skip to main content
10.1145/1294261.1294283acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
Article

Staged deployment in mirage, an integrated software upgrade testing and distribution system

Published:14 October 2007Publication History

ABSTRACT

Despite major advances in the engineering of maintainable and robust software over the years, upgrading software remains a primitive and error-prone activity. In this paper, we argue that several problems with upgrading software are caused by a poor integration between upgrade deployment, user-machine testing, and problem reporting. To support this argument, we present a characterization of softwareupgrades resulting from a survey we conducted of 50 system administrators. Motivated by the survey results, we present Mirage, a distributed framework for integrating upgrade deployment, user-machine testing, and problem reporting into the overall upgrade development process. Our evaluation focuses on the most novel aspect of Mirage, namely its staged upgrade deployment based on the clustering of usermachines according to their environments and configurations. Our results suggest that Mirage's staged deployment is effective for real upgrade problems.

Skip Supplemental Material Section

Supplemental Material

1294283.mp4

mp4

125.5 MB

References

  1. M. Agrawal and S. Seshan. Development Tools for Distributed Applications. In Proceedings of the 9th Workshop on Hot Topics in Operating Systems, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Ajmani, B. Liskov, and L. Shrira. Scheduling and Simulation: How to Upgrade Distributed Systems. In Proceedings of the 9th Workshop on Hot Topics in Operating Systems, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ASF Bugzilla Bug 10073 upgrade from 1.3.24 to 1.3.26 breaks include directive. http://issues.apache.org/bugzilla/show_bug.cgi?id=10073.Google ScholarGoogle Scholar
  4. S. Beattie, S. Arnold, C. Cowan, P. Wagle, C. Wright, and A. Shostack. Timing the Application of Security Patches for Optimal Uptime. In Proceedings of the 16th Systems Administration Conference, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Brada. Metadata Support for Safe Component Upgrades. In Proceedings of the 26th International Computer Software and Applications Conference, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 4(2), February 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Cook and A. Orso. MonDe: Safe Updating through Monitored Deployment of New Component Versions. In Proceedings of the 6th Workshop on Program Analysis for Software Tools and Engineering (PASTE), September 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. P. Cox, C. D. Murray, and B. D. Noble. Pastiche: Making Backup Cheap and Easy. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Dunagan, R. Roussev, B. Daniels, A. Johson, C. Verbowski, and Y.-M. Wang. Towards a Self-Managing Software Patching Process Using Black--Box Persistent-State Manifests. In Proceedings of the International Conference on Autonomic Computing, May 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. SIGOPS Oper. Syst. Rev., 36(SI):211--224, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fixing A Troubled Firefox 2.0 Upgrade. http://softwaregadgets.gridspace.net/2006/10/30/fixing-a-troubled-firefox-20-upgrade/.Google ScholarGoogle Scholar
  12. Firefox crashes after 1.5.0.9 update. http://www.ubuntuforums.org/showthread.php?t=331274.Google ScholarGoogle Scholar
  13. C. Gkantsidis, T. Karagiannis, P. Rodriguez, and M. Vojnovic. Planet Scale Software Updates. In Proceedings of SIGCOMM, September 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Heydon, R. Levin, T. Mann, and Y. Yu. The Vesta Software Configuration Management System. Compaq Systems Research Center, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. J. Heyer, S. Kruglyak, and S. Yooseph. Exploring Expression Data: Identification and Analysis of Coexpressed Genes. In Genome Research, pages 1106--1115, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  16. F. Junqueira, R. Bhagwan, A. Hevia, K. Marzullo, and G. M. Voelker. Surviving Internet Catastrophes. In Proceedings of the USENIX 2005 Annual Technical Conference, April 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kaseya Patch Management. http://www.kaseya.com/products/patch-management.php.Google ScholarGoogle Scholar
  18. S. King and P. Chen. Backtracking Intrusions. In Proceedings of the 19th SOSP, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. L. Mariani and M. Pezze. Behavior Capture and Test: Automated Analysis of Component Integration. In Proceedings of the International Conference on Engineering of Complex Computer Systems, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. McCamant and M. D. Ernst. Predicting Problems Caused by Component Upgrades. In Proceedings of the 10th European Software Engineering Conference and the 11th Symposium on the Foundations of Software Engineering, September 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Microsoft Online Crash Analysis. http://oca.microsoft.com/en/Welcome.aspx.Google ScholarGoogle Scholar
  22. K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. Seltzer. Provenance-Aware Storage Systems. In Proceedings of the USENIX Annual Technical Conference, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Muthitacharoen, B. Chen, and D. Mazieres. A Low-bandwidth Network File System. In Proceedings of the 18th SOSP, December 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Report of PHP problem after MySQL upgrade. http://www.linuxquestions.org/questions/showthread.php?t=425535.Google ScholarGoogle Scholar
  25. K. Nagaraja, F. Oliveira, R. Bianchini, R. P. Martin, and T. D. Nguyen. Understanding and Dealing with Operator Mistakes in Internet Services. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, Dec. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. F. Oliveira, K. Nagaraja, R. Bachwani, R. Bianchini, R. P. Martin, and T. D. Nguyen. Understanding and Validating Database System Administration. In Proceedings of the USENIX Annual Technical Conference, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. PatchLink. http://www.patchlink.com/.Google ScholarGoogle Scholar
  28. PHP5 Migration guide. http://ch2.php.net/manual/en/migration5.incompatible.php.Google ScholarGoogle Scholar
  29. Y. Saito. Jockey: A User-Space Library for Record-Replay Debugging. In Proceedings of the 6th International Symposium on Automated Analysis-Driven Debugging, September 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Secunia "Security Watchdog" Blog. http://secunia.com/blog/11.Google ScholarGoogle Scholar
  31. L. Sobr and P. Tuma. SOFAnet: Middleware for Software Distribution over Internet. In Proceedings of the IEEE Symposium on Applications and the Internet, January 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. S. Srnivasan, S. Kandula, C. Andrews, and Y. Zhou. Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging. In Proceedings of the USENIX Annual Technical Conference, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Software upgrade survey. http://mirage.epfl.ch/webdav/site/mirage/users/128770/public/survey.pdf.Google ScholarGoogle Scholar
  34. User-Mode Linux. http://user-mode-linux.sourceforge.net/.Google ScholarGoogle Scholar
  35. T. Xie and D. Notkin. Checking Inside the Black Box: Regression Testing Based on Value Spectra Differences. In Proceedings of the 20th IEEE International Conference on Software Maintenance, September 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Staged deployment in mirage, an integrated software upgrade testing and distribution system

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
              October 2007
              378 pages
              ISBN:9781595935915
              DOI:10.1145/1294261
              • cover image ACM SIGOPS Operating Systems Review
                ACM SIGOPS Operating Systems Review  Volume 41, Issue 6
                SOSP '07
                December 2007
                363 pages
                ISSN:0163-5980
                DOI:10.1145/1323293
                Issue’s Table of Contents

              Copyright © 2007 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 14 October 2007

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate131of716submissions,18%

              Upcoming Conference

              SOSP '24

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader