Koordinator: a Service Approach for Replicating Docker Containers in Kubernetes

Koordinator: a Service Approach for Replicating Docker Containers in Kubernetes

Koordinator: A Service Approach for Replicating Docker Containers in Kubernetes Hylson Vescovi Netto∗, Aldelir Fernando Luiz∗, Miguel Correiay, Luciana de Oliveira Rechz, Caio Pereira Oliveiraz ∗College of Blumenau, Federal Institute Catarinense - Brazil yINESC-ID, Instituto Superior Tecnico,´ Universidade de Lisboa - Portugal zDepartment of Informatics and Statistics, Federal University of Santa Catarina - Brazil fhylson.vescovi, [email protected], [email protected], [email protected], [email protected] Abstract—Container-based virtualization technologies such as is a backend data store, access concurrency must be managed Docker and Kubernetes are being adopted by cloud service to prevent corruption. providers due to their simpler deployment, better performance, This paper presents Koordinator, a new container replica and lower memory footprint in relation to hypervisor-based virtualization. Kubernetes supports basic replication for availa- coordination approach that provides availability and integrity bility, but does not provide strong consistency and may corrupt with strong consistency in Kubernetes. Koordinator is based application state in case there is a fault. This paper presents a on state machine replication (SMR) [8], an approach that keeps state machine replication scheme for Kubernetes that provides replicas consistent even if some of them fail, providing high high availability and integrity with strong consistency. Replica availability and integrity. Koordinator is provided as a service, coordination is provided as a service, with lightweight coupling to applications. Experimental results show the solution feasibility. i.e., on top of Kubernetes, with lightweight coupling with the application being replicated. I. INTRODUCTION The rest of this paper is organized as follows. Section II briefly introduces container-based virtualization. Section III The increasing adoption of cloud computing [1] by orga- presents Koordinator. The experimental validation and results nizations and individuals is driving the use of virtualization are presented in Section IV. Section V discusses related works technology [2], [3]. Virtualization is extremely important in and Section VI concludes the paper. cloud computing mainly to isolate the consumers and to control the provisioning of resources. II. CONTAINER-BASED VIRTUALIZATION The prevalent virtualization technology in cloud data centers Container-based virtualization, or OS-level virtualization, is is based on hypervisors. Each server has an hypervisor (e.g., implemented by an OS, as the second name suggests (Figure Xen or KVM) on top of which are executed virtual machines 1). Each container contains libraries and application code. Iso- (VMs) containing their own operating system (OS) and user lation between containers is provided by the OS itself, e.g., by software. However, container-based virtualization (or OS-level mechanisms such as Linux cgroups and namespaces in Docker virtualization) is gaining increasing acceptance [4]. In this form and Linux Containers (LXC). Container management software of virtualization, several containers are executed on top of the provides functionality such as the creation of containers. same OS, with benefits such as simpler deployment, better performance, and lower memory footprint, in comparison to app 1 app 2 app 3 hypervisor-based virtualization. Docker is the most popular container-based virtualization bin/libs bin/libs bin/libs technology [5]. Docker supports the execution of containers container management / on top of Linux. However, it does not support management or virtualization layer orchestration of containers in a cluster environment. Therefore, host operating system engineers at Google developed Borg [6] and, the better known, Kubernetes [7], a system that allows controlling the lifecycle hardware of containers on a cluster environment. Kubernetes supports basic application replication for availa- Fig. 1: Container-based Virtualization. bility. Specifically, it allows defining the number of container replicas that should be running and, whenever a replica stops, In large-scale systems, such as cloud data centers, there it starts a new one from an image. However, this scheme does may be a vast number of containers, so their management and not provide strong consistency. For instance, if a replica fails orchestration with basic tools to create/delete containers may two problems may happen: part of the application state may be complicated. Kubernetes is a container management system be lost (in case it is stored in the containers) or the state may that simplifies such management in a cluster, i.e., in a group become corrupted (in case it is stored in a backend data store, of physical or virtual machines. The two major alternatives to outside of the containers). In relation to the latter issue, if there Kubernetes are Docker Swarm and Apache Mesos. Internet kubectl firewall Management API REST components NODE 1 server requests ordered replicated clients ordering requests application Fig. 3: Ordering requests for simultaneous clients accessing a NODE 2 distributed replicated stateful application. watchable storage MAIN NODE N tainer fails, the availability of the application is compromised. kubelet proxy Replicating the container can improve the application availa- bility (the failure of a replica does not impair the application docker availability) and provide better throughput (because requests POD POD are distributed among replicas via the load balancing scheme ... container container provided by Kubernetes). However, when multiple containers access shared data in a persistent volume, this access has to be coordinated, so that concurrent requests are properly executed. Fig. 2: Architecture of Kubernetes. A well-known approach to coordinate request execution in a replicated application is state machine replication (SMR) [8]. Figure 2 presents the Kubernetes architecture. Each machine, With SMR, concurrent requests are ordered by a distributed either virtual or physical, is designated by node.A pod is a consensus algorithm and their execution happens in the same group of one or more containers that must be in the same way in all replicas (Figure 3). Paxos, Raft, PBFT, MinBFT, machine and constitutes the minimal management unit. Pods and BFT-Smart are examples of such consensus algorithms receive network address and are allocated to nodes. Containers [9], [10], [11], [12], [13]. However, using such schemes with inside a pod share resources, such as volumes where they can containers is far from trivial. Although there are SMR libraries write and read data. Each node contains an agent called kubelet available, e.g., Raft [10] and BFT-Smart [13], applications that manages its pods, containers, images, and other resources. have to be modified to use such software. The interface of an A Kubernetes cluster often provides services that process SMR implementation can be complex to integrate with already requests incoming from clients (e.g., REST/HTTP requests). existing applications [14]. A typical interaction is the following. A client request reaches A possible strategy to coordinate replicated applications the cluster through its firewall (top-right of the figure), which is incorporating coordination in the environment where the forwards it to the proxy at a node. That proxy forwards the applications are executed. At least three possible approaches request to the kubelet. The kubelet does load balancing, in can be considered when boarding a consensus algorithm in an case the service is replicated, and forwards the request to a existing platform: integration, interception, and service [15], container in a pod that processes it. [16]. Integration means building or modifying a component The node where Kubernetes’ management components run in a system with the aim of adding some feature. There has main node is denominated . Some important management com- been a previous effort to integrate coordination in Kubernetes etcd ponents are the service that does notification (e.g., notifies with a new consensus protocol [17]. It this paper, instead, we certain components when data is created or updated) and want to use available crash fault-tolerant consensus libraries kubectl that is used by operators to interact with the Kubernetes which are stable and continuously being improved, such as cluster. Most communication between components uses the BFT-Smart2 and Raft. The interception approach requires that REST API. messages sent to the receiver are captured and passed to the III. KOORDINATOR communication layer. A practical example of this approach is the use of operating system interfaces to intercept system calls This section presents our solution for replicating stateful related to the application [18]. Both integration and interception containers in Kubernetes. are transparent for the clients which are accessing the replicated A. Approach system. The management of stateful containers in Kubernetes de- In contrast with the other approaches, the service approach pends on the number of containers replicas being executed. For – the one we adopt – incorporates new functionality in the single-instance, non-replicated, containers, the state has to be system, in the form of a service layer on top of that system, maintained securely by connecting the container to persistent not as an integral part of it [19], [20]. In our case, this layer storage, e.g., a disk volume1. In that situation, if the con- is inserted between the client

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us