SlideShare a Scribd company logo
1 of 4
Download to read offline
978-1-5386-5619-8/19/$31.00 ©2019 IEEE
Advanced resource allocation and Service level
monitoring for container orchestration platform
Rajendar Kandan
Department of Advanced Computing
Lab,
MIMOS,
Kuala lumpur, Malaysia
rajendar.kandan@mimos.my
Ong Hong Hoe
Department of Advanced Computing
Lab,
MIMOS,
Kuala lumpur, Malaysia
hh.ong@mimos.my
Mohammad Fairus Khalid
Department of Advanced Computing
Lab,
MIMOS,
Kuala lumpur, Malaysia
fairus.khalid@mimos.my
Bukhary Ikhwan Ismail
Department of Advanced Computing
Lab,
MIMOS,
Kuala lumpur, Malaysia
ikhwan.ismail@mimos.my
Abstract—Containerization becomes the first choice for
faster deployment of application. Lightweight and instant start
of containers find its place across various domains including big
data and cloud. Due to this wide range in heterogeneity of
resources, the orchestration framework is required for the
management of containers. Resource selection becomes one of
the major challenges in such environment. Although various
open-source orchestration available in market for addressing
the management of containers across varied platform, they
provide only a basic scheduling scheme. In this paper, we
highlighted various factors affecting the resource selection and
proposed an architecture of resource-aware placement and SLA
(Service Level Agreement) based monitoring which provides
advanced scheduling and minimizes container migration.
Keywords—container orchestration, resource scheduling
I. INTRODUCTION
Virtualization is the underlying technology for providing
abstraction[1]. Cloud computing uses virtualization for
running multiple virtual machine based on the user request. It
benefits the cloud with greater isolation and security. Virtual
machines are realized using Hypervisor, which manages the
entire life cycle. Popular hypervisor includes Xen [2], KVM
[2] and VMWare [3]. Virtual machine image is generally
heavy, and greater the image size affects the deployment of
virtual machine. Hence, cloud provider would always face a
challenge in the management of virtual machines. Faniyi [4]
describes the autonomic management of the virtual machine
in cloud using Service level agreement.
Container solution emerges as an alternative to the virtual
machine due to the rapidness in terms of deployment and
management[5]. Docker is one of the most popular open
source container solution, widely adopted across various IT
industries. It provides the basic layer to manage the containers
on the single host, server or device. Docker engine is a light
weight tool which helps to package, build and run application
much faster. Performance of Docker compared with that of
virtualization software, shows better results [6]. Even high
performance computing applications were also experimented
on Docker containers [7]. Docker uses some of the Linux
kernel feature such as cgroups and namespace for running
application as container. Docker containers are also evaluated
based on the hardware utilization [8]. Some of the issues in the
management of Docker containers were discussed by Paraiso
[9]. Docker engine could manage applications only on single
host, hence it requires an orchestration engine to manage
multiple hosts. Docker swarm, Kubernetes, Mesos are some
of the examples of open-source orchestration engine which
could manage application across the cluster of resources. This
orchestrator manages the entire life cycle of the container
across the cluster based on user request. The requests are
basically made through the file describing the specification of
containers. YAML and JSON are the most popular file format
used for defining the container specification. Required
hardware specification can also be added in the file for proper
identification of resources. Each orchestrator defines their
own scheduling algorithm for identifying the required
resources and manage the deployment of containers. Some of
the orchestration engine provide an interface to various cloud
platforms which could help to scale across during resource
burst.
Information about the resources is more important for
proper scheduling across varied domain. Tosatto [10]
describes resource challenges based on the container
orchestration. Most of the orchestrator has an inbuilt
information system which could monitor status of the
container as well as the system characteristics of the
underlying host or server. Container deployment across a wide
range of resources also brings complexity in the scheduling
which has not been explored. Few reasons for complexity
include
A. Multiple system requirements
Some container may require a minimal hardware
requirement for successful deployment. Most common
requirements from the user include specification on CPUs,
RAM, Network and Storage. Based on requirements by the
user, orchestration system need to identify the desired
resource and deploy. Thus, it adds complexity to the provider
in finding the better resource across wide range of
requirements.
B. Source of deployments
As containers could be deployed across a wide range of
computing platforms like cloud and datacenter, it becomes
complex for any scheduling scheme for deciding the best fit
resources. The user requirements also varied based on the
deployment model, for e.g., if datacenter is chosen for
deployment, user may provide the basic system requirements
including CPU, RAM, disk space, etc. Similarly, if
deployment on Cloud, the user may provide the pricing
details, etc. Hence, source of deployment also considered to
be an important factor.
C. Nature of application
Types of application deployed as containers also vary.
Microservices [11] starts replacing the traditional multi-tier
application. The requirement of such application also differs
from the traditional container application.
Once the containers being placed across the resources, it
has become important to monitor at regular intervals based on
the performance. In this paper, we propose an architecture of
resource-aware placement and SLA based monitoring for
better management of resources.
The paper is organized as follows: Section II details on
various container orchestration platforms followed by our
focus on container placement and SLA. Section IV compares
our algorithm with default scheduling and proposed
architecture is described in section V followed by advantages
and conclusion in Section VII.
II. CONTAINER ORCHESTRATION AND SCHEDULING
Docker Swarm [12] is one of the popular open-source
orchestration platforms. Its architecture is simple and consists
