full text]
  • Open Source Software
    OPEN SOURCE SOFTWARE Product AVD9x0x0-0010 Firmware and version 3.4.57 Notes on Open Source software The TCS device uses Open Source software that has been released under specific licensing requirements such as the ”General Public License“ (GPL) Version 2 or 3, the ”Lesser General Public License“ (LGPL), the ”Apache License“ or similar licenses. Any accompanying material such as instruction manuals, handbooks etc. contain copyright notes, conditions of use or licensing requirements that contradict any applicable Open Source license, these conditions are inapplicable. The use and distribution of any Open Source software used in the product is exclusively governed by the respective Open Source license. The programmers provided their software without ANY WARRANTY, whether implied or expressed, of any fitness for a particular purpose. Further, the programmers DECLINE ALL LIABILITY for damages, direct or indirect, that result from the using this software. This disclaimer does not affect the responsibility of TCS. AVAILABILITY OF SOURCE CODE: Where the applicable license entitles you to the source code of such software and/or other additional data, you may obtain it for a period of three years after purchasing this product, and, if required by the license conditions, for as long as we offer customer support for the device. If this document is available at the website of TCS and TCS offers a download of the firmware, the offer to receive the source code is valid for a period of three years and, if required by the license conditions, for as long as TCS offers customer support for the device. TCS provides an option for obtaining the source code: You may obtain any version of the source code that has been distributed by TCS for the cost of reproduction of the physical copy.
    [Show full text]
  • Digitalocean
    UPDATE SAGE WEIL – RED HAT SC16 CEPH BOF – 2016.11.16 2 JEWEL APPAPP APPAPP HOST/VMHOST/VM CLIENTCLIENT RADOSGWRADOSGW RBDRBD CEPHCEPH FSFS LIBRADOSLIBRADOS AA bucket-based bucket-based AA reliable reliable and and fully- fully- AA POSIX-compliant POSIX-compliant AA library library allowing allowing RESTREST gateway, gateway, distributeddistributed block block distributeddistributed file file appsapps to to directly directly compatiblecompatible with with S3 S3 device,device, with with a a Linux Linux system,system, with with a a accessaccess RADOS, RADOS, andand Swift Swift kernelkernel client client and and a a LinuxLinux kernel kernel client client withwith support support for for QEMU/KVMQEMU/KVM driver driver andand support support for for C,C, C++, C++, Java, Java, FUSEFUSE Python,Python, Ruby, Ruby, andand PHP PHP AWESOME AWESOME NEARLY AWESOME AWESOME RADOSRADOS AWESOME AA reliable, reliable, autonomous, autonomous, distributed distributed object object store store comprised comprised of of self-healing, self-healing, self-managing, self-managing, intelligentintelligent storage storage nodes nodes 3 2016 = FULLY AWESOME OBJECT BLOCK FILE RGW RBD CEPHFS S3 and Swift compatible A virtual block device with A distributed POSIX file object storage with object snapshots, copy-on-write system with coherent versioning, multi-site clones, and multi-site caches and snapshots on federation, and replication replication any directory LIBRADOS A library allowing apps to direct access RADOS (C, C++, Java, Python, Ruby, PHP) RADOS A software-based,
    [Show full text]
  • Ceph, Programmable Storage, and Data Fabrics Carlos Maltzahn, UC Santa Cruz Fermilab, 6/9/17 Carlos Maltzahn Background
    Ceph, Programmable Storage, and Data Fabrics Carlos Maltzahn, UC Santa Cruz Fermilab, 6/9/17 Carlos Maltzahn Background • Adjunct Professor, Computer Science, UC Santa Cruz • Current Research • Director, UCSC Systems Research • High-performance ultra-scale Laboratory (SRL) storage and data management • Director, Center for Research in Open • End-to-end Performance Source Software (CROSS) cross.ucsc.edu management and QoS • Director, UCSC/LANL Institute for • Reproducible Evaluation of Scalable Scientific Data Management Systems (ISSDM) • Network Intermediaries • 1999-2004: Performance Engineer, • Other Research Netapp • Data Management Games • Information Retrieval • Advising 6 Ph.D. students. • Cooperation Dynamics • Graduated 5 Ph.D. students • I do this 100% of my time! 2 Agenda • Overview of Ceph • Programmable Storage • CDNs/Data Fabrics Ceph, Programmable Storage, and Data Fabrics 3 Carlos Maltzahn Ceph History • 2005: Started as summer project • Funded by DOE/NNSA (LANL, LLNL, SNL) • Quickly turned into Sage Weil’s Ph.D. project • 2006: Publications at OSDI and SC • 2007: Sage graduated end of 2007, turned prototype into OSS project • 2010: Ceph Linux kernel client in 2.6.34 • 2011: Inktank startup • 2014: Red Hat acquires Inktank for $175m Ceph, Programmable Storage, and Data Fabrics 4 Carlos Maltzahn ARCHITECTURAL COMPONENTS APP HOST/VM CLIENT RGW RBD CEPHFS A web services A reliable, fully- A distributed <le gateway for object distributed block system with POSIX storage, compatible device with cloud semantics and scale- with
    [Show full text]
  • File Systems Unfit As Distributed Storage Back Ends
    File Systems Unfit as Distributed Storage Back Ends LessonsSYSTEMS from 10 Years of Ceph Evolution ABUTALIB AGHAYEV, SAGE WEIL, MICHAEL KUCHNIK, MARK NELSON, GREG GANGER, AND GEORGE AMVROSIADIS Abutalib Aghayev is a PhD stu- or a decade, the Ceph distributed file system followed the conventional dent in the Computer Science wisdom of building its storage back end on top of local file systems. Department at Carnegie Mellon The experience with different file systems showed that this approach University. He has broad research F interests in computer systems, always leaves significant performance on the table while incurring signifi- including storage and file systems, distributed cant accidental complexity [2]. Therefore, the Ceph team embarked on an systems, and operating systems. ambitious project to build BlueStore, a new back end designed to run directly [email protected] on raw storage devices. Somewhat surprisingly, BlueStore matured in less Sage Weil is the Lead Architect than two years. It outperformed back ends built atop file systems and got and co-creator of the Ceph open adopted by 70% of users in production. source distributed storage sys- Figure 1 shows the high-level architecture of Ceph. At the core of Ceph is the Reliable Auto- tem. Ceph was created to pro- nomic Distributed Object Store (RADOS) service. RADOS scales to thousands of Object vide a stable, next generation Storage Devices (OSDs), providing self-healing, self-managing, replicated object storage with distributed storage system for Linux. Inktank strong consistency. Ceph’s librados library provides a transactional interface for manipu- was co-founded by Sage in 2012 to support lating objects and object collections in RADOS.
    [Show full text]
  • Ceph Parallel File System Evaluation Report
    ORNL/TM-2013/151 National Center for Computatational Sciences Ceph Parallel File System Evaluation Report Feiyi Wang Mark Nelson ORNL/NCCS Inktank Inc. Other contributors: Sarp Oral Doug Fuller Scott Atchley Blake Caldwell James Simmons Brad Settlemyer Jason Hill Sage Weil (Inktank Inc.) Prepared by OAK RIDGE NATIONAL LABORATORY Oak Ridge, Tennessee 37831-6283 managed by UT-BATTELLE, LLC for the U.S. DEPARTMENT OF ENERGY This research was supported by, and used the resources of, the Oak Ridge Leadership Computing Facility, located in the National Center for Computational Sciences at ORNL, which is managed by UT Battelle, LLC for the U.S. DOE (under the contract No. DE-AC05-00OR22725). Contents 1 Introduction 1 2 Testbed Environment Description 2 3 Baseline Performance 3 3.1 Block I/O over Native IB ..................................... 3 3.2 IP over IB ............................................. 3 4 System Tuning 3 5 XFS Performance As Backend File System 4 6 Ceph RADOS Scaling: Initial Test 5 6.1 Scaling on number of OSDs per server ............................ 6 6.2 Scaling on number of OSD servers ............................... 6 7 Ceph File System Performance: Initial Test 7 8 Improving RADOS Performance 8 8.1 Disable Cache Mirroring on Controllers ............................ 9 8.2 Disable TCP autotuning ..................................... 10 8.3 Repeating RADOS Scaling Test ................................. 10 9 Improving Ceph File System Performance 12 9.1 Disabling Client CRC32 ..................................... 12 9.2 Improving IOR Read Performance ............................... 13 9.3 Repeating the IOR Scaling Test ................................. 14 10 Metadata Performance 15 11 Observations and Conclusions 17 Appendix A - CephFS Final Mount 18 Appendix B - OSD File System Options 18 Appendix C - CRUSH map 19 Appendix D - Final ceph.conf 23 Appendix E - Tuning Parameters 24 3 List of Figures 1 DDN SFA10K hardware and host connection diagram ...................
