skip to main content
research-article

Software aging in the eucalyptus cloud computing infrastructure: Characterization and rejuvenation

Published:13 January 2014Publication History
Skip Abstract Section

Abstract

The need for high reliability, availability and performance has significantly increased in modern applications, that handle rapidly growing demands while providing uninterruptible services. Cloud computing systems fundamentally provide access to large pools of data and computational resources. Eucalyptus is a software framework largely used to implement private clouds and hybrid-style Infrastructure as a Service. It implements the Amazon Web Service (AWS) API, allowing interoperability with other AWS-based services. This article investigates the software aging effects in the Eucalyptus framework, considering workloads composed of intensive requests for remote storage attachment and virtual machine instantiations. We found problems that may be harmful to system dependability and performance, specifically regarding to RAM memory and swap space exhaustion, besides highly excessive CPU utilization by the virtual machines. We also present an approach that applies time series analysis to schedule rejuvenation, so as to reduce the downtime by predicting the proper moment to perform the rejuvenation. We experimentally evaluate our approach using an Eucalyptus test bed. The results show that our approach achieves higher availability, when compared to a threshold-triggered rejuvenation method based on continuous monitoring of resources utilization.

References

  1. Akaike, H. 1969. Fitting autoregressive models for prediction. Ann. Institute Stat. Math. 21, 1, 243--247.Google ScholarGoogle ScholarCross RefCross Ref
  2. Amazon. 2011a. Amazon Elastic Block Store (EBS). Amazon.com, Inc. Available in: http://aws.amazon.com/ebs.Google ScholarGoogle Scholar
  3. Amazon. 2011b. Amazon elastic compute cloud - ec2. Amazon.com, Inc.Google ScholarGoogle Scholar
  4. Araujo, J., Matos Junior, R., Maciel, P., and Matias, R. 2011a. Software aging issues on the eucalyptus cloud computing infrastructure. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC'11). Anchorage.Google ScholarGoogle Scholar
  5. Araujo, J., Matos Junior, R., Maciel, P., Matias, R., and Beicker, I. 2011b. Experimental evaluation of software aging effects on the eucalyptus cloud computing infrastructure. In Proceedings of the ACM/IFIP/USENIX International Middleware Conference (Middleware'11). Lisbon. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Araujo, J., Matos Junior, R., Maciel, P., Vieira, F., Matias, R., and Trivedi, K. S. 2011c. Software rejuvenation in eucalyptus cloud computing infrastructure: A method based on time series forecasting and multiple thresholds. In Proceedings of the 3rd International Workshop on Software Aging and Rejuvenation (WoSAR'11) in conjuction with the 22nd Annual International Symposium on Software Reliability Engineering (ISSRE'11). Hiroshima. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., and Zaharia, M. 2009. Above the clouds: A Berkeley view of cloud computing. Tech. Rep. UCB/EECS-2009-28, UC Berkeley Reliable Adaptive Distributed Systems Laboratory. Feb.Google ScholarGoogle Scholar
  8. Avizienis, A., Laprie, J., Randell, B., and Landwehr, C. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Depend. Secure Comput. 1, 11--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bao, Y., Sun, X., and Trivedi, K. S. 2005. A workload-based analysis of software aging and rejuvenation. IEEE Trans. Reliab. 54, 541--548.Google ScholarGoogle ScholarCross RefCross Ref
  10. Bloomfield, P. 2000. Fourier Analysis of Time Series: An Introduction. Wiley Series in Probability and Statistics.Google ScholarGoogle ScholarCross RefCross Ref
  11. Blum, R. 2008. Linux Command Line and Shell Scripting Bible. Wiley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Box, G. and Jenkins, G. 1970. Time Series Analysis. Holden-Day series in time series analysis. Holden-Day, San Francisco, CA.Google ScholarGoogle Scholar
  13. Canonical. 2011. Manual pages about using a GNU/Linux system. Canonical Ltd. Available in: http://manpages.ubuntu.com/manpages/hardy/man5/proc.5.html.Google ScholarGoogle Scholar
  14. Carrozza, G., Cotroneo, D., Natella, R., Pecchia, A., and Russo, S. 2010. Memory leak analysis of mission-critical middleware. J. Syst. Softw. 83, 1556--1567. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Chatfield, C. 1996. The Analysis of Time Series: An Introduction 5th Ed. Chapman & Hall/CRC, New York.Google ScholarGoogle Scholar