of Manager and Worker nodes. Manager Node controls the
entire cluster management and task distribution. Worker
nodes run containers as directed by Manager Nodes. Recent
Docker version includes the “Swarm Mode” by default which
helps to manage a cluster of Docker engine.
Kubernetes [13], another popular solution for container
orchestration. Architecture consists of Master and nodes
similar to Swarm. Latest versions of Kubernetes provide four
different advanced scheduling policies viz., node affinity/anti-
affinity, taints and tolerations, pod affinity/anti-affinity and
custom. Mesos [14], yet another orchestration solution for
managing diverse cluster computing frameworks including
Hadoop. Another orchestration framework based on Mesos is
Marathon [15].
Most of the orchestration solution provides scheduling
scheme which could identify the resources based on the
current demand and availability of resources for faster
deployment. The need for resource scheduling and continuous
monitoring is explained in the next section.
III. RESOURCE-AWARE PLACEMENT AND SLA MONITORING
Most of the traditional orchestration scheduling identifies
the resources matching minimum requirement set by the user.
Usually the resources are rated/graded based on the current
availability and characteristics to process the
scheduling/placement of containers. After the container being
deployed, it has become equally important to monitor the
performance of the container. Since more than one containers
could be placed on the same physical server/VM, one could
affect each other’s performance, hence it requires a resource
aware placement and SLA monitoring control for better
management of the resources. Our main motivation behind
Container placement and SLA monitoring are explained as
follows
A. Container placement
Containers placed on the server or VM consume memory
based on the level of usage. Some users request for scaling
application based on threshold values. However, on certain
conditions, the containers residing at the same host may have
an impact on each other’s performance. Monitoring at host
level could identify the container’s performance metrics such
as CPU utilization, memory consumption, etc. For proper
placement of containers, user could recommend the
maximum level of the CPU, RAM or other metrics. Most of
the scheduling scheme analyzes resource based on the current
condition and place the container. It doesn’t forecast the
running containers impact and how the current deployment
will affect each other. Hence, this could create an
environment with higher chances of getting overloaded
which also result in degradation of performance and even
result in restarting of containers. An example of such
condition is illustrated as follows
Fig. 1 shows the CPU utilization of containers
deployed across four servers at a time interval Tx. Now if a
new container is to be scheduled across these servers, based
on low utilization, server-2 might have chosen.
Fig. 2 shows the CPU utilization of containers after a time
interval Tx+y. Therefore, if server-2 has chosen for new
deployment, as based on Tx, server-2 might have overloaded
during Tx+y time interval and may result in degradation of
performance across the containers deployed.
Fig. 1. CPU utilization of Containers during time interval (Tx)
Fig. 2. CPU utilization of Containers during time interval (Tx+y)
B. SLA Monitoring and negotiation
After a container being placed across the resources, it has
to be monitored at regular interval. Default monitoring
scheme aims at verifying the actual requirement by the user
for example, if the user requested a maximum of 4GB
memory for Container C, it monitors at a periodic interval on
the memory usage of the Container C and eventually before
it reaches 4GB, alert will be provided. Our proposed solution
aims at carrying out desired action on the affected container,
during such conditions. To ensure smooth operation, the user
could choose the default action which can be carried on such
conditions for e.g.: scaling, pause, stop and termination.
Negotiation with the user can be made to handle any
uncertain conditions for e.g.: no resources available at the
moment based on request, abnormal behavior of containers,
etc. Thus negotiation helps to overcome any issues on the
deployment of containers.
SLA monitoring and negotiation are required for the
verification on deployment of container and ensures the
smooth management. SLA monitoring we refer to the
requirements specified by the user on the deployment of a
container. Similarly, the resources are also monitored to
ensure that the containers are not affected on performance.
SLA monitoring ensures that the given container utilizes the
resources as requested. SLA negotiation is also made on
certain cases when required, for e.g., if the container
consumes very less resource than requested over a long
period of time. This is to ensure that the resource is not
underutilized and to provide an optimal usage. Thus
negotiation helps to manage resources as well as containers.
IV. COMPARISON OF ALGORITHM
This section explains in detail about our proposed and
default scheduling algorithm. Default scheduling algorithm
selects the resource based on the current trend of resource
utilization. Fig. 3 represents the default scheduling algorithm.
In this experiment, we have used four servers (Server1,
Server2, Server3 and Server4). There are 3 containers
deployed across each server. The total amount of CPU
utilized across all the servers are 40, 30, 45 and 60
respectively. In this scenario, if there is new request for the
deployment of container, default scheduling scheme chooses
the server-2 based on the minimal utilization of the resources.
Fig. 4. Proposed scheduler
Fig. 4 explains our proposed scheduling algorithm. In the
same scenario, where the server’s CPU is utilized as 40, 30,
45 and 60. When there is a new request for deployment of the
container, our proposed algorithm chooses the server-1.
Although Server-1’s current CPU utilization is more than that
of the Server-2, it predicts the future load based on the
requirements. Hence, this could help in identifying the
optimal resource, minimizing the migration and improving
the overall performance.
Our proposed scheduling algorithm differs from the
default scheduling algorithm. It identifies the resources based
on the future utilization of resources. The differences
between our proposed and default scheduling is tabulated as
follows
TABLE I. Comparison of scheduling algorithm
Proposed algorithm Default scheduling algorithm
a. Identify the resource list {Rlist }
matching User requirements (Ur)
from the total resource {Ri}
Where i=1..n
b. If Rlist > 1, then identify the
maximum requirement of each
container deployed across Rlist
c. Identify total resource
usage[TMaxcpu] =
,
where
→Maximum value of
request,
→ Container running on
resource
n→ Total number of Rlist
m→ total number of containers
deployed at a resource.
d. Identify optimal resource Rd from
Min{ TMaxcpu }
e. Deploy container on Rd
a. Identify the resource list {Rlist }
matching User requirements
(Ur) from the total resource
{Ri} Where i=1..n
b. If Rlist > 1, then identify the
current least utilized resource
Rleast
c. Deploy container on Rleast
Note: User requirements can be of any performance metrics. In our experiment,
we have used CPU utilization.
Fig. 3. Default scheduler
V. PROPOSED ARCHITECTURE
Our proposed architecture manages the advance
scheduling of container across Kubernetes platform and the
overall architecture is as follows.
Request manger, Information collector, Policy manager,
SLA Manager and Resource manager are the major
components. Request Manager validates the container
request and checks for the feasibility of deploying the
requested number of containers. Information collector
manages the complete information about all resources
(Kubernetes cluster, containers) and updates in NoSQL based
databases (e.g.: MONGO). It also records each container’s
historic behavior. SLA Manager verify the container
performance against the policy which has been updated by
the policy manager. User can create and monitor their policy
using Policy manager. Resource Manager is core component
managing all other components and it also ensures secure
communication across Kubernetes cluster. It aids in
scheduling and identifies the best matched resources for the
successful deployment of containers over Kubernetes cluster.
It manages the resources based on the algorithm described in
section IV.
VI. ADVANTAGES OF PROPOSED SOLUTION
Proposed solution analyze the future utilization on the
targeted resource before the deployment which could
minimize the migration of resource and ensure the smooth
function of all applications or containers across the resources.
Our solution is based on the approach of user specification and
for the new users who don’t have any upfront information on
specification, SLA negotiation helps in finding the optimal
resources. However, it is recommended for the new user to
provide the minimum requirement for the initial placement of
containers. SLA based monitoring helps to verify against the
commitment from both the provider and user.
VII. CONCLUSION
Our proposed solution could benefit any container
orchestrator for effective scheduling of containers and
improve application performance. We experimented our
solution with CPU requirement, similarly it can span across
any set of performance metrics. Our solution aims at
minimizing the issues before and after the scheduling. Thus, it
aids in minimizing the amount of migration or restart of
containers. We also understand that it’s difficult for the user
in specifying the performance upfront, hence in future we plan
to predict the performance based on historic reference and
create SLA policy accordingly. We also plan to expand our
experiment with additional performance metrics over wide
range of micro service applications.
REFERENCES
[1] A. J. Younge, R. Henschel, J. T. Brown, G. von Laszewski, J. Qiu and
G. C. Fox, "Analysis of Virtualization Technologies for High
Performance Computing Environments," 2011 IEEE 4th International
Conference on Cloud Computing, Washington, DC, 2011, pp. 9-16.
doi: 10.1109/CLOUD.2011.29
[2] S. G. Soriga and M. Barbulescu, "A comparison of the performance
and scalability of Xen and KVM hypervisors," 2013 RoEduNet
International Conference 12th Edition: Networking in Education and
Research, Iasi, Romania, 2013, pp. 1-6.
[3] J. P. Walters et al., "GPU Passthrough Performance: A Comparison of
KVM, Xen, VMWare ESXi, and LXC for CUDA and OpenCL
Applications," 2014 IEEE 7th International Conference on Cloud
Computing, Anchorage, AK, 2014, pp. 636-643.
[4] F. Faniyi and R. Bahsoon, “A Systematic Review of Service Level
Management in the Cloud”, ACM Comput. Surv. 48, 3, Article 43
(December 2015), 27 pages.
[5] D. Bernstein, "Containers and Cloud: From LXC to Docker to
Kubernetes," in IEEE Cloud Computing, vol. 1, no. 3, pp. 81-84, 2014.
[6] M. Raho, A. Spyridakis, M. Paolino and D. Raho, "KVM, Xen and
Docker: A performance analysis for ARM based NFV and cloud
computing," 2015 IEEE 3rd Workshop on Advances in Information,
Electronic and Electrical Engineering (AIEEE), Riga, 2015, pp. 1-8.
[7] T. Adufu, J. Choi and Y. Kim, “Is container-based technology a winner
for high performance scientific applications?”, Network Operations
and Management Symposium, 17th Asia-Pacific, Busan, 2015, pp.
507-510.
[8] E. N. Preeth, F. J. P. Mulerickal, B. Paul and Y. Sastri, "Evaluation of
Docker containers based on hardware utilization," 2015 International
Conference on Control Communication & Computing India (ICCC),
Trivandrum, 2015, pp. 697-700
[9] F. Paraiso, S. Challita, Y. Al-Dhuraibi, P. Merle. “Model-Driven
Management of Docker Containers”, 9th IEEE International
Conference on Cloud Computing (CLOUD), Jun 2016, San Francisco,
United States.
[10] A. Tosatto, P. Ruiu, A. Attanasio, “Container-based orchestration in
cloud: State of the art and challenges”, in: Proc. of 9th Int'l Conf. on
Complex, Intelligent, and Software Intensive Systems, CISIS '15,
2015, pp. 70-75
[11] D. Jaramillo, D. V. Nguyen and R. Smart, "Leveraging microservices
architecture by using Docker technology," SoutheastCon 2016,
Norfolk, VA, 2016, pp. 1-5.
[12] N. Naik, "Building a virtual system of systems using docker swarm in
multiple clouds," 2016 IEEE International Symposium on Systems
Engineering (ISSE), Edinburgh, 2016, pp. 1-3.
doi: 10.1109/SysEng.2016.7753148
[13] L. Abdollahi Vayghan, M. A. Saied, M. Toeroe and F. Khendek,
"Deploying Microservice Based Applications with Kubernetes:
Experiments and Lessons Learned," 2018 IEEE 11th International
Conference on Cloud Computing (CLOUD), San Francisco, CA, USA,
2018, pp. 970-973.
[14] B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. D. Joseph, R.
H. Katz, S. Shenker, and I. Stoica. “Mesos: A platform for fine-grained
resource sharing in the data center”, In NSDI, volume 11, pages 22–22,
2011.
[15] Marathon, [online]. Available: https://mesosphere.github.io/marathon.
[Accessed: 09- June- 2019]
Fig. 5. Proposed architecture

More Related Content

What's hot

Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture serviceeSAT Publishing House
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
Performance analysis of enhanced delta sampling algorithm for ble indoor loca...
Performance analysis of enhanced delta sampling algorithm for ble indoor loca...Performance analysis of enhanced delta sampling algorithm for ble indoor loca...
Performance analysis of enhanced delta sampling algorithm for ble indoor loca...Conference Papers
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoptionijtsrd
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 

What's hot (20)

Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Performance analysis of enhanced delta sampling algorithm for ble indoor loca...
Performance analysis of enhanced delta sampling algorithm for ble indoor loca...Performance analysis of enhanced delta sampling algorithm for ble indoor loca...
Performance analysis of enhanced delta sampling algorithm for ble indoor loca...
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
E0332427
E0332427E0332427
E0332427
 
Embedded systems Implementation in Cloud Challenges
Embedded systems Implementation in Cloud ChallengesEmbedded systems Implementation in Cloud Challenges
Embedded systems Implementation in Cloud Challenges
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 

Similar to Advanced resource allocation and service level monitoring for container orchestration platform

A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...
A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...
A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...IRJET Journal
 
Measuring Resources & Workload Skew In Micro-Service MPP Analytic Query Engine
Measuring Resources & Workload Skew In Micro-Service MPP Analytic Query EngineMeasuring Resources & Workload Skew In Micro-Service MPP Analytic Query Engine
Measuring Resources & Workload Skew In Micro-Service MPP Analytic Query Engineparekhnikunj
 
Mesos vs kubernetes comparison
Mesos vs kubernetes comparisonMesos vs kubernetes comparison
Mesos vs kubernetes comparisonKrishna-Kumar
 
Container Orchestration.pdf
Container Orchestration.pdfContainer Orchestration.pdf
Container Orchestration.pdfSimform
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
 
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...chennaijp
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...IEEEFINALSEMSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...IEEEFINALYEARSTUDENTPROJECT
 
Hybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudHybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudEditor IJCATR
 
Adoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care CoordinationAdoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care CoordinationMindfire LLC
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsijfcstjournal
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsijfcstjournal
 
Cloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsCloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsMohammed Sajjad Ali
 
Highly scalable caching service on cloud - Redis
Highly scalable caching service on cloud - RedisHighly scalable caching service on cloud - Redis
Highly scalable caching service on cloud - RedisKrishna-Kumar
 
Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World IRJET Journal
 
LOAD MANAGEMENT IN CLOUD ENVIRONMENT
LOAD MANAGEMENT IN CLOUD ENVIRONMENTLOAD MANAGEMENT IN CLOUD ENVIRONMENT
LOAD MANAGEMENT IN CLOUD ENVIRONMENTIJERA Editor
 
How docker & kubernetes can optimize the cost of hosting
How docker & kubernetes can optimize the cost of hostingHow docker & kubernetes can optimize the cost of hosting
How docker & kubernetes can optimize the cost of hosting9 series
 

Similar to Advanced resource allocation and service level monitoring for container orchestration platform (20)

A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...
A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...
A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...
 
Measuring Resources & Workload Skew In Micro-Service MPP Analytic Query Engine
Measuring Resources & Workload Skew In Micro-Service MPP Analytic Query EngineMeasuring Resources & Workload Skew In Micro-Service MPP Analytic Query Engine
Measuring Resources & Workload Skew In Micro-Service MPP Analytic Query Engine
 
Mesos vs kubernetes comparison
Mesos vs kubernetes comparisonMesos vs kubernetes comparison
Mesos vs kubernetes comparison
 
Container Orchestration.pdf
Container Orchestration.pdfContainer Orchestration.pdf
Container Orchestration.pdf
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
Ijcet 06 08_004
Ijcet 06 08_004Ijcet 06 08_004
Ijcet 06 08_004
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
Hybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudHybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in Cloud
 
Adoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care CoordinationAdoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
 
B03410609
B03410609B03410609
B03410609
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systems
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systems
 
Cloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsCloud Delivery Model Considerations
Cloud Delivery Model Considerations
 
Highly scalable caching service on cloud - Redis
Highly scalable caching service on cloud - RedisHighly scalable caching service on cloud - Redis
Highly scalable caching service on cloud - Redis
 
Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World
 
LOAD MANAGEMENT IN CLOUD ENVIRONMENT
LOAD MANAGEMENT IN CLOUD ENVIRONMENTLOAD MANAGEMENT IN CLOUD ENVIRONMENT
LOAD MANAGEMENT IN CLOUD ENVIRONMENT
 
How docker & kubernetes can optimize the cost of hosting
How docker & kubernetes can optimize the cost of hostingHow docker & kubernetes can optimize the cost of hosting
How docker & kubernetes can optimize the cost of hosting
 

More from Conference Papers

Ai driven occupational skills generator
Ai driven occupational skills generatorAi driven occupational skills generator
Ai driven occupational skills generatorConference Papers
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Conference Papers
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Conference Papers
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
 
Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Conference Papers
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Conference Papers
 
Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Conference Papers
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution Conference Papers
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentConference Papers
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...Conference Papers
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...Conference Papers
 
Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Conference Papers
 
Towards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaTowards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaConference Papers
 
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...Conference Papers
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsConference Papers
 
Study on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorStudy on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorConference Papers
 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designConference Papers
 
On premise ai platform - from dc to edge
On premise ai platform - from dc to edgeOn premise ai platform - from dc to edge
On premise ai platform - from dc to edgeConference Papers
 
Review of big data analytics (bda) architecture trends and analysis
Review of big data analytics (bda) architecture   trends and analysis Review of big data analytics (bda) architecture   trends and analysis
Review of big data analytics (bda) architecture trends and analysis Conference Papers
 

More from Conference Papers (20)

Ai driven occupational skills generator
Ai driven occupational skills generatorAi driven occupational skills generator
Ai driven occupational skills generator
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
 
Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
 
Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...
 
Towards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaTowards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysia
 
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
 
Study on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorStudy on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistor
 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal design
 
On premise ai platform - from dc to edge
On premise ai platform - from dc to edgeOn premise ai platform - from dc to edge
On premise ai platform - from dc to edge
 
Review of big data analytics (bda) architecture trends and analysis
Review of big data analytics (bda) architecture   trends and analysis Review of big data analytics (bda) architecture   trends and analysis
Review of big data analytics (bda) architecture trends and analysis
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Advanced resource allocation and service level monitoring for container orchestration platform

  • 1. 978-1-5386-5619-8/19/$31.00 ©2019 IEEE Advanced resource allocation and Service level monitoring for container orchestration platform Rajendar Kandan Department of Advanced Computing Lab, MIMOS, Kuala lumpur, Malaysia rajendar.kandan@mimos.my Ong Hong Hoe Department of Advanced Computing Lab, MIMOS, Kuala lumpur, Malaysia hh.ong@mimos.my Mohammad Fairus Khalid Department of Advanced Computing Lab, MIMOS, Kuala lumpur, Malaysia fairus.khalid@mimos.my Bukhary Ikhwan Ismail Department of Advanced Computing Lab, MIMOS, Kuala lumpur, Malaysia ikhwan.ismail@mimos.my Abstract—Containerization becomes the first choice for faster deployment of application. Lightweight and instant start of containers find its place across various domains including big data and cloud. Due to this wide range in heterogeneity of resources, the orchestration framework is required for the management of containers. Resource selection becomes one of the major challenges in such environment. Although various open-source orchestration available in market for addressing the management of containers across varied platform, they provide only a basic scheduling scheme. In this paper, we highlighted various factors affecting the resource selection and proposed an architecture of resource-aware placement and SLA (Service Level Agreement) based monitoring which provides advanced scheduling and minimizes container migration. Keywords—container orchestration, resource scheduling I. INTRODUCTION Virtualization is the underlying technology for providing abstraction[1]. Cloud computing uses virtualization for running multiple virtual machine based on the user request. It benefits the cloud with greater isolation and security. Virtual machines are realized using Hypervisor, which manages the entire life cycle. Popular hypervisor includes Xen [2], KVM [2] and VMWare [3]. Virtual machine image is generally heavy, and greater the image size affects the deployment of virtual machine. Hence, cloud provider would always face a challenge in the management of virtual machines. Faniyi [4] describes the autonomic management of the virtual machine in cloud using Service level agreement. Container solution emerges as an alternative to the virtual machine due to the rapidness in terms of deployment and management[5]. Docker is one of the most popular open source container solution, widely adopted across various IT industries. It provides the basic layer to manage the containers on the single host, server or device. Docker engine is a light weight tool which helps to package, build and run application much faster. Performance of Docker compared with that of virtualization software, shows better results [6]. Even high performance computing applications were also experimented on Docker containers [7]. Docker uses some of the Linux kernel feature such as cgroups and namespace for running application as container. Docker containers are also evaluated based on the hardware utilization [8]. Some of the issues in the management of Docker containers were discussed by Paraiso [9]. Docker engine could manage applications only on single host, hence it requires an orchestration engine to manage multiple hosts. Docker swarm, Kubernetes, Mesos are some of the examples of open-source orchestration engine which could manage application across the cluster of resources. This orchestrator manages the entire life cycle of the container across the cluster based on user request. The requests are basically made through the file describing the specification of containers. YAML and JSON are the most popular file format used for defining the container specification. Required hardware specification can also be added in the file for proper identification of resources. Each orchestrator defines their own scheduling algorithm for identifying the required resources and manage the deployment of containers. Some of the orchestration engine provide an interface to various cloud platforms which could help to scale across during resource burst. Information about the resources is more important for proper scheduling across varied domain. Tosatto [10] describes resource challenges based on the container orchestration. Most of the orchestrator has an inbuilt information system which could monitor status of the container as well as the system characteristics of the underlying host or server. Container deployment across a wide range of resources also brings complexity in the scheduling which has not been explored. Few reasons for complexity include A. Multiple system requirements Some container may require a minimal hardware requirement for successful deployment. Most common requirements from the user include specification on CPUs, RAM, Network and Storage. Based on requirements by the user, orchestration system need to identify the desired resource and deploy. Thus, it adds complexity to the provider in finding the better resource across wide range of requirements.
  • 2. B. Source of deployments As containers could be deployed across a wide range of computing platforms like cloud and datacenter, it becomes complex for any scheduling scheme for deciding the best fit resources. The user requirements also varied based on the deployment model, for e.g., if datacenter is chosen for deployment, user may provide the basic system requirements including CPU, RAM, disk space, etc. Similarly, if deployment on Cloud, the user may provide the pricing details, etc. Hence, source of deployment also considered to be an important factor. C. Nature of application Types of application deployed as containers also vary. Microservices [11] starts replacing the traditional multi-tier application. The requirement of such application also differs from the traditional container application. Once the containers being placed across the resources, it has become important to monitor at regular intervals based on the performance. In this paper, we propose an architecture of resource-aware placement and SLA based monitoring for better management of resources. The paper is organized as follows: Section II details on various container orchestration platforms followed by our focus on container placement and SLA. Section IV compares our algorithm with default scheduling and proposed architecture is described in section V followed by advantages and conclusion in Section VII. II. CONTAINER ORCHESTRATION AND SCHEDULING Docker Swarm [12] is one of the popular open-source orchestration platforms. Its architecture is simple and consists of Manager and Worker nodes. Manager Node controls the entire cluster management and task distribution. Worker nodes run containers as directed by Manager Nodes. Recent Docker version includes the “Swarm Mode” by default which helps to manage a cluster of Docker engine. Kubernetes [13], another popular solution for container orchestration. Architecture consists of Master and nodes similar to Swarm. Latest versions of Kubernetes provide four different advanced scheduling policies viz., node affinity/anti- affinity, taints and tolerations, pod affinity/anti-affinity and custom. Mesos [14], yet another orchestration solution for managing diverse cluster computing frameworks including Hadoop. Another orchestration framework based on Mesos is Marathon [15]. Most of the orchestration solution provides scheduling scheme which could identify the resources based on the current demand and availability of resources for faster deployment. The need for resource scheduling and continuous monitoring is explained in the next section. III. RESOURCE-AWARE PLACEMENT AND SLA MONITORING Most of the traditional orchestration scheduling identifies the resources matching minimum requirement set by the user. Usually the resources are rated/graded based on the current availability and characteristics to process the scheduling/placement of containers. After the container being deployed, it has become equally important to monitor the performance of the container. Since more than one containers could be placed on the same physical server/VM, one could affect each other’s performance, hence it requires a resource aware placement and SLA monitoring control for better management of the resources. Our main motivation behind Container placement and SLA monitoring are explained as follows A. Container placement Containers placed on the server or VM consume memory based on the level of usage. Some users request for scaling application based on threshold values. However, on certain conditions, the containers residing at the same host may have an impact on each other’s performance. Monitoring at host level could identify the container’s performance metrics such as CPU utilization, memory consumption, etc. For proper placement of containers, user could recommend the maximum level of the CPU, RAM or other metrics. Most of the scheduling scheme analyzes resource based on the current condition and place the container. It doesn’t forecast the running containers impact and how the current deployment will affect each other. Hence, this could create an environment with higher chances of getting overloaded which also result in degradation of performance and even result in restarting of containers. An example of such condition is illustrated as follows Fig. 1 shows the CPU utilization of containers deployed across four servers at a time interval Tx. Now if a new container is to be scheduled across these servers, based on low utilization, server-2 might have chosen. Fig. 2 shows the CPU utilization of containers after a time interval Tx+y. Therefore, if server-2 has chosen for new deployment, as based on Tx, server-2 might have overloaded during Tx+y time interval and may result in degradation of performance across the containers deployed. Fig. 1. CPU utilization of Containers during time interval (Tx) Fig. 2. CPU utilization of Containers during time interval (Tx+y)
  • 3. B. SLA Monitoring and negotiation After a container being placed across the resources, it has to be monitored at regular interval. Default monitoring scheme aims at verifying the actual requirement by the user for example, if the user requested a maximum of 4GB memory for Container C, it monitors at a periodic interval on the memory usage of the Container C and eventually before it reaches 4GB, alert will be provided. Our proposed solution aims at carrying out desired action on the affected container, during such conditions. To ensure smooth operation, the user could choose the default action which can be carried on such conditions for e.g.: scaling, pause, stop and termination. Negotiation with the user can be made to handle any uncertain conditions for e.g.: no resources available at the moment based on request, abnormal behavior of containers, etc. Thus negotiation helps to overcome any issues on the deployment of containers. SLA monitoring and negotiation are required for the verification on deployment of container and ensures the smooth management. SLA monitoring we refer to the requirements specified by the user on the deployment of a container. Similarly, the resources are also monitored to ensure that the containers are not affected on performance. SLA monitoring ensures that the given container utilizes the resources as requested. SLA negotiation is also made on certain cases when required, for e.g., if the container consumes very less resource than requested over a long period of time. This is to ensure that the resource is not underutilized and to provide an optimal usage. Thus negotiation helps to manage resources as well as containers. IV. COMPARISON OF ALGORITHM This section explains in detail about our proposed and default scheduling algorithm. Default scheduling algorithm selects the resource based on the current trend of resource utilization. Fig. 3 represents the default scheduling algorithm. In this experiment, we have used four servers (Server1, Server2, Server3 and Server4). There are 3 containers deployed across each server. The total amount of CPU utilized across all the servers are 40, 30, 45 and 60 respectively. In this scenario, if there is new request for the deployment of container, default scheduling scheme chooses the server-2 based on the minimal utilization of the resources. Fig. 4. Proposed scheduler Fig. 4 explains our proposed scheduling algorithm. In the same scenario, where the server’s CPU is utilized as 40, 30, 45 and 60. When there is a new request for deployment of the container, our proposed algorithm chooses the server-1. Although Server-1’s current CPU utilization is more than that of the Server-2, it predicts the future load based on the requirements. Hence, this could help in identifying the optimal resource, minimizing the migration and improving the overall performance. Our proposed scheduling algorithm differs from the default scheduling algorithm. It identifies the resources based on the future utilization of resources. The differences between our proposed and default scheduling is tabulated as follows TABLE I. Comparison of scheduling algorithm Proposed algorithm Default scheduling algorithm a. Identify the resource list {Rlist } matching User requirements (Ur) from the total resource {Ri} Where i=1..n b. If Rlist > 1, then identify the maximum requirement of each container deployed across Rlist c. Identify total resource usage[TMaxcpu] = , where →Maximum value of request, → Container running on resource n→ Total number of Rlist m→ total number of containers deployed at a resource. d. Identify optimal resource Rd from Min{ TMaxcpu } e. Deploy container on Rd a. Identify the resource list {Rlist } matching User requirements (Ur) from the total resource {Ri} Where i=1..n b. If Rlist > 1, then identify the current least utilized resource Rleast c. Deploy container on Rleast Note: User requirements can be of any performance metrics. In our experiment, we have used CPU utilization. Fig. 3. Default scheduler
  • 4. V. PROPOSED ARCHITECTURE Our proposed architecture manages the advance scheduling of container across Kubernetes platform and the overall architecture is as follows. Request manger, Information collector, Policy manager, SLA Manager and Resource manager are the major components. Request Manager validates the container request and checks for the feasibility of deploying the requested number of containers. Information collector manages the complete information about all resources (Kubernetes cluster, containers) and updates in NoSQL based databases (e.g.: MONGO). It also records each container’s historic behavior. SLA Manager verify the container performance against the policy which has been updated by the policy manager. User can create and monitor their policy using Policy manager. Resource Manager is core component managing all other components and it also ensures secure communication across Kubernetes cluster. It aids in scheduling and identifies the best matched resources for the successful deployment of containers over Kubernetes cluster. It manages the resources based on the algorithm described in section IV. VI. ADVANTAGES OF PROPOSED SOLUTION Proposed solution analyze the future utilization on the targeted resource before the deployment which could minimize the migration of resource and ensure the smooth function of all applications or containers across the resources. Our solution is based on the approach of user specification and for the new users who don’t have any upfront information on specification, SLA negotiation helps in finding the optimal resources. However, it is recommended for the new user to provide the minimum requirement for the initial placement of containers. SLA based monitoring helps to verify against the commitment from both the provider and user. VII. CONCLUSION Our proposed solution could benefit any container orchestrator for effective scheduling of containers and improve application performance. We experimented our solution with CPU requirement, similarly it can span across any set of performance metrics. Our solution aims at minimizing the issues before and after the scheduling. Thus, it aids in minimizing the amount of migration or restart of containers. We also understand that it’s difficult for the user in specifying the performance upfront, hence in future we plan to predict the performance based on historic reference and create SLA policy accordingly. We also plan to expand our experiment with additional performance metrics over wide range of micro service applications. REFERENCES [1] A. J. Younge, R. Henschel, J. T. Brown, G. von Laszewski, J. Qiu and G. C. Fox, "Analysis of Virtualization Technologies for High Performance Computing Environments," 2011 IEEE 4th International Conference on Cloud Computing, Washington, DC, 2011, pp. 9-16. doi: 10.1109/CLOUD.2011.29 [2] S. G. Soriga and M. Barbulescu, "A comparison of the performance and scalability of Xen and KVM hypervisors," 2013 RoEduNet International Conference 12th Edition: Networking in Education and Research, Iasi, Romania, 2013, pp. 1-6. [3] J. P. Walters et al., "GPU Passthrough Performance: A Comparison of KVM, Xen, VMWare ESXi, and LXC for CUDA and OpenCL Applications," 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, 2014, pp. 636-643. [4] F. Faniyi and R. Bahsoon, “A Systematic Review of Service Level Management in the Cloud”, ACM Comput. Surv. 48, 3, Article 43 (December 2015), 27 pages. [5] D. Bernstein, "Containers and Cloud: From LXC to Docker to Kubernetes," in IEEE Cloud Computing, vol. 1, no. 3, pp. 81-84, 2014. [6] M. Raho, A. Spyridakis, M. Paolino and D. Raho, "KVM, Xen and Docker: A performance analysis for ARM based NFV and cloud computing," 2015 IEEE 3rd Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE), Riga, 2015, pp. 1-8. [7] T. Adufu, J. Choi and Y. Kim, “Is container-based technology a winner for high performance scientific applications?”, Network Operations and Management Symposium, 17th Asia-Pacific, Busan, 2015, pp. 507-510. [8] E. N. Preeth, F. J. P. Mulerickal, B. Paul and Y. Sastri, "Evaluation of Docker containers based on hardware utilization," 2015 International Conference on Control Communication & Computing India (ICCC), Trivandrum, 2015, pp. 697-700 [9] F. Paraiso, S. Challita, Y. Al-Dhuraibi, P. Merle. “Model-Driven Management of Docker Containers”, 9th IEEE International Conference on Cloud Computing (CLOUD), Jun 2016, San Francisco, United States. [10] A. Tosatto, P. Ruiu, A. Attanasio, “Container-based orchestration in cloud: State of the art and challenges”, in: Proc. of 9th Int'l Conf. on Complex, Intelligent, and Software Intensive Systems, CISIS '15, 2015, pp. 70-75 [11] D. Jaramillo, D. V. Nguyen and R. Smart, "Leveraging microservices architecture by using Docker technology," SoutheastCon 2016, Norfolk, VA, 2016, pp. 1-5. [12] N. Naik, "Building a virtual system of systems using docker swarm in multiple clouds," 2016 IEEE International Symposium on Systems Engineering (ISSE), Edinburgh, 2016, pp. 1-3. doi: 10.1109/SysEng.2016.7753148 [13] L. Abdollahi Vayghan, M. A. Saied, M. Toeroe and F. Khendek, "Deploying Microservice Based Applications with Kubernetes: Experiments and Lessons Learned," 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, 2018, pp. 970-973. [14] B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. D. Joseph, R. H. Katz, S. Shenker, and I. Stoica. “Mesos: A platform for fine-grained resource sharing in the data center”, In NSDI, volume 11, pages 22–22, 2011. [15] Marathon, [online]. Available: https://mesosphere.github.io/marathon. [Accessed: 09- June- 2019] Fig. 5. Proposed architecture