    [Show full text]
  • A Tool for Modeling, Viewing, and Checking Distributed System
    ;login FALL 2016 VOL. 41, NO. 3 : & POSIX: The Old, the New, and the Missing Vaggelis Atlidakis, Jeremy Andrus, Roxana Geambasu, Dimitris Mitropoulos, and Jason Nieh & Runway: A Tool for Modeling, Viewing, and Checking Distributed Systems Diego Ongaro & Create a Threat Model for Your Organization Bruce Potter & Eliminating Toil Betsy Beyer, Brendan Gleason, Dave O’Connor, and Vivek Rau Columns Separating Protocol Implementations from Transport in Python David Beazley Shutting Down Go Servers with Manners Kelsey Hightower Using Consul for Distributed Key-Value Stores David N. Blank-Edelman Monitoring Paging Trauma Dave Josephsen Making Security into a Science Dan Geer Distributed Systems Robert G. Ferrell UPCOMING EVENTS OSDI ’16: 12th USENIX Symposium on Operating Enigma 2017 Systems Design and Implementation January 30–February 1, 2017, Oakland, CA, USA Sponsored by USENIX in cooperation with ACM SIGOPS enigma.usenix.org November 2–4, 2016, Savannah, GA, USA www.usenix.org/osdi16 FAST ’17: 15th USENIX Conference on File and Co-located with OSDI ’16 Storage Technologies INFLOW ’16: 4th Workshop on Interactions of NVM/Flash Sponsored by USENIX in cooperation with ACM SIGOPS with Operating Systems and Workloads February 27–March 2, 2017, Santa Clara, CA, USA November 1, 2016 Submissions due September 27, 2016 www.usenix.org/inflow16 www.usenix.org/fast17 LISA16 SREcon17 December 4–9, 2016, Boston, MA, USA March 13–14, 2017, San Francisco, CA, USA www.usenix.org/lisa16 Co-located with LISA16 NSDI ’17: 14th USENIX Symposium on Networked SESA
    [Show full text]
  • Open Source Software License Information
    Open Source Software license information This document contains an open source software license information for the product VACUU·SELECT. The product VACUU·SELECT contains open source components which are licensed under the applicable open source licenses. The applicable open source licenses are listed below. The open source software licenses are granted by the respective right holders directly. The open source licenses prevail all other license information with regard to the respective open source software components contained in the product. Modifications of our programs which are linked to LGPL libraries are permitted for the customer's own use and reverse engineering for debugging such modifications. However, forwarding the information acquired during reverse engineering or debugging to third parties is prohibited. Furthermore, it is prohibited to distribute modified versions of our programs. In any case, the warranty for the product VACUU·SELECT will expire, as long as the customer cannot prove that the defect would also occur without these modification. WARRANTY DISCLAIMER THE OPEN SOURCE SOFTWARE IN THIS PRODUCT IS DISTRIBUTED IN THE HOPE THAT IT WILL BE USEFUL, BUT WITHOUT ANY WARRANTY, WITHOUT EVEN THE IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. See the applicable licenses for more details. Written offer This product VACUU·SELECT contains software components that are licensed by the holder of the rights as free software, or Open Source software, under GNU General Public License, Versions 2 and 3, or GNU Lesser General Public License, Versions 2.1, or GNU Library General Public License, Version 2, respectively. The source code for these software components can be obtained from us on a data carrier (e.g.
    [Show full text]
  • Summer 2020 Vol
    ;login SUMMER 2020 VOL. 45, NO. 2 : & Finding Anomalies in Linux Performance Richard L. Sites & Misaligned Incentives and Bad Software Design Marianne Bellotti & Failures in Enterprise SSDs Stathis Maneas, Kaveh Mahdaviani, Tim Emami, and Bianca Schroeder & Using ML in Support of SRE Steven Ross and Todd Underwood & Interview with Natalie Silvanovich Rik Farrow Columns Culture of Complacency and Crisis Laura Nolan Using eBPF, Part 2 Dave Josephsen Supporting OSS Dan Geer and George P. Sieniawski Thanks to our USENIX Supporters! USENIX appreciates the financial assistance our Supporters provide to subsidize our day-to-day operations and to continue our non-profit mission. Our supporters help ensure: • Free and open access to technical information • Student Grants and Diversity Grants to participate in USENIX conferences • The nexus between academic research and industry practice • Diversity and representation in the technical workplace We need you now more than ever! Contact us at [email protected]. USENIX PATRONS USENIX BENEFACTORS USENIX PARTNERS We offer our heartfelt appreciation to the following sponsors and champions of conference diversity, open access, and our SREcon communities via their sponsorship of multiple conferences: Ethyca Dropbox Microsoft Azure Packet Datadog Goldman Sachs LinkedIn Salesforce More information at www.usenix.org/supporters SUMMER 2020 VOL. 45, NO. 2 EDITOR Rik Farrow EDITORIAL MANAGING EDITOR Michele Nelson 2 Musings Rik Farrow COPY EDITORS FILE SYSTEMS AND STORAGE Steve Gilmartin Amber Ankerholz 6
    [Show full text]
  • Licence Agreement Supplement
    Licence Agreement Supplement 2 Index The ISC License ............................................ 300 Unicode License ........................................... 301 Contents X11 License.................................................. 302 Overview .......................................................... 3 Zlib License .................................................. 302 Note ................................................................. 3 Academic Free License 2.1 .............................. 4 Apache License, Version 2.0 ............................ 7 Beerware License ........................................... 10 Boost Software License 1.0 ........................... 10 BSD 2-clause .................................................. 11 BSD 3-clause .................................................. 17 BSD 4-Clause ................................................. 25 BSD variants................................................... 26 Bzip2 License ................................................. 26 Coffee-ware License ...................................... 27 Copyleft-next License .................................... 27 Curl License ................................................... 31 dhcp License .................................................. 32 Dropbear License ........................................... 33 expat License ................................................. 35 GNU GPL v 1.0 ............................................... 36 GNU GPL v 2.0 ............................................... 40 GNU GPL 3.0 ...............................................
    [Show full text]
  • Delivering Openstack and Ceph in Containers
    DELIVERING OPENSTACK AND CEPH IN CONTAINERS OpenStack Summit Sydney — November 7, 2017 The Three Amigos Andrew Federico Sébastien Hatfield Lucifredi Han Practice Lead Product Management Director Principal Software Engineer Cloud Storage Red Hat Ceph Storage Storage Architect Brisbane, Australia Boston, USA Paris, France 2 OpenStack Summit Sydney - October 2017 Where we are today Drivers Why are we moving toward containers? Packaging Scalability format Speed Upgrade Immutable downgrade infrastructure flexibility Deployment Resource flexibility constraints 4 OpenStack Summit Sydney - October 2017 Entering Kubernetes with OpenStack Kubernetes is an open-source orchestrator automating the deployment, scaling, and management of containerized applications. Container management platform: ● Self-healing ● Load balancing ● Automated rollouts and rollbacks ● Pluggable architecture: ○ Storage ○ Network ○ Containers runtime ○ Scheduling 5 OpenStack Summit Sydney - October 2017 Persistent Storage Pool of Persistent Volumes Ceph Ceph Ceph register PV iSCSI CephFS NFS RBD RBD RBD PV PV PV PV PV PV Admin Pod Pod Pod Pod create claim Claim Claim Claim Claim User Project 6 OpenStack Summit Sydney - October 2017 Dynamic Voluming Provisioning Slow Azure Azure-Disk Provisioner Define Storage Class Fast AWS AWS-SSD Provisioner Admin Fastest Provision Ceph PV Ceph-RBD Provisioner Pod Create claim: Fastest OpenShift PV Controller User Claim 7 OpenStack Summit Sydney - October 2017 OpenStack in Containers Why OpenStack on Kubernetes? Day 1: ease deployment ● OpenStack itself turned into microservice oriented architecture with its services ● Kubernetes manages applications ● Kubernetes load, driven by application needs, can vary dramatically over wide time scales (hours, days, weeks) ● Leverage the ease, scale and power of the Containers Day 2: ● Share scheduling functions between Nova and Kubernetes 9 OpenStack Summit Sydney - October 2017 Kolla Some background.
    [Show full text]
  • VPP: the Ultimate NFV Vswitch (And More!)?
    VPP: The ultimate NFV vSwitch (and more!)? Franck Baudin, Principal Product Manager - OpenStack NFV - Red Hat Uri Elzur, DNSG CTO - Intel OpenStack Summit | Barcelona 2016 Agenda ● FD.io project and community overview ● FD.io Vector Packet Processing framework ● FD.io in a broader context ○ OPNFV and FDS ○ OpenStack and ML2 ○ ODL and SFC ○ Containers ● Summary Key message: FD.io is getting ready for production readiness and offers some interesting innovations 2 OpenStack summit 2016, Barcelona FD.io overview Some slides adapted from multiple presentations at wiki.fd.io The authors wish to also thank: Frank Brockners, Keith Burns, Joel Halpern, Ray Kinsella, Hongjun Ni, Ed Warnicke, Yi Yang, Jerome Tollet, Danny Zhou, … ● FD.io FD.io in context ○ Offers a new high speed dynamic and programmable data plane adapted and optimized to the Server architecture Cloud ● VPP provides Management ○ IO, Processing and Management, for System Bare Metal, VM or Container ○ IO: HW / vHW cores/threads ○ Packet Processing: Classify, Transform, SDN Prioritize, Forward, Terminate Controller ○ Management Agents: control/manage IO/Processing ○ Local and remote Server 4 OpenStack summit 2016, Barcelona Introduction Fast Data: Scope Good Governance -> Fast Innovation Continuous Performance Lab Modular Governance supports concept of independent sub-projects enabling: ● faster evolution ● independant work stream ● Greater flexibility 5 OpenStack summit 2016, Barcelona projects 6 OpenStack summit 2016, Barcelona FD.io governance Subprojects: Anyone May Participate – Not just members Composed of the committers to that subproject – those Anyone can contribute code who can merge code Anyone can rise to being a committer via meritocracy Responsible for sub project oversight and autonomous releases Anyone can propose a subproject Make technical decisions for that subproject by consensus, Technical Steering Committee or failing that, majority vote.
    [Show full text]