  16. Cordeiro, T., Damalio, D., Pereira, N., Endo, P., Palhares, A., Goncalves, G., Sadok, D., Kelner, J., Melander, B., Souza, V., and Mångs, J.-E. 2010. Open source cloud computing platforms. In Proceedings of the 9th International Conference on Grid and Cloud Computing (GCC'2010) (Jiangsu). 1--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Cully, B., Lefebvre, G., Meyer, D., Feeley, M., Hutchinson, N., and Warfield, A. 2008. Remus: High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (San Francisco). 161--174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Eucalyptus. 2009. Eucalyptus Open-Source Cloud Computing Infrastructure - An Overview. Eucalyptus Systems, Inc., 130 Castilian Drive, Goleta, CA 93117 USA.Google ScholarGoogle Scholar
  19. Eucalyptus. 2010. Cloud Computing and Open Source: IT Climatology is Born. Eucalyptus Systems, Inc., 130 Castilian Drive, Goleta, CA 93117 USA.Google ScholarGoogle Scholar
  20. Eucalyptus. 2011. Eucalyptus - the open source cloud platform. Eucalyptus Systems, Inc. Available in: http://open.eucalyptus.com/.Google ScholarGoogle Scholar
  21. Grottke, M., Matias, R., and Trivedi, K. 2008. The fundamentals of software aging. In Proceedings of the 1st International Workshop on Software Aging and Rejuvenation (WoSAR), in conjunction with the 19th IEEE International Symposium on Software Reliability Engineering (Seattle).Google ScholarGoogle Scholar
  22. Huang, Y., Kintala, C., Kolettis, N., and Fulton, N. D. 1995. Software rejuvenation: Analysis, module and applications. In Proceedings of the 25th Symposium on Fault Tolerant Computing (FTCS-25) (Pasadena). 381--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Iosup, A., Ostermann, S., Yigitbasi, N., Prodan, R., Fahringer, T., and Epema, D. 2011. Performance analysis of cloud computing services for many-tasks scientific computing. IEEE Trans. Paral. Distrib. Syst. (TPDS), Special Issue on Many-Task Computing 22, 931--945. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Johnson, D., Murari, K., Raju, M., RB, S., and Girikumar, Y. 2010. Eucalyptus Beginner's Guide UEC Ed. For Ubuntu Server 10.04 - Lucid Lynx, v1.0.Google ScholarGoogle Scholar
  25. Jones, M. T. 2008. Cloud computing with Linux - cloud computing platforms and applications. IBM Corporation, 12.Google ScholarGoogle Scholar
  26. Kedem, B. and Fokianos, K. 2002. Regression Models for Time Series Analysis. Wiley.Google ScholarGoogle Scholar
  27. Kourai, K. and Chiba, S. 2007. A fast rejuvenation technique for server consolidation with virtual machines. In Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07) (Washington). 245--255. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. KVM. 2012. Kernel based virtual machine. Project Home Page. Available in: http://www.linux-kvm.org.Google ScholarGoogle Scholar
  29. Machida, F., Kim, D. S., and Trivedi, K. 2010. Modeling and analysis of software rejuvenation in a server virtualized system. In Proceedings of the 2010 IEEE 2nd International Workshop on Software Aging and Rejuvenation (WoSAR). 1--6.Google ScholarGoogle Scholar
  30. Matias, R. and Filho, P. J. F. 2010. Measuring software aging effects through OS kernel instrumentation. In Proceedings of the 2nd International Workshop on Software Aging and Rejuvenation (WoSAR), in conjunction with 21th IEEE International Symposium on Software Reliability Engineering (ISSRE'10) (San Jose).Google ScholarGoogle Scholar
  31. Matias, R. and Freitas Filho, P. J. 2006. An experimental study on software aging and rejuvenation in web servers. In Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC'06) (Chicago). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Matias Jr., R., Barbetta, P. A., Trivedi, K. S., and Filho, P. J. F. 2010. Accelerated degradation tests applied to software aging experiments. IEEE Trans. Reliab. 59, 1, 102--114.Google ScholarGoogle ScholarCross RefCross Ref
  33. Matos Jr., R., Araujo, J., Maciel, P., Vieira, F., Matias, R., and Trivedi, K. S. 2011. Software rejuvenation in Eucalyptus cloud computing infrastructure: A hybrid method based on multiple thresholds and time series prediction. Int. Trans. Syst. Sci. Appl. 7, 295--303.Google ScholarGoogle Scholar
  34. McKinley, P. K., Samimi, F. A., Shapiro, J. K., and Tang, C. 2006. Service clouds: A distributed infrastructure for composing autonomic communication services. In Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06) (Indianapolis, IN). 341--348. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Mihailescu, M., Rodriguez, A., and Amza, C. 2011. Enhancing application robustness in infrastructure-as-a-service clouds. In Proceedings of the 1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments (DCDV 2011) in conjunction with the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'11) (Hong Kong). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Montgomery, D. C., Jennings, C. L., and Kulahci, M. 2008. Introduction to Time Series Analysis and Forecasting. Wiley series in probability and statistics.Google ScholarGoogle Scholar
  37. Musa, J. D. 1998. Software Reliability Engineering: More Reliable Software, Faster Development and Testing 2 Ed. McGraw-Hill, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. NIST. 2011. NIST. National Institute of Standards and Technology, Information Technology Laboratory, U.S. Department of Commerce. Available in: http://csrc.nist.gov.Google ScholarGoogle Scholar
  39. Paing, A. M. M. and Thein, N. L. 2012. Stochastic reward nets model for time based software rejuvenation in virtualized environment. Int. J. Comput. Sci. Telecommuni. 3, 1, 1--10.Google ScholarGoogle Scholar
  40. Peng, J., Zhang, X., Lei, Z., Zhang, B., Zhang, W., and Li, Q. 2009. Comparison of several cloud computing platforms. In Proceedings of the 2nd International Symposium on Information Science and Engineering (ISISE) (Shanghai). IEEE Press, 23--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Rezaei, A. and Sharifi, M. 2010. Rejuvenating high available virtualized systems. In Proceedings of the International Conference on Availability, Reliability, and Security, 2010 (ARES'10). 289--294.Google ScholarGoogle Scholar
  42. Schwarz, G. 1978. Estimating the dimension of a model. Ann. Stati.Google ScholarGoogle Scholar
  43. Sousa, E., Maciel, P. R. M., Arajo, C., Alves, G., and Chicout, F. 2009. Performance modeling for evaluation and planning of electronic funds transfer systems. In Proceedings of ISCC'09. 73--76.Google ScholarGoogle Scholar
  44. Sun, D., Chang, G., Guo, Q., Wang, C., and Wang, X. 2010. A dependability model to enhance security of cloud environment using system-level virtualization techniques. In Proceedings of the 1st International Conference on Pervasive Computing, Signal Processing and Applications. 6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Sun Microsystems. 2009. Introduction to Cloud Computing Architecture 1 Ed. Sun Microsystems, Inc.Google ScholarGoogle Scholar
  46. Trivedi, K. S., Kim, D. S., Roy, A., and Medhi, D. 2009. Dependability and security models. In Proceedings of the 7th International Workshop on the Design of Reliable Communication Networks (DRCN'09).Google ScholarGoogle Scholar
  47. Vaidyanathan, K. and Trivedi, K. S. 2005. A comprehensive model for software rejuvenation. IEEE Trans. Depend. Secure Comput. 2, 124--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Witkon, E. 2007. Using Load Testing to meet Your SLA. RadView Software. RadView Executive White Paper.Google ScholarGoogle Scholar
  49. Xie, M., Dai, Y.-S., and Poh, K.-L. 2004. Computing System Reliability: Models and Analysis. Kluwer Academic Publishers. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Software aging in the eucalyptus cloud computing infrastructure: Characterization and rejuvenation

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Journal on Emerging Technologies in Computing Systems
                ACM Journal on Emerging Technologies in Computing Systems  Volume 10, Issue 1
                Special Issue on Reliability and Device Degradation in Emerging Technologies and Special Issue on WoSAR 2011
                January 2014
                210 pages
                ISSN:1550-4832
                EISSN:1550-4840
                DOI:10.1145/2543749
                Issue’s Table of Contents

                Copyright © 2014 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 13 January 2014
                • Accepted: 1 November 2012
                • Revised: 1 September 2012
                • Received: 1 April 2012
                Published in jetc Volume 10, Issue 1

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Research
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader